last executing test programs: 32.205587847s ago: executing program 2 (id=923): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x1800, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff0000000003000000000000000000000002000000000000000000000000000002030000000000000000000002"], 0x0, 0x56}, 0x20) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80) 27.547761652s ago: executing program 2 (id=923): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x1800, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff0000000003000000000000000000000002000000000000000000000000000002030000000000000000000002"], 0x0, 0x56}, 0x20) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80) 22.460629392s ago: executing program 2 (id=923): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x1800, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff0000000003000000000000000000000002000000000000000000000000000002030000000000000000000002"], 0x0, 0x56}, 0x20) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80) 14.774243261s ago: executing program 2 (id=923): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x1800, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff0000000003000000000000000000000002000000000000000000000000000002030000000000000000000002"], 0x0, 0x56}, 0x20) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80) 9.037028932s ago: executing program 4 (id=1369): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) close(r0) 8.82499533s ago: executing program 4 (id=1373): openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2a}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x100400, 0x0, 0xfffffffe, 0x9, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x13, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x7, 0xeb, &(0x7f00000008c0)=""/251}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x8, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r3, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x7fffffff, 0x2, 0x8, 0x400, r0, 0x8001, '\x00', r5, r6, 0x1, 0x1, 0x1, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r7, &(0x7f0000000080), 0x0}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) recvmsg$unix(r8, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, 0x0, 0xfdef) write$cgroup_subtree(r9, &(0x7f00000004c0)=ANY=[], 0xfdef) write$cgroup_netprio_ifpriomap(r9, &(0x7f0000000000)={'batadv_slave_1', 0x32, 0x34}, 0x11) 7.904344183s ago: executing program 4 (id=1377): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{}, &(0x7f0000000a00), 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000e300"/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000100", @ANYRES32=r4, @ANYBLOB='\a\x00'/20, @ANYRES32=r1, @ANYRES32, @ANYBLOB="0200"/24, @ANYRES32, @ANYBLOB="cef7a684757861a0c2cbdd263e6365219df29adf61c36171be521f236264ea0027b393589805acaac1585778259649fef678c1fc19698c67d7b8615d93d762eb614ce412c7e053cf1033f0becfbfab4f87cd793c74c3596359ad65779256e51297bded2e268b8dff144415a0"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="00181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000300)}, 0x805}, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = syz_clone(0x8080400, &(0x7f0000000680)="1ad8e0db7ea5ae70759627e514511cf6fa10e9139332c7c1f8452e31429dd5e572ac118f310e5c4c983adc301fff77f2aba23a8797f25ee9d8b726f3d0b97913f8e347addcb8fb95b5e1480c7508a0821c7935777c83af3858f70088f26b147fafe8098665fd7bc345d453b68c2e76f709964f2697b0fbb6bda358a1a3fee6faa58cee4687f18b8468cea1beff947ff305bf", 0x92, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000200)="f842c5861fc9f47e54e2d06a77b3") syz_open_procfs$namespace(r6, &(0x7f0000000280)='ns/pid\x00') r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r7, 0x27, 0x51, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b86dd", 0x0, 0x3ffe, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{}, &(0x7f0000000880), 0x0}, 0x20) write$cgroup_freezer_state(r0, &(0x7f0000001000)='THAWED\x00', 0x7) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001040)={'team_slave_0\x00', 0x100}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='kfree\x00', r8, 0x0, 0x800}, 0x18) 7.855330918s ago: executing program 0 (id=1378): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) close(r2) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="18020000010000000000000000000000850000004100000085000000d000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r3}, 0x18) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) r5 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) r8 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, r5, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x62, 0xfe, 0x80, 0x0, 0x0, 0x92, 0x8003, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0}, 0x101000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRESDEC=r6, @ANYRES64=0x0, @ANYRESHEX=r5, @ANYRESOCT=0x0, @ANYRES16=r8], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0}, 0x94) 7.566582921s ago: executing program 1 (id=1379): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b000000080000000209c7fb0a7fe617ef9d8ecf5d9cd1c455000000040000000500", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='cpu\t<0|&\t') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) 7.421575783s ago: executing program 4 (id=1380): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000600)=""/228, 0xe4}], 0x1, 0x0, 0x4b}, 0x23) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000002ec0)={0x10, 0x0, &(0x7f0000000740), &(0x7f0000000880)='GPL\x00', 0x7, 0xff1, &(0x7f0000000a00)=""/4081, 0x41000, 0x2, '\x00', 0x0, @sk_msg=0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000900)={0xc, 0x2, 0x8, 0x4b89}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000002e00)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000002e40)=[{0x4, 0x2, 0x14, 0x9}, {0x5, 0x3, 0x6, 0x2}, {0x2, 0x5, 0x1, 0x8}, {0x0, 0x2, 0x2, 0x1}, {0x2, 0x2, 0xb, 0x6}], 0x10, 0x4}, 0x94) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='fsi_master_break\x00', r4}, 0x18) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x0, 0x2000000000000188, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0xbff}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0e00000004387b00000008000000080000000000afe41e1b9edfecbefb1cb38e3173da43d30f1d9d4e02a7cb10690625c66943bbf7d031eae90e0f364ee0e74c6259e53b9efd403bd3798e6cb3f4", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r6}, 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0x20}, 0x1f00) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x18) perf_event_open(0x0, 0x0, 0xf, r9, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x7d2ccc1a8cedb015}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='\ncpuset '], 0x8) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 7.319008461s ago: executing program 1 (id=1381): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb7030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYRESDEC=0x0, @ANYRES32, @ANYRES8, @ANYRES32=0x0, @ANYRES16=r0, @ANYBLOB='\x00'/25], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x2, 0xffffffffffffff50, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x200, 0x20, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x11a00, 0x200000000000005, 0xf, 0x0, 0xffdffffffffffff9, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xb8600, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000013c0)="d080", 0x2}], 0x1}, 0x20000801) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8982, &(0x7f0000000080)) 7.130768136s ago: executing program 1 (id=1382): perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x2}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) getpid() getpid() openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={&(0x7f0000000300)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000480)={r0}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r3, 0x400454c9, 0xba98575a95aeb70d) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40)=0xffffffffffffffff, 0x12) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002420702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000022850000009400000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x2f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000070000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r6}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x19, 0x4, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000018000000850000007c00000095"], &(0x7f0000001040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 7.088598909s ago: executing program 2 (id=923): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x1800, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff0000000003000000000000000000000002000000000000000000000000000002030000000000000000000002"], 0x0, 0x56}, 0x20) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80) 4.946818362s ago: executing program 0 (id=1383): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) close(r0) 4.946147982s ago: executing program 1 (id=1384): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x1c1842, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r4}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000980)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000900), &(0x7f0000000940)='%pS \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1c, 0x2c, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x40}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000780)='syzkaller\x00', 0x3ff, 0x84, &(0x7f00000007c0)=""/132, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000008c0)={0x2, 0xc, 0x9aa0, 0xf}, 0x10, 0xffffffffffffffff, r0, 0x1, &(0x7f00000009c0)=[0xffffffffffffffff, r6], &(0x7f0000000a00)=[{0x4, 0x4, 0xd, 0x1}], 0x10, 0x8}, 0x94) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) close(r7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1300000008000000080000000000000008000000", @ANYRES32=0x1, @ANYBLOB="fdebe6ff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f00000003c0)={r9, 0x0, 0x0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001e40)={r8, &(0x7f0000000300), 0x0}, 0x20) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000400000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r11}, 0x10) close(r10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r10, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) 4.944544582s ago: executing program 4 (id=1386): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x4}, {0xac}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r2, 0xe0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xb3, &(0x7f0000000b00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000c80), &(0x7f0000000cc0), 0x8, 0xf, 0x8, 0x8, &(0x7f0000000d00)}}, 0x10) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000f00)={r5}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r7, r8}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r11}, 0x10) sendmsg$tipc(r10, &(0x7f0000000940)={&(0x7f0000000180)=@name={0x1e, 0x2, 0x1, {{0x40}, 0x3}}, 0x10, &(0x7f0000000880)=[{&(0x7f00000003c0)="2fa159566505646b7915cb78b153ed522cccdaaa4b1f151c667087b0947301ee359fc8a21ce12c1a3328a8a70c1d017bdaf279a8828d74857eaa1c124d79fff088d7efbe2031f85dcc414563f0", 0x4d}, {&(0x7f0000000500)="9dc4fdb73bdaf84fd51edbb80b43050c47ea22476b8067c217a9a352718ac6ab88edc2b2290eb52c6ec07537da68482b0889844312804df41bce408d2265b81b9a31ddd528afea75412124c5099123c7bc2439e98d33653dd98a6ecf314255a7fab77b0938ba9ebb9138ddf001199877109ef2330cd63619a4a13556dbe1574719", 0x81}, {&(0x7f00000001c0)="3d49308cedb0edee3ee896edd10a19a30b", 0x11}, {&(0x7f00000005c0)="4e89d075817bbd6ccbbd3705a629d57af5b7d2473c11f8821bf018b3d5a09a07b87a356852a8267904fc1816d7527f44d318203bf750452a3dc3d7bd487db8571c2f822a655a34cd51df142941cde892a1dc920c8e4196d831d4a438dfa39f4ef2b6b65fdc3a10c37e6cf1160c5cdbbb51c70ff3d0a72866c739e07c49e06a36db4f3acedb06472e7973c6a303f3b02b6f3cd68170fbff6f023d5b20f747f92935409dec0d4014ad9121121b39b98b38c591d0f8ea4e3b86ab18d913332dd6e047f661768b428c4bc60ae90f7ff3e35ca530d82f446c786ce3e783b7a8edf86fcbc81248bd4cae1f48bf68c0c03a07", 0xef}, {&(0x7f00000006c0)="06abb1ed1e48c3ad3e7671375a3d3b9064064cf3d8bc72ba6b7e2a946d6a4f06e9d62f931dfa946a8053953023661bf8416969a6e0898abbcd975293ec646219f96da083e69ab1badd3be089ee133ebb7d14afc0b72fc636c6d351a1b9812a7e974898e72db3d16b85ac773de1159f225691beaecac517a89b0b0a3c1c25eb4ccba8fa11873f65d8c3561b70c855d01c3fc147bdf95533a2e42c9b5ffcd1a66300cf42ddf57dcd4115e3852f0ee45417e3e29e7177d9617be6ddad6bcc", 0xbd}, {&(0x7f0000000440)="52ea650c319d8481df324d3117577a0af5c0a0f6cfd94ba9d014ee2b7dacff22ae6dba904ed335e952548fe7b6fa05498349b90b170059a699acc65d1a66304000ecb10678b7a8cd027a410e2e22ea0f4a29", 0x52}, {&(0x7f0000000300)="b879a18267255cad9c", 0x9}, {&(0x7f0000000780)="6e976fba94e0aba4f9b190d247f4bdd51a18853b18b11073b90e34ebb49ff8e94283021df1277deed96d88ac9006986fd44ef7ca007ebecc1b851016dcc42caabbfd45ae893adfd9d17bc690070afbf418c35554f9", 0x55}, {&(0x7f0000000800)="2bd64cb7d6cd716a92a2b631e6b62f5b70aca443d4a021b51e50218a8b3c7eef9aa89bb59b6df15836128ce736180b5f2caa53b61900288e662976aa475ce26a57b06dc2afc0e7247224344aa9ad06b3c5814dbabf2e8ab12f2476d0af0a7598ec8f28ed681f89fec568c95c97122c25", 0x70}], 0x9, &(0x7f00000009c0)="59fb39f18a7301bec746fc8c554840132637dccaf345b97a193db4c690f4bf864fa6cd2c0d2dc6b30ad8bbe93c34cd46f4b4bb0735774cf0b4d153b5b694fc3df492c0d5e1b023bb819fc9ba23ec95ec7778cded1a8790f11fff34c71ca606a3b77d", 0x62, 0x4000}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r1, 0xe0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000036c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea, 0x8, 0x0, 0x0}}, 0x10) 4.84670518s ago: executing program 4 (id=1387): r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={0x0, 0x0, 0x8}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@o_path={&(0x7f0000000000)='./file0\x00', r0}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x10}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x8300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) close(r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0xffffffffffffff38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x0, 0x4e}, 0x28) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 4.816130033s ago: executing program 0 (id=1388): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000002000000000000800000000850000000f00000095"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b000000080000000c000000ffffff7f01000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x18, &(0x7f0000000180)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x79ac53b7bac5bad5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000040000000c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000db13c36ccf9d70d4000000000000"], 0x48) 4.737459959s ago: executing program 0 (id=1389): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x4, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000600)={0x0, 0x37fe0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000000080)='syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup(r5, 0x0, 0x1ff) openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.737027719s ago: executing program 1 (id=1390): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x1800, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.837838361s ago: executing program 0 (id=1393): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x1e, 0xa, &(0x7f00000002c0)=@raw=[@map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000001}}], &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x25, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x4, 0xe, 0x4, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) ioctl$TUNSETOFFLOAD(r0, 0x8004745a, 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x1, 0x8, 0x6, 0x800, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r4, 0x0) syz_open_procfs$namespace(r4, 0x0) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000d0ff00000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000950000008d0000009500"/48], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) 1.965484742s ago: executing program 3 (id=1396): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f00000000c0)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0x1, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x6, [@const={0x6, 0x0, 0x0, 0xa, 0x2}, @union={0x4, 0x2, 0x0, 0x5, 0x1, 0x0, [{0x10, 0x1}, {0x2, 0x1, 0x5}]}, @func={0xc, 0x0, 0x0, 0xc, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0x6}}, @enum={0x7, 0x8, 0x0, 0x6, 0x4, [{0x7, 0x5}, {0x0, 0x800}, {0xd, 0x5}, {0x2, 0x7}, {0xb, 0xfffffde5}, {0x9, 0x4}, {0x8, 0xfffffffa}, {0x6, 0x81}]}, @restrict={0x9, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x61, 0x61, 0x61, 0x0]}}, &(0x7f0000000280)=""/173, 0xca, 0xad, 0x0, 0x1}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x4, 0x3, 0x16, 0x4, 0x8, r0, 0x1, '\x00', r2, r3, 0x4, 0x1, 0x1}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x8, '\x00', r2, r3, 0x2, 0x2, 0x5}, 0x50) (async) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x8, '\x00', r2, r3, 0x2, 0x2, 0x5}, 0x50) r6 = perf_event_open$cgroup(&(0x7f00000004c0)={0x4, 0x80, 0x7, 0x4, 0x1, 0xec, 0x0, 0x180000000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000480), 0x6}, 0x8810, 0x1, 0x3, 0x8, 0xf8f5, 0x3, 0xda, 0x0, 0x10000}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000540)=')\x00') r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0xd, &(0x7f00000005c0)=@raw=[@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @ldst={0x2, 0x1, 0x4, 0xa, 0xa, 0x6, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}], &(0x7f0000000640)='GPL\x00', 0x9, 0x7, &(0x7f0000000680)=""/7, 0x40f00, 0x13, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x6, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000700)=[{0x5, 0x2, 0x7, 0x1}, {0x4, 0x3, 0xf, 0x7}, {0x5, 0x1, 0xf, 0x1}], 0x10, 0x5}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000580)='svcsock_tcp_recv_short\x00', r7, 0x0, 0x1}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x6, [@ptr={0x4}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x24, 0x0, 0x32}, @var={0x2, 0x0, 0x0, 0xe, 0x3, 0x1}, @typedef={0x10, 0x0, 0x0, 0x8, 0x3}]}, {0x0, [0x5f, 0x0, 0x0, 0x0]}}, &(0x7f00000008c0)=""/48, 0x56, 0x30, 0x0, 0x10001, 0x10000}, 0x28) (async) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x6, [@ptr={0x4}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x24, 0x0, 0x32}, @var={0x2, 0x0, 0x0, 0xe, 0x3, 0x1}, @typedef={0x10, 0x0, 0x0, 0x8, 0x3}]}, {0x0, [0x5f, 0x0, 0x0, 0x0]}}, &(0x7f00000008c0)=""/48, 0x56, 0x30, 0x0, 0x10001, 0x10000}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={r3, 0x20, &(0x7f0000000a40)={&(0x7f0000000940)=""/134, 0x86, 0x0, &(0x7f0000000a00)=""/56, 0x38}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000ac0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @ldst={0x3, 0x2, 0x4, 0x8, 0x6, 0x1, 0xffffffffffffffff}], &(0x7f0000000b00)='GPL\x00', 0x5, 0x3d, &(0x7f0000000b40)=""/61, 0x41000, 0x0, '\x00', 0x0, 0x1b, r9, 0x8, &(0x7f0000000b80)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, r10, 0x0, 0x2, &(0x7f0000000bc0)=[r5, r4, r0, r0], &(0x7f0000000c00)=[{0x1, 0x2, 0xd}, {0x4, 0x4, 0xe, 0x9}], 0x10, 0x7ff}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40082404, &(0x7f0000000d00)=0x5) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000d40)={r7, r0}, 0xc) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000f00)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, '\x00', r2, r9, 0x0, 0x5, 0x3}, 0x50) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=@base={0xf, 0x7, 0x7ff, 0x7, 0x12100, r4, 0x1, '\x00', 0x0, r9, 0x2, 0x0, 0x4}, 0x50) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001040)=@o_path={&(0x7f0000001000)='./file0\x00', 0x0, 0x8, r9}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001080)={r1, 0x7, 0x10}, 0xc) (async) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001080)={r1, 0x7, 0x10}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001140)={0x11, 0x4, &(0x7f0000000d80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0x60d, 0x57, &(0x7f0000000e00)=""/87, 0x41000, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000000e80)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000ec0)={0x2, 0x4, 0x3, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000010c0)=[r4, r11, r0, r4, r12, r13, r4, r14, r5], &(0x7f0000001100)=[{0x3, 0x3, 0xb, 0x8}, {0x0, 0x1, 0x4, 0x2}, {0x3, 0x2, 0x8, 0x4}], 0x10, 0x5}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001140)={0x11, 0x4, &(0x7f0000000d80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000dc0)='GPL\x00', 0x60d, 0x57, &(0x7f0000000e00)=""/87, 0x41000, 0x0, '\x00', r2, 0x0, r9, 0x8, &(0x7f0000000e80)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000ec0)={0x2, 0x4, 0x3, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000010c0)=[r4, r11, r0, r4, r12, r13, r4, r14, r5], &(0x7f0000001100)=[{0x3, 0x3, 0xb, 0x8}, {0x0, 0x1, 0x4, 0x2}, {0x3, 0x2, 0x8, 0x4}], 0x10, 0x5}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x11, 0x15, &(0x7f0000001200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x87e, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x4, 0x2, 0x0, r13, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0x7, 0x1, 0x0, r11}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000012c0)='syzkaller\x00', 0xfff, 0x52, &(0x7f0000001300)=""/82, 0x41100, 0x40, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000001380)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000013c0)={0x5, 0x5, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f0000001400)=[{0x0, 0x3, 0x6, 0x8}, {0x1, 0x2, 0xc, 0x3}, {0x0, 0x2, 0x5, 0xa}, {0x1, 0x5, 0x0, 0x9}, {0x1, 0x4, 0x8, 0x6}, {0x1, 0x5, 0x1}, {0x5, 0x1, 0x2, 0x6}]}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x11, 0x15, &(0x7f0000001200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x87e, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x4, 0x2, 0x0, r13, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0x7, 0x1, 0x0, r11}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f00000012c0)='syzkaller\x00', 0xfff, 0x52, &(0x7f0000001300)=""/82, 0x41100, 0x40, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000001380)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000013c0)={0x5, 0x5, 0x3, 0x8}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f0000001400)=[{0x0, 0x3, 0x6, 0x8}, {0x1, 0x2, 0xc, 0x3}, {0x0, 0x2, 0x5, 0xa}, {0x1, 0x5, 0x0, 0x9}, {0x1, 0x4, 0x8, 0x6}, {0x1, 0x5, 0x1}, {0x5, 0x1, 0x2, 0x6}]}, 0x94) r15 = perf_event_open$cgroup(&(0x7f0000001540)={0x1, 0x80, 0x7, 0x9, 0x1, 0x4, 0x0, 0x5adb, 0x124, 0xb, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x9, 0x780}, 0x8c00, 0x7ff, 0x0, 0x3, 0xbd4, 0xfffffff8, 0x10, 0x0, 0x7000000, 0x0, 0xa4c}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x40082406, &(0x7f00000015c0)='^,!%[\x00') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x40082406, &(0x7f00000015c0)='^,!%[\x00') ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x4) (async) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f0000001600)='syz0\x00', 0x200002, 0x0) (async) r16 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001600)='syz0\x00', 0x200002, 0x0) r17 = openat$cgroup_ro(r16, &(0x7f0000001640)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r15, 0x2405, r8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001680)={r4, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x6, 0x21, &(0x7f00000016c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf080000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r18}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001800)='GPL\x00', 0x3f1, 0x0, 0x0, 0xc2f00, 0x0, '\x00', r2, @fallback, r17, 0x8, &(0x7f0000001840)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, r10, 0xffffffffffffffff, 0x5, &(0x7f0000001880)=[r17, r0, r4, r11, r5], &(0x7f00000018c0)=[{0x1, 0x4, 0x9, 0x5}, {0x5, 0x2, 0x752, 0xb}, {0x4, 0x2, 0x0, 0x7}, {0x2, 0x5, 0x1, 0xc}, {0x3, 0x2, 0x9, 0x4}], 0x10, 0x7}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', r2, r3, 0x2, 0x5, 0x5}, 0x50) (async) r19 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001b00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', r2, r3, 0x2, 0x5, 0x5}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001c00)=@bpf_lsm={0x1d, 0x4, &(0x7f0000001a00)=@raw=[@alu={0x4, 0x0, 0xe, 0x5, 0xa, 0x6, 0xfffffffffffffffc}, @map_val={0x18, 0x4, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x1}, @ldst={0x3, 0x0, 0x6, 0x8, 0x6, 0xffffffffffffffff, 0x4}], &(0x7f0000001a40)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x40, '\x00', r2, 0x1b, r3, 0x8, &(0x7f0000001a80)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000001ac0)={0x2, 0xb, 0x4, 0x4}, 0x10, r10, 0x0, 0x3, &(0x7f0000001b80)=[r19, r0], &(0x7f0000001bc0)=[{0x1, 0x3, 0xc, 0x5}, {0x0, 0x3, 0x5, 0xb}, {0x4, 0x3, 0x10, 0x1}], 0x10, 0x80}, 0x94) 1.890654748s ago: executing program 3 (id=1397): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r0}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) 1.813758724s ago: executing program 3 (id=1398): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r1}, &(0x7f0000000a00), &(0x7f0000000a40)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f0000000880), &(0x7f00000008c0)=r0}, 0x20) 1.708407932s ago: executing program 3 (id=1399): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x482800, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={0x0, 0x6}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000690000000000000100000094"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x5}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2212102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa00006558"], 0xcfa4) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000001c0)={0x3}, 0x8) 1.362501341s ago: executing program 3 (id=1400): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2b6370752064b5844626288b77b02a6d7707fd461a76f9db38dc4b015756bc69ccb1be670c04edbe821ca9b2c672166c7ca7302d"], 0x5) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0100000006000000080000000800000040000000", @ANYRES32, @ANYRESOCT=r2, @ANYRES32=r3, @ANYRES32, @ANYBLOB="000600"], 0x50) 1.037315066s ago: executing program 1 (id=1401): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='mm_page_alloc\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff000000"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x200, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="1e032800008c71ef288563"], 0xffdd) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="34cbf9c55466da0eadc249236ab3cbf316717306be4c08c8c7da1f1ee04ab4b4eac14995ebdf620ff778a4e3452587e42a3c6aa1bd35dfd99f23b525893bc3b5f9f3bed1986bf8d0dddd7c5cdada611f9bf641e421ed71a842d84fa289a542f941d6e06b2b14e2a706ce30acf7d82f224f3e30cadd9d15f3dddbb29dbeb9f68fb68bedb91e0b1ef48832778fe36699c7ebf101659a8f476c4a065eac71d6d1e7fafc6f25ec2c9a8f431fe347a2d30e912c5b2397613ce784637ec71e37566eb0548b461f71028459c6f137c18737d58b56949d022bf1eaf486692bb76836a233c7879d740ad0beaf5159d3380442824f536a41bb22d08fe53952b9c6fed2605d53311c71b455655f96ea6a87e41e9211e90170b0a2b1a2098175ebcd33d517085d224122264cddadd82a3d11bc4a33ce66108b22b1abc6243d306d8f6b8a2ddb5373c190d8f859a3174a200936b079f85edcac7fc03fb993ec0ff8b83f1fd3f1b888d192d99c7ede5d381784d25410cccf1b0bf26a54f065e1e3ec59cc5704fb658fc980a0ac4287ef884ee82007554be3f1e163c81468d0c26c95e3e12393776e32800bb4f086f19080c4fca3d72e8569a5627ce98f2ae0bdb3ec42c23847d47e10b1c58da7e9cea990da842d96e3a51ed7d892f7b28a10486424a69a9109ebd4d7d5a3768400ac000a6d7556ca192e5cd45efb82001ac7b53e03036b6019a07ffb545cd3853e077f08a015f6232488c1139a9409c95ed005261e36b307406ba5714ef395129345866109341feb6c7c458ce08c147a983b46375ddb3621cee0312ba1a434bcd6081e1a8ae8b6d518988b9965faf9aff86df8173b93342cceaec357a100e59b4d66553633626b0b12e9622b8f8fdfe26545b87c57f8ce8609fb8e19b0f6d1cd64e8de85c7327f543b2f38cf3086b57f85e1aaa4add723e4bc4e3ea2c27acec1e545ae3fc870bd42422f6eaf17a1f82699c9cadf224ea1e5d1705b49118d91cc3731aeed60e41bf15a9613aeda8e63a29bc7a95b2d993d23269a310b91f69d16a71243c0f4080d3359f5ddd63c7032bef14ab25eb7df4b28b2132bcbf94a281c8f5de79885a6d679f145fca292b599bb09a1864726d86b65d4781408320b968e2224c23ce7a56d8892970043737ae47f071aaeb219716bc21e3304e301eb5cd32aea951a70621eb870214a72e6c474c3a20f5bd8e089ba16326cc9a80a1a4f5f0e8f58629e20b1c73eb8af330744b187a5cfdb410466378313700ca44eb6dcbc8f3d70f58e134202546f0b1a3b61a298f2a1184b1533bdad308fa2f960087e0f239d2ccbaee3889ddc1a2bea2183b98854d255a6f708909134fab83f42f13e7604f602e264f4a3b2b2a08c673c7ce2813218159b472d3b20ecbf26dd2f7b3ba5298a4ff7444ea0936e098c126f590b05e7697ed8a3d52ba1abc7285de2f160b9b081cb775a5ab77aad1bb98d47e3da53fc4c11d4db47de1e4e6f56ad671f5d8389b33260cc546e4f0bf34fec9b2abd209e6b89e6e381367774676ed6e6eaffe42b07241c276f3c84f17a0762de83eb769bdf28991ddbc23758f01c9ecfba4ab2ca2118fcedd7adde9ff47f643c13e3ad2f13b576985128f233e329fe269d5745cd2b30e5762452a4ff58fdec30623175f8d575ced1c43411e2869aadbe6f1e79a010bca334cb08d545bc2808f359b7777d1bb5675ee210574b9f72cdeb071e07eeaa0988086213a37a972647cf21d3a3bcbd7359da327bacad41b93c5e0e494669109dddcec781774f248f5663e4fac187d42ffccf68335de2adac4f8d3e1bf04b95a9464960186ed019773ffeda18f9827a61edc5fc4088eb0965cb1bd8af1185aa3972b8f73839b4611e303bcbc1f84a330f60fa0a7795ea3cffe0e338406533e12c7deef0b5906c513eab4619a8f02fdd65dcfb7297ef971c4601ad079f7ad38278ae3ff455b37d5492af546975535450693fd4593c8157b3fdb16fd3a106d2f1509d1c06dabb8933269d790a1c5e5f7bdd4a57e1e670d7043cfed88c365b5f8eefe530ef7da5322df981723332c088fce89c2ceee23b420f64332243b9c606d67d538810a94e0ffbd37a119d8fc4d6caec0def40e62613873c74feabde63e12cb2016c1d35cf1bb95bf59e01a63be8825cb3118b74b106f21eef5ee2f41e5fb39fdde058050f780d98ced247c66fc3a03ba04edaf14d698859ba303d511cf0845dc5e269aef2287770a247fd5ae1299b45819ff41725f9da3e4dab7770eb83992b53ae9a9de69e764f6e3aee3e27cfb1bacf531a91605894ae209da6d25872fb54bf36b2ed450b51aa8ee4875b9bc7e55753f61e12a323d301faceb2ecff0686b1359343a94774a6a098dc2df440725cd8331f527d4e22f8090d8879ef4765849705b99465d7ebdf661b81c303d13b87270dc1f227d5954fcbc93bbce6fde2a1f8d573d9cd8130c173a14706f1e9dabc4d16a5b003dd3239faf91769e25cf007b0623141e4e57f11746cd62f20d73956fa84c6a12e1756b6671a64bd7a474ba425907e1a61ba6d2ffa1149165a713a141bfec0f1af51afebdb84d5f14eb51acc284403627d6ce48fd028dc04e00ed963de37f85d155c33e2b4ceb09044c4f1c7791348216b674a8831a232a638f8bfb396fabbe1f880944bc5dcac55df8abc78f804306c88617acfd4adfbb5a055d3d3e91abb763ad84e701cc5679498e04600570f4b2e57c70542043dc590ab363215e6ab3f0bd89383748783d01c9227229edac723d4e2eaa061a44f2630691f25ca6093775183fdf432e01322203dd654b336670116a6a52a27ff2032b1103a4e4be0cc2fb05b24352d72e374e90cc3db2a5a691c7f6b8d1058d7730433c742d8ce52074318b1bce9bb104cf90c8b7f65293c2b74434661444f38d94d977e03433440517f6155a3cad2621c5502dd6148b867a40e6a40be4c8265ec2164b5257f06da1784e98991f42003ced4ba67c23b8c654b542d2d31168fd853cf56cc2c464d7a8a9fbcd2715968788f8527c597ab5f917753c1f1708d2c19972373c5a22af71847de22b9f1e9d38a04ea4dd291da3099cb836a696350bf1263c3c275c27b8b82f604625451a24490b0b5367c2fd05e699546ddf17709d2e2c2710f4361d9dd6e2de2b4353b7f4f8141f6f989dc1a798a974565978e4f9ec0c59a7dbc04bcab072c8513b9ca782c22cdd31fb116c10081740fd8f7d0cbd5c54f1069297f20b45d79bb9ace8e851a655fedf47b2dc76fd30b9ba9f09c9b50d6910ffcdec7078c36fe1e9b19dbb110197496349560a43c0ab42b4ce286643e73a92246ecb71e95ce0d54114772f8477c7d5604c1a52d2f680c5868cf08a2688dd9fef492a01836112cec824483e77da93d104a9e18d06bddf9a4007740a0537ac1a5e09900acc65d52680212a15b68b0ef887228e06f533c1ca95b8f9d81b9fc6608cb5bacf4b867922999c69d46048ec3f408866789f49fcb176fc99ed9d3e6c357ed2e3ce2665925773e5d86c2ceaf8f18519a00d9d2e19e9a6b16af0a53fd7df6974f5db00494460e7f3de6ff6b642859335e020513bb525adddabf0d7d6ae85e7e56e32ca8acc07fe86b7b445358966ba3914c1dfa7b814d9e846ff02a6a8c8f5713a0f727024b5d1ea7e4ce7c64f9b24dd3337a3df33714c5404403b0304b25a66fe3ac85083965877117b3d721e7922f0ac7e278feeb8dc09f58cbcfbb81b11d4699737f37ac240a24b9c4b2b587e68974f7ca5561856f32e389d32056f7d58e4de24c11bd5c5afaa441120370d0c48341e1b8146a6bbca8c15f23c155d2533e97a8e6496bc00533ec83be8488d020708d97385a03bcbf57cadc2c1e575e1ac134cdb5047f3f88eae0230751626cea1c85da9b74ddace668afebb2dc66d302ddf3c5f8f21ac0c0535d00839457e7cac9282a8e49d018b077e38ea512cf28eacff5d98e880abfb5af2e7c039d2e1f1edaad2642963ef29d715f754e2715caa6af046a298b285e3582d903be726b608619332e1a82be48b0f5adf6838f41ff776e5290de8269794bce8fb971267d036bd6bd30e42df918125d573ced78263251bcae2b7b40f1ba855b4f2472312ea8752c4a0e09468bd25615a6c00a9b44c484c5507b8400537f20890e9499ec94ed2b6aeff21e57c6e8a93d80097f85ac9316b03a5f768721bf7d041bb9a6a03eabd615e3c4d74f56c429d53b8fec4b5e86c5b311a6cd4a86f03e04dab25ad65b68a8b8d9053993fd2440ff2b81768213084c831d31a0f8c646aff9090b5463cbee452abd6318340ec41b50f1deba7ffb60b326751de3f6dbf9b17714299233d5c43071367ece2e53212e7f4e084fea60850d4d16908d9bbbb531fbf72143fdb62d1b40afde3d0b2ac2c94c32e456bbef62f8d677e332aec8ccc8eedbac61e7b89b32d57157a39ad5c456258d9c36db0edc82c2baead990ee78007ed89c8f450e92d5e209cc25f7c13f5909ca404fddbdbeff89cc42350c91e9f1fdf9753c6e95f71257f8cbb97838684461cd1244c938b9939a4e9c7727902b6f1a5434e0a06d3fc221771dd87572ae801c5ce6886122f0c91dae57440ffc7ace4e8e0041a1d245103aaadbfc2ecff622228daed2b0cd30f7f59b2617f6f0571ee4403d84e652d78b8e64d5450b6483ef70582dcda9351f2dddd3a4ac84f514f708d3af6242501bd041beae78e6b29b517b534148ea91ef85653fec824d6ddb0c0fa2555ab2564ba29227b1046b48a11ee0e6aafda9d0b80b0f05a8d057cbeb16264cb579aea3ba2b2000052d03c77844ab7c", 0xd4d}], 0x1}, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) 928.795435ms ago: executing program 3 (id=1402): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x730, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x6081, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=r2, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="8ad7a6b1d708ea7bc3298a6bed58ddf5605622ab8f0e7a6cb6f5b2cd8812c202a3f842675da0eaa28e9edf54f5390769b205bbf4530308809e2112e2e43ece4ddd98d0f3150e7ca3e29a11d3de58cb943ef84e55ac88b89e8ab64be6bde60a4a1dede697504f68f63dcdd05ba524f43f3e5573c2d0fcd3c8e1f85036020f538392e0f8b7927e50d66b3ec0c9166f893a3338453d2f1844c62e7de8627305bac1be188ec5f4e455782ab4"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYRES32], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000", @ANYBLOB, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r5) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x47, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000ecff000000000001024fafcbb1aceec500127e00007e7b110000", @ANYRES32=r6, @ANYRESHEX=r6], 0x0, 0x8, 0x0, 0x0, 0x40f00, 0x91bd406a1122679a, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 64.725655ms ago: executing program 0 (id=1403): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x7fffffff}, 0x50) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x3ff}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB='\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32], 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xaffffffe00000000, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x30120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 0s ago: executing program 2 (id=923): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x1800, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff0000000003000000000000000000000002000000000000000000000000000002030000000000000000000002"], 0x0, 0x56}, 0x20) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80) kernel console output (not intermixed with test programs): [ T1893] name failslab, interval 1, probability 0, space 0, times 0 [ 108.671719][ T1893] CPU: 1 PID: 1893 Comm: syz.0.528 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 108.681461][ T1893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 108.691550][ T1893] Call Trace: [ 108.694818][ T1893] [ 108.697736][ T1893] __dump_stack+0x21/0x24 [ 108.702243][ T1893] dump_stack_lvl+0xee/0x150 [ 108.706832][ T1893] ? __cfi_dump_stack_lvl+0x8/0x8 [ 108.711854][ T1893] ? pcpu_memcg_post_alloc_hook+0x177/0x270 [ 108.717749][ T1893] ? __kasan_check_write+0x14/0x20 [ 108.722860][ T1893] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 108.729533][ T1893] dump_stack+0x15/0x24 [ 108.733689][ T1893] should_fail_ex+0x3d4/0x520 [ 108.738366][ T1893] __should_failslab+0xac/0xf0 [ 108.743120][ T1893] ? selinux_bpf_prog_alloc+0x51/0x140 [ 108.748574][ T1893] should_failslab+0x9/0x20 [ 108.753084][ T1893] __kmem_cache_alloc_node+0x3d/0x2c0 [ 108.758457][ T1893] ? selinux_bpf_prog_alloc+0x51/0x140 [ 108.763907][ T1893] kmalloc_trace+0x29/0xb0 [ 108.768325][ T1893] selinux_bpf_prog_alloc+0x51/0x140 [ 108.773601][ T1893] security_bpf_prog_alloc+0x73/0xa0 [ 108.778966][ T1893] bpf_prog_load+0x9ab/0x15a0 [ 108.783639][ T1893] ? map_freeze+0x390/0x390 [ 108.788137][ T1893] ? __sys_bpf+0x2ed/0x780 [ 108.792545][ T1893] ? __sanitizer_cov_trace_switch+0x61/0xe0 [ 108.798439][ T1893] __sys_bpf+0x504/0x780 [ 108.802678][ T1893] ? bpf_link_show_fdinfo+0x320/0x320 [ 108.808044][ T1893] ? __cfi_sched_clock_cpu+0x10/0x10 [ 108.813347][ T1893] __x64_sys_bpf+0x7c/0x90 [ 108.817763][ T1893] x64_sys_call+0x488/0x9a0 [ 108.822272][ T1893] do_syscall_64+0x4c/0xa0 [ 108.826683][ T1893] ? clear_bhb_loop+0x30/0x80 [ 108.831351][ T1893] ? clear_bhb_loop+0x30/0x80 [ 108.836021][ T1893] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 108.841908][ T1893] RIP: 0033:0x7ff651b8ebe9 [ 108.846319][ T1893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.865923][ T1893] RSP: 002b:00007ff6529db038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 108.874349][ T1893] RAX: ffffffffffffffda RBX: 00007ff651db5fa0 RCX: 00007ff651b8ebe9 [ 108.882322][ T1893] RDX: 0000000000000080 RSI: 0000200000000040 RDI: 0000000000000005 [ 108.890373][ T1893] RBP: 00007ff6529db090 R08: 0000000000000000 R09: 0000000000000000 [ 108.898434][ T1893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.906407][ T1893] R13: 00007ff651db6038 R14: 00007ff651db5fa0 R15: 00007ffee8c1a4e8 [ 108.914384][ T1893] [ 109.443538][ T1910] FAULT_INJECTION: forcing a failure. [ 109.443538][ T1910] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 109.552171][ T1910] CPU: 1 PID: 1910 Comm: syz.2.535 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 109.561927][ T1910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 109.572125][ T1910] Call Trace: [ 109.575406][ T1910] [ 109.578327][ T1910] __dump_stack+0x21/0x24 [ 109.582656][ T1910] dump_stack_lvl+0xee/0x150 [ 109.587248][ T1910] ? __cfi_dump_stack_lvl+0x8/0x8 [ 109.592285][ T1910] ? __rcu_read_unlock+0xa0/0xa0 [ 109.597246][ T1910] ? migrate_enable+0x19c/0x280 [ 109.602103][ T1910] dump_stack+0x15/0x24 [ 109.606274][ T1910] should_fail_ex+0x3d4/0x520 [ 109.611038][ T1910] should_fail+0xb/0x10 [ 109.615200][ T1910] should_fail_usercopy+0x1a/0x20 [ 109.620233][ T1910] _copy_to_user+0x1e/0x90 [ 109.624642][ T1910] bpf_test_finish+0x48d/0x6b0 [ 109.629400][ T1910] ? __kasan_slab_alloc+0x72/0x80 [ 109.634421][ T1910] ? convert_skb_to___skb+0x430/0x430 [ 109.639792][ T1910] bpf_prog_test_run_skb+0xce1/0x1290 [ 109.645508][ T1910] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 109.651311][ T1910] bpf_prog_test_run+0x3e3/0x630 [ 109.656236][ T1910] ? slab_free_freelist_hook+0xc2/0x190 [ 109.661777][ T1910] ? bpf_prog_query+0x270/0x270 [ 109.666617][ T1910] ? selinux_bpf+0xce/0xf0 [ 109.671031][ T1910] ? security_bpf+0x93/0xb0 [ 109.675528][ T1910] __sys_bpf+0x56d/0x780 [ 109.679794][ T1910] ? bpf_link_show_fdinfo+0x320/0x320 [ 109.685160][ T1910] ? __cfi_ksys_write+0x10/0x10 [ 109.690014][ T1910] ? debug_smp_processor_id+0x17/0x20 [ 109.695395][ T1910] __x64_sys_bpf+0x7c/0x90 [ 109.699880][ T1910] x64_sys_call+0x488/0x9a0 [ 109.704383][ T1910] do_syscall_64+0x4c/0xa0 [ 109.708796][ T1910] ? clear_bhb_loop+0x30/0x80 [ 109.713476][ T1910] ? clear_bhb_loop+0x30/0x80 [ 109.718199][ T1910] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 109.724439][ T1910] RIP: 0033:0x7f023df8ebe9 [ 109.728936][ T1910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.748620][ T1910] RSP: 002b:00007f023ede6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 109.757042][ T1910] RAX: ffffffffffffffda RBX: 00007f023e1b5fa0 RCX: 00007f023df8ebe9 [ 109.765105][ T1910] RDX: 0000000000000050 RSI: 0000200000000900 RDI: 000000000000000a [ 109.773168][ T1910] RBP: 00007f023ede6090 R08: 0000000000000000 R09: 0000000000000000 [ 109.781146][ T1910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.789124][ T1910] R13: 00007f023e1b6038 R14: 00007f023e1b5fa0 R15: 00007ffe8e538108 [ 109.797105][ T1910] [ 111.685616][ T1972] device sit0 left promiscuous mode [ 111.779865][ T1972] device sit0 entered promiscuous mode [ 112.198131][ T1982] device bridge_slave_1 left promiscuous mode [ 112.327731][ T1982] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.361113][ T1982] device bridge_slave_0 left promiscuous mode [ 112.382238][ T1982] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.408202][ T2025] device sit0 left promiscuous mode [ 114.693781][ T2026] device sit0 entered promiscuous mode [ 119.595431][ T2122] FAULT_INJECTION: forcing a failure. [ 119.595431][ T2122] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 119.608916][ T2122] CPU: 1 PID: 2122 Comm: syz.1.602 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 119.618638][ T2122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 119.628704][ T2122] Call Trace: [ 119.631985][ T2122] [ 119.634907][ T2122] __dump_stack+0x21/0x24 [ 119.639276][ T2122] dump_stack_lvl+0xee/0x150 [ 119.643866][ T2122] ? __cfi_dump_stack_lvl+0x8/0x8 [ 119.648898][ T2122] dump_stack+0x15/0x24 [ 119.653054][ T2122] should_fail_ex+0x3d4/0x520 [ 119.657741][ T2122] should_fail_alloc_page+0x61/0x90 [ 119.662945][ T2122] prepare_alloc_pages+0x148/0x5f0 [ 119.668099][ T2122] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 119.673325][ T2122] ? __vmalloc_node_range+0x326/0x13d0 [ 119.678797][ T2122] ? dev_map_create_hash+0x26/0x1c0 [ 119.684006][ T2122] ? dev_map_alloc+0x2af/0x540 [ 119.688765][ T2122] ? map_create+0x49c/0xd80 [ 119.693282][ T2122] __alloc_pages+0x124/0x450 [ 119.697868][ T2122] ? __cfi___alloc_pages+0x10/0x10 [ 119.702985][ T2122] ? __cfi__raw_spin_lock+0x10/0x10 [ 119.708180][ T2122] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 119.714326][ T2122] __get_free_pages+0xe/0x30 [ 119.718920][ T2122] kasan_populate_vmalloc_pte+0x29/0x120 [ 119.724550][ T2122] __apply_to_page_range+0x8c1/0xc00 [ 119.729875][ T2122] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 119.736202][ T2122] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 119.742447][ T2122] apply_to_page_range+0x3b/0x50 [ 119.747390][ T2122] kasan_populate_vmalloc+0x60/0x70 [ 119.752593][ T2122] alloc_vmap_area+0x173e/0x1870 [ 119.757537][ T2122] ? vm_map_ram+0x930/0x930 [ 119.762038][ T2122] ? __kasan_kmalloc+0x95/0xb0 [ 119.766804][ T2122] ? kmalloc_node_trace+0x3d/0xb0 [ 119.771836][ T2122] __get_vm_area_node+0x160/0x360 [ 119.776865][ T2122] ? __kmalloc_node+0xb2/0x1e0 [ 119.781623][ T2122] __vmalloc_node_range+0x326/0x13d0 [ 119.786908][ T2122] ? dev_map_create_hash+0x26/0x1c0 [ 119.792112][ T2122] ? __cfi___vmalloc_node_range+0x10/0x10 [ 119.797830][ T2122] ? bpf_map_area_alloc+0x4b/0xe0 [ 119.802849][ T2122] ? kasan_save_alloc_info+0x25/0x30 [ 119.808142][ T2122] bpf_map_area_alloc+0xd7/0xe0 [ 119.812996][ T2122] ? dev_map_create_hash+0x26/0x1c0 [ 119.818543][ T2122] dev_map_create_hash+0x26/0x1c0 [ 119.823565][ T2122] dev_map_alloc+0x2af/0x540 [ 119.828154][ T2122] map_create+0x49c/0xd80 [ 119.832478][ T2122] __sys_bpf+0x30b/0x780 [ 119.836714][ T2122] ? bpf_link_show_fdinfo+0x320/0x320 [ 119.842083][ T2122] ? fpregs_restore_userregs+0x128/0x260 [ 119.847718][ T2122] __x64_sys_bpf+0x7c/0x90 [ 119.852133][ T2122] x64_sys_call+0x488/0x9a0 [ 119.856631][ T2122] do_syscall_64+0x4c/0xa0 [ 119.861047][ T2122] ? clear_bhb_loop+0x30/0x80 [ 119.865730][ T2122] ? clear_bhb_loop+0x30/0x80 [ 119.870408][ T2122] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 119.876311][ T2122] RIP: 0033:0x7ff49ad8ebe9 [ 119.880722][ T2122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 119.900319][ T2122] RSP: 002b:00007ff49bb52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 119.908731][ T2122] RAX: ffffffffffffffda RBX: 00007ff49afb5fa0 RCX: 00007ff49ad8ebe9 [ 119.916698][ T2122] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 119.924648][ T2122] RBP: 00007ff49bb52090 R08: 0000000000000000 R09: 0000000000000000 [ 119.932596][ T2122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 119.940541][ T2122] R13: 00007ff49afb6038 R14: 00007ff49afb5fa0 R15: 00007ffd638fae78 [ 119.948539][ T2122] [ 121.087967][ T2161] FAULT_INJECTION: forcing a failure. [ 121.087967][ T2161] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 121.115350][ T2161] CPU: 1 PID: 2161 Comm: syz.2.618 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 121.125110][ T2161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 121.135164][ T2161] Call Trace: [ 121.138438][ T2161] [ 121.141362][ T2161] __dump_stack+0x21/0x24 [ 121.145703][ T2161] dump_stack_lvl+0xee/0x150 [ 121.150286][ T2161] ? __cfi_dump_stack_lvl+0x8/0x8 [ 121.155306][ T2161] dump_stack+0x15/0x24 [ 121.159458][ T2161] should_fail_ex+0x3d4/0x520 [ 121.164132][ T2161] should_fail_alloc_page+0x61/0x90 [ 121.169330][ T2161] prepare_alloc_pages+0x148/0x5f0 [ 121.174441][ T2161] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 121.179633][ T2161] ? __vmalloc_node_range+0x326/0x13d0 [ 121.185089][ T2161] ? sock_hash_alloc+0x297/0x510 [ 121.190020][ T2161] ? map_create+0x49c/0xd80 [ 121.194514][ T2161] ? __sys_bpf+0x30b/0x780 [ 121.198927][ T2161] __alloc_pages+0x124/0x450 [ 121.203510][ T2161] ? __cfi___alloc_pages+0x10/0x10 [ 121.208613][ T2161] ? __cfi__raw_spin_lock+0x10/0x10 [ 121.213981][ T2161] __get_free_pages+0xe/0x30 [ 121.218567][ T2161] kasan_populate_vmalloc_pte+0x29/0x120 [ 121.224194][ T2161] __apply_to_page_range+0x8c1/0xc00 [ 121.229467][ T2161] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 121.235698][ T2161] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 121.241936][ T2161] apply_to_page_range+0x3b/0x50 [ 121.246863][ T2161] kasan_populate_vmalloc+0x60/0x70 [ 121.252051][ T2161] alloc_vmap_area+0x173e/0x1870 [ 121.256982][ T2161] ? vm_map_ram+0x930/0x930 [ 121.261472][ T2161] ? __kasan_kmalloc+0x95/0xb0 [ 121.266228][ T2161] ? kmalloc_node_trace+0x3d/0xb0 [ 121.271243][ T2161] __get_vm_area_node+0x160/0x360 [ 121.276256][ T2161] ? x64_sys_call+0x488/0x9a0 [ 121.280922][ T2161] __vmalloc_node_range+0x326/0x13d0 [ 121.286199][ T2161] ? sock_hash_alloc+0x297/0x510 [ 121.291128][ T2161] ? __cfi___vmalloc_node_range+0x10/0x10 [ 121.296846][ T2161] ? kasan_save_alloc_info+0x25/0x30 [ 121.302123][ T2161] ? bpf_map_area_alloc+0x4b/0xe0 [ 121.307221][ T2161] ? __kmalloc_node+0xb2/0x1e0 [ 121.311972][ T2161] bpf_map_area_alloc+0xd7/0xe0 [ 121.316804][ T2161] ? sock_hash_alloc+0x297/0x510 [ 121.321729][ T2161] sock_hash_alloc+0x297/0x510 [ 121.326478][ T2161] map_create+0x49c/0xd80 [ 121.330790][ T2161] __sys_bpf+0x30b/0x780 [ 121.335015][ T2161] ? bpf_link_show_fdinfo+0x320/0x320 [ 121.340381][ T2161] ? __cfi_ksys_write+0x10/0x10 [ 121.345219][ T2161] ? do_user_addr_fault+0x9ac/0x1050 [ 121.350492][ T2161] ? debug_smp_processor_id+0x17/0x20 [ 121.355858][ T2161] __x64_sys_bpf+0x7c/0x90 [ 121.360268][ T2161] x64_sys_call+0x488/0x9a0 [ 121.364759][ T2161] do_syscall_64+0x4c/0xa0 [ 121.369170][ T2161] ? clear_bhb_loop+0x30/0x80 [ 121.373836][ T2161] ? clear_bhb_loop+0x30/0x80 [ 121.378498][ T2161] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 121.384376][ T2161] RIP: 0033:0x7f023df8ebe9 [ 121.388776][ T2161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.408374][ T2161] RSP: 002b:00007f023ede6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 121.416777][ T2161] RAX: ffffffffffffffda RBX: 00007f023e1b5fa0 RCX: 00007f023df8ebe9 [ 121.424909][ T2161] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 0000000000000000 [ 121.432875][ T2161] RBP: 00007f023ede6090 R08: 0000000000000000 R09: 0000000000000000 [ 121.440832][ T2161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.448872][ T2161] R13: 00007f023e1b6038 R14: 00007f023e1b5fa0 R15: 00007ffe8e538108 [ 121.456917][ T2161] [ 126.465222][ T2351] FAULT_INJECTION: forcing a failure. [ 126.465222][ T2351] name failslab, interval 1, probability 0, space 0, times 0 [ 126.510438][ T2351] CPU: 0 PID: 2351 Comm: syz.2.695 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 126.520279][ T2351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 126.530333][ T2351] Call Trace: [ 126.533599][ T2351] [ 126.536515][ T2351] __dump_stack+0x21/0x24 [ 126.540849][ T2351] dump_stack_lvl+0xee/0x150 [ 126.545431][ T2351] ? __cfi_dump_stack_lvl+0x8/0x8 [ 126.550452][ T2351] dump_stack+0x15/0x24 [ 126.554602][ T2351] should_fail_ex+0x3d4/0x520 [ 126.559275][ T2351] __should_failslab+0xac/0xf0 [ 126.564030][ T2351] ? slhc_init+0x77/0x770 [ 126.568359][ T2351] should_failslab+0x9/0x20 [ 126.572866][ T2351] __kmem_cache_alloc_node+0x3d/0x2c0 [ 126.578238][ T2351] ? security_file_permission+0x94/0xb0 [ 126.583783][ T2351] ? slhc_init+0x77/0x770 [ 126.588108][ T2351] kmalloc_trace+0x29/0xb0 [ 126.592520][ T2351] slhc_init+0x77/0x770 [ 126.596673][ T2351] ppp_ioctl+0x126d/0x1690 [ 126.601104][ T2351] ? mutex_unlock+0x89/0x220 [ 126.605704][ T2351] ? __cfi_mutex_unlock+0x10/0x10 [ 126.610738][ T2351] ? __cfi_ppp_ioctl+0x10/0x10 [ 126.615526][ T2351] ? __fget_files+0x2d5/0x330 [ 126.620197][ T2351] ? security_file_ioctl+0x95/0xc0 [ 126.625297][ T2351] ? __cfi_ppp_ioctl+0x10/0x10 [ 126.630056][ T2351] __se_sys_ioctl+0x12f/0x1b0 [ 126.634716][ T2351] __x64_sys_ioctl+0x7b/0x90 [ 126.639294][ T2351] x64_sys_call+0x58b/0x9a0 [ 126.643778][ T2351] do_syscall_64+0x4c/0xa0 [ 126.648181][ T2351] ? clear_bhb_loop+0x30/0x80 [ 126.652858][ T2351] ? clear_bhb_loop+0x30/0x80 [ 126.657522][ T2351] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 126.663391][ T2351] RIP: 0033:0x7f023df8ebe9 [ 126.667783][ T2351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.687364][ T2351] RSP: 002b:00007f023ede6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 126.695760][ T2351] RAX: ffffffffffffffda RBX: 00007f023e1b5fa0 RCX: 00007f023df8ebe9 [ 126.703712][ T2351] RDX: 0000200000000180 RSI: 0000000040047451 RDI: 0000000000000009 [ 126.711687][ T2351] RBP: 00007f023ede6090 R08: 0000000000000000 R09: 0000000000000000 [ 126.719636][ T2351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.727584][ T2351] R13: 00007f023e1b6038 R14: 00007f023e1b5fa0 R15: 00007ffe8e538108 [ 126.735540][ T2351] [ 127.208465][ T2371] device pim6reg1 entered promiscuous mode [ 130.744746][ T2478] syzkaller1: tun_chr_ioctl cmd 2147767517 [ 131.692366][ T2506] device GPL entered promiscuous mode [ 131.746620][ T2510] FAULT_INJECTION: forcing a failure. [ 131.746620][ T2510] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 131.892752][ T2510] CPU: 0 PID: 2510 Comm: syz.4.748 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 131.902502][ T2510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 131.912550][ T2510] Call Trace: [ 131.915824][ T2510] [ 131.918746][ T2510] __dump_stack+0x21/0x24 [ 131.923086][ T2510] dump_stack_lvl+0xee/0x150 [ 131.927671][ T2510] ? __cfi_dump_stack_lvl+0x8/0x8 [ 131.932705][ T2510] dump_stack+0x15/0x24 [ 131.936865][ T2510] should_fail_ex+0x3d4/0x520 [ 131.941543][ T2510] should_fail+0xb/0x10 [ 131.945700][ T2510] should_fail_usercopy+0x1a/0x20 [ 131.950720][ T2510] _copy_from_user+0x1e/0xc0 [ 131.955313][ T2510] __sys_bpf+0x277/0x780 [ 131.959560][ T2510] ? bpf_link_show_fdinfo+0x320/0x320 [ 131.964953][ T2510] ? __cfi_ksys_write+0x10/0x10 [ 131.969813][ T2510] ? debug_smp_processor_id+0x17/0x20 [ 131.975184][ T2510] __x64_sys_bpf+0x7c/0x90 [ 131.979608][ T2510] x64_sys_call+0x488/0x9a0 [ 131.984108][ T2510] do_syscall_64+0x4c/0xa0 [ 131.988524][ T2510] ? clear_bhb_loop+0x30/0x80 [ 131.993197][ T2510] ? clear_bhb_loop+0x30/0x80 [ 131.997874][ T2510] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 132.003759][ T2510] RIP: 0033:0x7fa9edb8ebe9 [ 132.008166][ T2510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.027766][ T2510] RSP: 002b:00007fa9ee973038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 132.036178][ T2510] RAX: ffffffffffffffda RBX: 00007fa9eddb6090 RCX: 00007fa9edb8ebe9 [ 132.044143][ T2510] RDX: 0000000000000094 RSI: 0000200000000100 RDI: 0000000000000005 [ 132.052113][ T2510] RBP: 00007fa9ee973090 R08: 0000000000000000 R09: 0000000000000000 [ 132.060169][ T2510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.068131][ T2510] R13: 00007fa9eddb6128 R14: 00007fa9eddb6090 R15: 00007fffc7b6ec88 [ 132.076102][ T2510] [ 134.071356][ T2576] FAULT_INJECTION: forcing a failure. [ 134.071356][ T2576] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 134.100985][ T2576] CPU: 1 PID: 2576 Comm: syz.2.771 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 134.110733][ T2576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 134.120800][ T2576] Call Trace: [ 134.124080][ T2576] [ 134.127012][ T2576] __dump_stack+0x21/0x24 [ 134.131344][ T2576] dump_stack_lvl+0xee/0x150 [ 134.135937][ T2576] ? __cfi_dump_stack_lvl+0x8/0x8 [ 134.140972][ T2576] dump_stack+0x15/0x24 [ 134.145124][ T2576] should_fail_ex+0x3d4/0x520 [ 134.149797][ T2576] should_fail_alloc_page+0x61/0x90 [ 134.154994][ T2576] prepare_alloc_pages+0x148/0x5f0 [ 134.160111][ T2576] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 134.165304][ T2576] ? __vmalloc_node_range+0x326/0x13d0 [ 134.170760][ T2576] ? htab_map_alloc+0x399/0xfd0 [ 134.175605][ T2576] ? map_create+0x49c/0xd80 [ 134.180107][ T2576] ? __sys_bpf+0x30b/0x780 [ 134.184519][ T2576] __alloc_pages+0x124/0x450 [ 134.189111][ T2576] ? __cfi___alloc_pages+0x10/0x10 [ 134.194226][ T2576] ? __cfi__raw_spin_lock+0x10/0x10 [ 134.199425][ T2576] __get_free_pages+0xe/0x30 [ 134.204012][ T2576] kasan_populate_vmalloc_pte+0x29/0x120 [ 134.209640][ T2576] __apply_to_page_range+0x8c1/0xc00 [ 134.214912][ T2576] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 134.221136][ T2576] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 134.227356][ T2576] apply_to_page_range+0x3b/0x50 [ 134.232274][ T2576] kasan_populate_vmalloc+0x60/0x70 [ 134.237454][ T2576] alloc_vmap_area+0x173e/0x1870 [ 134.242378][ T2576] ? vm_map_ram+0x930/0x930 [ 134.246860][ T2576] ? __kasan_kmalloc+0x95/0xb0 [ 134.252066][ T2576] ? kmalloc_node_trace+0x3d/0xb0 [ 134.257077][ T2576] __get_vm_area_node+0x160/0x360 [ 134.262081][ T2576] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 134.268126][ T2576] __vmalloc_node_range+0x326/0x13d0 [ 134.273391][ T2576] ? htab_map_alloc+0x399/0xfd0 [ 134.278221][ T2576] ? irqentry_exit+0x37/0x40 [ 134.282790][ T2576] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 134.288573][ T2576] ? __cfi___vmalloc_node_range+0x10/0x10 [ 134.294276][ T2576] bpf_map_area_alloc+0xd7/0xe0 [ 134.299103][ T2576] ? htab_map_alloc+0x399/0xfd0 [ 134.303928][ T2576] htab_map_alloc+0x399/0xfd0 [ 134.308581][ T2576] ? htab_map_alloc_check+0x3e1/0x4c0 [ 134.313932][ T2576] map_create+0x49c/0xd80 [ 134.318242][ T2576] __sys_bpf+0x30b/0x780 [ 134.322458][ T2576] ? bpf_link_show_fdinfo+0x320/0x320 [ 134.327804][ T2576] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 134.333585][ T2576] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 134.339724][ T2576] __x64_sys_bpf+0x7c/0x90 [ 134.344128][ T2576] x64_sys_call+0x488/0x9a0 [ 134.348606][ T2576] do_syscall_64+0x4c/0xa0 [ 134.352999][ T2576] ? clear_bhb_loop+0x30/0x80 [ 134.357651][ T2576] ? clear_bhb_loop+0x30/0x80 [ 134.362301][ T2576] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 134.368260][ T2576] RIP: 0033:0x7f023df8ebe9 [ 134.372654][ T2576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.392234][ T2576] RSP: 002b:00007f023ede6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 134.400625][ T2576] RAX: ffffffffffffffda RBX: 00007f023e1b5fa0 RCX: 00007f023df8ebe9 [ 134.408576][ T2576] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 134.416697][ T2576] RBP: 00007f023ede6090 R08: 0000000000000000 R09: 0000000000000000 [ 134.424645][ T2576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 134.432590][ T2576] R13: 00007f023e1b6038 R14: 00007f023e1b5fa0 R15: 00007ffe8e538108 [ 134.440543][ T2576] [ 142.861329][ T2821] device syzkaller0 entered promiscuous mode [ 143.837321][ T2867] FAULT_INJECTION: forcing a failure. [ 143.837321][ T2867] name failslab, interval 1, probability 0, space 0, times 0 [ 143.849997][ T2867] CPU: 1 PID: 2867 Comm: syz.2.879 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 143.859727][ T2867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 143.869791][ T2867] Call Trace: [ 143.873070][ T2867] [ 143.875996][ T2867] __dump_stack+0x21/0x24 [ 143.880327][ T2867] dump_stack_lvl+0xee/0x150 [ 143.884927][ T2867] ? __cfi_dump_stack_lvl+0x8/0x8 [ 143.889950][ T2867] dump_stack+0x15/0x24 [ 143.894102][ T2867] should_fail_ex+0x3d4/0x520 [ 143.898774][ T2867] ? dst_alloc+0x16a/0x1e0 [ 143.903189][ T2867] __should_failslab+0xac/0xf0 [ 143.907953][ T2867] should_failslab+0x9/0x20 [ 143.912469][ T2867] kmem_cache_alloc+0x3b/0x330 [ 143.917232][ T2867] dst_alloc+0x16a/0x1e0 [ 143.921510][ T2867] ip_route_output_key_hash_rcu+0x1516/0x2060 [ 143.927573][ T2867] ip_route_output_flow+0x12e/0x2e0 [ 143.932875][ T2867] ? arch_stack_walk+0xfc/0x150 [ 143.937734][ T2867] ? __cfi_ip_route_output_flow+0x10/0x10 [ 143.943473][ T2867] ip_tunnel_xmit+0xa4b/0x2700 [ 143.948269][ T2867] ? __cfi_ip_tunnel_xmit+0x10/0x10 [ 143.953462][ T2867] ? __kasan_check_write+0x14/0x20 [ 143.958576][ T2867] ? gre_build_header+0x25d/0x9b0 [ 143.963599][ T2867] ipgre_xmit+0x80b/0xb90 [ 143.967930][ T2867] dev_hard_start_xmit+0x20b/0x750 [ 143.973040][ T2867] __dev_queue_xmit+0x18d9/0x3420 [ 143.978150][ T2867] ? __dev_queue_xmit+0x250/0x3420 [ 143.983259][ T2867] ? __cfi___dev_queue_xmit+0x10/0x10 [ 143.988626][ T2867] ? __kasan_check_write+0x14/0x20 [ 143.993742][ T2867] ? skb_release_data+0x1d2/0x890 [ 143.998764][ T2867] ? skb_ensure_writable+0x2f8/0x470 [ 144.004047][ T2867] ? __kasan_check_write+0x14/0x20 [ 144.009158][ T2867] ? pskb_expand_head+0xc4a/0x1210 [ 144.014273][ T2867] __bpf_redirect+0x8db/0x1130 [ 144.019044][ T2867] bpf_clone_redirect+0x26a/0x3c0 [ 144.024068][ T2867] bpf_prog_208b094576c80b22+0x56/0x5b [ 144.029521][ T2867] ? kasan_set_track+0x60/0x70 [ 144.034276][ T2867] ? kasan_set_track+0x4b/0x70 [ 144.039031][ T2867] ? kasan_save_alloc_info+0x25/0x30 [ 144.044311][ T2867] ? __kasan_slab_alloc+0x72/0x80 [ 144.049340][ T2867] ? slab_post_alloc_hook+0x4f/0x2d0 [ 144.054620][ T2867] ? kmem_cache_alloc+0x16e/0x330 [ 144.059638][ T2867] ? build_skb+0x2a/0x220 [ 144.063960][ T2867] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 144.069500][ T2867] ? bpf_prog_test_run+0x3e3/0x630 [ 144.074605][ T2867] ? __sys_bpf+0x56d/0x780 [ 144.079013][ T2867] ? __x64_sys_bpf+0x7c/0x90 [ 144.083595][ T2867] ? x64_sys_call+0x488/0x9a0 [ 144.088263][ T2867] ? do_syscall_64+0x4c/0xa0 [ 144.092850][ T2867] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 144.098916][ T2867] ? ktime_get+0x141/0x170 [ 144.103334][ T2867] bpf_test_run+0x349/0x8d0 [ 144.107836][ T2867] ? convert___skb_to_skb+0x5b0/0x5b0 [ 144.113204][ T2867] ? __cfi_eth_type_trans+0x10/0x10 [ 144.118401][ T2867] ? convert___skb_to_skb+0x40/0x5b0 [ 144.123687][ T2867] bpf_prog_test_run_skb+0xaec/0x1290 [ 144.129055][ T2867] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 144.134848][ T2867] bpf_prog_test_run+0x3e3/0x630 [ 144.139773][ T2867] ? slab_free_freelist_hook+0xc2/0x190 [ 144.145311][ T2867] ? bpf_prog_query+0x270/0x270 [ 144.150164][ T2867] ? selinux_bpf+0xce/0xf0 [ 144.154576][ T2867] ? security_bpf+0x93/0xb0 [ 144.159418][ T2867] __sys_bpf+0x56d/0x780 [ 144.163651][ T2867] ? bpf_link_show_fdinfo+0x320/0x320 [ 144.169016][ T2867] ? __cfi_ksys_write+0x10/0x10 [ 144.173869][ T2867] ? debug_smp_processor_id+0x17/0x20 [ 144.179243][ T2867] __x64_sys_bpf+0x7c/0x90 [ 144.183655][ T2867] x64_sys_call+0x488/0x9a0 [ 144.188152][ T2867] do_syscall_64+0x4c/0xa0 [ 144.192563][ T2867] ? clear_bhb_loop+0x30/0x80 [ 144.197231][ T2867] ? clear_bhb_loop+0x30/0x80 [ 144.201910][ T2867] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 144.207798][ T2867] RIP: 0033:0x7f023df8ebe9 [ 144.212204][ T2867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.231891][ T2867] RSP: 002b:00007f023ede6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 144.240302][ T2867] RAX: ffffffffffffffda RBX: 00007f023e1b5fa0 RCX: 00007f023df8ebe9 [ 144.248273][ T2867] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 144.256244][ T2867] RBP: 00007f023ede6090 R08: 0000000000000000 R09: 0000000000000000 [ 144.264209][ T2867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.272182][ T2867] R13: 00007f023e1b6038 R14: 00007f023e1b5fa0 R15: 00007ffe8e538108 [ 144.280151][ T2867] [ 145.033844][ T2870] device syzkaller0 entered promiscuous mode [ 145.688839][ T2903] FAULT_INJECTION: forcing a failure. [ 145.688839][ T2903] name failslab, interval 1, probability 0, space 0, times 0 [ 145.701499][ T2903] CPU: 0 PID: 2903 Comm: syz.2.891 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 145.711219][ T2903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 145.721270][ T2903] Call Trace: [ 145.724545][ T2903] [ 145.727466][ T2903] __dump_stack+0x21/0x24 [ 145.731794][ T2903] dump_stack_lvl+0xee/0x150 [ 145.736378][ T2903] ? __cfi_dump_stack_lvl+0x8/0x8 [ 145.741407][ T2903] dump_stack+0x15/0x24 [ 145.745556][ T2903] should_fail_ex+0x3d4/0x520 [ 145.750231][ T2903] ? dst_alloc+0x16a/0x1e0 [ 145.754644][ T2903] __should_failslab+0xac/0xf0 [ 145.759408][ T2903] should_failslab+0x9/0x20 [ 145.763908][ T2903] kmem_cache_alloc+0x3b/0x330 [ 145.768668][ T2903] dst_alloc+0x16a/0x1e0 [ 145.772909][ T2903] ip_route_output_key_hash_rcu+0x1516/0x2060 [ 145.778972][ T2903] ip_route_output_flow+0x12e/0x2e0 [ 145.784166][ T2903] ? arch_stack_walk+0xfc/0x150 [ 145.789025][ T2903] ? __cfi_ip_route_output_flow+0x10/0x10 [ 145.794744][ T2903] ip_tunnel_xmit+0xa4b/0x2700 [ 145.799502][ T2903] ? __cfi_ip_tunnel_xmit+0x10/0x10 [ 145.804690][ T2903] ? __kasan_check_write+0x14/0x20 [ 145.809804][ T2903] ? gre_build_header+0x25d/0x9b0 [ 145.814827][ T2903] ipgre_xmit+0x80b/0xb90 [ 145.819156][ T2903] dev_hard_start_xmit+0x20b/0x750 [ 145.824256][ T2903] __dev_queue_xmit+0x18d9/0x3420 [ 145.829276][ T2903] ? __dev_queue_xmit+0x250/0x3420 [ 145.834362][ T2903] ? __cfi___dev_queue_xmit+0x10/0x10 [ 145.839712][ T2903] ? __kasan_check_write+0x14/0x20 [ 145.844812][ T2903] ? skb_release_data+0x1d2/0x890 [ 145.849838][ T2903] ? skb_ensure_writable+0x2f8/0x470 [ 145.855115][ T2903] ? __kasan_check_write+0x14/0x20 [ 145.860220][ T2903] ? pskb_expand_head+0xc4a/0x1210 [ 145.865318][ T2903] __bpf_redirect+0x8db/0x1130 [ 145.870158][ T2903] bpf_clone_redirect+0x26a/0x3c0 [ 145.875167][ T2903] bpf_prog_208b094576c80b22+0x56/0x5b [ 145.880607][ T2903] ? kasan_set_track+0x60/0x70 [ 145.885351][ T2903] ? kasan_set_track+0x4b/0x70 [ 145.890089][ T2903] ? kasan_save_alloc_info+0x25/0x30 [ 145.895351][ T2903] ? __kasan_slab_alloc+0x72/0x80 [ 145.900349][ T2903] ? slab_post_alloc_hook+0x4f/0x2d0 [ 145.905613][ T2903] ? kmem_cache_alloc+0x16e/0x330 [ 145.910616][ T2903] ? build_skb+0x2a/0x220 [ 145.914925][ T2903] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 145.920449][ T2903] ? bpf_prog_test_run+0x3e3/0x630 [ 145.925537][ T2903] ? __sys_bpf+0x56d/0x780 [ 145.929927][ T2903] ? __x64_sys_bpf+0x7c/0x90 [ 145.934495][ T2903] ? x64_sys_call+0x488/0x9a0 [ 145.939147][ T2903] ? do_syscall_64+0x4c/0xa0 [ 145.943718][ T2903] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 145.949770][ T2903] ? ktime_get+0x141/0x170 [ 145.954161][ T2903] bpf_test_run+0x349/0x8d0 [ 145.958648][ T2903] ? convert___skb_to_skb+0x5b0/0x5b0 [ 145.963999][ T2903] ? __cfi_eth_type_trans+0x10/0x10 [ 145.969174][ T2903] ? convert___skb_to_skb+0x40/0x5b0 [ 145.974446][ T2903] bpf_prog_test_run_skb+0xaec/0x1290 [ 145.979805][ T2903] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 145.985586][ T2903] bpf_prog_test_run+0x3e3/0x630 [ 145.990499][ T2903] ? slab_free_freelist_hook+0xc2/0x190 [ 145.996026][ T2903] ? bpf_prog_query+0x270/0x270 [ 146.000852][ T2903] ? selinux_bpf+0xce/0xf0 [ 146.005251][ T2903] ? security_bpf+0x93/0xb0 [ 146.009734][ T2903] __sys_bpf+0x56d/0x780 [ 146.013952][ T2903] ? bpf_link_show_fdinfo+0x320/0x320 [ 146.019304][ T2903] ? __cfi_ksys_write+0x10/0x10 [ 146.024136][ T2903] ? debug_smp_processor_id+0x17/0x20 [ 146.029488][ T2903] __x64_sys_bpf+0x7c/0x90 [ 146.033904][ T2903] x64_sys_call+0x488/0x9a0 [ 146.038397][ T2903] do_syscall_64+0x4c/0xa0 [ 146.042798][ T2903] ? clear_bhb_loop+0x30/0x80 [ 146.047451][ T2903] ? clear_bhb_loop+0x30/0x80 [ 146.052105][ T2903] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 146.057972][ T2903] RIP: 0033:0x7f023df8ebe9 [ 146.062368][ T2903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.081949][ T2903] RSP: 002b:00007f023ede6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 146.090339][ T2903] RAX: ffffffffffffffda RBX: 00007f023e1b5fa0 RCX: 00007f023df8ebe9 [ 146.098290][ T2903] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 146.106238][ T2903] RBP: 00007f023ede6090 R08: 0000000000000000 R09: 0000000000000000 [ 146.114192][ T2903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.122148][ T2903] R13: 00007f023e1b6038 R14: 00007f023e1b5fa0 R15: 00007ffe8e538108 [ 146.130105][ T2903] [ 147.824169][ T2945] FAULT_INJECTION: forcing a failure. [ 147.824169][ T2945] name failslab, interval 1, probability 0, space 0, times 0 [ 147.980206][ T2945] CPU: 1 PID: 2945 Comm: syz.1.905 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 147.989973][ T2945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 148.000029][ T2945] Call Trace: [ 148.003300][ T2945] [ 148.006216][ T2945] __dump_stack+0x21/0x24 [ 148.010549][ T2945] dump_stack_lvl+0xee/0x150 [ 148.015129][ T2945] ? __cfi_dump_stack_lvl+0x8/0x8 [ 148.020173][ T2945] dump_stack+0x15/0x24 [ 148.024323][ T2945] should_fail_ex+0x3d4/0x520 [ 148.029078][ T2945] __should_failslab+0xac/0xf0 [ 148.033830][ T2945] ? sk_prot_alloc+0xed/0x320 [ 148.038507][ T2945] should_failslab+0x9/0x20 [ 148.043008][ T2945] __kmem_cache_alloc_node+0x3d/0x2c0 [ 148.048371][ T2945] ? sk_prot_alloc+0xed/0x320 [ 148.053040][ T2945] __kmalloc+0xa1/0x1e0 [ 148.057191][ T2945] sk_prot_alloc+0xed/0x320 [ 148.061698][ T2945] sk_alloc+0x3b/0x460 [ 148.065761][ T2945] packet_create+0x109/0x850 [ 148.070343][ T2945] __sock_create+0x39e/0x7c0 [ 148.074932][ T2945] __sys_socketpair+0x218/0x5b0 [ 148.079777][ T2945] __x64_sys_socketpair+0x9b/0xb0 [ 148.084794][ T2945] x64_sys_call+0x6e/0x9a0 [ 148.089202][ T2945] do_syscall_64+0x4c/0xa0 [ 148.093614][ T2945] ? clear_bhb_loop+0x30/0x80 [ 148.098283][ T2945] ? clear_bhb_loop+0x30/0x80 [ 148.102948][ T2945] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 148.108832][ T2945] RIP: 0033:0x7ff49ad8ebe9 [ 148.113240][ T2945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.132843][ T2945] RSP: 002b:00007ff49bb52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 148.141262][ T2945] RAX: ffffffffffffffda RBX: 00007ff49afb5fa0 RCX: 00007ff49ad8ebe9 [ 148.149223][ T2945] RDX: 0000000000000009 RSI: 000000000000000a RDI: 0000000000000011 [ 148.157187][ T2945] RBP: 00007ff49bb52090 R08: 0000000000000000 R09: 0000000000000000 [ 148.165152][ T2945] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 148.173114][ T2945] R13: 00007ff49afb6038 R14: 00007ff49afb5fa0 R15: 00007ffd638fae78 [ 148.181088][ T2945] [ 148.185685][ T2943] device veth1_to_bond entered promiscuous mode [ 149.134448][ T2964] device syzkaller0 entered promiscuous mode [ 149.909659][ T2985] device syzkaller0 entered promiscuous mode [ 150.164446][ T2995] device syzkaller0 entered promiscuous mode [ 150.218801][ T2993] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.226444][ T2993] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.234090][ T2993] device bridge_slave_0 entered promiscuous mode [ 150.241449][ T2993] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.248773][ T2993] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.256566][ T2993] device bridge_slave_1 entered promiscuous mode [ 150.749296][ T341] device bridge_slave_1 left promiscuous mode [ 150.760240][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.841259][ T341] device bridge_slave_0 left promiscuous mode [ 150.894241][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.980574][ T341] device veth1_macvtap left promiscuous mode [ 151.351135][ T3029] device sit0 left promiscuous mode [ 151.533166][ T28] audit: type=1400 audit(1755675573.641:128): avc: denied { create } for pid=2993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 151.580795][ T28] audit: type=1400 audit(1755675573.661:129): avc: denied { write } for pid=2993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 151.652450][ T28] audit: type=1400 audit(1755675573.661:130): avc: denied { read } for pid=2993 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 151.954774][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.982907][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 152.119832][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 152.221414][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 152.274158][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.281243][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.301437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 152.310045][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.318222][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.325270][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.332855][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 152.350381][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.358380][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 152.392486][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.408049][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 152.428840][ T2993] device veth0_vlan entered promiscuous mode [ 152.442008][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.450456][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.457897][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.465654][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 152.474758][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 152.487025][ T2993] device veth1_macvtap entered promiscuous mode [ 152.532703][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 152.549158][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.557522][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 152.582804][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 152.594386][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 152.603036][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 152.611710][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 153.347174][ T3066] device syzkaller0 entered promiscuous mode [ 155.338960][ T3094] device syzkaller0 entered promiscuous mode [ 155.679120][ T3092] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.695207][ T3092] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.706168][ T3092] device bridge_slave_0 entered promiscuous mode [ 155.754292][ T3092] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.761470][ T3092] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.768979][ T3092] device bridge_slave_1 entered promiscuous mode [ 156.055255][ T3092] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.062399][ T3092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.154851][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.235774][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.278368][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.301182][ T341] device bridge_slave_1 left promiscuous mode [ 156.307339][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.385672][ T341] device bridge_slave_0 left promiscuous mode [ 156.462589][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.553956][ T341] device veth1_macvtap left promiscuous mode [ 156.629586][ T341] device veth0_vlan left promiscuous mode [ 156.800527][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.843775][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.994787][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.001890][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.087537][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.098761][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.107599][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.114656][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.194342][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.202559][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.220088][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.231451][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.247299][ T3125] device sit0 left promiscuous mode [ 157.282620][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 157.291328][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 157.336457][ T3092] device veth0_vlan entered promiscuous mode [ 157.425666][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 157.471644][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 157.480508][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 157.488021][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 157.552062][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 157.564865][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 157.650914][ T3092] device veth1_macvtap entered promiscuous mode [ 157.687453][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 157.735617][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 157.841595][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.946369][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 158.025132][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.583010][ T3149] device syzkaller0 entered promiscuous mode [ 159.877792][ T3159] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.967303][ T3159] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.052740][ T3159] device bridge_slave_0 entered promiscuous mode [ 160.131266][ T1120] device bridge_slave_1 left promiscuous mode [ 160.142158][ T1120] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.227630][ T1120] device bridge_slave_0 left promiscuous mode [ 160.233883][ T1120] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.247099][ T1120] device veth1_macvtap left promiscuous mode [ 160.255384][ T1120] device veth0_vlan left promiscuous mode [ 160.383259][ T3159] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.390429][ T3159] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.397910][ T3159] device bridge_slave_1 entered promiscuous mode [ 160.911852][ T3195] device syzkaller0 entered promiscuous mode [ 161.038049][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.045572][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.055759][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.064326][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.072712][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.079851][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.161112][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.301353][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.470053][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.619983][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.627058][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.951332][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.076473][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.183665][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.300401][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.500495][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 162.596046][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.706590][ T3159] device veth0_vlan entered promiscuous mode [ 162.728636][ T3159] device veth1_macvtap entered promiscuous mode [ 162.753057][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.851883][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.890427][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 162.898642][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 162.916759][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 162.940310][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.001715][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.021652][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.030134][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 163.038565][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.046195][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.180433][ T1120] device bridge_slave_1 left promiscuous mode [ 164.196828][ T1120] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.290031][ T1120] device bridge_slave_0 left promiscuous mode [ 164.385106][ T1120] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.536735][ T1120] device veth1_macvtap left promiscuous mode [ 164.547156][ T1120] device veth0_vlan left promiscuous mode [ 165.003238][ T3257] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.010347][ T3257] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.017782][ T3257] device bridge_slave_0 entered promiscuous mode [ 165.025042][ T3257] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.032686][ T3257] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.071473][ T3257] device bridge_slave_1 entered promiscuous mode [ 165.858547][ T3278] device syzkaller0 entered promiscuous mode [ 166.025930][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.033508][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.051913][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.061026][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.085677][ T1120] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.092769][ T1120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.155513][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.237841][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.283983][ T3307] FAULT_INJECTION: forcing a failure. [ 166.283983][ T3307] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 166.302976][ T1120] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.310053][ T1120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.319868][ T3307] CPU: 0 PID: 3307 Comm: syz.3.1017 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 166.329688][ T3307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 166.339775][ T3307] Call Trace: [ 166.343048][ T3307] [ 166.345970][ T3307] __dump_stack+0x21/0x24 [ 166.350302][ T3307] dump_stack_lvl+0xee/0x150 [ 166.354890][ T3307] ? __cfi_dump_stack_lvl+0x8/0x8 [ 166.359910][ T3307] dump_stack+0x15/0x24 [ 166.364059][ T3307] should_fail_ex+0x3d4/0x520 [ 166.368729][ T3307] should_fail+0xb/0x10 [ 166.372875][ T3307] should_fail_usercopy+0x1a/0x20 [ 166.377899][ T3307] _copy_from_user+0x1e/0xc0 [ 166.382483][ T3307] generic_map_update_batch+0x4b1/0x780 [ 166.388037][ T3307] ? __cfi_generic_map_update_batch+0x10/0x10 [ 166.394131][ T3307] ? __fdget+0x19c/0x220 [ 166.398413][ T3307] ? __cfi_generic_map_update_batch+0x10/0x10 [ 166.404518][ T3307] bpf_map_do_batch+0x48c/0x620 [ 166.409422][ T3307] __sys_bpf+0x624/0x780 [ 166.413656][ T3307] ? bpf_link_show_fdinfo+0x320/0x320 [ 166.419024][ T3307] ? __cfi_sched_clock_cpu+0x10/0x10 [ 166.419987][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.424306][ T3307] __x64_sys_bpf+0x7c/0x90 [ 166.436418][ T3307] x64_sys_call+0x488/0x9a0 [ 166.440935][ T3307] do_syscall_64+0x4c/0xa0 [ 166.444062][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.445356][ T3307] ? clear_bhb_loop+0x30/0x80 [ 166.457705][ T3307] ? clear_bhb_loop+0x30/0x80 [ 166.462387][ T3307] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 166.468284][ T3307] RIP: 0033:0x7ff358f8ebe9 [ 166.472701][ T3307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.476492][ T3257] device veth0_vlan entered promiscuous mode [ 166.492299][ T3307] RSP: 002b:00007ff359dd9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 166.492322][ T3307] RAX: ffffffffffffffda RBX: 00007ff3591b5fa0 RCX: 00007ff358f8ebe9 [ 166.492333][ T3307] RDX: 0000000000000038 RSI: 00002000000006c0 RDI: 000000000000001a [ 166.492343][ T3307] RBP: 00007ff359dd9090 R08: 0000000000000000 R09: 0000000000000000 [ 166.492354][ T3307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.514973][ T3257] device veth1_macvtap entered promiscuous mode [ 166.522589][ T3307] R13: 00007ff3591b6038 R14: 00007ff3591b5fa0 R15: 00007ffd3a021d88 [ 166.522608][ T3307] [ 166.617417][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.633407][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.668249][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.689289][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.702333][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 166.710722][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.740840][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 166.757462][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 166.767008][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 166.781198][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 167.470298][ T1120] device bridge_slave_1 left promiscuous mode [ 167.476479][ T1120] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.484012][ T1120] device bridge_slave_0 left promiscuous mode [ 167.490276][ T1120] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.498033][ T1120] device veth1_macvtap left promiscuous mode [ 167.504144][ T1120] device veth0_vlan left promiscuous mode [ 168.188285][ T3348] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.216022][ T3348] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.231284][ T3348] device bridge_slave_0 entered promiscuous mode [ 168.245626][ T3348] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.259190][ T3348] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.273356][ T3348] device bridge_slave_1 entered promiscuous mode [ 168.677862][ T3348] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.684954][ T3348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.692338][ T3348] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.699359][ T3348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.818359][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.830681][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.853657][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.885733][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.907570][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.916256][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.923306][ T341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.930739][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.938888][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.945931][ T341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.965052][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.973130][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.985850][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 168.997251][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.005515][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.014684][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.023154][ T3348] device veth0_vlan entered promiscuous mode [ 169.035951][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 169.113325][ T3348] device veth1_macvtap entered promiscuous mode [ 169.129720][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 169.138212][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 169.146711][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 169.155164][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.253054][ T1120] device bridge_slave_1 left promiscuous mode [ 170.259219][ T1120] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.359576][ T1120] device bridge_slave_0 left promiscuous mode [ 170.449823][ T1120] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.522514][ T1120] device veth1_macvtap left promiscuous mode [ 170.531028][ T1120] device veth0_vlan left promiscuous mode [ 170.582241][ T3412] FAULT_INJECTION: forcing a failure. [ 170.582241][ T3412] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 170.602498][ T3412] CPU: 1 PID: 3412 Comm: syz.3.1048 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 170.612329][ T3412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 170.622379][ T3412] Call Trace: [ 170.625648][ T3412] [ 170.628558][ T3412] __dump_stack+0x21/0x24 [ 170.632890][ T3412] dump_stack_lvl+0xee/0x150 [ 170.637459][ T3412] ? __cfi_dump_stack_lvl+0x8/0x8 [ 170.642462][ T3412] ? ioctl_has_perm+0x391/0x4c0 [ 170.647289][ T3412] dump_stack+0x15/0x24 [ 170.651449][ T3412] should_fail_ex+0x3d4/0x520 [ 170.656125][ T3412] should_fail+0xb/0x10 [ 170.660270][ T3412] should_fail_usercopy+0x1a/0x20 [ 170.665364][ T3412] _copy_from_user+0x1e/0xc0 [ 170.669935][ T3412] __tun_chr_ioctl+0x1ed/0x1e70 [ 170.674782][ T3412] ? tun_flow_create+0x320/0x320 [ 170.679703][ T3412] ? mutex_unlock+0x89/0x220 [ 170.684272][ T3412] tun_chr_ioctl+0x2a/0x40 [ 170.688666][ T3412] ? __cfi_tun_chr_ioctl+0x10/0x10 [ 170.693842][ T3412] __se_sys_ioctl+0x12f/0x1b0 [ 170.698504][ T3412] __x64_sys_ioctl+0x7b/0x90 [ 170.703074][ T3412] x64_sys_call+0x58b/0x9a0 [ 170.707554][ T3412] do_syscall_64+0x4c/0xa0 [ 170.711971][ T3412] ? clear_bhb_loop+0x30/0x80 [ 170.716629][ T3412] ? clear_bhb_loop+0x30/0x80 [ 170.721292][ T3412] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 170.727161][ T3412] RIP: 0033:0x7ff358f8ebe9 [ 170.731551][ T3412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 170.751263][ T3412] RSP: 002b:00007ff359db8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 170.759658][ T3412] RAX: ffffffffffffffda RBX: 00007ff3591b6090 RCX: 00007ff358f8ebe9 [ 170.767614][ T3412] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000005 [ 170.775563][ T3412] RBP: 00007ff359db8090 R08: 0000000000000000 R09: 0000000000000000 [ 170.783513][ T3412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 170.791459][ T3412] R13: 00007ff3591b6128 R14: 00007ff3591b6090 R15: 00007ffd3a021d88 [ 170.799409][ T3412] [ 170.864889][ T3411] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.874430][ T3411] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.881907][ T3411] device bridge_slave_0 entered promiscuous mode [ 170.889016][ T3411] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.896703][ T3411] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.928567][ T3411] device bridge_slave_1 entered promiscuous mode [ 170.937917][ T3420] device sit0 entered promiscuous mode [ 171.091502][ T3436] device sit0 left promiscuous mode [ 171.124953][ T3436] device sit0 entered promiscuous mode [ 171.938553][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.973386][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.080888][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.099540][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.147258][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.154376][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.302320][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.388298][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.527731][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.606014][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.613104][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.621223][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.629358][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.637618][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.658876][ T3468] device pim6reg1 entered promiscuous mode [ 172.673129][ T3411] device veth0_vlan entered promiscuous mode [ 172.746033][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 172.803257][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.845761][ T3470] FAULT_INJECTION: forcing a failure. [ 172.845761][ T3470] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 172.862294][ T3470] CPU: 0 PID: 3470 Comm: syz.0.1062 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 172.872119][ T3470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 172.882171][ T3470] Call Trace: [ 172.885446][ T3470] [ 172.888364][ T3470] __dump_stack+0x21/0x24 [ 172.890130][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.892691][ T3470] dump_stack_lvl+0xee/0x150 [ 172.904528][ T3470] ? __cfi_dump_stack_lvl+0x8/0x8 [ 172.909558][ T3470] dump_stack+0x15/0x24 [ 172.913715][ T3470] should_fail_ex+0x3d4/0x520 [ 172.918432][ T3470] should_fail+0xb/0x10 [ 172.922588][ T3470] should_fail_usercopy+0x1a/0x20 [ 172.927608][ T3470] _copy_from_user+0x1e/0xc0 [ 172.932191][ T3470] __sys_bpf+0x277/0x780 [ 172.936426][ T3470] ? bpf_link_show_fdinfo+0x320/0x320 [ 172.941792][ T3470] ? __cfi_ksys_write+0x10/0x10 [ 172.946643][ T3470] ? debug_smp_processor_id+0x17/0x20 [ 172.952018][ T3470] __x64_sys_bpf+0x7c/0x90 [ 172.956437][ T3470] x64_sys_call+0x488/0x9a0 [ 172.960934][ T3470] do_syscall_64+0x4c/0xa0 [ 172.965345][ T3470] ? clear_bhb_loop+0x30/0x80 [ 172.970013][ T3470] ? clear_bhb_loop+0x30/0x80 [ 172.974683][ T3470] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 172.980562][ T3470] RIP: 0033:0x7ff651b8ebe9 [ 172.984970][ T3470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.004568][ T3470] RSP: 002b:00007ff6529ba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 173.012980][ T3470] RAX: ffffffffffffffda RBX: 00007ff651db6090 RCX: 00007ff651b8ebe9 [ 173.020941][ T3470] RDX: 0000000000000050 RSI: 0000200000000a40 RDI: 000000000000000a [ 173.028898][ T3470] RBP: 00007ff6529ba090 R08: 0000000000000000 R09: 0000000000000000 [ 173.036860][ T3470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.044904][ T3470] R13: 00007ff651db6128 R14: 00007ff651db6090 R15: 00007ffee8c1a4e8 [ 173.052871][ T3470] [ 173.063287][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 173.079806][ T3411] device veth1_macvtap entered promiscuous mode [ 173.134433][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 173.147193][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 173.175830][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 173.221443][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 173.267363][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 173.303121][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 173.311494][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 174.111064][ T1120] device bridge_slave_1 left promiscuous mode [ 174.123122][ T1120] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.135789][ T1120] device bridge_slave_0 left promiscuous mode [ 174.154262][ T1120] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.172476][ T1120] device veth1_macvtap left promiscuous mode [ 174.181778][ T1120] device veth0_vlan left promiscuous mode [ 174.587964][ T3502] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.595103][ T3502] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.607685][ T3502] device bridge_slave_0 entered promiscuous mode [ 174.627974][ T3502] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.635327][ T3502] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.643662][ T3502] device bridge_slave_1 entered promiscuous mode [ 174.716155][ T3502] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.723231][ T3502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.730516][ T3502] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.737618][ T3502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.763219][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.771150][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.778554][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.795444][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.803890][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.813431][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.820489][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.828125][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.837292][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.863079][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.870168][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.950542][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.958843][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.967118][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.976089][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.997784][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 175.060340][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 175.089511][ T3502] device veth0_vlan entered promiscuous mode [ 175.125594][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 175.134825][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.143034][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.150986][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.168625][ T3502] device veth1_macvtap entered promiscuous mode [ 175.181078][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 175.193548][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 175.203089][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 175.246323][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 175.273226][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 175.330717][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 175.343928][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 176.291108][ T1120] device bridge_slave_1 left promiscuous mode [ 176.297309][ T1120] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.304781][ T1120] device bridge_slave_0 left promiscuous mode [ 176.311010][ T1120] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.470771][ T1120] device veth1_macvtap left promiscuous mode [ 176.476820][ T1120] device veth0_vlan left promiscuous mode [ 177.232342][ T3576] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.274579][ T3576] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.465199][ T3576] device bridge_slave_0 entered promiscuous mode [ 177.520058][ T3576] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.527200][ T3576] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.620817][ T3576] device bridge_slave_1 entered promiscuous mode [ 177.690445][ T3593] device sit0 left promiscuous mode [ 178.490206][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.511661][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.540180][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.553629][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.566787][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.573876][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.592949][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.607817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.621730][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.628797][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.653275][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.668428][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.691990][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.707432][ T3576] device veth0_vlan entered promiscuous mode [ 178.724756][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.754019][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.773416][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.797121][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 178.863587][ T3644] FAULT_INJECTION: forcing a failure. [ 178.863587][ T3644] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 178.878829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 178.896099][ T3576] device veth1_macvtap entered promiscuous mode [ 178.909793][ T3644] CPU: 1 PID: 3644 Comm: syz.0.1115 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 178.917449][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 178.919622][ T3644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 178.919634][ T3644] Call Trace: [ 178.919639][ T3644] [ 178.919645][ T3644] __dump_stack+0x21/0x24 [ 178.948207][ T3644] dump_stack_lvl+0xee/0x150 [ 178.952811][ T3644] ? __cfi_dump_stack_lvl+0x8/0x8 [ 178.957842][ T3644] ? try_charge_memcg+0x24a/0x15b0 [ 178.963046][ T3644] dump_stack+0x15/0x24 [ 178.967232][ T3644] should_fail_ex+0x3d4/0x520 [ 178.971994][ T3644] should_fail_alloc_page+0x61/0x90 [ 178.977206][ T3644] prepare_alloc_pages+0x148/0x5f0 [ 178.982327][ T3644] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 178.987626][ T3644] __alloc_pages+0x124/0x450 [ 178.992223][ T3644] ? __cfi___alloc_pages+0x10/0x10 [ 178.997334][ T3644] ? memcg_rstat_updated+0x56/0x110 [ 179.002545][ T3644] ? folio_add_lru+0x260/0x390 [ 179.007325][ T3644] __folio_alloc+0x12/0x40 [ 179.011761][ T3644] wp_page_copy+0x255/0x15b0 [ 179.016362][ T3644] ? fault_dirty_shared_page+0x310/0x310 [ 179.021999][ T3644] ? vm_normal_page+0x1eb/0x200 [ 179.026860][ T3644] do_wp_page+0x9f2/0xfc0 [ 179.031202][ T3644] handle_mm_fault+0x10e4/0x2640 [ 179.036148][ T3644] ? __cfi_handle_mm_fault+0x10/0x10 [ 179.041454][ T3644] ? down_read_trylock+0x273/0x640 [ 179.046576][ T3644] ? __cfi___alloc_pages+0x10/0x10 [ 179.051701][ T3644] ? lock_mm_and_find_vma+0x9e/0x320 [ 179.056992][ T3644] ? do_user_addr_fault+0x2ee/0x1050 [ 179.062281][ T3644] do_user_addr_fault+0x63b/0x1050 [ 179.067569][ T3644] exc_page_fault+0x51/0xb0 [ 179.072072][ T3644] asm_exc_page_fault+0x27/0x30 [ 179.076921][ T3644] RIP: 0010:copy_user_enhanced_fast_string+0xa/0x40 [ 179.083509][ T3644] Code: ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 8d 0c ca 89 ca eb 20 0f 01 cb 83 fa 40 72 38 89 d1 a4 31 c0 0f 01 ca c3 89 ca eb 0a 90 90 90 90 90 90 90 90 90 90 [ 179.103113][ T3644] RSP: 0018:ffffc90000b17cb8 EFLAGS: 00050206 [ 179.109184][ T3644] RAX: ffffffff82635401 RBX: 000000000000b161 RCX: 00000000000058e1 [ 179.117141][ T3644] RDX: 000000000000b161 RSI: ffff888131d85880 RDI: 0000200000007000 [ 179.125103][ T3644] RBP: ffffc90000b17ce0 R08: 0000000000000001 R09: 0000000000000000 [ 179.133058][ T3644] R10: ffffed10263b162c R11: 0000000000001628 R12: 00007fffffff3e9f [ 179.141009][ T3644] R13: 0000000000000000 R14: 0000200000001780 R15: ffff888131d80000 [ 179.148962][ T3644] ? _copy_to_user+0x31/0x90 [ 179.153634][ T3644] ? _copy_to_user+0x72/0x90 [ 179.158204][ T3644] map_lookup_and_delete_elem+0x63e/0x770 [ 179.163994][ T3644] __sys_bpf+0x516/0x780 [ 179.168326][ T3644] ? bpf_link_show_fdinfo+0x320/0x320 [ 179.173685][ T3644] ? __cfi_ksys_write+0x10/0x10 [ 179.178519][ T3644] ? debug_smp_processor_id+0x17/0x20 [ 179.183888][ T3644] __x64_sys_bpf+0x7c/0x90 [ 179.188313][ T3644] x64_sys_call+0x488/0x9a0 [ 179.192800][ T3644] do_syscall_64+0x4c/0xa0 [ 179.197198][ T3644] ? clear_bhb_loop+0x30/0x80 [ 179.201859][ T3644] ? clear_bhb_loop+0x30/0x80 [ 179.206514][ T3644] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 179.212388][ T3644] RIP: 0033:0x7ff651b8ebe9 [ 179.216784][ T3644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 179.236366][ T3644] RSP: 002b:00007ff6529db038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 179.244757][ T3644] RAX: ffffffffffffffda RBX: 00007ff651db5fa0 RCX: 00007ff651b8ebe9 [ 179.252709][ T3644] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 179.260659][ T3644] RBP: 00007ff6529db090 R08: 0000000000000000 R09: 0000000000000000 [ 179.268609][ T3644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 179.276563][ T3644] R13: 00007ff651db6038 R14: 00007ff651db5fa0 R15: 00007ffee8c1a4e8 [ 179.284518][ T3644] [ 179.291485][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.300842][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 180.540900][ T10] device bridge_slave_1 left promiscuous mode [ 180.548208][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.630351][ T10] device bridge_slave_0 left promiscuous mode [ 180.709788][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.784850][ T10] device veth1_macvtap left promiscuous mode [ 180.799814][ T10] device veth0_vlan left promiscuous mode [ 181.041348][ T3685] device wg2 entered promiscuous mode [ 181.063979][ T3701] device syzkaller0 entered promiscuous mode [ 181.101800][ T3708] FAULT_INJECTION: forcing a failure. [ 181.101800][ T3708] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 181.114976][ T3708] CPU: 0 PID: 3708 Comm: syz.3.1136 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 181.124779][ T3708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 181.134822][ T3708] Call Trace: [ 181.138081][ T3708] [ 181.141077][ T3708] __dump_stack+0x21/0x24 [ 181.145388][ T3708] dump_stack_lvl+0xee/0x150 [ 181.149958][ T3708] ? __cfi_dump_stack_lvl+0x8/0x8 [ 181.154959][ T3708] ? __mod_node_page_state+0x9e/0xd0 [ 181.160219][ T3708] dump_stack+0x15/0x24 [ 181.164350][ T3708] should_fail_ex+0x3d4/0x520 [ 181.169007][ T3708] should_fail+0xb/0x10 [ 181.173139][ T3708] should_fail_usercopy+0x1a/0x20 [ 181.178176][ T3708] _copy_from_user+0x1e/0xc0 [ 181.182757][ T3708] iovec_from_user+0x1aa/0x2e0 [ 181.187499][ T3708] ? _parse_integer+0x2a/0x40 [ 181.192158][ T3708] __import_iovec+0x71/0x470 [ 181.196751][ T3708] import_iovec+0x7c/0xb0 [ 181.201057][ T3708] ___sys_sendmsg+0x1e4/0x290 [ 181.205710][ T3708] ? __sys_sendmsg+0x270/0x270 [ 181.210447][ T3708] ? __kasan_check_write+0x14/0x20 [ 181.215543][ T3708] ? proc_fail_nth_write+0x17a/0x1f0 [ 181.220806][ T3708] ? vfs_write+0x9d6/0xca0 [ 181.225202][ T3708] ? __fdget+0x19c/0x220 [ 181.229439][ T3708] __x64_sys_sendmsg+0x1f0/0x2c0 [ 181.234382][ T3708] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 181.239817][ T3708] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 181.245860][ T3708] x64_sys_call+0x171/0x9a0 [ 181.250343][ T3708] do_syscall_64+0x4c/0xa0 [ 181.254744][ T3708] ? clear_bhb_loop+0x30/0x80 [ 181.259397][ T3708] ? clear_bhb_loop+0x30/0x80 [ 181.264048][ T3708] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 181.269915][ T3708] RIP: 0033:0x7ff358f8ebe9 [ 181.274305][ T3708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 181.293887][ T3708] RSP: 002b:00007ff359dd9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 181.302277][ T3708] RAX: ffffffffffffffda RBX: 00007ff3591b5fa0 RCX: 00007ff358f8ebe9 [ 181.310320][ T3708] RDX: 0000000024040800 RSI: 0000200000000040 RDI: 0000000000000006 [ 181.318282][ T3708] RBP: 00007ff359dd9090 R08: 0000000000000000 R09: 0000000000000000 [ 181.326239][ T3708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 181.334198][ T3708] R13: 00007ff3591b6038 R14: 00007ff3591b5fa0 R15: 00007ffd3a021d88 [ 181.342168][ T3708] [ 181.519113][ T3688] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.526725][ T3688] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.581518][ T3688] device bridge_slave_0 entered promiscuous mode [ 181.613279][ T3688] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.674880][ T3688] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.787655][ T3688] device bridge_slave_1 entered promiscuous mode [ 182.870242][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.878935][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.050591][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.226535][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.330939][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.338032][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.550820][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.641385][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.735398][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.742490][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.970123][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.056197][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.064647][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.533935][ T3762] device syzkaller0 entered promiscuous mode [ 184.581526][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.608010][ T3688] device veth0_vlan entered promiscuous mode [ 184.621490][ T3688] device veth1_macvtap entered promiscuous mode [ 184.629148][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 184.639051][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.652651][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.661724][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.669878][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 184.678272][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.686731][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 184.696085][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.704131][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.737197][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 184.751485][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.770637][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 184.778976][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.917035][ T10] device bridge_slave_1 left promiscuous mode [ 185.923809][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.948487][ T10] device bridge_slave_0 left promiscuous mode [ 185.954788][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.962983][ T10] device veth1_macvtap left promiscuous mode [ 185.969092][ T10] device veth0_vlan left promiscuous mode [ 186.658238][ T3801] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.685723][ T3801] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.694213][ T3801] device bridge_slave_0 entered promiscuous mode [ 186.746924][ T3801] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.756451][ T3801] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.777667][ T3801] device bridge_slave_1 entered promiscuous mode [ 187.555066][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.565774][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.644087][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.670335][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.687404][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.694533][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.702746][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.716405][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.728705][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.735798][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.745718][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.753868][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.781926][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 187.851445][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.883291][ T3801] device veth0_vlan entered promiscuous mode [ 187.941655][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 187.962448][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.053435][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.080115][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.100059][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 188.123311][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 188.228944][ T3801] device veth1_macvtap entered promiscuous mode [ 188.273806][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 188.311936][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 188.326129][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 188.357445][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 188.380217][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 189.350226][ T10] device bridge_slave_1 left promiscuous mode [ 189.356366][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.363987][ T10] device bridge_slave_0 left promiscuous mode [ 189.370775][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.378456][ T10] device veth1_macvtap left promiscuous mode [ 189.384505][ T10] device veth0_vlan left promiscuous mode [ 190.271549][ T3887] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.278651][ T3887] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.286679][ T3887] device bridge_slave_0 entered promiscuous mode [ 190.294956][ T3887] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.302069][ T3887] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.344806][ T3887] device bridge_slave_1 entered promiscuous mode [ 190.916588][ T3887] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.923681][ T3887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.930996][ T3887] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.938014][ T3887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.947630][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.957007][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.981656][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.989531][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.020983][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.030818][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.039307][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.046392][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.053891][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.062596][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.072197][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.079230][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.106751][ T3887] device veth0_vlan entered promiscuous mode [ 191.119960][ T3887] device veth1_macvtap entered promiscuous mode [ 191.126975][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.135346][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.143593][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.152234][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.161530][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 191.170041][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 191.178518][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 191.187069][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.195650][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 191.204394][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.213591][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 191.247467][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.333933][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.365367][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 191.374611][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 191.392194][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 191.405005][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 191.464259][ T3946] device sit0 entered promiscuous mode [ 192.240848][ T3943] device sit0 left promiscuous mode [ 193.050312][ T10] device bridge_slave_1 left promiscuous mode [ 193.056459][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.063961][ T10] device bridge_slave_0 left promiscuous mode [ 193.070183][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.077832][ T10] device veth1_macvtap left promiscuous mode [ 193.083975][ T10] device veth0_vlan left promiscuous mode [ 193.915106][ T3986] device sit0 entered promiscuous mode [ 194.687469][ T3991] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.759708][ T3991] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.775818][ T3991] device bridge_slave_0 entered promiscuous mode [ 194.815816][ T3991] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.867020][ T3991] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.874592][ T3991] device bridge_slave_1 entered promiscuous mode [ 195.985089][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.068263][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.222056][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.262688][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.272780][ T341] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.279859][ T341] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.290337][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.396817][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.415369][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.430187][ T341] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.437246][ T341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.510347][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.645466][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.789964][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.892481][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.028839][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.208459][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.292624][ T3991] device veth0_vlan entered promiscuous mode [ 197.308386][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 197.318875][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.341415][ T3991] device veth1_macvtap entered promiscuous mode [ 197.421735][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.439342][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.446939][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 197.456484][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 197.480595][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 197.732912][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 197.741555][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 197.766972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 197.775530][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 198.780598][ T10] device bridge_slave_1 left promiscuous mode [ 198.786720][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.794199][ T10] device bridge_slave_0 left promiscuous mode [ 198.800379][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.807974][ T10] device veth1_macvtap left promiscuous mode [ 198.814139][ T10] device veth0_vlan left promiscuous mode [ 199.781836][ T4071] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.788991][ T4071] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.809462][ T4071] device bridge_slave_0 entered promiscuous mode [ 199.819326][ T4071] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.927144][ T4071] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.994416][ T4071] device bridge_slave_1 entered promiscuous mode [ 200.939969][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.947506][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.956835][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.965441][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.973839][ T1120] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.980900][ T1120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.000156][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.007956][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.016542][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.025391][ T1120] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.032444][ T1120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.041300][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.093452][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.257654][ T4111] device sit0 entered promiscuous mode [ 201.289486][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 201.453063][ T4071] device veth0_vlan entered promiscuous mode [ 201.468467][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 201.573623][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.737647][ T4071] device veth1_macvtap entered promiscuous mode [ 201.881929][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.921926][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.962011][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 202.046994][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 202.164378][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 202.260047][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 202.357149][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 202.373319][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 202.387252][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.270343][ T10] device bridge_slave_1 left promiscuous mode [ 203.276474][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.284021][ T10] device bridge_slave_0 left promiscuous mode [ 203.290250][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.298047][ T10] device veth1_macvtap left promiscuous mode [ 203.304154][ T10] device veth0_vlan left promiscuous mode [ 205.881945][ T4153] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.116755][ T4153] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.220228][ T4153] device bridge_slave_0 entered promiscuous mode [ 206.227453][ T4153] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.655344][ T4153] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.803863][ T4153] device bridge_slave_1 entered promiscuous mode [ 207.251033][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 207.310395][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.348868][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 207.368824][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.395656][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.402782][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.447815][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 207.456315][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.464580][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.471611][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.479321][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 207.511471][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.542857][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.601655][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 207.658621][ T4153] device veth0_vlan entered promiscuous mode [ 207.692224][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.720213][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.741571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.760814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 207.776831][ T4153] device veth1_macvtap entered promiscuous mode [ 207.790426][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 207.809365][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 208.670286][ T10] device bridge_slave_1 left promiscuous mode [ 208.676399][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.683911][ T10] device bridge_slave_0 left promiscuous mode [ 208.690131][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.697777][ T10] device veth1_macvtap left promiscuous mode [ 208.703920][ T10] device veth0_vlan left promiscuous mode [ 209.686509][ T4219] syz.1.1268[4219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.686584][ T4219] syz.1.1268[4219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.425209][ T4221] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.560876][ T4230] syz.0.1284[4230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.560952][ T4230] syz.0.1284[4230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.582693][ T4221] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.827052][ T4221] device bridge_slave_0 entered promiscuous mode [ 210.845002][ T4221] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.862761][ T4221] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.890465][ T4221] device bridge_slave_1 entered promiscuous mode [ 211.985166][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.023261][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.240410][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.277771][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.491822][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.498886][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.528767][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.537318][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.602030][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.609115][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.636386][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.651222][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.900072][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.907839][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.996970][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.280887][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 213.338519][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.417255][ T4221] device veth0_vlan entered promiscuous mode [ 213.431048][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 213.472993][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.494812][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.531146][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.554144][ T4221] device veth1_macvtap entered promiscuous mode [ 213.674167][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.771001][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.867460][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 213.990356][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.030242][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.053916][ T4288] syz.1.1286[4288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.053984][ T4288] syz.1.1286[4288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.061831][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.150308][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.440302][ T43] device bridge_slave_1 left promiscuous mode [ 215.446429][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.453948][ T43] device bridge_slave_0 left promiscuous mode [ 215.460283][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.468066][ T43] device veth1_macvtap left promiscuous mode [ 215.474144][ T43] device veth0_vlan left promiscuous mode [ 216.758056][ T4312] device syzkaller0 entered promiscuous mode [ 217.640968][ T4318] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.721640][ T4318] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.902089][ T4318] device bridge_slave_0 entered promiscuous mode [ 218.100973][ T4318] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.108037][ T4318] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.170234][ T4318] device bridge_slave_1 entered promiscuous mode [ 219.050116][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.059043][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.067438][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.076564][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.092008][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.099052][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.130565][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.146285][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.163412][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.179961][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.187068][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.208204][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.222957][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.238739][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.256090][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.286432][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.303458][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.313600][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.321412][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.329194][ T4318] device veth0_vlan entered promiscuous mode [ 219.342775][ T4318] device veth1_macvtap entered promiscuous mode [ 219.355623][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.393551][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.402550][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.483739][ T4359] FAULT_INJECTION: forcing a failure. [ 219.483739][ T4359] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 219.515019][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.524313][ T4359] CPU: 1 PID: 4359 Comm: syz.3.1302 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 219.531079][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.534132][ T4359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 219.534145][ T4359] Call Trace: [ 219.534150][ T4359] [ 219.534156][ T4359] __dump_stack+0x21/0x24 [ 219.562742][ T4359] dump_stack_lvl+0xee/0x150 [ 219.567344][ T4359] ? __cfi_dump_stack_lvl+0x8/0x8 [ 219.572378][ T4359] dump_stack+0x15/0x24 [ 219.576550][ T4359] should_fail_ex+0x3d4/0x520 [ 219.581227][ T4359] should_fail+0xb/0x10 [ 219.585376][ T4359] should_fail_usercopy+0x1a/0x20 [ 219.590403][ T4359] _copy_from_user+0x1e/0xc0 [ 219.595003][ T4359] ___sys_recvmsg+0x12b/0x510 [ 219.599681][ T4359] ? __sys_recvmsg+0x270/0x270 [ 219.604445][ T4359] ? security_file_permission+0x94/0xb0 [ 219.610000][ T4359] ? __fget_files+0x2d5/0x330 [ 219.614683][ T4359] ? __fdget+0x19c/0x220 [ 219.618933][ T4359] __x64_sys_recvmsg+0x1ed/0x2c0 [ 219.623878][ T4359] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 219.629343][ T4359] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 219.635408][ T4359] x64_sys_call+0x75/0x9a0 [ 219.639826][ T4359] do_syscall_64+0x4c/0xa0 [ 219.644240][ T4359] ? clear_bhb_loop+0x30/0x80 [ 219.648912][ T4359] ? clear_bhb_loop+0x30/0x80 [ 219.653580][ T4359] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 219.659471][ T4359] RIP: 0033:0x7ff358f8ebe9 [ 219.663882][ T4359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.683491][ T4359] RSP: 002b:00007ff359db8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 219.691914][ T4359] RAX: ffffffffffffffda RBX: 00007ff3591b6090 RCX: 00007ff358f8ebe9 [ 219.699882][ T4359] RDX: 0000000000001f00 RSI: 0000200000000500 RDI: 0000000000000007 [ 219.707855][ T4359] RBP: 00007ff359db8090 R08: 0000000000000000 R09: 0000000000000000 [ 219.715818][ T4359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.723782][ T4359] R13: 00007ff3591b6128 R14: 00007ff3591b6090 R15: 00007ffd3a021d88 [ 219.731755][ T4359] [ 220.190306][ T28] audit: type=1400 audit(1755675642.301:131): avc: denied { create } for pid=4367 comm="syz.0.1303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 221.320291][ T8] device bridge_slave_1 left promiscuous mode [ 221.326447][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.334131][ T8] device bridge_slave_0 left promiscuous mode [ 221.340381][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.348125][ T8] device veth1_macvtap left promiscuous mode [ 221.354158][ T8] device veth0_vlan left promiscuous mode [ 222.980071][ T4381] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.987126][ T4381] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.223903][ T4381] device bridge_slave_0 entered promiscuous mode [ 223.331000][ T4381] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.348402][ T4381] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.355966][ T4381] device bridge_slave_1 entered promiscuous mode [ 224.042386][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.073771][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.112363][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.127304][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.143219][ T1120] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.150289][ T1120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.181720][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.193357][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.203239][ T1120] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.210299][ T1120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.229963][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.242114][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.251373][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.261211][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.269335][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.279524][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 224.288301][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.302884][ T4381] device veth0_vlan entered promiscuous mode [ 224.309108][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 224.317114][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.337271][ T4381] device veth1_macvtap entered promiscuous mode [ 224.344607][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.352386][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.360286][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 224.368543][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.377163][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 224.396434][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 224.405936][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.415195][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 224.421502][ T28] audit: type=1400 audit(1755675646.531:132): avc: denied { create } for pid=4421 comm="syz.4.1317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 224.424142][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 225.550292][ T341] device bridge_slave_1 left promiscuous mode [ 225.556407][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.563963][ T341] device bridge_slave_0 left promiscuous mode [ 225.570173][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.578049][ T341] device veth1_macvtap left promiscuous mode [ 225.584212][ T341] device veth0_vlan left promiscuous mode [ 226.321036][ T4433] FAULT_INJECTION: forcing a failure. [ 226.321036][ T4433] name failslab, interval 1, probability 0, space 0, times 0 [ 226.334830][ T4433] CPU: 1 PID: 4433 Comm: syz.1.1320 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 226.344659][ T4433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 226.354728][ T4433] Call Trace: [ 226.358016][ T4433] [ 226.360943][ T4433] __dump_stack+0x21/0x24 [ 226.365283][ T4433] dump_stack_lvl+0xee/0x150 [ 226.369875][ T4433] ? __cfi_dump_stack_lvl+0x8/0x8 [ 226.374898][ T4433] ? __memmove+0x1a0/0x1a0 [ 226.379320][ T4433] dump_stack+0x15/0x24 [ 226.383479][ T4433] should_fail_ex+0x3d4/0x520 [ 226.388163][ T4433] __should_failslab+0xac/0xf0 [ 226.392937][ T4433] ? shmem_initxattrs+0xcd/0x1e0 [ 226.397871][ T4433] should_failslab+0x9/0x20 [ 226.402373][ T4433] __kmem_cache_alloc_node+0x3d/0x2c0 [ 226.407744][ T4433] ? simple_xattr_alloc+0x23/0xa0 [ 226.412768][ T4433] ? shmem_initxattrs+0xcd/0x1e0 [ 226.417742][ T4433] __kmalloc+0xa1/0x1e0 [ 226.421986][ T4433] shmem_initxattrs+0xcd/0x1e0 [ 226.426747][ T4433] security_inode_init_security+0x28c/0x3a0 [ 226.432632][ T4433] ? irqentry_exit+0x37/0x40 [ 226.437220][ T4433] ? __cfi_shmem_initxattrs+0x10/0x10 [ 226.442587][ T4433] ? __cfi_security_inode_init_security+0x10/0x10 [ 226.448999][ T4433] ? __kasan_check_write+0x14/0x20 [ 226.454113][ T4433] ? set_cached_acl+0xdd/0x180 [ 226.458866][ T4433] ? simple_acl_create+0x191/0x1c0 [ 226.463971][ T4433] shmem_mknod+0xbb/0x1d0 [ 226.468294][ T4433] shmem_create+0x2c/0x40 [ 226.472619][ T4433] ? __cfi_shmem_create+0x10/0x10 [ 226.477641][ T4433] path_openat+0x11e3/0x2f50 [ 226.482227][ T4433] ? do_filp_open+0x3c0/0x3c0 [ 226.486897][ T4433] do_filp_open+0x1c1/0x3c0 [ 226.491388][ T4433] ? __cfi_do_filp_open+0x10/0x10 [ 226.496420][ T4433] ? alloc_fd+0x4e6/0x590 [ 226.500750][ T4433] do_sys_openat2+0x185/0x7e0 [ 226.505419][ T4433] ? __kasan_check_write+0x14/0x20 [ 226.510960][ T4433] ? do_sys_open+0xe0/0xe0 [ 226.515368][ T4433] ? ksys_write+0x1eb/0x240 [ 226.519870][ T4433] ? __cfi_ksys_write+0x10/0x10 [ 226.524714][ T4433] __x64_sys_openat+0x136/0x160 [ 226.529560][ T4433] x64_sys_call+0x783/0x9a0 [ 226.534054][ T4433] do_syscall_64+0x4c/0xa0 [ 226.538463][ T4433] ? clear_bhb_loop+0x30/0x80 [ 226.543125][ T4433] ? clear_bhb_loop+0x30/0x80 [ 226.547805][ T4433] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 226.553695][ T4433] RIP: 0033:0x7ff49ad8ebe9 [ 226.558099][ T4433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.577694][ T4433] RSP: 002b:00007ff49bb52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 226.586104][ T4433] RAX: ffffffffffffffda RBX: 00007ff49afb5fa0 RCX: 00007ff49ad8ebe9 [ 226.594065][ T4433] RDX: 00000000000026e1 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 226.602050][ T4433] RBP: 00007ff49bb52090 R08: 0000000000000000 R09: 0000000000000000 [ 226.610008][ T4433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 226.617972][ T4433] R13: 00007ff49afb6038 R14: 00007ff49afb5fa0 R15: 00007ffd638fae78 [ 226.625939][ T4433] [ 226.687937][ T4437] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.695198][ T4437] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.703018][ T4437] device bridge_slave_0 entered promiscuous mode [ 226.710575][ T4437] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.717639][ T4437] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.725388][ T4437] device bridge_slave_1 entered promiscuous mode [ 227.213687][ T4437] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.220779][ T4437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.228065][ T4437] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.235123][ T4437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.292418][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.318366][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.520783][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.541825][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.643949][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.789482][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.919997][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.927077][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.155528][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.262167][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.376098][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.383198][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.449353][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.490768][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.599186][ T4437] device veth0_vlan entered promiscuous mode [ 228.710369][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.724404][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.739490][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 228.750652][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 228.759620][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 228.847815][ T28] audit: type=1400 audit(1755675650.951:133): avc: denied { create } for pid=4474 comm="syz.4.1328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 228.878540][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.985830][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.101508][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.233836][ T4437] device veth1_macvtap entered promiscuous mode [ 229.359728][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 229.368221][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.491795][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 229.523081][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 229.531680][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 229.540285][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 229.548618][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.130422][ T341] device bridge_slave_1 left promiscuous mode [ 230.136583][ T341] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.144105][ T341] device bridge_slave_0 left promiscuous mode [ 230.150265][ T341] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.157946][ T341] device veth1_macvtap left promiscuous mode [ 230.164047][ T341] device veth0_vlan left promiscuous mode [ 231.650396][ T4499] device pim6reg1 entered promiscuous mode [ 232.751380][ T4512] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 232.909025][ T4512] device syzkaller0 entered promiscuous mode [ 232.991443][ T4506] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.005434][ T4506] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.018914][ T4506] device bridge_slave_0 entered promiscuous mode [ 233.069774][ T4506] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.102514][ T4506] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.111549][ T4506] device bridge_slave_1 entered promiscuous mode [ 234.325069][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.354440][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.514271][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.602151][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.611333][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.618371][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.780838][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.880264][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.010042][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.017106][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.140508][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.209509][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.260306][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.355394][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.395455][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.636657][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 235.791322][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 235.993785][ T4506] device veth0_vlan entered promiscuous mode [ 236.112972][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 236.206239][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 236.298649][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 236.359389][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.458178][ T4506] device veth1_macvtap entered promiscuous mode [ 236.570655][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 236.580322][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 236.770958][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 236.880335][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.979627][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.998835][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 237.037440][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 237.902916][ T43] device bridge_slave_1 left promiscuous mode [ 237.909169][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.050888][ T43] device bridge_slave_0 left promiscuous mode [ 238.057057][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.111181][ T43] device veth1_macvtap left promiscuous mode [ 238.117256][ T43] device veth0_vlan left promiscuous mode [ 239.868387][ T28] audit: type=1400 audit(1755675661.971:134): avc: denied { create } for pid=4561 comm="syz.3.1353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 240.814028][ T4580] syz.4.1357[4580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.814110][ T4580] syz.4.1357[4580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.954070][ T4571] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.972555][ T4571] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.980027][ T4571] device bridge_slave_0 entered promiscuous mode [ 241.078419][ T4571] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.339518][ T4571] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.391481][ T4571] device bridge_slave_1 entered promiscuous mode [ 243.058028][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.065811][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.081701][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.090915][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.099166][ T1120] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.106224][ T1120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.114458][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.123576][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.132069][ T1120] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.139097][ T1120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.184220][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.200603][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.215226][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.281850][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.343286][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.423232][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.480382][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.527814][ T4571] device veth0_vlan entered promiscuous mode [ 243.555519][ T4647] device sit0 left promiscuous mode [ 243.574925][ T4648] device sit0 entered promiscuous mode [ 244.197491][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 244.236371][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 244.406378][ T4657] device sit0 left promiscuous mode [ 244.479446][ T4660] device sit0 entered promiscuous mode [ 244.651159][ T4571] device veth1_macvtap entered promiscuous mode [ 244.665835][ T4664] device veth1_macvtap left promiscuous mode [ 244.672085][ T4664] device macsec0 entered promiscuous mode [ 244.702744][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 244.711114][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 244.719553][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 244.727852][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 246.160312][ T43] device bridge_slave_1 left promiscuous mode [ 246.166436][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.173900][ T43] device bridge_slave_0 left promiscuous mode [ 246.180092][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.187764][ T43] device veth1_macvtap left promiscuous mode [ 246.193875][ T43] device veth0_vlan left promiscuous mode [ 247.826578][ T4688] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.971833][ T4688] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.059561][ T4688] device bridge_slave_0 entered promiscuous mode [ 248.291572][ T4688] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.298656][ T4688] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.330256][ T4688] device bridge_slave_1 entered promiscuous mode [ 248.640048][ T4714] FAULT_INJECTION: forcing a failure. [ 248.640048][ T4714] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 248.655065][ T4714] CPU: 1 PID: 4714 Comm: syz.3.1392 Not tainted 6.1.145-syzkaller-00015-g87b9d836c3d8 #0 [ 248.664966][ T4714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 248.675021][ T4714] Call Trace: [ 248.678294][ T4714] [ 248.681213][ T4714] __dump_stack+0x21/0x24 [ 248.685570][ T4714] dump_stack_lvl+0xee/0x150 [ 248.690158][ T4714] ? __cfi_dump_stack_lvl+0x8/0x8 [ 248.695180][ T4714] ? memcpy+0x56/0x70 [ 248.699172][ T4714] dump_stack+0x15/0x24 [ 248.703322][ T4714] should_fail_ex+0x3d4/0x520 [ 248.707998][ T4714] should_fail+0xb/0x10 [ 248.712145][ T4714] should_fail_usercopy+0x1a/0x20 [ 248.717166][ T4714] strncpy_from_user+0x24/0x2d0 [ 248.722026][ T4714] bpf_prog_load+0x1bb/0x15a0 [ 248.726697][ T4714] ? map_freeze+0x390/0x390 [ 248.731194][ T4714] ? __sys_bpf+0x2ed/0x780 [ 248.735600][ T4714] ? __sanitizer_cov_trace_switch+0x61/0xe0 [ 248.741491][ T4714] __sys_bpf+0x504/0x780 [ 248.745725][ T4714] ? __kasan_check_read+0x11/0x20 [ 248.750752][ T4714] ? bpf_link_show_fdinfo+0x320/0x320 [ 248.756118][ T4714] ? sysvec_reschedule_ipi+0x78/0x80 [ 248.761399][ T4714] ? asm_sysvec_reschedule_ipi+0x1b/0x20 [ 248.767031][ T4714] __x64_sys_bpf+0x7c/0x90 [ 248.771445][ T4714] x64_sys_call+0x488/0x9a0 [ 248.775944][ T4714] do_syscall_64+0x4c/0xa0 [ 248.780356][ T4714] ? clear_bhb_loop+0x30/0x80 [ 248.785060][ T4714] ? clear_bhb_loop+0x30/0x80 [ 248.789731][ T4714] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 248.795615][ T4714] RIP: 0033:0x7ff358f8ebe9 [ 248.800034][ T4714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.819638][ T4714] RSP: 002b:00007ff359db8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 248.828053][ T4714] RAX: ffffffffffffffda RBX: 00007ff3591b6090 RCX: 00007ff358f8ebe9 [ 248.836022][ T4714] RDX: 0000000000000094 RSI: 0000200000002ac0 RDI: 0000000000000005 [ 248.844074][ T4714] RBP: 00007ff359db8090 R08: 0000000000000000 R09: 0000000000000000 [ 248.852041][ T4714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.860011][ T4714] R13: 00007ff3591b6128 R14: 00007ff3591b6090 R15: 00007ffd3a021d88 [ 248.867984][ T4714] [ 249.380077][ T4720] syz.3.1394[4720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.380154][ T4720] syz.3.1394[4720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.119721][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.140810][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.148805][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.159522][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.167767][ T337] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.174831][ T337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.186630][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.195218][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.203809][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.210858][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.218806][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 250.227047][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.236433][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.244108][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.252474][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.287503][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 250.302643][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.360786][ T4688] device veth0_vlan entered promiscuous mode [ 250.409735][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 250.446300][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.565622][ T4688] device veth1_macvtap entered promiscuous mode [ 250.700016][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.707529][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.955353][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 251.039479][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 251.048106][ T1120] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 251.170734][ T4748] device syzkaller0 entered promiscuous mode [ 251.302512][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 251.396753][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 251.497503][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 251.637527][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=923 state=3 status=67 (errno 9: Bad file descriptor) [ 252.819224][ T4756] device syzkaller0 entered promiscuous mode [ 253.011854][ T283] syz-executor (283) used greatest stack depth: 20992 bytes left [ 253.240445][ T1120] device bridge_slave_1 left promiscuous mode [ 253.246629][ T1120] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.254217][ T1120] device bridge_slave_0 left promiscuous mode [ 253.260353][ T1120] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.268053][ T1120] device veth1_macvtap left promiscuous mode [ 253.274139][ T1120] device veth0_vlan left promiscuous mode [ 254.110832][ T1120] device bridge_slave_1 left promiscuous mode [ 254.117056][ T1120] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.124708][ T1120] device bridge_slave_0 left promiscuous mode [ 254.130925][ T1120] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.139162][ T1120] device bridge_slave_1 left promiscuous mode [ 254.145483][ T1120] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.152992][ T1120] device bridge_slave_0 left promiscuous mode [ 254.159098][ T1120] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.167075][ T1120] device bridge_slave_1 left promiscuous mode [ 254.173241][ T1120] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.180661][ T1120] device bridge_slave_0 left promiscuous mode [ 254.186741][ T1120] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.195467][ T1120] device veth1_macvtap left promiscuous mode [ 254.202306][ T1120] device veth1_macvtap left promiscuous mode [ 254.208811][ T1120] device veth1_macvtap left promiscuous mode [ 254.214945][ T1120] device veth0_vlan left promiscuous mode