last executing test programs: 21m22.795846419s ago: executing program 0 (id=13123): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x7, 0x4, 0x80, 0xe, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x3e, &(0x7f0000000b40)="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", 0x0, 0x8001, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0xa00, 0xc8, 0x4, 0x0, 0xfffffffffffffe01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece"], 0x0}, 0x94) sendmsg$unix(r5, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1b) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1900000004000000040000000200020000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200000000000000000000000000000000000000000000002e0f6e82d559c5d89285aa5515513ba2e947603b83ed5bd526bdf94f27d77adb5431ff2446d3c0654542795aa87f46852a11ac62302db2aca173e40e"], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 21m21.66464391s ago: executing program 0 (id=13129): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x7, 0x4, 0x80, 0xe, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x3e, &(0x7f0000000b40)="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", 0x0, 0x8001, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0xa00, 0xc8, 0x4, 0x0, 0xfffffffffffffe01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece"], 0x0}, 0x94) sendmsg$unix(r5, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) 21m21.597960266s ago: executing program 0 (id=13131): bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000004e994008abe595e00000000000000000000000000000000ac16818e8b470eba0599048a5dba9854403c6a77a184be4876547e0f4c09d2b93497a6710a2a54c982366bb6b89c1876ce65af1574ed0f28885f2456ff1c2f6b752e"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], 0x0, 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r2, 0x8982, 0x20000500) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x4e}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="1e00004000120000005000002df0acd92e93529179c14230e8269e17d57a82f7df69650ec6c8111e5d20aef880d5d7f2d1cd6fe47bc02e5b08c98b35ca8c9a7964f45f0b427fa1aebf962f2796454c84b41061a29aadd10286941db10bc21cbaf827e43bffb5c0ab13370eb4651e2a00fbcf22fd9b782c4f60eb0b195e520ec1dc55fcc4efe28ba2989037f0f945842c9d0cd5df95c4664ae9617698b6937b0cae46b03053870cd4aa3b4cbc94512c42676ce8f32df2e6302789e65857eb95fd342af4badef2d75c11a3ef2fa2011285e4ec24c0815cd105e289df7418d4a342fdcc42", @ANYRES64], 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000028c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000e1e}, 0x50) openat$cgroup_int(r5, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="2d63707520a2fbfdbd963e6d6d64aa34d4236f3a28a3c4cecafd11885981b6388708f0789613be46592d079c548d646886"], 0x5) 21m20.512506923s ago: executing program 0 (id=13136): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a00000004000000dd0000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa10000000000000701"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x16, 0x4, &(0x7f0000000480)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="260a00002000000061116c0000000000180000000000000000000000000000009500000000000000323d383ebfa4c0dd5b990c1af957a166b635bc02e0f2ce14fb97b7e823248b079ef3"], &(0x7f0000000000)='GPL\x00'}, 0x80) 21m19.549285271s ago: executing program 0 (id=13138): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x3}, 0x0, 0xc8, 0x8, 0x8, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x4) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000880)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fefd000e40000200875a65969ff57b00000000000000000000000000ac"], 0xfe43) 21m19.498958735s ago: executing program 0 (id=13141): socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="0018110000000000000000000000000000000000e8f6f5518e1508f9a1efa98be4ff4cc4fc85318c2e4e9d72d24726f1b5271dedd3744c510c65bc5371b02ac8e65d188f538802253a658eefead1be04f926f64e322a16d01baa7b8400a9f4b5825e3c808472d4a94a5917deb16a7e6460ed35fcbf7c2dfde4bb338fe78818652c38682dda2fa474c9bbe7086870537cb1af2b", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000", @ANYRESHEX, @ANYBLOB="14050f521c3bd7d7f14c70a9ec84e91b40d9e890319a7862740f97bca3c38fa235697e1f", @ANYBLOB="00642cd3562c7422597213d8e7af72452533cf0007c34f17eaf8c8d5ce6c12c88bca754e85266e55af6614d1837702a17e6903af91fbe545c309a05a5cb2340e125e95d17e1a7e9431abdfa1da4366afbba9604222780c6052def808fd2b9aa23035ca916b694b5d1ca1a4b14179facc918657c4fdacc8d3d10ad21a0c36b1bd6ebcdd9615c42c63323826a15d1d612681f65a0a67e0bafd096945b3a9f3da16cd9833a0d02907812ae3888e3f01fe4199d43b4ab7c3f2091135a7ea47a220994ba123e15282a2278669284242e2c7be13c13bf763652c30ed8b624cc0f5e11e5b68c9c2a16dc1e2"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006000000"], 0x0, 0x8000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="feffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="181c0000090000", @ANYRESDEC=0x0, @ANYRESHEX, @ANYBLOB="d3598def88231aaa7b5723c204e2cb050116ac2600693c76f537abcdb2d411a3feb7921cc2cf33713632e2796a175941e40b97473542892574441191227c487d8e243d5e51729a1ecd45f676c443703032008936d5262d7d8517018d1833f4505dac54ffd54d99961c5fd47c744e5714eb1b8a21e67af2da503d70747ff6b0566ee116d794df538be1591697dbf1e2be9920769fdc2c8b688b380af0f84e5f6763f7acda11954abdc2e00bb1e10b75728442625544195de6a1c930f48778939cb40232cec2d8716344e220005c073c8ac71f89b37f44a882e8ad387c", @ANYRESDEC=r0, @ANYRES16=0x0], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000004c0)='ext4_evict_inode\x00', r1, 0x0, 0x4}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0xa, 0x2, 0x11, &(0x7f0000000040)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000faff0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[], 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r6) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000280)=0x7) 21m4.473453535s ago: executing program 32 (id=13141): socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="0018110000000000000000000000000000000000e8f6f5518e1508f9a1efa98be4ff4cc4fc85318c2e4e9d72d24726f1b5271dedd3744c510c65bc5371b02ac8e65d188f538802253a658eefead1be04f926f64e322a16d01baa7b8400a9f4b5825e3c808472d4a94a5917deb16a7e6460ed35fcbf7c2dfde4bb338fe78818652c38682dda2fa474c9bbe7086870537cb1af2b", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000", @ANYRESHEX, @ANYBLOB="14050f521c3bd7d7f14c70a9ec84e91b40d9e890319a7862740f97bca3c38fa235697e1f", @ANYBLOB="00642cd3562c7422597213d8e7af72452533cf0007c34f17eaf8c8d5ce6c12c88bca754e85266e55af6614d1837702a17e6903af91fbe545c309a05a5cb2340e125e95d17e1a7e9431abdfa1da4366afbba9604222780c6052def808fd2b9aa23035ca916b694b5d1ca1a4b14179facc918657c4fdacc8d3d10ad21a0c36b1bd6ebcdd9615c42c63323826a15d1d612681f65a0a67e0bafd096945b3a9f3da16cd9833a0d02907812ae3888e3f01fe4199d43b4ab7c3f2091135a7ea47a220994ba123e15282a2278669284242e2c7be13c13bf763652c30ed8b624cc0f5e11e5b68c9c2a16dc1e2"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006000000"], 0x0, 0x8000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="feffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="181c0000090000", @ANYRESDEC=0x0, @ANYRESHEX, @ANYBLOB="d3598def88231aaa7b5723c204e2cb050116ac2600693c76f537abcdb2d411a3feb7921cc2cf33713632e2796a175941e40b97473542892574441191227c487d8e243d5e51729a1ecd45f676c443703032008936d5262d7d8517018d1833f4505dac54ffd54d99961c5fd47c744e5714eb1b8a21e67af2da503d70747ff6b0566ee116d794df538be1591697dbf1e2be9920769fdc2c8b688b380af0f84e5f6763f7acda11954abdc2e00bb1e10b75728442625544195de6a1c930f48778939cb40232cec2d8716344e220005c073c8ac71f89b37f44a882e8ad387c", @ANYRESDEC=r0, @ANYRES16=0x0], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000004c0)='ext4_evict_inode\x00', r1, 0x0, 0x4}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0xa, 0x2, 0x11, &(0x7f0000000040)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000faff0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[], 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r6) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000280)=0x7) 22.965771703s ago: executing program 1 (id=22982): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1f000000}, @generic={0x2c}, @map_fd, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x609, 0xe, 0x0, &(0x7f0000000140)="dd80000000000000000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x7, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="170000000500000002000000000000000800", @ANYBLOB="0100000000000000", @ANYRES32, @ANYBLOB="040000000400"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000170000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x1102b0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x41, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2, 0x0, 0x8000000000000}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 18.315419787s ago: executing program 1 (id=22982): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1f000000}, @generic={0x2c}, @map_fd, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x609, 0xe, 0x0, &(0x7f0000000140)="dd80000000000000000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x7, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="170000000500000002000000000000000800", @ANYBLOB="0100000000000000", @ANYRES32, @ANYBLOB="040000000400"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000170000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x1102b0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x41, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2, 0x0, 0x8000000000000}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 14.30391327s ago: executing program 1 (id=22982): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1f000000}, @generic={0x2c}, @map_fd, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x609, 0xe, 0x0, &(0x7f0000000140)="dd80000000000000000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x7, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="170000000500000002000000000000000800", @ANYBLOB="0100000000000000", @ANYRES32, @ANYBLOB="040000000400"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000170000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x1102b0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x41, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2, 0x0, 0x8000000000000}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 8.805421562s ago: executing program 1 (id=22982): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1f000000}, @generic={0x2c}, @map_fd, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x609, 0xe, 0x0, &(0x7f0000000140)="dd80000000000000000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x7, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="170000000500000002000000000000000800", @ANYBLOB="0100000000000000", @ANYRES32, @ANYBLOB="040000000400"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000170000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x1102b0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x41, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2, 0x0, 0x8000000000000}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 5.761487267s ago: executing program 3 (id=23527): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESDEC=0x0], 0x0, 0x80, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x600e7180, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000fc0)={{0x1}, &(0x7f0000000f40), &(0x7f0000000f80)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r0, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x0, 0x63, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b00)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"/276], &(0x7f0000000a80)=""/76, 0x114, 0x4c, 0x0, 0xa512}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d00)={0xffffffffffffffff, 0x20, &(0x7f0000000cc0)={&(0x7f0000000bc0)=""/187, 0xbb, 0x0, &(0x7f0000000c80)=""/22, 0x16}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="1b0000000000000000000000f8ffffff00000000", @ANYRES32=0x1, @ANYBLOB="100f0000223d6c6792000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000000000000400"/28], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) close(r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 5.630419198s ago: executing program 2 (id=23531): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b00000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 5.528326706s ago: executing program 2 (id=23533): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000020001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x16, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000c80)={r0, &(0x7f0000000cc0), &(0x7f0000000bc0)=""/181}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r2, 0x0, 0x0) 5.401976066s ago: executing program 2 (id=23536): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESDEC=0x0], 0x0, 0x80, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x600e7180, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000fc0)={{0x1}, &(0x7f0000000f40), &(0x7f0000000f80)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r0, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x0, 0x63, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b00)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"/276], &(0x7f0000000a80)=""/76, 0x114, 0x4c, 0x0, 0xa512}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d00)={0xffffffffffffffff, 0x20, &(0x7f0000000cc0)={&(0x7f0000000bc0)=""/187, 0xbb, 0x0, &(0x7f0000000c80)=""/22, 0x16}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="1b0000000000000000000000f8ffffff00000000", @ANYRES32=0x1, @ANYBLOB="100f0000223d6c6792000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000000000000400"/28], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) close(r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) 4.459688122s ago: executing program 4 (id=23538): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x9d, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000400"/28], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0xd, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) close(r7) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{}, &(0x7f0000000a00), &(0x7f0000000a40)=r4}, 0x20) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="6ac100"/20, @ANYRES32=r0, @ANYRES32=r4, @ANYBLOB="050000000500f4ff0400080000000000000000000000000004000000"], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r9, 0x0, &(0x7f00000003c0)=""/158, 0x4}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x31) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r11, 0x0, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.22732368s ago: executing program 5 (id=23539): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x5e, 0x0, 0xff, 0x2, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffff}, 0x1f8c8, 0xc8, 0x0, 0x8, 0xfffffffffffffffe, 0x200, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0xffffffffffffffff, 0x101, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(r2) recvmsg$unix(r1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) 4.175098274s ago: executing program 5 (id=23540): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x9d, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000400"/28], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0xd, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) close(r7) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="10eb0000040000000400496c9f00000200000000000000", @ANYRES16=r1, @ANYBLOB="000000bed22cce7e198edd000000000000000000", @ANYRES8=r0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r9}, &(0x7f0000000a00), &(0x7f0000000a40)=r5}, 0x20) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r3) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="6ac100"/20, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB="050000000500f4ff0400080000000000000000000000000004000000"], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r10, 0x0, &(0x7f00000003c0)=""/158, 0x4}, 0x20) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x31) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r12, 0x0, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.895109587s ago: executing program 1 (id=22982): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1f000000}, @generic={0x2c}, @map_fd, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x609, 0xe, 0x0, &(0x7f0000000140)="dd80000000000000000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x7, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="170000000500000002000000000000000800", @ANYBLOB="0100000000000000", @ANYRES32, @ANYBLOB="040000000400"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000170000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x1102b0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x41, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2, 0x0, 0x8000000000000}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 1.849446152s ago: executing program 5 (id=23541): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 1.847275172s ago: executing program 3 (id=23542): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair(0x1d, 0x2, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)=@o_path={0x0, 0x0, 0x4018}, 0x18) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, 0x0, &(0x7f0000000480)='GPL\x00'}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0xb0}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 1.846576892s ago: executing program 4 (id=23543): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b00000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r0}, 0x18) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.834119033s ago: executing program 2 (id=23551): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000b108000000614200000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0xf, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000495"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000002000000008000000100000000000000", @ANYRES32, @ANYBLOB="0000000000200007000000060000008a00800000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000005c0), 0x12) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r9}, &(0x7f0000000000), &(0x7f0000000140)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.830809523s ago: executing program 5 (id=23544): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1f000000}, @generic={0x2c}, @map_fd, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x609, 0xe, 0x0, &(0x7f0000000140)="dd80000000000000000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x7, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="170000000500000002000000000000000800", @ANYBLOB="0100000000000000", @ANYRES32, @ANYBLOB="040000000400"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000170000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x1102b0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x41, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2, 0x0, 0x8000000000000}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 1.788059437s ago: executing program 4 (id=23545): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r3}, 0xc) 1.757198339s ago: executing program 3 (id=23546): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000020001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x16, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000c80)={r0, &(0x7f0000000cc0), &(0x7f0000000bc0)=""/181}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r2, 0x0, 0x0) 1.717532893s ago: executing program 4 (id=23547): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='rdma.current\x00', 0x26e1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000020001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000500)=[0x0, 0x0], &(0x7f0000000540)=[0x0], 0x0, 0x20, &(0x7f00000006c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x85, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x16, 0x5, &(0x7f0000000380)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}], &(0x7f00000003c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0x2, '\x00', r3, @flow_dissector=0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000a40)={0x1, 0x8, 0x7, 0x2}, 0x10, 0x0, r0, 0x4, &(0x7f0000000a80)=[r2], &(0x7f0000000ac0)=[{0x2, 0x2, 0xe, 0x6}, {0x2, 0x3, 0x9, 0xc}, {0x3, 0x1, 0x6, 0x7}, {0x2, 0x4, 0x5, 0x8}]}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x1, 0x0}, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x16, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r6, 0x0, 0x0) 1.717125583s ago: executing program 5 (id=23548): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x9d, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000400"/28], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0xd, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r8) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="10eb0000040000000400496c9f00000200000000000000", @ANYRES16=r1, @ANYBLOB="000000bed22cce7e198edd000000000000000000", @ANYRES8=r0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r9}, &(0x7f0000000a00), &(0x7f0000000a40)=r5}, 0x20) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="6ac100"/20, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB="050000000500f4ff0400080000000000000000000000000004000000"], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r10, 0x0, &(0x7f00000003c0)=""/158, 0x4}, 0x20) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x31) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r12, 0x0, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.667159217s ago: executing program 3 (id=23549): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0500000000f01f00810000007f00000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r2, 0x0, 0x0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.663171597s ago: executing program 4 (id=23550): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x5e, 0x0, 0xff, 0x2, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffff}, 0x1f8c8, 0xc8, 0x0, 0x8, 0xfffffffffffffffe, 0x200, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0xffffffffffffffff, 0x101, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) close(r2) recvmsg$unix(r1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) 1.554478346s ago: executing program 4 (id=23552): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESDEC=0x0], 0x0, 0x80, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x600e7180, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000fc0)={{0x1}, &(0x7f0000000f40), &(0x7f0000000f80)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r0, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x0, 0x63, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b00)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"/276], &(0x7f0000000a80)=""/76, 0x114, 0x4c, 0x0, 0xa512}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d00)={0xffffffffffffffff, 0x20, &(0x7f0000000cc0)={&(0x7f0000000bc0)=""/187, 0xbb, 0x0, &(0x7f0000000c80)=""/22, 0x16}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="1b0000000000000000000000f8ffffff00000000", @ANYRES32=0x1, @ANYBLOB="100f0000223d6c6792000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000000000000400"/28], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) close(r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) 1.302024416s ago: executing program 2 (id=23553): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x9d, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000400"/28], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0xd, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) close(r7) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="10eb0000040000000400496c9f00000200000000000000", @ANYRES16=r1, @ANYBLOB="000000bed22cce7e198edd000000000000000000", @ANYRES8=r0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r9}, &(0x7f0000000a00), &(0x7f0000000a40)=r5}, 0x20) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r3) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="6ac100"/20, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB="050000000500f4ff0400080000000000000000000000000004000000"], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r10, 0x0, &(0x7f00000003c0)=""/158, 0x4}, 0x20) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x31) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r12, 0x0, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 507.20207ms ago: executing program 2 (id=23554): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x9d, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000400"/28], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0xd, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) close(r7) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{}, &(0x7f0000000a00), &(0x7f0000000a40)=r4}, 0x20) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="6ac100"/20, @ANYRES32=r0, @ANYRES32=r4, @ANYBLOB="050000000500f4ff0400080000000000000000000000000004000000"], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r9, 0x0, &(0x7f00000003c0)=""/158, 0x4}, 0x20) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x31) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r11, 0x0, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 502.82888ms ago: executing program 5 (id=23564): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x9d, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = perf_event_open(&(0x7f0000000940)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000400"/28], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0xd, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r8) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="10eb0000040000000400496c9f00000200000000000000", @ANYRES16=r1, @ANYBLOB="000000bed22cce7e198edd000000000000000000", @ANYRES8=r0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r9}, &(0x7f0000000a00), &(0x7f0000000a40)=r5}, 0x20) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="6ac100"/20, @ANYRES32=r1, @ANYRES32=r5, @ANYBLOB="050000000500f4ff0400080000000000000000000000000004000000"], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r10, 0x0, &(0x7f00000003c0)=""/158, 0x4}, 0x20) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x31) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000000400007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70400000000000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r12, 0x0, 0x0, 0xfffffffffffffdf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 464.593923ms ago: executing program 3 (id=23555): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 365.989461ms ago: executing program 3 (id=23556): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b00000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r0}, 0x18) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 0s ago: executing program 1 (id=22982): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1f000000}, @generic={0x2c}, @map_fd, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x609, 0xe, 0x0, &(0x7f0000000140)="dd80000000000000000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x7, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="170000000500000002000000000000000800", @ANYBLOB="0100000000000000", @ANYRES32, @ANYBLOB="040000000400"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000170000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x1102b0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x41, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0x8}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2, 0x0, 0x8000000000000}, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) kernel console output (not intermixed with test programs): ] ? file_end_write+0x1b0/0x1b0 [ 2770.004384][T30925] ? __sanitizer_cov_trace_const_cmp8+0x1/0x80 [ 2770.010571][T30925] ? __fdget_pos+0x1f7/0x380 [ 2770.015164][T30925] ? ksys_write+0x71/0x240 [ 2770.019582][T30925] ksys_write+0x140/0x240 [ 2770.023910][T30925] ? __ia32_sys_read+0x90/0x90 [ 2770.028766][T30925] __x64_sys_write+0x7b/0x90 [ 2770.033357][T30925] x64_sys_call+0x8ef/0x9a0 [ 2770.037860][T30925] do_syscall_64+0x4c/0xa0 [ 2770.042278][T30925] ? clear_bhb_loop+0x50/0xa0 [ 2770.046953][T30925] ? clear_bhb_loop+0x50/0xa0 [ 2770.051637][T30925] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2770.057536][T30925] RIP: 0033:0x7f89f79d7be9 [ 2770.061952][T30925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2770.081571][T30925] RSP: 002b:00007f89f6440038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2770.089994][T30925] RAX: ffffffffffffffda RBX: 00007f89f7bfefa0 RCX: 00007f89f79d7be9 [ 2770.098081][T30925] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 2770.106150][T30925] RBP: 00007f89f6440090 R08: 0000000000000000 R09: 0000000000000000 [ 2770.114133][T30925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2770.122106][T30925] R13: 00007f89f7bff038 R14: 00007f89f7bfefa0 R15: 00007fffe8027ac8 [ 2770.130090][T30925] [ 2770.300762][T30937] device syzkaller0 entered promiscuous mode [ 2770.776529][T30955] device syzkaller0 entered promiscuous mode [ 2770.816082][T30957] bond_slave_1: mtu less than device minimum [ 2770.918685][T30967] FAULT_INJECTION: forcing a failure. [ 2770.918685][T30967] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2770.943882][T30967] CPU: 0 PID: 30967 Comm: syz.1.22445 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2770.954263][T30967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2770.964441][T30967] Call Trace: [ 2770.967736][T30967] [ 2770.970680][T30967] __dump_stack+0x21/0x30 [ 2770.975053][T30967] dump_stack_lvl+0xee/0x150 [ 2770.979670][T30967] ? show_regs_print_info+0x20/0x20 [ 2770.984895][T30967] ? kstrtouint_from_user+0x1a0/0x200 [ 2770.990300][T30967] dump_stack+0x15/0x20 [ 2770.994481][T30967] should_fail+0x3c1/0x510 [ 2770.998927][T30967] should_fail_usercopy+0x1a/0x20 [ 2771.003982][T30967] _copy_from_user+0x20/0xd0 [ 2771.008619][T30967] ___sys_recvmsg+0x129/0x4f0 [ 2771.013331][T30967] ? proc_fail_nth_read+0x210/0x210 [ 2771.018836][T30967] ? __sys_recvmsg+0x250/0x250 [ 2771.023640][T30967] ? vfs_write+0xc17/0xf70 [ 2771.028268][T30967] ? __fdget+0x1a1/0x230 [ 2771.032548][T30967] __x64_sys_recvmsg+0x1df/0x2a0 [ 2771.037522][T30967] ? ___sys_recvmsg+0x4f0/0x4f0 [ 2771.042397][T30967] ? ksys_write+0x1eb/0x240 [ 2771.046929][T30967] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 2771.053029][T30967] x64_sys_call+0x705/0x9a0 [ 2771.057556][T30967] do_syscall_64+0x4c/0xa0 [ 2771.062000][T30967] ? clear_bhb_loop+0x50/0xa0 [ 2771.066703][T30967] ? clear_bhb_loop+0x50/0xa0 [ 2771.071411][T30967] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2771.077337][T30967] RIP: 0033:0x7f89f79d7be9 [ 2771.081774][T30967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2771.101412][T30967] RSP: 002b:00007f89f641f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 2771.109944][T30967] RAX: ffffffffffffffda RBX: 00007f89f7bff090 RCX: 00007f89f79d7be9 [ 2771.118028][T30967] RDX: 0000000040000100 RSI: 0000200000001140 RDI: 0000000000000006 [ 2771.126126][T30967] RBP: 00007f89f641f090 R08: 0000000000000000 R09: 0000000000000000 [ 2771.134126][T30967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2771.142136][T30967] R13: 00007f89f7bff128 R14: 00007f89f7bff090 R15: 00007fffe8027ac8 [ 2771.150146][T30967] [ 2772.419719][T30996] FAULT_INJECTION: forcing a failure. [ 2772.419719][T30996] name failslab, interval 1, probability 0, space 0, times 0 [ 2772.434670][T30996] CPU: 1 PID: 30996 Comm: syz.2.22453 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2772.445057][T30996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2772.455139][T30996] Call Trace: [ 2772.458442][T30996] [ 2772.461400][T30996] __dump_stack+0x21/0x30 [ 2772.465773][T30996] dump_stack_lvl+0xee/0x150 [ 2772.470394][T30996] ? show_regs_print_info+0x20/0x20 [ 2772.475630][T30996] ? avc_has_perm+0x158/0x240 [ 2772.480340][T30996] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 2772.486180][T30996] dump_stack+0x15/0x20 [ 2772.490371][T30996] should_fail+0x3c1/0x510 [ 2772.494825][T30996] __should_failslab+0xa4/0xe0 [ 2772.499617][T30996] should_failslab+0x9/0x20 [ 2772.504149][T30996] slab_pre_alloc_hook+0x3b/0xe0 [ 2772.509115][T30996] ? sock_alloc_inode+0x1b/0xb0 [ 2772.513992][T30996] kmem_cache_alloc+0x44/0x260 [ 2772.519053][T30996] ? sockfs_init_fs_context+0xb0/0xb0 [ 2772.524564][T30996] sock_alloc_inode+0x1b/0xb0 [ 2772.529362][T30996] ? sockfs_init_fs_context+0xb0/0xb0 [ 2772.534769][T30996] new_inode_pseudo+0x62/0x210 [ 2772.539569][T30996] __sock_create+0x12c/0x7a0 [ 2772.544193][T30996] __sys_socketpair+0x218/0x590 [ 2772.549072][T30996] __x64_sys_socketpair+0x9b/0xb0 [ 2772.554128][T30996] x64_sys_call+0x36/0x9a0 [ 2772.558570][T30996] do_syscall_64+0x4c/0xa0 [ 2772.563020][T30996] ? clear_bhb_loop+0x50/0xa0 [ 2772.567726][T30996] ? clear_bhb_loop+0x50/0xa0 [ 2772.572434][T30996] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2772.578387][T30996] RIP: 0033:0x7ff93fb46be9 [ 2772.582840][T30996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2772.602691][T30996] RSP: 002b:00007ff93e58e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 2772.611121][T30996] RAX: ffffffffffffffda RBX: 00007ff93fd6e090 RCX: 00007ff93fb46be9 [ 2772.619213][T30996] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 2772.627339][T30996] RBP: 00007ff93e58e090 R08: 0000000000000000 R09: 0000000000000000 [ 2772.635337][T30996] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 2772.643331][T30996] R13: 00007ff93fd6e128 R14: 00007ff93fd6e090 R15: 00007ffeac13c598 [ 2772.651312][T30996] [ 2772.673179][T30996] socket: no more sockets [ 2772.715881][T31001] device syzkaller0 entered promiscuous mode [ 2772.932072][T31007] device syzkaller0 entered promiscuous mode [ 2772.944445][T31009] bond_slave_1: mtu less than device minimum [ 2772.992589][T31013] device syzkaller0 entered promiscuous mode [ 2774.624684][T31040] device syzkaller0 entered promiscuous mode [ 2775.074082][T31051] device syzkaller0 entered promiscuous mode [ 2776.429110][T31091] device syzkaller0 entered promiscuous mode [ 2776.844887][T31109] device syzkaller0 entered promiscuous mode [ 2777.197939][T31114] device syzkaller0 entered promiscuous mode [ 2778.599071][T31148] device syzkaller0 entered promiscuous mode [ 2779.228888][T31191] device pim6reg1 entered promiscuous mode [ 2779.277087][T31190] device pim6reg1 entered promiscuous mode [ 2779.429612][T31197] device syzkaller0 entered promiscuous mode [ 2779.735895][T31209] device syzkaller0 entered promiscuous mode [ 2779.884463][T31221] FAULT_INJECTION: forcing a failure. [ 2779.884463][T31221] name failslab, interval 1, probability 0, space 0, times 0 [ 2779.900824][T31221] CPU: 0 PID: 31221 Comm: syz.2.22536 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2779.911235][T31221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2779.921314][T31221] Call Trace: [ 2779.924599][T31221] [ 2779.927533][T31221] __dump_stack+0x21/0x30 [ 2779.931875][T31221] dump_stack_lvl+0xee/0x150 [ 2779.936464][T31221] ? show_regs_print_info+0x20/0x20 [ 2779.941692][T31221] dump_stack+0x15/0x20 [ 2779.945850][T31221] should_fail+0x3c1/0x510 [ 2779.950267][T31221] __should_failslab+0xa4/0xe0 [ 2779.955036][T31221] should_failslab+0x9/0x20 [ 2779.959540][T31221] slab_pre_alloc_hook+0x3b/0xe0 [ 2779.964484][T31221] ? __d_alloc+0x2d/0x6a0 [ 2779.968831][T31221] kmem_cache_alloc+0x44/0x260 [ 2779.973870][T31221] __d_alloc+0x2d/0x6a0 [ 2779.978025][T31221] d_alloc_parallel+0xd6/0x1320 [ 2779.982876][T31221] ? irqentry_exit+0x37/0x40 [ 2779.987466][T31221] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 2779.993363][T31221] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 2779.999521][T31221] ? irqentry_exit+0x37/0x40 [ 2780.004122][T31221] ? d_hash_and_lookup+0x1f0/0x1f0 [ 2780.009228][T31221] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 2780.015453][T31221] path_openat+0x958/0x2f10 [ 2780.019962][T31221] ? do_syscall_64+0x4c/0xa0 [ 2780.024560][T31221] ? do_filp_open+0x3e0/0x3e0 [ 2780.029351][T31221] ? do_sys_openat2+0x137/0x7b0 [ 2780.034224][T31221] do_filp_open+0x1b3/0x3e0 [ 2780.038740][T31221] ? vfs_tmpfile+0x2d0/0x2d0 [ 2780.043352][T31221] do_sys_openat2+0x14c/0x7b0 [ 2780.048054][T31221] ? do_sys_open+0xe0/0xe0 [ 2780.052573][T31221] ? kvm_sched_clock_read+0x18/0x40 [ 2780.057816][T31221] ? sched_clock+0x9/0x10 [ 2780.062150][T31221] ? sched_clock_cpu+0x18/0x3c0 [ 2780.067005][T31221] __x64_sys_openat+0x136/0x160 [ 2780.071871][T31221] x64_sys_call+0x219/0x9a0 [ 2780.076379][T31221] do_syscall_64+0x4c/0xa0 [ 2780.080974][T31221] ? clear_bhb_loop+0x50/0xa0 [ 2780.085655][T31221] ? clear_bhb_loop+0x50/0xa0 [ 2780.090337][T31221] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2780.096232][T31221] RIP: 0033:0x7ff93fb46be9 [ 2780.100745][T31221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2780.120445][T31221] RSP: 002b:00007ff93e5af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2780.128859][T31221] RAX: ffffffffffffffda RBX: 00007ff93fd6dfa0 RCX: 00007ff93fb46be9 [ 2780.136830][T31221] RDX: 00000000000026e1 RSI: 0000200000000380 RDI: ffffffffffffff9c [ 2780.144802][T31221] RBP: 00007ff93e5af090 R08: 0000000000000000 R09: 0000000000000000 [ 2780.152771][T31221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2780.160745][T31221] R13: 00007ff93fd6e038 R14: 00007ff93fd6dfa0 R15: 00007ffeac13c598 [ 2780.168742][T31221] [ 2780.514177][T31241] device syzkaller0 entered promiscuous mode [ 2780.892494][T31255] device syzkaller0 entered promiscuous mode [ 2780.961193][T31261] FAULT_INJECTION: forcing a failure. [ 2780.961193][T31261] name failslab, interval 1, probability 0, space 0, times 0 [ 2781.073204][T31261] CPU: 0 PID: 31261 Comm: syz.5.22548 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2781.083680][T31261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2781.093771][T31261] Call Trace: [ 2781.097067][T31261] [ 2781.100020][T31261] __dump_stack+0x21/0x30 [ 2781.104373][T31261] dump_stack_lvl+0xee/0x150 [ 2781.108988][T31261] ? show_regs_print_info+0x20/0x20 [ 2781.114295][T31261] ? __stack_depot_save+0x34/0x480 [ 2781.119434][T31261] dump_stack+0x15/0x20 [ 2781.123612][T31261] should_fail+0x3c1/0x510 [ 2781.128046][T31261] __should_failslab+0xa4/0xe0 [ 2781.132832][T31261] should_failslab+0x9/0x20 [ 2781.137358][T31261] slab_pre_alloc_hook+0x3b/0xe0 [ 2781.142323][T31261] kmem_cache_alloc_trace+0x48/0x270 [ 2781.147633][T31261] ? __get_vm_area_node+0x11d/0x350 [ 2781.152852][T31261] __get_vm_area_node+0x11d/0x350 [ 2781.157906][T31261] __vmalloc_node_range+0xdf/0xaf0 [ 2781.163036][T31261] ? sock_hash_alloc+0x2bc/0x540 [ 2781.168105][T31261] bpf_map_area_alloc+0xd5/0xe0 [ 2781.172969][T31261] ? sock_hash_alloc+0x2bc/0x540 [ 2781.177911][T31261] sock_hash_alloc+0x2bc/0x540 [ 2781.182704][T31261] map_create+0x455/0x21b0 [ 2781.187136][T31261] __sys_bpf+0x2cf/0x730 [ 2781.191489][T31261] ? bpf_link_show_fdinfo+0x310/0x310 [ 2781.196871][T31261] ? debug_smp_processor_id+0x17/0x20 [ 2781.202346][T31261] __x64_sys_bpf+0x7c/0x90 [ 2781.206774][T31261] x64_sys_call+0x4b9/0x9a0 [ 2781.211280][T31261] do_syscall_64+0x4c/0xa0 [ 2781.215708][T31261] ? clear_bhb_loop+0x50/0xa0 [ 2781.220408][T31261] ? clear_bhb_loop+0x50/0xa0 [ 2781.225086][T31261] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2781.230980][T31261] RIP: 0033:0x7fce07ac0be9 [ 2781.235396][T31261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2781.255002][T31261] RSP: 002b:00007fce06529038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2781.263427][T31261] RAX: ffffffffffffffda RBX: 00007fce07ce7fa0 RCX: 00007fce07ac0be9 [ 2781.271397][T31261] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 0000000000000000 [ 2781.279365][T31261] RBP: 00007fce06529090 R08: 0000000000000000 R09: 0000000000000000 [ 2781.287422][T31261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2781.295392][T31261] R13: 00007fce07ce8038 R14: 00007fce07ce7fa0 R15: 00007ffc46626398 [ 2781.303727][T31261] [ 2781.848535][T31288] device syzkaller0 entered promiscuous mode [ 2782.696789][T31322] device sit0 left promiscuous mode [ 2782.843849][T31331] device sit0 entered promiscuous mode [ 2782.980787][T31330] device sit0 left promiscuous mode [ 2783.070453][T31335] device sit0 entered promiscuous mode [ 2783.231096][T31352] device pim6reg1 entered promiscuous mode [ 2783.367855][T31363] device sit0 entered promiscuous mode [ 2783.488541][T31368] device pim6reg1 entered promiscuous mode [ 2783.596078][T31371] device sit0 left promiscuous mode [ 2783.881081][T31373] device sit0 entered promiscuous mode [ 2783.966484][T31378] device veth0_vlan left promiscuous mode [ 2783.974867][T31378] device veth0_vlan entered promiscuous mode [ 2784.290292][T31394] device syzkaller0 entered promiscuous mode [ 2784.481105][T31397] device syzkaller0 entered promiscuous mode [ 2784.773800][T31408] device syzkaller0 entered promiscuous mode [ 2785.002973][T31413] device sit0 left promiscuous mode [ 2785.083653][T31419] device pim6reg1 entered promiscuous mode [ 2785.095111][T31418] device sit0 left promiscuous mode [ 2785.199724][T31423] device sit0 entered promiscuous mode [ 2785.323862][T31425] device sit0 entered promiscuous mode [ 2785.871317][T31460] device syzkaller0 entered promiscuous mode [ 2786.103027][T31469] device sit0 entered promiscuous mode [ 2786.965293][T31502] device sit0 left promiscuous mode [ 2787.109667][T31505] device sit0 entered promiscuous mode [ 2787.838895][T31558] device syzkaller0 entered promiscuous mode [ 2788.547629][T31604] device syzkaller0 entered promiscuous mode [ 2789.579780][T31655] FAULT_INJECTION: forcing a failure. [ 2789.579780][T31655] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2789.593186][T31655] CPU: 1 PID: 31655 Comm: syz.4.22696 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2789.603549][T31655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2789.613623][T31655] Call Trace: [ 2789.616908][T31655] [ 2789.619848][T31655] __dump_stack+0x21/0x30 [ 2789.624188][T31655] dump_stack_lvl+0xee/0x150 [ 2789.628789][T31655] ? show_regs_print_info+0x20/0x20 [ 2789.633998][T31655] ? __activate_page+0xd40/0xd40 [ 2789.638946][T31655] dump_stack+0x15/0x20 [ 2789.643163][T31655] should_fail+0x3c1/0x510 [ 2789.647591][T31655] should_fail_usercopy+0x1a/0x20 [ 2789.652617][T31655] copy_page_from_iter_atomic+0x3fb/0x1350 [ 2789.658516][T31655] ? pipe_zero+0x370/0x370 [ 2789.662940][T31655] generic_perform_write+0x307/0x670 [ 2789.668238][T31655] ? grab_cache_page_write_begin+0xb0/0xb0 [ 2789.674050][T31655] ? file_remove_privs+0x590/0x590 [ 2789.679174][T31655] ? rwsem_write_trylock+0x130/0x300 [ 2789.684479][T31655] ? bpf_get_current_cgroup_id+0xa3/0xb0 [ 2789.690134][T31655] ? clear_nonspinnable+0x60/0x60 [ 2789.695171][T31655] ? avc_policy_seqno+0x1b/0x70 [ 2789.700028][T31655] __generic_file_write_iter+0x268/0x480 [ 2789.705804][T31655] generic_file_write_iter+0xa9/0x1d0 [ 2789.711202][T31655] vfs_write+0x802/0xf70 [ 2789.715465][T31655] ? file_end_write+0x1b0/0x1b0 [ 2789.720326][T31655] ? wait_for_completion_killable_timeout+0x10/0x10 [ 2789.726917][T31655] ? __fget_files+0x2c4/0x320 [ 2789.731605][T31655] ? __fdget_pos+0x2d2/0x380 [ 2789.736202][T31655] ? ksys_write+0x71/0x240 [ 2789.740854][T31655] ksys_write+0x140/0x240 [ 2789.745200][T31655] ? __ia32_sys_read+0x90/0x90 [ 2789.749990][T31655] ? debug_smp_processor_id+0x17/0x20 [ 2789.755377][T31655] __x64_sys_write+0x7b/0x90 [ 2789.759998][T31655] x64_sys_call+0x8ef/0x9a0 [ 2789.764550][T31655] do_syscall_64+0x4c/0xa0 [ 2789.768998][T31655] ? clear_bhb_loop+0x50/0xa0 [ 2789.773684][T31655] ? clear_bhb_loop+0x50/0xa0 [ 2789.778366][T31655] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2789.784264][T31655] RIP: 0033:0x7f5b84132be9 [ 2789.788686][T31655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2789.808304][T31655] RSP: 002b:00007f5b82b9b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2789.816733][T31655] RAX: ffffffffffffffda RBX: 00007f5b84359fa0 RCX: 00007f5b84132be9 [ 2789.824714][T31655] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000006 [ 2789.832697][T31655] RBP: 00007f5b82b9b090 R08: 0000000000000000 R09: 0000000000000000 [ 2789.840680][T31655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2789.848660][T31655] R13: 00007f5b8435a038 R14: 00007f5b84359fa0 R15: 00007ffc00ad7298 [ 2789.856650][T31655] [ 2790.072362][T31681] device syzkaller0 entered promiscuous mode [ 2790.598516][T31695] device wg2 left promiscuous mode [ 2790.686391][T31696] device wg2 entered promiscuous mode [ 2790.864385][T31705] device wg2 left promiscuous mode [ 2790.961878][T31713] device syzkaller0 entered promiscuous mode [ 2791.185400][T31722] device pim6reg1 entered promiscuous mode [ 2792.417132][T31760] device syzkaller0 entered promiscuous mode [ 2792.684746][T31769] device pim6reg1 entered promiscuous mode [ 2793.643802][T31804] device syzkaller0 entered promiscuous mode [ 2794.069877][T31834] device syzkaller0 entered promiscuous mode [ 2795.319032][T31874] device syzkaller0 entered promiscuous mode [ 2795.644679][T31886] device wg2 left promiscuous mode [ 2795.702986][T31886] device wg2 entered promiscuous mode [ 2795.845200][T31896] device syzkaller0 entered promiscuous mode [ 2796.612979][T31914] device syzkaller0 entered promiscuous mode [ 2796.894879][T31926] device sit0 left promiscuous mode [ 2796.920829][T31926] device sit0 entered promiscuous mode [ 2797.609875][T31960] device syzkaller0 entered promiscuous mode [ 2798.531213][T31979] device syzkaller0 entered promiscuous mode [ 2798.717937][T31990] FAULT_INJECTION: forcing a failure. [ 2798.717937][T31990] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2798.749567][T31990] CPU: 0 PID: 31990 Comm: syz.1.22822 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2798.760081][T31990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2798.770141][T31990] Call Trace: [ 2798.773636][T31990] [ 2798.776582][T31990] __dump_stack+0x21/0x30 [ 2798.780921][T31990] dump_stack_lvl+0xee/0x150 [ 2798.785600][T31990] ? show_regs_print_info+0x20/0x20 [ 2798.790813][T31990] ? page_counter_try_charge+0x3a0/0x3d0 [ 2798.796468][T31990] dump_stack+0x15/0x20 [ 2798.800624][T31990] should_fail+0x3c1/0x510 [ 2798.805041][T31990] should_fail_alloc_page+0x55/0x80 [ 2798.810257][T31990] prepare_alloc_pages+0x156/0x600 [ 2798.815559][T31990] ? __alloc_pages_bulk+0xab0/0xab0 [ 2798.820783][T31990] ? flush_tlb_one_user+0x50/0x50 [ 2798.825899][T31990] ? cgroup_rstat_updated+0xf5/0x370 [ 2798.831211][T31990] __alloc_pages+0x10a/0x440 [ 2798.835813][T31990] ? prep_new_page+0x110/0x110 [ 2798.840833][T31990] wp_page_copy+0x1c9/0x18f0 [ 2798.845609][T31990] ? arch_stack_walk+0xee/0x140 [ 2798.850746][T31990] ? insert_page_into_pte_locked+0x310/0x310 [ 2798.856742][T31990] ? _raw_spin_lock+0x8e/0xe0 [ 2798.861465][T31990] ? _raw_spin_trylock_bh+0x130/0x130 [ 2798.866840][T31990] ? vm_normal_page+0x1dd/0x1f0 [ 2798.871690][T31990] do_wp_page+0x731/0xc90 [ 2798.876034][T31990] ? kvmalloc_node+0x206/0x300 [ 2798.880807][T31990] handle_pte_fault+0x73c/0x2680 [ 2798.885750][T31990] ? sched_clock_cpu+0x18/0x3c0 [ 2798.890608][T31990] ? fault_around_bytes_set+0xc0/0xc0 [ 2798.896009][T31990] ? __set_page_owner+0x2c2/0x2e0 [ 2798.901036][T31990] do_handle_mm_fault+0x1a6d/0x1d50 [ 2798.906257][T31990] ? prep_new_page+0x3b/0x110 [ 2798.910958][T31990] ? numa_migrate_prep+0xd0/0xd0 [ 2798.915995][T31990] ? __find_vma+0x30/0x150 [ 2798.920417][T31990] do_user_addr_fault+0x841/0x1180 [ 2798.925537][T31990] ? do_kern_addr_fault+0x80/0x80 [ 2798.930743][T31990] ? kasan_poison+0x62/0x70 [ 2798.935246][T31990] ? __kasan_kmalloc_large+0xa4/0xb0 [ 2798.940555][T31990] ? __kasan_check_write+0x14/0x20 [ 2798.945670][T31990] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 2798.951131][T31990] ? _raw_spin_lock+0xe0/0xe0 [ 2798.955807][T31990] ? kmalloc_order_trace+0x18/0xb0 [ 2798.960978][T31990] exc_page_fault+0x51/0xb0 [ 2798.965499][T31990] asm_exc_page_fault+0x27/0x30 [ 2798.970367][T31990] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 2798.976973][T31990] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 2798.996783][T31990] RSP: 0018:ffffc90000c67ce0 EFLAGS: 00050206 [ 2799.002964][T31990] RAX: ffffffff824bef01 RBX: 000000000000b161 RCX: 00000000000098e1 [ 2799.010945][T31990] RDX: 000000000000b161 RSI: ffff888121371880 RDI: 0000200000003000 [ 2799.018916][T31990] RBP: ffffc90000c67d10 R08: 0000000000000001 R09: 0000000000000000 [ 2799.026898][T31990] R10: ffffed102426f62c R11: 0000000000001628 R12: 00007ffffffff000 [ 2799.034885][T31990] R13: 000020000000c8e1 R14: ffff888121370000 R15: 0000200000001780 [ 2799.042967][T31990] ? _copy_to_user+0x1/0x90 [ 2799.047483][T31990] ? _copy_to_user+0x78/0x90 [ 2799.052072][T31990] map_lookup_and_delete_elem+0x724/0x8c0 [ 2799.057810][T31990] __sys_bpf+0x4d5/0x730 [ 2799.062223][T31990] ? bpf_link_show_fdinfo+0x310/0x310 [ 2799.067693][T31990] ? debug_smp_processor_id+0x17/0x20 [ 2799.073119][T31990] __x64_sys_bpf+0x7c/0x90 [ 2799.077552][T31990] x64_sys_call+0x4b9/0x9a0 [ 2799.082065][T31990] do_syscall_64+0x4c/0xa0 [ 2799.086514][T31990] ? clear_bhb_loop+0x50/0xa0 [ 2799.091197][T31990] ? clear_bhb_loop+0x50/0xa0 [ 2799.095899][T31990] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2799.101812][T31990] RIP: 0033:0x7f89f79d7be9 [ 2799.106340][T31990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2799.125956][T31990] RSP: 002b:00007f89f6440038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2799.134377][T31990] RAX: ffffffffffffffda RBX: 00007f89f7bfefa0 RCX: 00007f89f79d7be9 [ 2799.142464][T31990] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 2799.150443][T31990] RBP: 00007f89f6440090 R08: 0000000000000000 R09: 0000000000000000 [ 2799.158430][T31990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2799.166400][T31990] R13: 00007f89f7bff038 R14: 00007f89f7bfefa0 R15: 00007fffe8027ac8 [ 2799.174396][T31990] [ 2799.349148][T31998] device syzkaller0 entered promiscuous mode [ 2799.544715][T32000] device wg2 entered promiscuous mode [ 2799.801226][T32003] device veth0_vlan left promiscuous mode [ 2799.848850][T32003] device veth0_vlan entered promiscuous mode [ 2800.277189][T32018] FAULT_INJECTION: forcing a failure. [ 2800.277189][T32018] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2800.302102][T32018] CPU: 1 PID: 32018 Comm: syz.2.22833 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2800.313284][T32018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2800.323519][T32018] Call Trace: [ 2800.326843][T32018] [ 2800.329881][T32018] __dump_stack+0x21/0x30 [ 2800.334220][T32018] dump_stack_lvl+0xee/0x150 [ 2800.338823][T32018] ? show_regs_print_info+0x20/0x20 [ 2800.344025][T32018] dump_stack+0x15/0x20 [ 2800.348365][T32018] should_fail+0x3c1/0x510 [ 2800.352802][T32018] should_fail_usercopy+0x1a/0x20 [ 2800.357830][T32018] _copy_from_iter+0x21a/0x1050 [ 2800.362691][T32018] ? kasan_quarantine_put+0x34/0x190 [ 2800.368068][T32018] ? copy_mc_pipe_to_iter+0x770/0x770 [ 2800.373449][T32018] ? pskb_expand_head+0x36c/0x11d0 [ 2800.378583][T32018] ? check_stack_object+0x81/0x140 [ 2800.383708][T32018] ? __kasan_check_read+0x11/0x20 [ 2800.388739][T32018] ? __check_object_size+0x2f4/0x3c0 [ 2800.394032][T32018] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 2800.399862][T32018] tun_get_user+0xc3c/0x33c0 [ 2800.404469][T32018] ? __kasan_unpoison_object_data+0x1/0x20 [ 2800.410299][T32018] ? kmem_cache_free+0x100/0x320 [ 2800.415247][T32018] ? tun_do_read+0x1c40/0x1c40 [ 2800.420026][T32018] ? kstrtouint_from_user+0x1a0/0x200 [ 2800.425410][T32018] ? kstrtol_from_user+0x260/0x260 [ 2800.430520][T32018] ? putname+0x111/0x160 [ 2800.434763][T32018] ? avc_policy_seqno+0x1b/0x70 [ 2800.439619][T32018] ? selinux_file_permission+0x2aa/0x510 [ 2800.445260][T32018] tun_chr_write_iter+0x1eb/0x2e0 [ 2800.450293][T32018] vfs_write+0x802/0xf70 [ 2800.454551][T32018] ? file_end_write+0x1b0/0x1b0 [ 2800.459407][T32018] ? __fget_files+0x2c4/0x320 [ 2800.464090][T32018] ? __fdget_pos+0x1f7/0x380 [ 2800.468679][T32018] ? ksys_write+0x71/0x240 [ 2800.473107][T32018] ksys_write+0x140/0x240 [ 2800.477437][T32018] ? __ia32_sys_read+0x90/0x90 [ 2800.482208][T32018] ? debug_smp_processor_id+0x17/0x20 [ 2800.487608][T32018] __x64_sys_write+0x7b/0x90 [ 2800.492397][T32018] x64_sys_call+0x8ef/0x9a0 [ 2800.496952][T32018] do_syscall_64+0x4c/0xa0 [ 2800.501476][T32018] ? clear_bhb_loop+0x50/0xa0 [ 2800.506161][T32018] ? clear_bhb_loop+0x50/0xa0 [ 2800.510843][T32018] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2800.516742][T32018] RIP: 0033:0x7ff93fb46be9 [ 2800.521206][T32018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2800.541222][T32018] RSP: 002b:00007ff93e5af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2800.549728][T32018] RAX: ffffffffffffffda RBX: 00007ff93fd6dfa0 RCX: 00007ff93fb46be9 [ 2800.557726][T32018] RDX: 000000000000ffbf RSI: 0000000000000000 RDI: 0000000000000003 [ 2800.565715][T32018] RBP: 00007ff93e5af090 R08: 0000000000000000 R09: 0000000000000000 [ 2800.573970][T32018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2800.581957][T32018] R13: 00007ff93fd6e038 R14: 00007ff93fd6dfa0 R15: 00007ffeac13c598 [ 2800.590029][T32018] [ 2800.725038][T32025] device syzkaller0 entered promiscuous mode [ 2801.866645][T32051] FAULT_INJECTION: forcing a failure. [ 2801.866645][T32051] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2801.890532][T32051] CPU: 0 PID: 32051 Comm: syz.5.22845 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2801.900967][T32051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2801.911320][T32051] Call Trace: [ 2801.914623][T32051] [ 2801.917573][T32051] __dump_stack+0x21/0x30 [ 2801.921932][T32051] dump_stack_lvl+0xee/0x150 [ 2801.926550][T32051] ? show_regs_print_info+0x20/0x20 [ 2801.931766][T32051] ? __this_cpu_preempt_check+0x13/0x20 [ 2801.937345][T32051] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 2801.943881][T32051] dump_stack+0x15/0x20 [ 2801.948061][T32051] should_fail+0x3c1/0x510 [ 2801.952588][T32051] should_fail_usercopy+0x1a/0x20 [ 2801.957719][T32051] _copy_from_user+0x20/0xd0 [ 2801.962342][T32051] iovec_from_user+0x1bc/0x2f0 [ 2801.967135][T32051] ? irqentry_exit+0x37/0x40 [ 2801.971765][T32051] __import_iovec+0x71/0x400 [ 2801.976413][T32051] import_iovec+0x7c/0xb0 [ 2801.980767][T32051] ___sys_recvmsg+0x420/0x4f0 [ 2801.985468][T32051] ? __sys_recvmsg+0x250/0x250 [ 2801.990285][T32051] ? __hrtimer_run_queues+0x97a/0x9e0 [ 2801.995895][T32051] ? __fdget+0x1a1/0x230 [ 2802.000155][T32051] __x64_sys_recvmsg+0x1df/0x2a0 [ 2802.005141][T32051] ? ___sys_recvmsg+0x4f0/0x4f0 [ 2802.010037][T32051] ? debug_smp_processor_id+0x17/0x20 [ 2802.015427][T32051] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 2802.021523][T32051] x64_sys_call+0x705/0x9a0 [ 2802.026056][T32051] do_syscall_64+0x4c/0xa0 [ 2802.030497][T32051] ? clear_bhb_loop+0x50/0xa0 [ 2802.035322][T32051] ? clear_bhb_loop+0x50/0xa0 [ 2802.040107][T32051] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2802.046017][T32051] RIP: 0033:0x7fce07ac0be9 [ 2802.050480][T32051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2802.071074][T32051] RSP: 002b:00007fce06529038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 2802.079639][T32051] RAX: ffffffffffffffda RBX: 00007fce07ce7fa0 RCX: 00007fce07ac0be9 [ 2802.087636][T32051] RDX: 0000000000001f00 RSI: 0000200000000500 RDI: 0000000000000008 [ 2802.095659][T32051] RBP: 00007fce06529090 R08: 0000000000000000 R09: 0000000000000000 [ 2802.103860][T32051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2802.112197][T32051] R13: 00007fce07ce8038 R14: 00007fce07ce7fa0 R15: 00007ffc46626398 [ 2802.120415][T32051] [ 2802.210501][T32062] device syzkaller0 entered promiscuous mode [ 2802.591236][T32094] device syzkaller0 entered promiscuous mode [ 2802.634476][T32095] device syzkaller0 entered promiscuous mode [ 2803.233333][T32110] device veth0_vlan left promiscuous mode [ 2803.257802][T32110] device veth0_vlan entered promiscuous mode [ 2804.070026][T32155] device syzkaller0 entered promiscuous mode [ 2804.483257][T32170] device syzkaller0 entered promiscuous mode [ 2805.790401][T32224] device syzkaller0 entered promiscuous mode [ 2806.031369][T32244] FAULT_INJECTION: forcing a failure. [ 2806.031369][T32244] name failslab, interval 1, probability 0, space 0, times 0 [ 2806.073194][T32244] CPU: 0 PID: 32244 Comm: syz.4.22918 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2806.083599][T32244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2806.093683][T32244] Call Trace: [ 2806.096980][T32244] [ 2806.099926][T32244] __dump_stack+0x21/0x30 [ 2806.104287][T32244] dump_stack_lvl+0xee/0x150 [ 2806.108902][T32244] ? show_regs_print_info+0x20/0x20 [ 2806.114221][T32244] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 2806.120062][T32244] dump_stack+0x15/0x20 [ 2806.124504][T32244] should_fail+0x3c1/0x510 [ 2806.128968][T32244] __should_failslab+0xa4/0xe0 [ 2806.133754][T32244] should_failslab+0x9/0x20 [ 2806.138460][T32244] slab_pre_alloc_hook+0x3b/0xe0 [ 2806.143422][T32244] __kmalloc+0x6d/0x2c0 [ 2806.147648][T32244] ? tun_device_event+0x15d/0xf20 [ 2806.152699][T32244] tun_device_event+0x15d/0xf20 [ 2806.157577][T32244] ? __kasan_check_read+0x11/0x20 [ 2806.162635][T32244] ? macsec_notify+0xff/0x490 [ 2806.167353][T32244] ? inetdev_event+0x493/0x10a0 [ 2806.172367][T32244] ? macsec_common_dellink+0x520/0x520 [ 2806.177879][T32244] ? sel_netif_netdev_notifier_handler+0x1a1/0x300 [ 2806.184413][T32244] raw_notifier_call_chain+0x90/0x100 [ 2806.189813][T32244] dev_change_tx_queue_len+0x1af/0x330 [ 2806.195302][T32244] ? dev_set_mtu+0xc0/0xc0 [ 2806.199843][T32244] dev_ifsioc+0x25c/0xe70 [ 2806.204313][T32244] ? dev_ioctl+0xd10/0xd10 [ 2806.208756][T32244] ? __mutex_lock_slowpath+0xe/0x10 [ 2806.214068][T32244] ? mutex_lock+0x100/0x1a0 [ 2806.218594][T32244] ? wait_for_completion_killable_timeout+0x10/0x10 [ 2806.225316][T32244] ? dev_get_by_name_rcu+0xc8/0xf0 [ 2806.230546][T32244] dev_ioctl+0x560/0xd10 [ 2806.234817][T32244] sock_do_ioctl+0x22e/0x300 [ 2806.239435][T32244] ? sock_show_fdinfo+0xa0/0xa0 [ 2806.244313][T32244] ? selinux_file_ioctl+0x377/0x480 [ 2806.249538][T32244] sock_ioctl+0x4bc/0x6b0 [ 2806.254035][T32244] ? sock_poll+0x3d0/0x3d0 [ 2806.258484][T32244] ? __fget_files+0x2c4/0x320 [ 2806.263234][T32244] ? security_file_ioctl+0x84/0xa0 [ 2806.268380][T32244] ? sock_poll+0x3d0/0x3d0 [ 2806.272826][T32244] __se_sys_ioctl+0x121/0x1a0 [ 2806.277532][T32244] __x64_sys_ioctl+0x7b/0x90 [ 2806.282157][T32244] x64_sys_call+0x2f/0x9a0 [ 2806.286606][T32244] do_syscall_64+0x4c/0xa0 [ 2806.291055][T32244] ? clear_bhb_loop+0x50/0xa0 [ 2806.295765][T32244] ? clear_bhb_loop+0x50/0xa0 [ 2806.300497][T32244] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2806.306444][T32244] RIP: 0033:0x7f5b84132be9 [ 2806.310884][T32244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2806.330513][T32244] RSP: 002b:00007f5b82b59038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2806.338960][T32244] RAX: ffffffffffffffda RBX: 00007f5b8435a180 RCX: 00007f5b84132be9 [ 2806.346967][T32244] RDX: 0000200000000080 RSI: 0000000000008943 RDI: 0000000000000009 [ 2806.354975][T32244] RBP: 00007f5b82b59090 R08: 0000000000000000 R09: 0000000000000000 [ 2806.362976][T32244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2806.370972][T32244] R13: 00007f5b8435a218 R14: 00007f5b8435a180 R15: 00007ffc00ad7298 [ 2806.379071][T32244] [ 2806.384399][T32244] syzkaller0: refused to change device tx_queue_len [ 2806.463307][T32256] device syzkaller0 entered promiscuous mode [ 2806.496336][T32254] device syzkaller0 entered promiscuous mode [ 2807.143251][T32285] ªªªªªª: renamed from vlan0 [ 2807.148261][T32285] FAULT_INJECTION: forcing a failure. [ 2807.148261][T32285] name failslab, interval 1, probability 0, space 0, times 0 [ 2807.161467][T32285] CPU: 0 PID: 32285 Comm: syz.1.22937 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2807.171915][T32285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2807.182082][T32285] Call Trace: [ 2807.185392][T32285] [ 2807.188348][T32285] __dump_stack+0x21/0x30 [ 2807.192713][T32285] dump_stack_lvl+0xee/0x150 [ 2807.197333][T32285] ? show_regs_print_info+0x20/0x20 [ 2807.202586][T32285] dump_stack+0x15/0x20 [ 2807.206866][T32285] should_fail+0x3c1/0x510 [ 2807.211311][T32285] __should_failslab+0xa4/0xe0 [ 2807.216117][T32285] should_failslab+0x9/0x20 [ 2807.220648][T32285] slab_pre_alloc_hook+0x3b/0xe0 [ 2807.225638][T32285] __kmalloc+0x6d/0x2c0 [ 2807.229815][T32285] ? kobject_rename+0x1a8/0x4d0 [ 2807.234700][T32285] kobject_rename+0x1a8/0x4d0 [ 2807.239406][T32285] ? kobject_init_and_add+0x190/0x190 [ 2807.244931][T32285] ? sysfs_rename_link_ns+0x170/0x1a0 [ 2807.250335][T32285] device_rename+0x164/0x190 [ 2807.254967][T32285] dev_change_name+0x2df/0x8f0 [ 2807.259758][T32285] ? avc_denied+0x1b0/0x1b0 [ 2807.264283][T32285] ? dev_alloc_name+0x130/0x130 [ 2807.269174][T32285] dev_ifsioc+0x3b9/0xe70 [ 2807.273542][T32285] ? dev_ioctl+0xd10/0xd10 [ 2807.278001][T32285] ? __kasan_check_write+0x14/0x20 [ 2807.283276][T32285] ? mutex_lock+0x95/0x1a0 [ 2807.287727][T32285] ? wait_for_completion_killable_timeout+0x10/0x10 [ 2807.294522][T32285] ? security_capable+0x87/0xb0 [ 2807.299415][T32285] dev_ioctl+0x345/0xd10 [ 2807.303694][T32285] sock_do_ioctl+0x22e/0x300 [ 2807.308320][T32285] ? sock_show_fdinfo+0xa0/0xa0 [ 2807.313209][T32285] ? selinux_file_ioctl+0x377/0x480 [ 2807.318442][T32285] sock_ioctl+0x4bc/0x6b0 [ 2807.322806][T32285] ? sock_poll+0x3d0/0x3d0 [ 2807.327362][T32285] ? __fget_files+0x2c4/0x320 [ 2807.332159][T32285] ? security_file_ioctl+0x84/0xa0 [ 2807.337307][T32285] ? sock_poll+0x3d0/0x3d0 [ 2807.341792][T32285] __se_sys_ioctl+0x121/0x1a0 [ 2807.346513][T32285] __x64_sys_ioctl+0x7b/0x90 [ 2807.351139][T32285] x64_sys_call+0x2f/0x9a0 [ 2807.355589][T32285] do_syscall_64+0x4c/0xa0 [ 2807.360211][T32285] ? clear_bhb_loop+0x50/0xa0 [ 2807.364930][T32285] ? clear_bhb_loop+0x50/0xa0 [ 2807.369642][T32285] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2807.375560][T32285] RIP: 0033:0x7f89f79d7be9 [ 2807.380000][T32285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2807.399633][T32285] RSP: 002b:00007f89f6440038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2807.408075][T32285] RAX: ffffffffffffffda RBX: 00007f89f7bfefa0 RCX: 00007f89f79d7be9 [ 2807.416083][T32285] RDX: 0000200000000000 RSI: 0000000000008923 RDI: 000000000000000d [ 2807.424090][T32285] RBP: 00007f89f6440090 R08: 0000000000000000 R09: 0000000000000000 [ 2807.432089][T32285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2807.440085][T32285] R13: 00007f89f7bff038 R14: 00007f89f7bfefa0 R15: 00007fffe8027ac8 [ 2807.448093][T32285] [ 2807.511273][T32286] ªªªªªª: renamed from vlan0 [ 2808.336932][T32314] device syzkaller0 entered promiscuous mode [ 2808.784299][T32331] device syzkaller0 entered promiscuous mode [ 2810.035972][T32370] device syzkaller0 entered promiscuous mode [ 2810.340691][T32369] ªªªªªª: renamed from vlan0 [ 2810.655804][T32377] device pim6reg1 entered promiscuous mode [ 2812.382664][T32422] bridge0: port 1(bridge_slave_0) entered blocking state [ 2812.397725][T32422] bridge0: port 1(bridge_slave_0) entered disabled state [ 2812.411960][T32422] device bridge_slave_0 entered promiscuous mode [ 2812.435768][T32422] bridge0: port 2(bridge_slave_1) entered blocking state [ 2812.450853][T32422] bridge0: port 2(bridge_slave_1) entered disabled state [ 2812.466189][T32422] device bridge_slave_1 entered promiscuous mode [ 2812.654165][T31318] device bridge_slave_1 left promiscuous mode [ 2812.667055][T31318] bridge0: port 2(bridge_slave_1) entered disabled state [ 2812.743147][T31318] device bridge_slave_0 left promiscuous mode [ 2812.805768][T31318] bridge0: port 1(bridge_slave_0) entered disabled state [ 2812.874114][T31318] device veth1_macvtap left promiscuous mode [ 2813.041272][T32435] device pim6reg1 entered promiscuous mode [ 2813.299008][ T8145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2813.319048][ T8145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2813.356703][ T8145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2813.374082][ T8145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2813.390023][ T8145] bridge0: port 1(bridge_slave_0) entered blocking state [ 2813.397198][ T8145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2813.405269][ T8145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2813.435640][ T8145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2813.453470][ T8145] bridge0: port 2(bridge_slave_1) entered blocking state [ 2813.460734][ T8145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2813.480733][T32453] device syzkaller0 entered promiscuous mode [ 2813.548771][ T8145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2813.574613][ T8145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2813.589465][ T8145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2813.627612][T32471] device syzkaller0 entered promiscuous mode [ 2813.700503][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2813.768341][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2813.787604][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2813.858204][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2813.904664][T32422] device veth0_vlan entered promiscuous mode [ 2813.995457][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2814.021723][T32422] device veth1_macvtap entered promiscuous mode [ 2814.110904][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2814.141235][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2814.211511][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2814.259856][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2814.590956][T32498] bridge0: port 1(bridge_slave_0) entered blocking state [ 2814.598628][T32498] bridge0: port 1(bridge_slave_0) entered disabled state [ 2814.606591][T32498] device bridge_slave_0 entered promiscuous mode [ 2814.621449][T32498] bridge0: port 2(bridge_slave_1) entered blocking state [ 2814.629007][T32498] bridge0: port 2(bridge_slave_1) entered disabled state [ 2814.636486][T32498] device bridge_slave_1 entered promiscuous mode [ 2814.833148][T32498] bridge0: port 2(bridge_slave_1) entered blocking state [ 2814.840275][T32498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2814.847671][T32498] bridge0: port 1(bridge_slave_0) entered blocking state [ 2814.854746][T32498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2814.929292][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2814.937725][T27193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2814.946242][T27193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2814.974088][T31318] device bridge_slave_1 left promiscuous mode [ 2814.980688][T31318] bridge0: port 2(bridge_slave_1) entered disabled state [ 2815.008865][T31318] device bridge_slave_0 left promiscuous mode [ 2815.023350][T31318] bridge0: port 1(bridge_slave_0) entered disabled state [ 2815.034578][T31318] device veth1_macvtap left promiscuous mode [ 2815.040637][T31318] device veth0_vlan left promiscuous mode [ 2815.168008][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2815.176574][T27193] bridge0: port 1(bridge_slave_0) entered blocking state [ 2815.183701][T27193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2815.191456][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2815.200532][T27193] bridge0: port 2(bridge_slave_1) entered blocking state [ 2815.207671][T27193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2815.216152][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2815.231677][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2815.260342][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2815.280935][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2815.302205][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2815.314979][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2815.326158][T32498] device veth0_vlan entered promiscuous mode [ 2815.334190][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2815.350047][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2815.373570][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2815.385460][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2815.403818][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2815.413930][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2815.428862][T32498] device veth1_macvtap entered promiscuous mode [ 2815.462330][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2815.473977][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2815.500225][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2815.535836][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2815.553857][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2815.639828][T32545] device syzkaller0 entered promiscuous mode [ 2815.937635][T32568] device syzkaller0 entered promiscuous mode [ 2816.409168][T32574] bridge0: port 1(bridge_slave_0) entered blocking state [ 2816.416447][T32574] bridge0: port 1(bridge_slave_0) entered disabled state [ 2816.424603][T32574] device bridge_slave_0 entered promiscuous mode [ 2816.432072][T32574] bridge0: port 2(bridge_slave_1) entered blocking state [ 2816.439287][T32574] bridge0: port 2(bridge_slave_1) entered disabled state [ 2816.447177][T32574] device bridge_slave_1 entered promiscuous mode [ 2816.591463][T32574] bridge0: port 2(bridge_slave_1) entered blocking state [ 2816.598568][T32574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2816.605927][T32574] bridge0: port 1(bridge_slave_0) entered blocking state [ 2816.612978][T32574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2816.745396][T32604] ip6_vti0: mtu greater than device maximum [ 2816.768886][T32613] device syzkaller0 entered promiscuous mode [ 2816.980538][T32625] device sit0 left promiscuous mode [ 2817.021505][T32630] device sit0 entered promiscuous mode [ 2817.235039][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2817.257460][T20480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2817.283842][T20480] bridge0: port 2(bridge_slave_1) entered disabled state [ 2817.323658][T31318] device bridge_slave_1 left promiscuous mode [ 2817.329837][T31318] bridge0: port 2(bridge_slave_1) entered disabled state [ 2817.366328][T31318] device bridge_slave_0 left promiscuous mode [ 2817.373253][T31318] bridge0: port 1(bridge_slave_0) entered disabled state [ 2817.384395][T31318] device veth1_macvtap left promiscuous mode [ 2817.390491][T31318] device veth0_vlan left promiscuous mode [ 2817.499729][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2817.535789][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2817.579891][T20480] bridge0: port 1(bridge_slave_0) entered blocking state [ 2817.587024][T20480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2817.754343][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2817.784067][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2817.833229][T20480] bridge0: port 2(bridge_slave_1) entered blocking state [ 2817.840288][T20480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2817.847892][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2817.862144][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2817.870464][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2817.878768][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2817.938266][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2817.963762][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2818.015838][T32668] device syzkaller0 entered promiscuous mode [ 2818.152108][T32574] device veth0_vlan entered promiscuous mode [ 2818.168600][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2818.181824][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2818.220886][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2818.235412][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2818.256919][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2818.265865][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2818.275952][T32574] device veth1_macvtap entered promiscuous mode [ 2818.333601][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2818.347599][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2818.356463][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2818.365391][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2818.397637][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2819.404099][T32698] bridge0: port 1(bridge_slave_0) entered blocking state [ 2819.457104][T32698] bridge0: port 1(bridge_slave_0) entered disabled state [ 2819.518384][T32698] device bridge_slave_0 entered promiscuous mode [ 2819.569507][T32698] bridge0: port 2(bridge_slave_1) entered blocking state [ 2819.580676][T32698] bridge0: port 2(bridge_slave_1) entered disabled state [ 2819.602296][T32698] device bridge_slave_1 entered promiscuous mode [ 2819.736058][T32719] device syzkaller0 entered promiscuous mode [ 2819.937273][T32717] device veth0_vlan left promiscuous mode [ 2819.950364][T32717] device veth0_vlan entered promiscuous mode [ 2819.971593][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2819.980395][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 2820.004121][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2820.381047][T32744] device syzkaller0 entered promiscuous mode [ 2820.451498][T32746] device syzkaller0 entered promiscuous mode [ 2820.628713][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2820.640915][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2820.658121][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2820.675829][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2820.690842][T20480] bridge0: port 1(bridge_slave_0) entered blocking state [ 2820.698009][T20480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2820.715755][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2820.728924][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2820.740759][T20480] bridge0: port 2(bridge_slave_1) entered blocking state [ 2820.747888][T20480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2821.049651][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2821.057686][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2821.066992][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2821.097318][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2821.112669][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2821.147315][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2821.162459][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2821.220029][T32698] device veth0_vlan entered promiscuous mode [ 2821.231926][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2821.270705][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2821.285287][T31318] device bridge_slave_1 left promiscuous mode [ 2821.291458][T31318] bridge0: port 2(bridge_slave_1) entered disabled state [ 2821.313711][T31318] device bridge_slave_0 left promiscuous mode [ 2821.319899][T31318] bridge0: port 1(bridge_slave_0) entered disabled state [ 2821.354521][T31318] device veth1_macvtap left promiscuous mode [ 2821.360690][T31318] device veth0_vlan left promiscuous mode [ 2821.610364][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2821.624616][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2821.649481][T32698] device veth1_macvtap entered promiscuous mode [ 2821.664672][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2821.683608][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2821.702097][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2821.721480][T32767] device veth0_vlan left promiscuous mode [ 2821.729951][T32767] device veth0_vlan entered promiscuous mode [ 2821.751908][ T301] device syzkaller0 entered promiscuous mode [ 2821.803533][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2821.822066][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2821.845170][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2821.853928][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 2821.873711][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2821.956941][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2821.965591][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2822.117604][ T318] device syzkaller0 entered promiscuous mode [ 2822.959587][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 2822.967113][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 2822.980679][ T334] device bridge_slave_0 entered promiscuous mode [ 2822.988238][T31318] device bridge_slave_1 left promiscuous mode [ 2822.994571][T31318] bridge0: port 2(bridge_slave_1) entered disabled state [ 2823.002553][T31318] device bridge_slave_0 left promiscuous mode [ 2823.009132][T31318] bridge0: port 1(bridge_slave_0) entered disabled state [ 2823.027549][T31318] device veth1_macvtap left promiscuous mode [ 2823.042458][T31318] device veth0_vlan left promiscuous mode [ 2823.146427][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 2823.153633][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 2823.161229][ T334] device bridge_slave_1 entered promiscuous mode [ 2823.203710][ T350] device syzkaller0 entered promiscuous mode [ 2823.524983][ T334] bridge0: port 2(bridge_slave_1) entered blocking state [ 2823.532380][ T334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2823.539763][ T334] bridge0: port 1(bridge_slave_0) entered blocking state [ 2823.546832][ T334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2823.683299][T20480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2823.690894][T20480] bridge0: port 2(bridge_slave_1) entered disabled state [ 2823.699567][ T372] device veth0_vlan left promiscuous mode [ 2823.732705][ T372] device veth0_vlan entered promiscuous mode [ 2823.774682][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2823.784716][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2823.793409][T20480] bridge0: port 1(bridge_slave_0) entered blocking state [ 2823.800496][T20480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2823.828128][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2823.841093][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2823.849765][T20480] bridge0: port 2(bridge_slave_1) entered blocking state [ 2823.856846][T20480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2823.879284][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2823.887448][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2823.935752][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2823.946592][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2823.962421][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2823.981582][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2823.995765][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2824.010478][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2824.024146][ T334] device veth0_vlan entered promiscuous mode [ 2824.043160][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2824.051809][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2824.081542][ T392] device syzkaller0 entered promiscuous mode [ 2824.332902][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2824.343800][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2824.354755][ T334] device veth1_macvtap entered promiscuous mode [ 2824.396948][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2824.413541][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2824.423790][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2824.476176][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2824.493894][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2825.117227][T31318] device bridge_slave_1 left promiscuous mode [ 2825.123508][T31318] bridge0: port 2(bridge_slave_1) entered disabled state [ 2825.131301][T31318] device bridge_slave_0 left promiscuous mode [ 2825.137741][T31318] bridge0: port 1(bridge_slave_0) entered disabled state [ 2825.146365][T31318] device veth1_macvtap left promiscuous mode [ 2825.152651][T31318] device veth0_vlan left promiscuous mode [ 2825.518727][ T438] device veth0_vlan left promiscuous mode [ 2825.565166][ T438] device veth0_vlan entered promiscuous mode [ 2825.679448][ T443] device syzkaller0 entered promiscuous mode [ 2826.058963][ T435] bridge0: port 1(bridge_slave_0) entered blocking state [ 2826.096528][ T435] bridge0: port 1(bridge_slave_0) entered disabled state [ 2826.153798][ T435] device bridge_slave_0 entered promiscuous mode [ 2826.241146][ T435] bridge0: port 2(bridge_slave_1) entered blocking state [ 2826.259482][ T435] bridge0: port 2(bridge_slave_1) entered disabled state [ 2826.309280][ T435] device bridge_slave_1 entered promiscuous mode [ 2826.727846][ T435] bridge0: port 2(bridge_slave_1) entered blocking state [ 2826.734975][ T435] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2826.742331][ T435] bridge0: port 1(bridge_slave_0) entered blocking state [ 2826.749411][ T435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2826.934587][T31318] bridge0: port 1(bridge_slave_0) entered disabled state [ 2826.962111][T31318] bridge0: port 2(bridge_slave_1) entered disabled state [ 2827.044846][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2827.074639][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2827.130369][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2827.153735][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2827.192429][T31318] bridge0: port 1(bridge_slave_0) entered blocking state [ 2827.199556][T31318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2827.288703][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2827.336864][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2827.423634][T31318] bridge0: port 2(bridge_slave_1) entered blocking state [ 2827.430732][T31318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2827.463869][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2827.512822][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2827.538372][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2827.568931][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2827.593554][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2827.605386][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2827.649094][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2827.657924][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2827.666553][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2827.702926][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2827.755333][ T435] device veth0_vlan entered promiscuous mode [ 2827.812768][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2827.821770][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2827.854305][ T435] device veth1_macvtap entered promiscuous mode [ 2827.886020][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2827.896294][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2827.917726][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2827.984880][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2828.020702][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2828.833886][T31318] device bridge_slave_1 left promiscuous mode [ 2828.840048][T31318] bridge0: port 2(bridge_slave_1) entered disabled state [ 2828.847754][T31318] device bridge_slave_0 left promiscuous mode [ 2828.853985][T31318] bridge0: port 1(bridge_slave_0) entered disabled state [ 2828.861978][T31318] device veth1_macvtap left promiscuous mode [ 2828.868055][T31318] device veth0_vlan left promiscuous mode [ 2829.200394][ T533] bridge0: port 1(bridge_slave_0) entered blocking state [ 2829.245459][ T533] bridge0: port 1(bridge_slave_0) entered disabled state [ 2829.303019][ T533] device bridge_slave_0 entered promiscuous mode [ 2829.435619][ T533] bridge0: port 2(bridge_slave_1) entered blocking state [ 2829.442878][ T533] bridge0: port 2(bridge_slave_1) entered disabled state [ 2829.560699][ T533] device bridge_slave_1 entered promiscuous mode [ 2829.943904][ T543] bridge0: port 3(gretap0) entered disabled state [ 2829.950450][ T543] bridge0: port 2(bridge_slave_1) entered disabled state [ 2829.957784][ T543] bridge0: port 1(bridge_slave_0) entered disabled state [ 2830.150050][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2830.159275][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2830.196476][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2830.213509][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2830.242132][T27193] bridge0: port 1(bridge_slave_0) entered blocking state [ 2830.249246][T27193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2830.282223][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2830.299502][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2830.330916][T27193] bridge0: port 2(bridge_slave_1) entered blocking state [ 2830.338048][T27193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2830.395029][ T565] device wg2 left promiscuous mode [ 2830.463981][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2830.501847][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2830.561756][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2830.617357][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2830.684875][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2830.775435][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2830.785343][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2830.839051][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2830.920102][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2830.969292][ T533] device veth0_vlan entered promiscuous mode [ 2830.981459][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2830.999865][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2831.038519][ T533] device veth1_macvtap entered promiscuous mode [ 2831.060453][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2831.090127][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2831.122749][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2831.193149][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2831.233819][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2832.093955][T27193] device bridge_slave_1 left promiscuous mode [ 2832.100102][T27193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2832.108060][T27193] device bridge_slave_0 left promiscuous mode [ 2832.114314][T27193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2832.122833][T27193] device veth1_macvtap left promiscuous mode [ 2832.128910][T27193] device veth0_vlan left promiscuous mode [ 2832.231976][ T593] FAULT_INJECTION: forcing a failure. [ 2832.231976][ T593] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2832.273245][ T593] CPU: 1 PID: 593 Comm: syz.5.23202 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2832.283566][ T593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2832.293737][ T593] Call Trace: [ 2832.297043][ T593] [ 2832.299991][ T593] __dump_stack+0x21/0x30 [ 2832.304351][ T593] dump_stack_lvl+0xee/0x150 [ 2832.308971][ T593] ? show_regs_print_info+0x20/0x20 [ 2832.314505][ T593] dump_stack+0x15/0x20 [ 2832.318703][ T593] should_fail+0x3c1/0x510 [ 2832.323147][ T593] should_fail_alloc_page+0x55/0x80 [ 2832.328376][ T593] prepare_alloc_pages+0x156/0x600 [ 2832.333523][ T593] ? __alloc_pages_bulk+0xab0/0xab0 [ 2832.338759][ T593] ? slab_post_alloc_hook+0x4f/0x2b0 [ 2832.344072][ T593] ? kmem_cache_alloc+0xf7/0x260 [ 2832.349038][ T593] ? alloc_vmap_area+0x17a/0x1990 [ 2832.354089][ T593] ? __get_vm_area_node+0x14e/0x350 [ 2832.359314][ T593] ? __vmalloc_node_range+0xdf/0xaf0 [ 2832.364633][ T593] ? dev_map_alloc+0x24c/0x560 [ 2832.369433][ T593] __alloc_pages+0x10a/0x440 [ 2832.374073][ T593] ? prep_new_page+0x110/0x110 [ 2832.378882][ T593] __get_free_pages+0x10/0x30 [ 2832.383674][ T593] kasan_populate_vmalloc_pte+0x29/0x120 [ 2832.389331][ T593] __apply_to_page_range+0x8b0/0xbf0 [ 2832.394648][ T593] ? kasan_populate_vmalloc+0x70/0x70 [ 2832.400053][ T593] ? kasan_populate_vmalloc+0x70/0x70 [ 2832.405455][ T593] apply_to_page_range+0x3b/0x50 [ 2832.410425][ T593] kasan_populate_vmalloc+0x60/0x70 [ 2832.415650][ T593] alloc_vmap_area+0x185c/0x1990 [ 2832.420613][ T593] ? vm_map_ram+0xa60/0xa60 [ 2832.425119][ T593] ? kmem_cache_alloc_trace+0x119/0x270 [ 2832.430665][ T593] __get_vm_area_node+0x14e/0x350 [ 2832.435683][ T593] __vmalloc_node_range+0xdf/0xaf0 [ 2832.440787][ T593] ? dev_map_alloc+0x24c/0x560 [ 2832.445568][ T593] bpf_map_area_alloc+0xd5/0xe0 [ 2832.450557][ T593] ? dev_map_alloc+0x24c/0x560 [ 2832.455439][ T593] dev_map_alloc+0x24c/0x560 [ 2832.460079][ T593] map_create+0x455/0x21b0 [ 2832.464601][ T593] __sys_bpf+0x2cf/0x730 [ 2832.468841][ T593] ? bpf_link_show_fdinfo+0x310/0x310 [ 2832.474235][ T593] ? debug_smp_processor_id+0x17/0x20 [ 2832.479616][ T593] __x64_sys_bpf+0x7c/0x90 [ 2832.484087][ T593] x64_sys_call+0x4b9/0x9a0 [ 2832.488600][ T593] do_syscall_64+0x4c/0xa0 [ 2832.493020][ T593] ? clear_bhb_loop+0x50/0xa0 [ 2832.497706][ T593] ? clear_bhb_loop+0x50/0xa0 [ 2832.502394][ T593] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2832.508288][ T593] RIP: 0033:0x7fce07ac0be9 [ 2832.512813][ T593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2832.532436][ T593] RSP: 002b:00007fce06529038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2832.540867][ T593] RAX: ffffffffffffffda RBX: 00007fce07ce7fa0 RCX: 00007fce07ac0be9 [ 2832.549149][ T593] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 2832.557252][ T593] RBP: 00007fce06529090 R08: 0000000000000000 R09: 0000000000000000 [ 2832.565240][ T593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2832.573241][ T593] R13: 00007fce07ce8038 R14: 00007fce07ce7fa0 R15: 00007ffc46626398 [ 2832.581227][ T593] [ 2832.732956][ T600] bridge0: port 1(bridge_slave_0) entered blocking state [ 2832.742056][ T600] bridge0: port 1(bridge_slave_0) entered disabled state [ 2832.783939][ T600] device bridge_slave_0 entered promiscuous mode [ 2832.816357][ T600] bridge0: port 2(bridge_slave_1) entered blocking state [ 2832.836489][ T600] bridge0: port 2(bridge_slave_1) entered disabled state [ 2832.850955][ T600] device bridge_slave_1 entered promiscuous mode [ 2833.572865][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2833.581231][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2833.610858][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2833.624658][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2833.634456][T31318] bridge0: port 1(bridge_slave_0) entered blocking state [ 2833.641713][T31318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2833.650348][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2833.660385][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2833.669671][T31318] bridge0: port 2(bridge_slave_1) entered blocking state [ 2833.676770][T31318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2833.687250][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2833.733881][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2833.774646][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2833.829230][ T638] ªªªªªª: renamed from vlan0 [ 2833.842792][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2833.856448][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2833.869283][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2833.881290][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2833.925633][ T652] device syzkaller0 entered promiscuous mode [ 2833.939515][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2833.947907][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2833.958293][ T600] device veth0_vlan entered promiscuous mode [ 2833.971864][ T600] device veth1_macvtap entered promiscuous mode [ 2833.990722][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2834.003571][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2834.013639][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2834.022214][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2834.031927][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2834.054409][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2834.073396][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2834.227192][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2834.235757][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2834.337528][ T674] FAULT_INJECTION: forcing a failure. [ 2834.337528][ T674] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2834.359734][ T674] CPU: 1 PID: 674 Comm: syz.3.23228 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2834.369996][ T674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2834.380081][ T674] Call Trace: [ 2834.383387][ T674] [ 2834.386335][ T674] __dump_stack+0x21/0x30 [ 2834.390693][ T674] dump_stack_lvl+0xee/0x150 [ 2834.395330][ T674] ? show_regs_print_info+0x20/0x20 [ 2834.400562][ T674] ? avc_has_perm+0x158/0x240 [ 2834.405270][ T674] dump_stack+0x15/0x20 [ 2834.409452][ T674] should_fail+0x3c1/0x510 [ 2834.413907][ T674] should_fail_alloc_page+0x55/0x80 [ 2834.419145][ T674] prepare_alloc_pages+0x156/0x600 [ 2834.424292][ T674] ? __alloc_pages_bulk+0xab0/0xab0 [ 2834.429531][ T674] ? 0xffffffffa0018000 [ 2834.433702][ T674] ? is_bpf_text_address+0x177/0x190 [ 2834.439013][ T674] __alloc_pages+0x10a/0x440 [ 2834.443630][ T674] ? prep_new_page+0x110/0x110 [ 2834.448426][ T674] skb_page_frag_refill+0x202/0x3a0 [ 2834.453756][ T674] tun_get_user+0x785/0x33c0 [ 2834.458372][ T674] ? __kasan_poison_slab+0x70/0x70 [ 2834.463506][ T674] ? kmem_cache_free+0x100/0x320 [ 2834.468473][ T674] ? __x64_sys_openat+0x136/0x160 [ 2834.473538][ T674] ? x64_sys_call+0x219/0x9a0 [ 2834.478242][ T674] ? tun_do_read+0x1c40/0x1c40 [ 2834.483034][ T674] ? kstrtouint_from_user+0x1a0/0x200 [ 2834.488515][ T674] ? kstrtol_from_user+0x260/0x260 [ 2834.493649][ T674] ? avc_policy_seqno+0x1b/0x70 [ 2834.498525][ T674] ? selinux_file_permission+0x2aa/0x510 [ 2834.504183][ T674] tun_chr_write_iter+0x1eb/0x2e0 [ 2834.509236][ T674] vfs_write+0x802/0xf70 [ 2834.513501][ T674] ? file_end_write+0x1b0/0x1b0 [ 2834.518373][ T674] ? __fget_files+0x2c4/0x320 [ 2834.523074][ T674] ? __fdget_pos+0x1f7/0x380 [ 2834.527685][ T674] ? ksys_write+0x71/0x240 [ 2834.532128][ T674] ksys_write+0x140/0x240 [ 2834.536493][ T674] ? __ia32_sys_read+0x90/0x90 [ 2834.541288][ T674] ? debug_smp_processor_id+0x17/0x20 [ 2834.546694][ T674] __x64_sys_write+0x7b/0x90 [ 2834.551348][ T674] x64_sys_call+0x8ef/0x9a0 [ 2834.555924][ T674] do_syscall_64+0x4c/0xa0 [ 2834.560367][ T674] ? clear_bhb_loop+0x50/0xa0 [ 2834.565069][ T674] ? clear_bhb_loop+0x50/0xa0 [ 2834.569792][ T674] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2834.575707][ T674] RIP: 0033:0x7f6d17eb6be9 [ 2834.580156][ T674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2834.599870][ T674] RSP: 002b:00007f6d1691f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2834.608301][ T674] RAX: ffffffffffffffda RBX: 00007f6d180ddfa0 RCX: 00007f6d17eb6be9 [ 2834.616462][ T674] RDX: 0000000000000015 RSI: 0000200000000000 RDI: 00000000000000c8 [ 2834.624442][ T674] RBP: 00007f6d1691f090 R08: 0000000000000000 R09: 0000000000000000 [ 2834.632428][ T674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2834.640401][ T674] R13: 00007f6d180de038 R14: 00007f6d180ddfa0 R15: 00007fff4fe0de78 [ 2834.648416][ T674] [ 2835.494379][T27193] device bridge_slave_1 left promiscuous mode [ 2835.500548][T27193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2835.508296][T27193] device bridge_slave_0 left promiscuous mode [ 2835.514535][T27193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2835.522731][T27193] device veth1_macvtap left promiscuous mode [ 2835.528887][T27193] device veth0_vlan left promiscuous mode [ 2835.833445][ T703] device syzkaller0 entered promiscuous mode [ 2836.117878][ T709] bridge0: port 1(bridge_slave_0) entered blocking state [ 2836.136518][ T709] bridge0: port 1(bridge_slave_0) entered disabled state [ 2836.147359][ T709] device bridge_slave_0 entered promiscuous mode [ 2836.157519][ T709] bridge0: port 2(bridge_slave_1) entered blocking state [ 2836.165394][ T709] bridge0: port 2(bridge_slave_1) entered disabled state [ 2836.179241][ T709] device bridge_slave_1 entered promiscuous mode [ 2836.217341][ T734] device syzkaller0 entered promiscuous mode [ 2836.467524][ T753] device veth1_macvtap left promiscuous mode [ 2836.488169][ T709] bridge0: port 2(bridge_slave_1) entered blocking state [ 2836.495283][ T709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2836.502580][ T709] bridge0: port 1(bridge_slave_0) entered blocking state [ 2836.509638][ T709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2836.530847][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2836.544382][T20480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2836.552234][T20480] bridge0: port 2(bridge_slave_1) entered disabled state [ 2836.580239][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2836.593029][T20480] bridge0: port 1(bridge_slave_0) entered blocking state [ 2836.600154][T20480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2836.633786][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2836.642485][T20480] bridge0: port 2(bridge_slave_1) entered blocking state [ 2836.649586][T20480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2836.671760][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2836.681246][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2836.720401][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2836.729424][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2836.743782][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2836.752242][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2836.761283][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2836.769677][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2836.793533][ T709] device veth0_vlan entered promiscuous mode [ 2836.834492][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2836.854994][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2836.925399][ T709] device veth1_macvtap entered promiscuous mode [ 2836.983816][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2837.002140][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2837.024737][ T779] FAULT_INJECTION: forcing a failure. [ 2837.024737][ T779] name failslab, interval 1, probability 0, space 0, times 0 [ 2837.043344][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2837.051655][ T779] CPU: 0 PID: 779 Comm: syz.4.23265 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2837.061838][ T779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2837.071907][ T779] Call Trace: [ 2837.075200][ T779] [ 2837.078140][ T779] __dump_stack+0x21/0x30 [ 2837.082511][ T779] dump_stack_lvl+0xee/0x150 [ 2837.087116][ T779] ? show_regs_print_info+0x20/0x20 [ 2837.092331][ T779] dump_stack+0x15/0x20 [ 2837.096503][ T779] should_fail+0x3c1/0x510 [ 2837.100989][ T779] __should_failslab+0xa4/0xe0 [ 2837.105778][ T779] should_failslab+0x9/0x20 [ 2837.110282][ T779] slab_pre_alloc_hook+0x3b/0xe0 [ 2837.115240][ T779] ? __d_alloc+0x2d/0x6a0 [ 2837.119570][ T779] kmem_cache_alloc+0x44/0x260 [ 2837.124336][ T779] __d_alloc+0x2d/0x6a0 [ 2837.128492][ T779] ? perf_lock_task_context+0x35f/0x470 [ 2837.134039][ T779] d_alloc_pseudo+0x1d/0x70 [ 2837.138543][ T779] alloc_file_pseudo+0xc8/0x1f0 [ 2837.143394][ T779] ? alloc_empty_file_noaccount+0x80/0x80 [ 2837.149117][ T779] ? ihold+0x4a/0x60 [ 2837.153015][ T779] ? ihold+0x4a/0x60 [ 2837.156913][ T779] anon_inode_getfile+0xa6/0x180 [ 2837.161859][ T779] __se_sys_perf_event_open+0xbd2/0x1b80 [ 2837.167585][ T779] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 2837.173315][ T779] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 2837.179137][ T779] __x64_sys_perf_event_open+0xbf/0xd0 [ 2837.184603][ T779] x64_sys_call+0x50d/0x9a0 [ 2837.189112][ T779] do_syscall_64+0x4c/0xa0 [ 2837.193528][ T779] ? clear_bhb_loop+0x50/0xa0 [ 2837.198206][ T779] ? clear_bhb_loop+0x50/0xa0 [ 2837.202887][ T779] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2837.208783][ T779] RIP: 0033:0x7f5b84132be9 [ 2837.213209][ T779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2837.232989][ T779] RSP: 002b:00007f5b82b9b038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2837.241496][ T779] RAX: ffffffffffffffda RBX: 00007f5b84359fa0 RCX: 00007f5b84132be9 [ 2837.249472][ T779] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000003c0 [ 2837.257614][ T779] RBP: 00007f5b82b9b090 R08: 0000000000000000 R09: 0000000000000000 [ 2837.265584][ T779] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2837.273553][ T779] R13: 00007f5b8435a038 R14: 00007f5b84359fa0 R15: 00007ffc00ad7298 [ 2837.281535][ T779] [ 2837.297886][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2837.306589][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2837.395706][ T787] FAULT_INJECTION: forcing a failure. [ 2837.395706][ T787] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2837.409199][ T787] CPU: 1 PID: 787 Comm: syz.3.23268 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2837.419384][ T787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2837.429467][ T787] Call Trace: [ 2837.432772][ T787] [ 2837.435739][ T787] __dump_stack+0x21/0x30 [ 2837.440105][ T787] dump_stack_lvl+0xee/0x150 [ 2837.444803][ T787] ? show_regs_print_info+0x20/0x20 [ 2837.450034][ T787] ? page_counter_try_charge+0x3a0/0x3d0 [ 2837.455695][ T787] ? debug_smp_processor_id+0x17/0x20 [ 2837.461104][ T787] ? flush_tlb_func+0x28c/0x4c0 [ 2837.465969][ T787] dump_stack+0x15/0x20 [ 2837.470145][ T787] should_fail+0x3c1/0x510 [ 2837.474591][ T787] should_fail_alloc_page+0x55/0x80 [ 2837.479817][ T787] prepare_alloc_pages+0x156/0x600 [ 2837.484954][ T787] ? __alloc_pages_bulk+0xab0/0xab0 [ 2837.490241][ T787] ? cgroup_rstat_updated+0xf5/0x370 [ 2837.495552][ T787] __alloc_pages+0x10a/0x440 [ 2837.500744][ T787] ? prep_new_page+0x110/0x110 [ 2837.505527][ T787] wp_page_copy+0x1c9/0x18f0 [ 2837.510137][ T787] ? arch_stack_walk+0xee/0x140 [ 2837.515031][ T787] ? insert_page_into_pte_locked+0x310/0x310 [ 2837.521022][ T787] ? _raw_spin_lock+0x8e/0xe0 [ 2837.525706][ T787] ? _raw_spin_trylock_bh+0x130/0x130 [ 2837.531083][ T787] ? vm_normal_page+0x1dd/0x1f0 [ 2837.536057][ T787] do_wp_page+0x731/0xc90 [ 2837.540487][ T787] ? kvmalloc_node+0x206/0x300 [ 2837.545259][ T787] handle_pte_fault+0x73c/0x2680 [ 2837.550213][ T787] ? sched_clock_cpu+0x18/0x3c0 [ 2837.555075][ T787] ? fault_around_bytes_set+0xc0/0xc0 [ 2837.560455][ T787] ? __set_page_owner+0x2c2/0x2e0 [ 2837.565506][ T787] do_handle_mm_fault+0x1a6d/0x1d50 [ 2837.570720][ T787] ? prep_new_page+0x3b/0x110 [ 2837.575413][ T787] ? numa_migrate_prep+0xd0/0xd0 [ 2837.580460][ T787] ? __find_vma+0x30/0x150 [ 2837.585077][ T787] do_user_addr_fault+0x841/0x1180 [ 2837.590320][ T787] ? do_kern_addr_fault+0x80/0x80 [ 2837.595364][ T787] ? kasan_poison+0x62/0x70 [ 2837.599882][ T787] ? __kasan_kmalloc_large+0xa4/0xb0 [ 2837.605351][ T787] ? __kasan_check_write+0x14/0x20 [ 2837.610470][ T787] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 2837.616194][ T787] ? _raw_spin_lock+0xe0/0xe0 [ 2837.620955][ T787] ? kmalloc_order_trace+0x18/0xb0 [ 2837.626069][ T787] exc_page_fault+0x51/0xb0 [ 2837.630578][ T787] asm_exc_page_fault+0x27/0x30 [ 2837.635444][ T787] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 2837.642045][ T787] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 2837.661829][ T787] RSP: 0018:ffffc90000ec7ce0 EFLAGS: 00050206 [ 2837.667990][ T787] RAX: ffffffff824bef01 RBX: 000000000000b161 RCX: 00000000000098e1 [ 2837.675963][ T787] RDX: 000000000000b161 RSI: ffff888120321880 RDI: 0000200000003000 [ 2837.683951][ T787] RBP: ffffc90000ec7d10 R08: 0000000000000001 R09: 0000000000000000 [ 2837.691936][ T787] R10: ffffed102406562c R11: 0000000000001628 R12: 00007ffffffff000 [ 2837.700083][ T787] R13: 000020000000c8e1 R14: ffff888120320000 R15: 0000200000001780 [ 2837.708183][ T787] ? _copy_to_user+0x1/0x90 [ 2837.712697][ T787] ? _copy_to_user+0x78/0x90 [ 2837.717302][ T787] map_lookup_and_delete_elem+0x724/0x8c0 [ 2837.723026][ T787] __sys_bpf+0x4d5/0x730 [ 2837.727281][ T787] ? bpf_link_show_fdinfo+0x310/0x310 [ 2837.732668][ T787] ? debug_smp_processor_id+0x17/0x20 [ 2837.738042][ T787] __x64_sys_bpf+0x7c/0x90 [ 2837.742460][ T787] x64_sys_call+0x4b9/0x9a0 [ 2837.746963][ T787] do_syscall_64+0x4c/0xa0 [ 2837.751383][ T787] ? clear_bhb_loop+0x50/0xa0 [ 2837.756059][ T787] ? clear_bhb_loop+0x50/0xa0 [ 2837.760740][ T787] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2837.766635][ T787] RIP: 0033:0x7f6d17eb6be9 [ 2837.771057][ T787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2837.790848][ T787] RSP: 002b:00007f6d1691f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2837.799263][ T787] RAX: ffffffffffffffda RBX: 00007f6d180ddfa0 RCX: 00007f6d17eb6be9 [ 2837.807252][ T787] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 2837.815329][ T787] RBP: 00007f6d1691f090 R08: 0000000000000000 R09: 0000000000000000 [ 2837.823310][ T787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2837.831285][ T787] R13: 00007f6d180de038 R14: 00007f6d180ddfa0 R15: 00007fff4fe0de78 [ 2837.839287][ T787] [ 2838.546738][ T799] device syzkaller0 entered promiscuous mode [ 2838.586280][ T800] device veth1_macvtap left promiscuous mode [ 2838.747449][T27193] device bridge_slave_1 left promiscuous mode [ 2838.754641][T27193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2838.762846][T27193] device bridge_slave_0 left promiscuous mode [ 2838.772382][T27193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2838.782220][T27193] device veth1_macvtap left promiscuous mode [ 2838.788715][T27193] device veth0_vlan left promiscuous mode [ 2838.895652][ T808] device wg2 left promiscuous mode [ 2838.901980][ T809] device wg2 entered promiscuous mode [ 2838.932466][ T813] device wg2 entered promiscuous mode [ 2839.350061][ T805] bridge0: port 1(bridge_slave_0) entered blocking state [ 2839.363790][ T805] bridge0: port 1(bridge_slave_0) entered disabled state [ 2839.371245][ T805] device bridge_slave_0 entered promiscuous mode [ 2839.429107][ T805] bridge0: port 2(bridge_slave_1) entered blocking state [ 2839.436999][ T805] bridge0: port 2(bridge_slave_1) entered disabled state [ 2839.485319][ T805] device bridge_slave_1 entered promiscuous mode [ 2839.796871][ T805] bridge0: port 2(bridge_slave_1) entered blocking state [ 2839.803971][ T805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2839.811385][ T805] bridge0: port 1(bridge_slave_0) entered blocking state [ 2839.818560][ T805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2839.829988][ T856] device wg2 left promiscuous mode [ 2839.851110][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2839.859284][T27193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2839.866913][T27193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2839.875547][ T856] device wg2 entered promiscuous mode [ 2839.886177][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2839.899846][T31318] bridge0: port 1(bridge_slave_0) entered blocking state [ 2839.906968][T31318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2839.927696][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2839.937196][T31318] bridge0: port 2(bridge_slave_1) entered blocking state [ 2839.944285][T31318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2839.952380][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2839.961070][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2839.979265][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2839.990141][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2840.004120][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2840.012727][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2840.021040][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2840.032530][ T805] device veth0_vlan entered promiscuous mode [ 2840.053338][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2840.063683][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2840.073618][ T805] device veth1_macvtap entered promiscuous mode [ 2840.090374][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2840.098607][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2840.109316][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2840.119192][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2840.127742][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2841.609313][ T887] device syzkaller0 entered promiscuous mode [ 2841.649741][T27193] device bridge_slave_1 left promiscuous mode [ 2841.657381][T27193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2841.685211][T27193] device bridge_slave_0 left promiscuous mode [ 2841.691393][T27193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2841.700394][T27193] device veth1_macvtap left promiscuous mode [ 2841.706621][T27193] device veth0_vlan left promiscuous mode [ 2841.987179][ T882] bridge0: port 1(bridge_slave_0) entered blocking state [ 2841.994430][ T882] bridge0: port 1(bridge_slave_0) entered disabled state [ 2842.002188][ T882] device bridge_slave_0 entered promiscuous mode [ 2842.010281][ T882] bridge0: port 2(bridge_slave_1) entered blocking state [ 2842.017761][ T882] bridge0: port 2(bridge_slave_1) entered disabled state [ 2842.025620][ T882] device bridge_slave_1 entered promiscuous mode [ 2842.142072][ T914] device syzkaller0 entered promiscuous mode [ 2842.582978][ T925] device syzkaller0 entered promiscuous mode [ 2842.859254][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2842.868850][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2842.884835][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2842.897254][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2842.923486][T27193] bridge0: port 1(bridge_slave_0) entered blocking state [ 2842.930594][T27193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2842.938259][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2842.946753][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2842.955486][T27193] bridge0: port 2(bridge_slave_1) entered blocking state [ 2842.962563][T27193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2842.970245][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2843.072139][ T938] device syzkaller0 entered promiscuous mode [ 2843.339835][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2843.349370][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2843.365224][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2843.382345][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2843.409804][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2843.428712][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2843.467093][ T882] device veth0_vlan entered promiscuous mode [ 2843.476767][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2843.505502][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2843.529096][ T882] device veth1_macvtap entered promiscuous mode [ 2843.540334][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2843.548794][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2843.556791][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2843.567306][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2843.575945][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2843.711525][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2843.728351][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2843.830869][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2843.843571][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2843.913694][ T963] device syzkaller0 entered promiscuous mode [ 2845.334141][T27193] device bridge_slave_1 left promiscuous mode [ 2845.340325][T27193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2845.348006][T27193] device bridge_slave_0 left promiscuous mode [ 2845.354267][T27193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2845.362265][T27193] device veth1_macvtap left promiscuous mode [ 2845.368572][T27193] device veth0_vlan left promiscuous mode [ 2845.694159][ T990] bridge0: port 1(bridge_slave_0) entered blocking state [ 2845.701378][ T990] bridge0: port 1(bridge_slave_0) entered disabled state [ 2845.726574][ T990] device bridge_slave_0 entered promiscuous mode [ 2845.739338][ T990] bridge0: port 2(bridge_slave_1) entered blocking state [ 2845.746713][ T990] bridge0: port 2(bridge_slave_1) entered disabled state [ 2845.754394][ T990] device bridge_slave_1 entered promiscuous mode [ 2846.062228][ T1018] device syzkaller0 entered promiscuous mode [ 2846.270756][ T990] bridge0: port 2(bridge_slave_1) entered blocking state [ 2846.277860][ T990] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2846.285313][ T990] bridge0: port 1(bridge_slave_0) entered blocking state [ 2846.292385][ T990] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2846.313465][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2846.321258][T31318] bridge0: port 1(bridge_slave_0) entered disabled state [ 2846.329101][T31318] bridge0: port 2(bridge_slave_1) entered disabled state [ 2846.340617][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2846.354571][T31318] bridge0: port 1(bridge_slave_0) entered blocking state [ 2846.361678][T31318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2846.370804][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2846.379160][T31318] bridge0: port 2(bridge_slave_1) entered blocking state [ 2846.386253][T31318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2846.425934][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2846.444055][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2846.477853][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2846.504092][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2846.520265][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2846.540630][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2846.552016][ T990] device veth0_vlan entered promiscuous mode [ 2846.552948][ T1029] FAULT_INJECTION: forcing a failure. [ 2846.552948][ T1029] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2846.571564][ T1029] CPU: 1 PID: 1029 Comm: syz.3.23349 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2846.573632][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2846.581853][ T1029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2846.581870][ T1029] Call Trace: [ 2846.581878][ T1029] [ 2846.581887][ T1029] __dump_stack+0x21/0x30 [ 2846.600793][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2846.603208][ T1029] dump_stack_lvl+0xee/0x150 [ 2846.603237][ T1029] ? show_regs_print_info+0x20/0x20 [ 2846.609329][ T990] device veth1_macvtap entered promiscuous mode [ 2846.610500][ T1029] ? __kasan_check_write+0x14/0x20 [ 2846.610529][ T1029] ? _raw_spin_lock_irq+0x8f/0xe0 [ 2846.627882][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2846.628298][ T1029] dump_stack+0x15/0x20 [ 2846.636519][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2846.639674][ T1029] should_fail+0x3c1/0x510 [ 2846.654118][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2846.656250][ T1029] should_fail_usercopy+0x1a/0x20 [ 2846.656280][ T1029] copy_page_from_iter_atomic+0x3fb/0x1350 [ 2846.687729][ T1029] ? pipe_zero+0x370/0x370 [ 2846.692161][ T1029] generic_perform_write+0x307/0x670 [ 2846.697595][ T1029] ? grab_cache_page_write_begin+0xb0/0xb0 [ 2846.703419][ T1029] ? file_remove_privs+0x590/0x590 [ 2846.708549][ T1029] ? rwsem_write_trylock+0x130/0x300 [ 2846.713979][ T1029] ? clear_nonspinnable+0x60/0x60 [ 2846.719026][ T1029] __generic_file_write_iter+0x268/0x480 [ 2846.724755][ T1029] generic_file_write_iter+0xa9/0x1d0 [ 2846.730229][ T1029] vfs_write+0x802/0xf70 [ 2846.734477][ T1029] ? file_end_write+0x1b0/0x1b0 [ 2846.739334][ T1029] ? wait_for_completion_killable_timeout+0x10/0x10 [ 2846.746261][ T1029] ? __fget_files+0x2c4/0x320 [ 2846.750976][ T1029] ? __fdget_pos+0x2d2/0x380 [ 2846.755676][ T1029] ? ksys_write+0x71/0x240 [ 2846.760245][ T1029] ksys_write+0x140/0x240 [ 2846.764584][ T1029] ? __ia32_sys_read+0x90/0x90 [ 2846.769352][ T1029] ? sched_clock_cpu+0x18/0x3c0 [ 2846.774205][ T1029] ? debug_smp_processor_id+0x17/0x20 [ 2846.779580][ T1029] __x64_sys_write+0x7b/0x90 [ 2846.784174][ T1029] x64_sys_call+0x8ef/0x9a0 [ 2846.788679][ T1029] do_syscall_64+0x4c/0xa0 [ 2846.793098][ T1029] ? clear_bhb_loop+0x50/0xa0 [ 2846.797779][ T1029] ? clear_bhb_loop+0x50/0xa0 [ 2846.802473][ T1029] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2846.808386][ T1029] RIP: 0033:0x7f6d17eb6be9 [ 2846.812802][ T1029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2846.832795][ T1029] RSP: 002b:00007f6d1691f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2846.841240][ T1029] RAX: ffffffffffffffda RBX: 00007f6d180ddfa0 RCX: 00007f6d17eb6be9 [ 2846.849215][ T1029] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000005 [ 2846.857184][ T1029] RBP: 00007f6d1691f090 R08: 0000000000000000 R09: 0000000000000000 [ 2846.865155][ T1029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2846.873295][ T1029] R13: 00007f6d180de038 R14: 00007f6d180ddfa0 R15: 00007fff4fe0de78 [ 2846.881275][ T1029] [ 2846.897955][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2846.909966][T31318] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2847.814183][T31318] device bridge_slave_1 left promiscuous mode [ 2847.820395][T31318] bridge0: port 2(bridge_slave_1) entered disabled state [ 2847.828122][T31318] device bridge_slave_0 left promiscuous mode [ 2847.834363][T31318] bridge0: port 1(bridge_slave_0) entered disabled state [ 2847.842475][T31318] device veth1_macvtap left promiscuous mode [ 2847.848572][T31318] device veth0_vlan left promiscuous mode [ 2848.431239][ T1040] device syzkaller0 entered promiscuous mode [ 2848.930051][ T1054] device sit0 left promiscuous mode [ 2849.076693][ T1055] device sit0 entered promiscuous mode [ 2849.109933][ T1063] device syzkaller0 entered promiscuous mode [ 2849.691942][ T1051] bridge0: port 1(bridge_slave_0) entered blocking state [ 2849.700000][ T1051] bridge0: port 1(bridge_slave_0) entered disabled state [ 2849.708192][ T1051] device bridge_slave_0 entered promiscuous mode [ 2849.753220][ T1051] bridge0: port 2(bridge_slave_1) entered blocking state [ 2849.760440][ T1051] bridge0: port 2(bridge_slave_1) entered disabled state [ 2849.768063][ T1051] device bridge_slave_1 entered promiscuous mode [ 2850.156439][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2850.176889][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2850.255523][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2850.343613][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2850.393977][T20480] bridge0: port 1(bridge_slave_0) entered blocking state [ 2850.401084][T20480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2850.450242][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2850.461764][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2850.470870][T20480] bridge0: port 2(bridge_slave_1) entered blocking state [ 2850.477963][T20480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2850.485929][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2850.497412][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2850.634644][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2850.731133][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2850.778696][ T1051] device veth0_vlan entered promiscuous mode [ 2850.801331][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2850.809791][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2850.824880][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2850.855602][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2850.883147][ T1051] device veth1_macvtap entered promiscuous mode [ 2850.920456][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2850.969887][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2851.013672][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2851.022344][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2851.584560][T20480] device bridge_slave_1 left promiscuous mode [ 2851.590971][T20480] bridge0: port 2(bridge_slave_1) entered disabled state [ 2851.598562][T20480] device bridge_slave_0 left promiscuous mode [ 2851.604860][T20480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2851.612859][T20480] device veth1_macvtap left promiscuous mode [ 2851.618937][T20480] device veth0_vlan left promiscuous mode [ 2852.706378][ T1120] device syzkaller0 entered promiscuous mode [ 2853.085211][ T1121] bridge0: port 1(bridge_slave_0) entered blocking state [ 2853.092768][ T1121] bridge0: port 1(bridge_slave_0) entered disabled state [ 2853.100888][ T1121] device bridge_slave_0 entered promiscuous mode [ 2853.108149][ T1121] bridge0: port 2(bridge_slave_1) entered blocking state [ 2853.115981][ T1121] bridge0: port 2(bridge_slave_1) entered disabled state [ 2853.123681][ T1121] device bridge_slave_1 entered promiscuous mode [ 2853.200350][ T1121] bridge0: port 2(bridge_slave_1) entered blocking state [ 2853.207576][ T1121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2853.214928][ T1121] bridge0: port 1(bridge_slave_0) entered blocking state [ 2853.221972][ T1121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2853.247746][T20480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2853.256615][T20480] bridge0: port 2(bridge_slave_1) entered disabled state [ 2853.264897][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2853.272557][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2853.315004][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2853.333472][T20480] bridge0: port 1(bridge_slave_0) entered blocking state [ 2853.340676][T20480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2853.359140][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2853.372019][T20480] bridge0: port 2(bridge_slave_1) entered blocking state [ 2853.379138][T20480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2853.400552][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2853.410538][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2853.433840][ T1121] device veth0_vlan entered promiscuous mode [ 2853.461949][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2853.504500][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2853.533757][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2853.541483][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2853.553608][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2853.564191][ T1121] device veth1_macvtap entered promiscuous mode [ 2853.582134][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2853.605162][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2853.744356][ T1157] GPL: port 1(erspan0) entered blocking state [ 2853.750976][ T1157] GPL: port 1(erspan0) entered disabled state [ 2853.765560][ T1157] device erspan0 entered promiscuous mode [ 2853.796752][ T1157] GPL: port 1(erspan0) entered blocking state [ 2853.803317][ T1157] GPL: port 1(erspan0) entered forwarding state [ 2853.924827][ T1165] device syzkaller0 entered promiscuous mode [ 2855.391396][ T8145] device bridge_slave_1 left promiscuous mode [ 2855.409655][ T8145] bridge0: port 2(bridge_slave_1) entered disabled state [ 2855.444508][ T8145] device bridge_slave_0 left promiscuous mode [ 2855.451350][ T8145] bridge0: port 1(bridge_slave_0) entered disabled state [ 2855.482057][ T8145] device veth1_macvtap left promiscuous mode [ 2855.488378][ T8145] device veth0_vlan left promiscuous mode [ 2856.039560][ T1184] bridge0: port 1(bridge_slave_0) entered blocking state [ 2856.047476][ T1184] bridge0: port 1(bridge_slave_0) entered disabled state [ 2856.077725][ T1184] device bridge_slave_0 entered promiscuous mode [ 2856.095286][ T1184] bridge0: port 2(bridge_slave_1) entered blocking state [ 2856.117980][ T1184] bridge0: port 2(bridge_slave_1) entered disabled state [ 2856.156202][ T1184] device bridge_slave_1 entered promiscuous mode [ 2856.698236][ T1221] device syzkaller0 entered promiscuous mode [ 2857.233500][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2857.243576][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2857.270947][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2857.289061][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2857.323763][T27193] bridge0: port 1(bridge_slave_0) entered blocking state [ 2857.330878][T27193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2857.352237][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2857.379691][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2857.393834][T27193] bridge0: port 2(bridge_slave_1) entered blocking state [ 2857.400954][T27193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2857.432909][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2857.487214][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2857.498436][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2857.513543][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2857.532002][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2857.606336][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2857.633735][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2857.663225][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2857.684205][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2857.714904][ T1184] device veth0_vlan entered promiscuous mode [ 2857.731315][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2857.743524][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2857.761133][ T1184] device veth1_macvtap entered promiscuous mode [ 2857.821682][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2857.830540][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2857.843514][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2857.927464][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2857.953987][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2858.023405][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2858.074317][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2858.161225][ T1258] device syzkaller0 entered promiscuous mode [ 2859.734290][ T8145] device bridge_slave_1 left promiscuous mode [ 2859.740450][ T8145] bridge0: port 2(bridge_slave_1) entered disabled state [ 2859.748107][ T8145] device bridge_slave_0 left promiscuous mode [ 2859.754649][ T8145] bridge0: port 1(bridge_slave_0) entered disabled state [ 2859.763183][ T8145] device veth1_macvtap left promiscuous mode [ 2859.769227][ T8145] device veth0_vlan left promiscuous mode [ 2860.404421][ T1298] bridge0: port 1(bridge_slave_0) entered blocking state [ 2860.411606][ T1298] bridge0: port 1(bridge_slave_0) entered disabled state [ 2860.419465][ T1298] device bridge_slave_0 entered promiscuous mode [ 2860.428477][ T1298] bridge0: port 2(bridge_slave_1) entered blocking state [ 2860.435790][ T1298] bridge0: port 2(bridge_slave_1) entered disabled state [ 2860.443504][ T1298] device bridge_slave_1 entered promiscuous mode [ 2860.457801][ T1303] device syzkaller0 entered promiscuous mode [ 2860.556856][ T1310] device syzkaller0 entered promiscuous mode [ 2861.373675][ T1326] device syzkaller0 entered promiscuous mode [ 2861.753695][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2861.762863][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2861.796178][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2861.811338][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2861.830915][T27193] bridge0: port 1(bridge_slave_0) entered blocking state [ 2861.838030][T27193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2861.861992][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2861.911113][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2861.951460][T27193] bridge0: port 2(bridge_slave_1) entered blocking state [ 2861.958581][T27193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2862.452931][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2862.462343][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2862.483807][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2862.492041][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2862.503713][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2862.543907][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2862.552472][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2862.570083][ T1298] device veth0_vlan entered promiscuous mode [ 2862.585433][ T1298] device veth1_macvtap entered promiscuous mode [ 2862.602131][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2862.612461][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2862.634204][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2862.653551][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2862.662217][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2862.715507][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2862.736778][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2862.775577][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2862.822997][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2862.875138][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2862.903518][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2864.653804][ T8145] device bridge_slave_1 left promiscuous mode [ 2864.660023][ T8145] bridge0: port 2(bridge_slave_1) entered disabled state [ 2864.667609][ T8145] device bridge_slave_0 left promiscuous mode [ 2864.673839][ T8145] bridge0: port 1(bridge_slave_0) entered disabled state [ 2864.681784][ T8145] device veth1_macvtap left promiscuous mode [ 2864.687884][ T8145] device veth0_vlan left promiscuous mode [ 2865.085659][ T1390] device syzkaller0 entered promiscuous mode [ 2865.787755][ T1399] FAULT_INJECTION: forcing a failure. [ 2865.787755][ T1399] name failslab, interval 1, probability 0, space 0, times 0 [ 2865.804075][ T1399] CPU: 0 PID: 1399 Comm: syz.3.23459 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 2865.814534][ T1399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 2865.824720][ T1399] Call Trace: [ 2865.828023][ T1399] [ 2865.830982][ T1399] __dump_stack+0x21/0x30 [ 2865.835338][ T1399] dump_stack_lvl+0xee/0x150 [ 2865.839956][ T1399] ? show_regs_print_info+0x20/0x20 [ 2865.845178][ T1399] dump_stack+0x15/0x20 [ 2865.849379][ T1399] should_fail+0x3c1/0x510 [ 2865.853816][ T1399] __should_failslab+0xa4/0xe0 [ 2865.858614][ T1399] should_failslab+0x9/0x20 [ 2865.863143][ T1399] slab_pre_alloc_hook+0x3b/0xe0 [ 2865.868109][ T1399] ? security_file_alloc+0x33/0x120 [ 2865.873335][ T1399] kmem_cache_alloc+0x44/0x260 [ 2865.878122][ T1399] security_file_alloc+0x33/0x120 [ 2865.883150][ T1399] __alloc_file+0xb5/0x2a0 [ 2865.887576][ T1399] alloc_empty_file+0x97/0x180 [ 2865.892339][ T1399] alloc_file+0x59/0x540 [ 2865.896588][ T1399] alloc_file_pseudo+0x17a/0x1f0 [ 2865.901533][ T1399] ? alloc_empty_file_noaccount+0x80/0x80 [ 2865.907255][ T1399] ? _raw_spin_lock_bh+0x8e/0xe0 [ 2865.912206][ T1399] anon_inode_getfile+0xa6/0x180 [ 2865.917145][ T1399] bpf_link_prime+0xf0/0x250 [ 2865.921824][ T1399] bpf_tracing_prog_attach+0x79f/0xea0 [ 2865.927295][ T1399] ? bpf_insn_prepare_dump+0x830/0x830 [ 2865.932770][ T1399] ? __fget_files+0x2c4/0x320 [ 2865.937553][ T1399] bpf_raw_tracepoint_open+0x667/0x960 [ 2865.943029][ T1399] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 2865.948759][ T1399] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 2865.954222][ T1399] ? _raw_spin_lock+0xe0/0xe0 [ 2865.958905][ T1399] ? selinux_bpf+0xce/0xf0 [ 2865.963351][ T1399] ? security_bpf+0x82/0xa0 [ 2865.967856][ T1399] __sys_bpf+0x490/0x730 [ 2865.972111][ T1399] ? bpf_link_show_fdinfo+0x310/0x310 [ 2865.977484][ T1399] ? bpf_trace_run2+0xb5/0x1b0 [ 2865.982262][ T1399] ? __bpf_trace_sys_enter+0x62/0x70 [ 2865.987555][ T1399] __x64_sys_bpf+0x7c/0x90 [ 2865.991978][ T1399] x64_sys_call+0x4b9/0x9a0 [ 2865.996487][ T1399] do_syscall_64+0x4c/0xa0 [ 2866.001007][ T1399] ? clear_bhb_loop+0x50/0xa0 [ 2866.005689][ T1399] ? clear_bhb_loop+0x50/0xa0 [ 2866.010367][ T1399] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 2866.016260][ T1399] RIP: 0033:0x7f6d17eb6be9 [ 2866.020764][ T1399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2866.040371][ T1399] RSP: 002b:00007f6d168fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2866.048786][ T1399] RAX: ffffffffffffffda RBX: 00007f6d180de090 RCX: 00007f6d17eb6be9 [ 2866.056786][ T1399] RDX: 0000000000000010 RSI: 0000200000000000 RDI: 0000000000000011 [ 2866.064760][ T1399] RBP: 00007f6d168fe090 R08: 0000000000000000 R09: 0000000000000000 [ 2866.072745][ T1399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2866.080974][ T1399] R13: 00007f6d180de128 R14: 00007f6d180de090 R15: 00007fff4fe0de78 [ 2866.089051][ T1399] [ 2866.185492][ T1396] bridge0: port 1(bridge_slave_0) entered blocking state [ 2866.192622][ T1396] bridge0: port 1(bridge_slave_0) entered disabled state [ 2866.200390][ T1396] device bridge_slave_0 entered promiscuous mode [ 2866.217803][ T1396] bridge0: port 2(bridge_slave_1) entered blocking state [ 2866.225110][ T1396] bridge0: port 2(bridge_slave_1) entered disabled state [ 2866.232756][ T1396] device bridge_slave_1 entered promiscuous mode [ 2866.425795][ T1426] device syzkaller0 entered promiscuous mode [ 2866.597093][ T1396] bridge0: port 2(bridge_slave_1) entered blocking state [ 2866.604216][ T1396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2866.611550][ T1396] bridge0: port 1(bridge_slave_0) entered blocking state [ 2866.618701][ T1396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2866.640201][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2866.647964][T20480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2866.656083][T20480] bridge0: port 2(bridge_slave_1) entered disabled state [ 2866.668163][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2866.676746][T20480] bridge0: port 1(bridge_slave_0) entered blocking state [ 2866.683882][T20480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2866.693589][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2866.706492][T20480] bridge0: port 2(bridge_slave_1) entered blocking state [ 2866.713604][T20480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2866.741027][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2866.784312][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2866.804701][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2866.832229][ T1396] device veth0_vlan entered promiscuous mode [ 2866.838990][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2866.847927][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2866.855902][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2866.868307][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2866.915185][ T1396] device veth1_macvtap entered promiscuous mode [ 2866.979655][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2866.998512][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2868.414062][T27193] device bridge_slave_1 left promiscuous mode [ 2868.420289][T27193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2868.428196][T27193] device bridge_slave_0 left promiscuous mode [ 2868.434426][T27193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2868.442553][T27193] device veth1_macvtap left promiscuous mode [ 2868.448635][T27193] device veth0_vlan left promiscuous mode [ 2869.677100][ T1482] device pim6reg1 entered promiscuous mode [ 2869.737427][ T1479] device pim6reg1 entered promiscuous mode [ 2869.941098][ T1463] bridge0: port 1(bridge_slave_0) entered blocking state [ 2869.959736][ T1463] bridge0: port 1(bridge_slave_0) entered disabled state [ 2869.968788][ T1463] device bridge_slave_0 entered promiscuous mode [ 2870.023485][ T1463] bridge0: port 2(bridge_slave_1) entered blocking state [ 2870.031133][ T1463] bridge0: port 2(bridge_slave_1) entered disabled state [ 2870.040005][ T1463] device bridge_slave_1 entered promiscuous mode [ 2870.805823][ T1521] device veth0_vlan left promiscuous mode [ 2870.822760][ T1521] device veth0_vlan entered promiscuous mode [ 2870.878981][ T1521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2870.923912][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2870.932325][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2870.939837][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 2871.901610][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2871.909701][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2871.917559][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2871.926461][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2871.936329][T20480] bridge0: port 1(bridge_slave_0) entered blocking state [ 2871.943419][T20480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2872.007536][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2872.015662][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2872.024433][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2872.032979][T20480] bridge0: port 2(bridge_slave_1) entered blocking state [ 2872.040075][T20480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2872.048394][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2872.059208][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2872.067647][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2872.076149][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2872.091920][ T1463] device veth0_vlan entered promiscuous mode [ 2872.108946][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2872.126036][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2872.138201][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2872.146881][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2872.217695][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2872.226117][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2872.250606][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2872.265578][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2872.286234][ T1463] device veth1_macvtap entered promiscuous mode [ 2872.467943][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2872.484975][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2872.523519][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2872.556319][ T1547] device pim6reg1 entered promiscuous mode [ 2872.566458][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2872.575834][T20480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2874.093906][T27193] device bridge_slave_1 left promiscuous mode [ 2874.100089][T27193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2874.107755][T27193] device bridge_slave_0 left promiscuous mode [ 2874.114056][T27193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2874.122235][T27193] device veth1_macvtap left promiscuous mode [ 2874.128502][T27193] device veth0_vlan left promiscuous mode [ 2874.772426][ T1561] device syzkaller0 entered promiscuous mode [ 2875.042873][ T1574] device syzkaller0 entered promiscuous mode [ 2875.595322][ T1589] device syzkaller0 entered promiscuous mode [ 2875.634088][ T1570] bridge0: port 1(bridge_slave_0) entered blocking state [ 2875.657030][ T1570] bridge0: port 1(bridge_slave_0) entered disabled state [ 2875.680129][ T1570] device bridge_slave_0 entered promiscuous mode [ 2875.721542][ T1570] bridge0: port 2(bridge_slave_1) entered blocking state [ 2875.745633][ T1570] bridge0: port 2(bridge_slave_1) entered disabled state [ 2875.783714][ T1570] device bridge_slave_1 entered promiscuous mode [ 2876.004880][ T1606] device pim6reg1 entered promiscuous mode [ 2876.026743][ T1570] bridge0: port 2(bridge_slave_1) entered blocking state [ 2876.033865][ T1570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2876.041317][ T1570] bridge0: port 1(bridge_slave_0) entered blocking state [ 2876.048418][ T1570] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2876.252453][T27193] bridge0: port 1(bridge_slave_0) entered disabled state [ 2876.260007][T27193] bridge0: port 2(bridge_slave_1) entered disabled state [ 2876.294092][ T1624] device pim6reg1 entered promiscuous mode [ 2876.420187][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2876.427939][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2876.516286][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2876.528217][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2876.536992][T27193] bridge0: port 1(bridge_slave_0) entered blocking state [ 2876.544086][T27193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2876.551724][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2876.560530][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2876.569233][T27193] bridge0: port 2(bridge_slave_1) entered blocking state [ 2876.576451][T27193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2876.584473][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2876.592665][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2876.600838][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2876.609035][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2876.991458][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2877.001499][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2877.012796][ T1570] device veth0_vlan entered promiscuous mode [ 2877.066487][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2877.074681][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2877.084064][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2877.092001][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2877.160894][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2877.179522][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2877.206450][ T1570] device veth1_macvtap entered promiscuous mode [ 2877.277372][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2877.292882][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2877.309945][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2877.369347][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2877.390460][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2879.094135][T20480] device bridge_slave_1 left promiscuous mode [ 2879.100714][T20480] bridge0: port 2(bridge_slave_1) entered disabled state [ 2879.108304][T20480] device bridge_slave_0 left promiscuous mode [ 2879.114515][T20480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2879.122348][T20480] device veth1_macvtap left promiscuous mode [ 2879.128431][T20480] device veth0_vlan left promiscuous mode [ 2879.720388][ T1642] device syzkaller0 entered promiscuous mode [ 2880.114891][ T1646] bridge0: port 1(bridge_slave_0) entered blocking state [ 2880.121980][ T1646] bridge0: port 1(bridge_slave_0) entered disabled state [ 2880.225337][ T1646] device bridge_slave_0 entered promiscuous mode [ 2880.275708][ T1668] device pim6reg1 entered promiscuous mode [ 2880.299700][ T1646] bridge0: port 2(bridge_slave_1) entered blocking state [ 2880.307065][ T1646] bridge0: port 2(bridge_slave_1) entered disabled state [ 2880.315299][ T1646] device bridge_slave_1 entered promiscuous mode [ 2880.914060][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2880.921698][T27193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2880.948736][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2880.957517][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2880.966007][T25594] bridge0: port 1(bridge_slave_0) entered blocking state [ 2880.973117][T25594] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2881.046059][ T1646] device veth0_vlan entered promiscuous mode [ 2881.078083][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2881.103639][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2881.111983][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2881.120094][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2881.128061][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2881.143846][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2881.152608][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2881.161153][T25594] bridge0: port 2(bridge_slave_1) entered blocking state [ 2881.168532][T25594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2881.176518][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2881.193557][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2881.236121][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2881.248586][ T1646] device veth1_macvtap entered promiscuous mode [ 2881.264319][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2881.277960][T25594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=22982 state=3 status=67 (errno 32: Broken pipe) [ 2881.602788][ T30] audit: type=1400 audit(1756485692.706:161): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14028]" dev="pipefs" ino=14028 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2882.373891][T20480] device bridge_slave_1 left promiscuous mode [ 2882.380039][T20480] bridge0: port 2(bridge_slave_1) entered disabled state [ 2882.387694][T20480] device bridge_slave_0 left promiscuous mode [ 2882.393929][T20480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2882.401889][T20480] device veth1_macvtap left promiscuous mode [ 2882.407984][T20480] device veth0_vlan left promiscuous mode [ 2883.574877][T20480] GPL: port 1(erspan0) entered disabled state [ 2883.583395][T20480] device erspan0 left promiscuous mode [ 2883.588871][T20480] GPL: port 1(erspan0) entered disabled state [ 2883.697963][T20480] device gretap0 left promiscuous mode [ 2883.703618][T20480] bridge0: port 3(gretap0) entered disabled state [ 2883.974776][T20480] device bridge_slave_1 left promiscuous mode [ 2883.980946][T20480] bridge0: port 2(bridge_slave_1) entered disabled state [ 2883.988575][T20480] device bridge_slave_0 left promiscuous mode [ 2883.994751][T20480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2884.003199][T20480] device bridge_slave_1 left promiscuous mode [ 2884.009390][T20480] bridge0: port 2(bridge_slave_1) entered disabled state [ 2884.017099][T20480] device bridge_slave_0 left promiscuous mode [ 2884.023265][T20480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2884.031220][T20480] device bridge_slave_1 left promiscuous mode [ 2884.037439][T20480] bridge0: port 2(bridge_slave_1) entered disabled state [ 2884.044966][T20480] device bridge_slave_0 left promiscuous mode [ 2884.051079][T20480] bridge0: port 1(bridge_slave_0) entered disabled state [ 2884.060651][T20480] device veth0_vlan left promiscuous mode [ 2884.067100][T20480] device veth0_vlan left promiscuous mode [ 2884.073309][T20480] device veth0_vlan left promiscuous mode