last executing test programs: 24.464461582s ago: executing program 2 (id=1039): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000740)='percpu_free_percpu\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3, 0x400000}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 20.177392828s ago: executing program 2 (id=1039): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000740)='percpu_free_percpu\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3, 0x400000}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 16.690447352s ago: executing program 2 (id=1039): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000740)='percpu_free_percpu\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3, 0x400000}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 10.590419917s ago: executing program 2 (id=1039): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000740)='percpu_free_percpu\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3, 0x400000}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 7.154573419s ago: executing program 1 (id=1650): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x10, 0x4, 0x0, 0x0, 0x3, 0x174c54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xc}, 0x4001, 0xc8, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x4840, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000180)=r8, 0x4) sendmsg$unix(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) 6.830563354s ago: executing program 1 (id=1654): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000500000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) syz_clone(0x638c11f0, 0x0, 0x0, 0x0, 0x0, 0x0) 6.057229876s ago: executing program 4 (id=1660): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000007c0)=ANY=[@ANYBLOB="187f8c639b3734ab9dcda508e11b30e4e2f1ce53000000fb8606f62d0000000f0900ec17c96f46180020000753baefc4ae78c733e4770bf7d010ce5bc32b0b65194dc0dec7dd3e5867b9c1ed894525f6ef94952f4325cd6b106158ccb18a17df600e564862b8a3e4ba7fd2debddd8fa4ac93a807ef5b06c095bb9d31559f95607e77f802f7b897422b2418ae78a8", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000003000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000070000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='xprtrdma_marshal_failed\x00', r7, 0x0, 0xb31}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='btrfs_handle_em_exist\x00', r7}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r8, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='xen_cpu_write_ldt_entry\x00', r3, 0x0, 0x5}, 0x18) 5.922182638s ago: executing program 4 (id=1661): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000f000000000000000000000000000000000000cb690000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1, &(0x7f0000000b80)=ANY=[@ANYRES32, @ANYBLOB="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"], 0x118}, 0x20000004) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000080)) 5.675046462s ago: executing program 1 (id=1664): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x10, 0x4, 0x0, 0x0, 0x3, 0x174c54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xc}, 0x4001, 0xc8, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x4840, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000180)=r7, 0x4) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) 5.645055082s ago: executing program 4 (id=1666): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r0, 0xc0189436, &(0x7f0000000000)={'bond_slave_0\x00', @random='\\\x00\x00 \x00'}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xfd, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='percpu_create_chunk\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92344f242b416ae9eeefc0e9c60ebab1c176bfdbb4ddffffff7f02f732e4c2eab72bf40c0682fd0a0c4ac106b29e220dc28d0072599456d4c4e6f3fe684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb39df9858037458a4ca037604007600b6be484e4c9517af216bd8ed42f7dd5adb8e49f4a94608c9a20819e02fc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8a80366ce5401ec61921a1b529cc8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa228504e4afd8c1cc3eb215ba22f43115f4d39ddbb1edb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e0200000057033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400001000000000ff8d01006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb6b3cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a634b93a09fab1daae4b518d7a5d95a017864010067d6bab101446ebfe3fdeed7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6f4a78444986f9b1ab61f9dab53038010000004abbfc59d6d1b18fe380df4bf024f120bd755d82033f2fb7d8fc9e0de834f7646c8dd27da1297d0c77b294e097e293db7f002c0024ab2fb4d32972cba6f49051cec1ff6f16231bbb90a2d201a500000000000000007700b06fa191ebd3a0c2ef0058ffebd7cc4cf80f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f8107671141ffffffe0c7d8e94a27a06a4e3d9acee835fd0571e5bbb3e6d2b5eba505000000968983811f832dc5390f83e817c64ac4f1f0d0504255c22ee8674053d0e160e5255366139bbe5863e23c3dd42d21f542816edf56a93d0a7e6f08f9ffffff64875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875857f083144c642f71cdc8e5634c1360c056430fe77ee7ed7ac1f9743786b2fb8e0fcfcc3d36c93230b7b059bc295aa0e38ff07edc3492b96e73d2060acfd8145e4a5851bc4d6fdc5ad939db52812e07795f3879baa88bd194d48e50c84892c97c800d156b059a718f6b10274b077a710f27ab8ee953de70ea860b74a0f3c3dc11177b11cc2e62a95f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f7975fe599678fee48f83b59895e0309130f534741377ea7b7bea3c46c0c4c4b7c27c5d057d95ac85a41cdcee8e6fa31f7d2137ed1fb4b21c13b9a2c5e3f7c9ef9e45a35adbf0b9312be929863f000000000000004a82bc080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561e34e4e8e51e81d4a355a7d00d917c16a2bb0cfb284fcfde9015769b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb46e1878c5295fecc27f9c6d1f62da58c0002ea00000000009aa38a05e70591d5cdab1c488ef3c1984c7c0a566cfc2a080000009ec206a54fb49056a555414178ef00d8b8f3c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a10100000000000000c9ccc89df41c39dd58dd70569dde45f8adeaad7d3328fbb6e279f745d2872f0208635e465ca443a6a64c7803760880af23fb3f430a5d11fffc96dd13b951642f1433f65b4e170a62a5f7b7d0f9d5cef0d17289c43d4aee0001f7a343899434594cc23e1c864164e130754b337e560f285dc670e31241bf657babf0615b85dc200a10294b7d5885b43ac62fc7f97a85586168483427072a535f2c7481ec261c00f725de74e48d9a86f7d4a5d28da3f099ca3e6472b9d7c86d961f525f799b4517141f018af0673b8296f867eca1ec07be11bc497a6f7d2b752bcf77c2908b64630ed5a0c2261bc2d5de6ee174534b8dfc0432ab6bbcf296d36807544aa7c3d3301fe227b713a371414c98695e559f9cbf6b046184064a5f24a4cc6f41f21fc24a3ad7d20a89e00a9dc99a40f890869d35fba3ce6f297661d3f8ba21c65badf55d1859581f9e7ef3e2693b46a8fc85be061ce79aa2832c04dc04de8b6536123b24be2ef80eb06b2db900fb30596c1574bda31f81d61ccfd58080d2330b9c7b87b5d17d48c32daffead3414b91603e250eeedc7d601000000037426f643797be3e93da96b5643d3feed0b7c885d06006b830d7cbf3152f27522f5142dcc84a9e48a07518f0142167a9f5d6685d09945cbc778bcc3e7dcfaee5d9c1689a3bafc0d3b51b5a3bfd6007954c36d532960964183842601e5364ecb6ad9168040388c7640bfa2f88643de7eebf4da8d1c3e76daace5217761d933d06bbe9609fcf5971aa1e77c3123910e63daaadd8878ad468eabaf78a96012a4ada1a9cd217fb2a0da2d521454ea9e8fcd3b5badfd6f00003a73345b841d04a02bf441955b932c59608a555bc44873272812e0fb874618a0b56b4cf44990f60000000000000000000000b20000da0ca67905e877893646d185a75582f866785af6b0149e336c31fb177e3e85f4c60cbbde4ce6ea73a95f434328620fa493937386ad2e2a0d60eb815aa05c33e02c32276dab36d14c63db66a31409ab2a403ec3c7a4e07bd745efa2835a8c932f22aa6da40af9bcdf808b916bc8deb37d5b8c422b65c42d17e61751c561ce985a31b52703d398d52694cfbb7d2b3791b030093b321d9f16b2f06676cf94d75cbba6491ae0b5a16ce92320321314d8d2e88d1cd7e7b1216bdaecba309a38e107103e649d46958cc6ba2d660dd41b78d832beb7206ae01508377273ea96e40760410aeed1866971e04f578e9d856d01000000045aea928f5f669be0636dc3f34f90a6e865225f271527412d1ae755a9243da523d713071f9370b509a34eeb46415b2f0d271a7072cbd17e293f20132e6c15756e92776c6a0d7c3a9f512ce17edf3f1ea190853b8b79d504c057000e7d8f8249a8158e68a90bbea8bfab2bd3045b9c790984c6fb65fd7887bd8bfcbe663df6b7770000f58fbad41e6eee5c9595950c4172b9c925403b2f99bbf3cb1981bb0d14bded8eae35e08278020a1ec7f508628056fd3d408a02a1cf8594bcbb21a88f477673442804f714212dedd245b9f563b5352fe460a30489b1b6a6d37daead86151492f7fd4b5c64007b68a1b04027eac124478a2ef7f59fe472795785de83578cb96334e0f7c1370dc397d3aa42d937b5718b7610cdcdfe104db7801ec74980b8b111a2748321f81512e4204eb2b024b9fc9e0f257f8c6037b93b2caa236d4354b32434d5a6b01e000000000000000000000087b97a200609c77e0000000000000000d3a54ccd0900a966801e9341260d6cbce5fe03999214462cbaa297448677ab659102d0f430fbeae119a7ef2e962d2829d4dd2201c4b30d491269594c88252fbd09ac0090609851bd9e5c307e7e0d39e73579c1f3563eff1a6237d3699f61acdc8e36010d76093ddd227d9ff2f5e8b5e0ba2048d542de40f643fda4036124b8feb2dd45d0fa52300518c8052cc09ad73f89732c651ed2644f34cfbc32e8b29cf29e895e43b473ddb9a43421b4b25f8bbce8e2d7cb8547d156d5972021ae4c9e30f85413276ddebde55999d2ec3c524632b74d703147ba09e0dcb26c4b89636d28428b67e955f53bfd0c9eebf33a260a9b2647726795617a9d1700000000000000f65d0eb4b7b077f1b4d3c5254753ddc9d5861fca4ec4205af1c89fa638b00342ff5f5994fc1f042d1b4a0000000000000070035394b646baa4ba26f70c2c2fe2bc501ecc19f538fdeb7485b73a72a3cba6c50721ce39a0dba3757fcfdb20f40fc9f7fb5d0b6100000000000000005bc7aff2c5b266f8276c6a6eebeae26b7410b7b506f7518ef70721f4315b04f1c35d5c5ab58d6d78682c21821d8e0648feddf5734daba6e219ddc4708f0de8032515fdd2825334e43786d58caeaaee3bdfcfc7e27d90f26de71d00417b23910b4f2c06d21313a73fdb069482241e09d49d37d91a43a08812df97700683e828735af95018960271e49d61fb985e088d079ee30b347952dc5ba725047cef9b0065fed61cf2a4336bd8b3dea27ab071fc2cea404b8d39b798aef5739327b0f02add98cb77ad6c6fc582798a8e5b0e7baf898efaff86d859932b903881253c3457a86fb5ff849bb51959d3d16cba8e59bc854be0509d12d800000000000000000000000000f82401ebba7ada9d9531161825cc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r9}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@fwd={0x1}]}, {0x0, [0x2e]}}, &(0x7f00000003c0)=""/187, 0x27, 0xbb, 0x1, 0x0, 0x0, @void, @value}, 0x28) r10 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffff3bf}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000033c0)={&(0x7f0000003200)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000700000004000000000000081e00000000002e002e17"], &(0x7f00000032c0)=""/217, 0x2b, 0xd9, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000539d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r11}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000004000100"/24], 0x50) 5.593614763s ago: executing program 2 (id=1039): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000740)='percpu_free_percpu\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3, 0x400000}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 3.568979275s ago: executing program 1 (id=1668): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x71, 0x1, 0x0, 0x0, 0x0, 0x3, 0x30400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xd}, 0x0, 0x400, 0x1, 0x6, 0x0, 0x2, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x2) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r1, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000240)={0x54, 0x0}, 0x8) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000940), 0x10000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d00)={r3, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000980)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a00)=[0x0], 0x0, 0x2d, &(0x7f0000000a40)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000a80), &(0x7f0000000ac0), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000b80)}}, 0x10) ioctl$TUNSETIFINDEX(r9, 0x400454da, &(0x7f0000000d40)=r10) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0xf, &(0x7f0000000280)=@raw=[@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x401}}, @call={0x85, 0x0, 0x0, 0x70}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}], &(0x7f0000000300)='GPL\x00', 0x16, 0x8b, &(0x7f0000000340)=""/139, 0x40f00, 0x5c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xe, 0x200, 0xb}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000480)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000004c0)=[{0x0, 0x5, 0xb, 0x9}, {0x3, 0x4, 0x8}, {0x1, 0x3, 0x1, 0x1}], 0x10, 0x8, @void, @value}, 0x94) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r13, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r14, &(0x7f0000000000)=ANY=[], 0xfdef) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d2943e6f5f828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r15, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)}, 0x20) r17 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)=@o_path={&(0x7f0000000700)='./file0\x00', 0x0, 0x4000, r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x15, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000003000000000000007f00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000186200000b000000000000001000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000000020000008500000084000000b70000007a2f00009500"/64], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x7d, &(0x7f0000000100)=""/125, 0x40e00, 0x8, '\x00', 0x0, @fallback, r7, 0x8, &(0x7f00000001c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x8, 0xf, 0x1}, 0x10, r8, r11, 0x1, &(0x7f0000000780)=[r12, r4, r14, r16, r17], &(0x7f0000000840)=[{0x5, 0x3, 0xc, 0x9}], 0x10, 0x4, @void, @value}, 0x94) 3.566056405s ago: executing program 4 (id=1670): bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r2, 0x4) sendmsg$inet(r1, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000000180)='\x00\x00\x00\x00\x00', 0x5}], 0x1}, 0x2404c014) 3.518163595s ago: executing program 4 (id=1671): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000007c0)=ANY=[@ANYBLOB="187f8c639b3734ab9dcda508e11b30e4e2f1ce53000000fb8606f62d0000000f0900ec17c96f46180020000753baefc4ae78c733e4770bf7d010ce5bc32b0b65194dc0dec7dd3e5867b9c1ed894525f6ef94952f4325cd6b106158ccb18a17df600e564862b8a3e4ba7fd2debddd8fa4ac93a807ef5b06c095bb9d31559f95607e77f802f7b897422b2418ae78a8", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000003000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000070000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='xprtrdma_marshal_failed\x00', r7, 0x0, 0xb31}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='btrfs_handle_em_exist\x00', r7}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r8, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='xen_cpu_write_ldt_entry\x00', r3, 0x0, 0x5}, 0x18) 3.390286517s ago: executing program 4 (id=1673): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000072000000850000000f00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, 0x0, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247931b3c139b7fa61e4af791a289f6f3f4e63a92f6a1f5") unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0a00000033dc01d100000000050000050000040000000a7c38d9b25ce9fb560ff4daa2d8e85d33b51f3b0b772d98d3d982b3687761afae39d680b2f92cc89a20bfe5c9ea497a651111d9ac15166e492ac4bf4291bac2c465f1afd8e10c771598262c29396b3ea835ff6df3acbc18ae1f7aa7fbef3b196f2533e12dd99774bc267800595c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465c4d40c9fc564e0bbfc7553358380b3a1f59916ffc9bf0bdf81524f07fb2819bf5774fedda52e39c90af27db5b56024df96b4673b4e8d5467e114604ea09b290a248a120c9c6e69f603ff0e80677eeba68562eb8ae2bcd87cef9000000a39c15a7ef365cc27dfeac7bb40e9048517354b0ca4f9cf8b59ee6fa003fe1f2c4c15f20a07db4583a462d8be6602186fd68ee14a19e9b5381791cbf0ceb42122b8635a66ce6b5b92356081bc0f18a0ca83dbc08c2daa235197f1496679a9813c1efa26001b3f486ebfaae85c4d0b96778478ae5355e6f923b1105696904fa93fa915ab8e1e0d7f31ebd19455e6827cd493907bf9d00"/382], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe1000087e9450077fbac141411ac141411be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 2.717795198s ago: executing program 1 (id=1678): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x2, 0x0, 0x0, 0x0, 0x0, 0x37a05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x500}, 0x1075, 0x4, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1c0000000000000}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x2000, r0}, 0x18) bpf$TOKEN_CREATE(0x24, &(0x7f0000000280)={0x0, r0}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000010c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000006000000040000000100000500000080ffffffff0500000054853be7ae14b5448188a26f005f2e305f"], &(0x7f0000001000)=""/139, 0x36, 0x8b, 0x1, 0x0, 0x0, @void, @value}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0500000004000000e47f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="050000000000040000dd601a9f56b8f598000000f5d4c798980d52dcf397d6007028641a3501800000c570a853ee428a3f68bc3464003440c760ebe000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001100)=ANY=[@ANYBLOB="18000000000000000000000000000000181100008a02f1567bffb01dcc797d8a9e95ff27d0550228733036f171b7e9b54cdfa7ea0037797b9698bdd23527f1da1e640a60c99c89bb6a5deec41c87de1c3cc11c9f52e836a3b21ffbb4264a6d88f7151be7a9234842a9718cac4b28554ebdfa129727323a578ac5a061468b5e00e2c71c05d8cb0f77e334b1f01b3863d7e466b11e2218e68a91654b19", @ANYRESOCT=r3], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x4, 0x4, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000080), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xde) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(r4, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 2.659437359s ago: executing program 3 (id=1679): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x10, 0x4, 0x0, 0x0, 0x3, 0x174c54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xc}, 0x4001, 0xc8, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x4840, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000180)=r7, 0x4) sendmsg$unix(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) 1.28688804s ago: executing program 1 (id=1680): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) close(0x3) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x17) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x800}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc, @void, @value, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x4, 0x0, 0x0, 0xd3, 0x0, 0x100, 0x11024, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x204001, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) 1.231341841s ago: executing program 3 (id=1683): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1200009bddc0c9212aa1e72fc1c1c59ee3c8c400", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r8 = bpf$ITER_CREATE(0xb, &(0x7f00000007c0)={r5}, 0x8) close(r8) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$LINK_DETACH(0x22, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 928.798905ms ago: executing program 3 (id=1685): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000007c0)=ANY=[@ANYBLOB="187f8c639b3734ab9dcda508e11b30e4e2f1ce53000000fb8606f62d0000000f0900ec17c96f46180020000753baefc4ae78c733e4770bf7d010ce5bc32b0b65194dc0dec7dd3e5867b9c1ed894525f6ef94952f4325cd6b106158ccb18a17df600e564862b8a3e4ba7fd2debddd8fa4ac93a807ef5b06c095bb9d31559f95607e77f802f7b897422b2418ae78a8", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000003000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000070000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='xprtrdma_marshal_failed\x00', r7, 0x0, 0xb31}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='btrfs_handle_em_exist\x00', r7}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r8, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='xen_cpu_write_ldt_entry\x00', r3, 0x0, 0x5}, 0x18) 923.085856ms ago: executing program 0 (id=1695): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000007c0)=ANY=[@ANYBLOB="187f8c639b3734ab9dcda508e11b30e4e2f1ce53000000fb8606f62d0000000f0900ec17c96f46180020000753baefc4ae78c733e4770bf7d010ce5bc32b0b65194dc0dec7dd3e5867b9c1ed894525f6ef94952f4325cd6b106158ccb18a17df600e564862b8a3e4ba7fd2debddd8fa4ac93a807ef5b06c095bb9d31559f95607e77f802f7b897422b2418ae78a8", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000003000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000070000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='xprtrdma_marshal_failed\x00', r5, 0x0, 0xb31}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='btrfs_handle_em_exist\x00', r5}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='xen_cpu_write_ldt_entry\x00', r1, 0x0, 0x5}, 0x18) 779.377718ms ago: executing program 3 (id=1686): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000030000000100000000000000000022c25636b60c304038e6e67ce94589dec231860f821775a755bf2e3b8045b30e901d19a65a1b33a4f4e5e1c976ae4d29830be621537ddef3fc2701d2e81bf47e20c229afda2720c133d148ec6d", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x10, 0x1, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 778.269598ms ago: executing program 0 (id=1697): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000007c0)=ANY=[@ANYBLOB="187f8c639b3734ab9dcda508e11b30e4e2f1ce53000000fb8606f62d0000000f0900ec17c96f46180020000753baefc4ae78c733e4770bf7d010ce5bc32b0b65194dc0dec7dd3e5867b9c1ed894525f6ef94952f4325cd6b106158ccb18a17df600e564862b8a3e4ba7fd2debddd8fa4ac93a807ef5b06c095bb9d31559f95607e77f802f7b897422b2418ae78a8", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000003000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000070000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='xprtrdma_marshal_failed\x00', r5, 0x0, 0xb31}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='btrfs_handle_em_exist\x00', r5}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='xen_cpu_write_ldt_entry\x00', r1, 0x0, 0x5}, 0x18) 529.423492ms ago: executing program 0 (id=1687): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, 0x0, &(0x7f0000001780)=""/4096, 0x800000000000000}, 0x20) 494.548402ms ago: executing program 0 (id=1688): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x17) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) syz_clone(0x400, 0x0, 0x20200, 0x0, 0x0, 0x0) 310.080855ms ago: executing program 0 (id=1689): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000f000000000000000000000000000000000000cb690000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1, &(0x7f0000000b80)=ANY=[@ANYRES32, @ANYBLOB="ffffffff7f0000010000000011000000000000000000000001000000000000000000000014000000000000000000000002000000ff0100000000000014000000000000000000000000000000ed00000000000000640000000000000000000000070000004454a8c3e000000100000f5c6000000100000007ac1e000100000fffac1e010100000000e000000200000772ffffffff0000000100000000000000b7ac1e00010ae08f50e000000200000005ac1e01010000000000000000110000000000000000000000010000005400000000000000140000000000000000000000010000004000df0000000000f6fb4c55a7791e58f9608bfba3393586c1949389a89dda7537dcc96fb398530e"], 0x118}, 0x20000004) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a1, &(0x7f0000000080)) 307.003505ms ago: executing program 3 (id=1690): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0x867b}, 0x14000, 0xc8, 0xfff, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r0}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x3, 0xc, &(0x7f0000000880)=ANY=[@ANYRESHEX=r1, @ANYRES32, @ANYRES64=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000180)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000b00000000000012030000000000d97d7f966388e69c6af21a9cf13b8e8f8a9ba48814f37b9ba2c1699d1dbac31cd749cc8dad8d9abe3cfa7a47f8f0a8a0412dc44d700bc790399b2009e8bf58daf7995413bbb0056117c937d29e9a8bb64dc7808f3fa7c5413acdd730073abc135649f8c1aecbd984fb47dc9851cc4057976c653b86827954296f22858a537b40232e74f55cc81f6d95cc361c6781ee4ba095260d970122a50d4d2c05c7e2e4eff328fb39db27ab2234e9ba45d14513e2c3bc96352ef0c00eb7f46873a43c"], &(0x7f0000000040)=""/249, 0x26, 0xf9, 0x4, 0x0, 0x0, @void, @value}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='workqueue_activate_work\x00', r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a40)={0x11, 0x1, &(0x7f0000001840)=@raw=[@alu={0x7, 0x0, 0x6, 0x5, 0x8, 0xffffffffffffffe0, 0xffffffffffffffff}], &(0x7f00000018c0)='syzkaller\x00', 0x6, 0x1e, &(0x7f0000001900)=""/159, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r7, 0x27, 0x22, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b08009f59d351f20c83a50ee033cf5f0759cfc67cb3a4", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r6, 0xffff0000, 0xf0, 0xe200, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff0b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x23, 0x5, 0x1000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 68.447309ms ago: executing program 0 (id=1691): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000007c0)=ANY=[@ANYBLOB="187f8c639b3734ab9dcda508e11b30e4e2f1ce53000000fb8606f62d0000000f0900ec17c96f46180020000753baefc4ae78c733e4770bf7d010ce5bc32b0b65194dc0dec7dd3e5867b9c1ed894525f6ef94952f4325cd6b106158ccb18a17df600e564862b8a3e4ba7fd2debddd8fa4ac93a807ef5b06c095bb9d31559f95607e77f802f7b897422b2418ae78a8", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000003000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000070000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r5, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='xprtrdma_marshal_failed\x00', r7, 0x0, 0xb31}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='btrfs_handle_em_exist\x00', r7}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r8, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='xen_cpu_write_ldt_entry\x00', r3, 0x0, 0x5}, 0x18) 45.727609ms ago: executing program 3 (id=1692): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffeca50000006d000000850000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x7}, 0xa100, 0xc8, 0x3, 0x0, 0x8001, 0x46, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa32"], 0xfdef) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b001c85e9669fa8a8b642731824ab5f00000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000010000000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES16=r6, @ANYRES8=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) 0s ago: executing program 2 (id=1039): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000740)='percpu_free_percpu\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3, 0x400000}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) kernel console output (not intermixed with test programs): 64_sys_call+0x4b9/0x9a0 [ 82.029570][ T2609] do_syscall_64+0x4c/0xa0 [ 82.034005][ T2609] ? clear_bhb_loop+0x50/0xa0 [ 82.038769][ T2609] ? clear_bhb_loop+0x50/0xa0 [ 82.043633][ T2609] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 82.051124][ T2609] RIP: 0033:0x7f817213b929 [ 82.055865][ T2609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.076415][ T2609] RSP: 002b:00007f81707a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 82.085238][ T2609] RAX: ffffffffffffffda RBX: 00007f8172362fa0 RCX: 00007f817213b929 [ 82.094780][ T2609] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 82.103500][ T2609] RBP: 00007f81707a4090 R08: 0000000000000000 R09: 0000000000000000 [ 82.111855][ T2609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.120518][ T2609] R13: 0000000000000000 R14: 00007f8172362fa0 R15: 00007ffe41831f68 [ 82.129295][ T2609] [ 82.135290][ T2615] FAULT_INJECTION: forcing a failure. [ 82.135290][ T2615] name failslab, interval 1, probability 0, space 0, times 0 [ 82.159025][ T2615] CPU: 1 PID: 2615 Comm: syz.1.897 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 82.170377][ T2615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 82.184655][ T2615] Call Trace: [ 82.189701][ T2615] [ 82.193309][ T2615] __dump_stack+0x21/0x30 [ 82.198380][ T2615] dump_stack_lvl+0xee/0x150 [ 82.203278][ T2615] ? show_regs_print_info+0x20/0x20 [ 82.209203][ T2615] dump_stack+0x15/0x20 [ 82.214938][ T2615] should_fail+0x3c1/0x510 [ 82.220282][ T2615] __should_failslab+0xa4/0xe0 [ 82.225420][ T2615] should_failslab+0x9/0x20 [ 82.230617][ T2615] slab_pre_alloc_hook+0x3b/0xe0 [ 82.236305][ T2615] __kmalloc+0x6d/0x2c0 [ 82.241480][ T2615] ? __vmalloc_node_range+0x2d9/0x840 [ 82.247581][ T2615] __vmalloc_node_range+0x2d9/0x840 [ 82.252900][ T2615] bpf_map_area_alloc+0xd5/0xe0 [ 82.258150][ T2615] ? htab_map_alloc+0xb29/0x14f0 [ 82.263111][ T2615] htab_map_alloc+0xb29/0x14f0 [ 82.268195][ T2615] map_create+0x455/0x21b0 [ 82.272994][ T2615] __sys_bpf+0x2cf/0x730 [ 82.277550][ T2615] ? bpf_link_show_fdinfo+0x310/0x310 [ 82.283105][ T2615] ? debug_smp_processor_id+0x17/0x20 [ 82.288699][ T2615] __x64_sys_bpf+0x7c/0x90 [ 82.293434][ T2615] x64_sys_call+0x4b9/0x9a0 [ 82.298050][ T2615] do_syscall_64+0x4c/0xa0 [ 82.303029][ T2615] ? clear_bhb_loop+0x50/0xa0 [ 82.307911][ T2615] ? clear_bhb_loop+0x50/0xa0 [ 82.313127][ T2615] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 82.319535][ T2615] RIP: 0033:0x7f26f0b52929 [ 82.324183][ T2615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.344756][ T2615] RSP: 002b:00007f26ef1bb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 82.353567][ T2615] RAX: ffffffffffffffda RBX: 00007f26f0d79fa0 RCX: 00007f26f0b52929 [ 82.362243][ T2615] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 82.370370][ T2615] RBP: 00007f26ef1bb090 R08: 0000000000000000 R09: 0000000000000000 [ 82.378743][ T2615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.386940][ T2615] R13: 0000000000000000 R14: 00007f26f0d79fa0 R15: 00007ffd87433748 [ 82.394935][ T2615] [ 82.564218][ T2637] device sit0 entered promiscuous mode [ 82.753127][ T30] audit: type=1400 audit(1750303376.370:124): avc: denied { create } for pid=2653 comm="syz.4.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 82.861202][ T2663] FAULT_INJECTION: forcing a failure. [ 82.861202][ T2663] name failslab, interval 1, probability 0, space 0, times 0 [ 82.962301][ T2663] CPU: 1 PID: 2663 Comm: syz.3.917 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 82.972268][ T2663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 82.983181][ T2663] Call Trace: [ 82.986503][ T2663] [ 82.989641][ T2663] __dump_stack+0x21/0x30 [ 82.993990][ T2663] dump_stack_lvl+0xee/0x150 [ 82.998773][ T2663] ? show_regs_print_info+0x20/0x20 [ 83.003987][ T2663] dump_stack+0x15/0x20 [ 83.008258][ T2663] should_fail+0x3c1/0x510 [ 83.012707][ T2663] __should_failslab+0xa4/0xe0 [ 83.017683][ T2663] should_failslab+0x9/0x20 [ 83.022384][ T2663] slab_pre_alloc_hook+0x3b/0xe0 [ 83.027425][ T2663] kmem_cache_alloc_trace+0x48/0x270 [ 83.032886][ T2663] ? nf_nat_masq_schedule+0x229/0x4c0 [ 83.038258][ T2663] nf_nat_masq_schedule+0x229/0x4c0 [ 83.043676][ T2663] ? __kasan_check_write+0x14/0x20 [ 83.048915][ T2663] ? nf_nat_masq_schedule+0x4c0/0x4c0 [ 83.054512][ T2663] ? masq_device_event+0xd0/0xd0 [ 83.059468][ T2663] ? nfqnl_rcv_dev_event+0x441/0x470 [ 83.064835][ T2663] ? __kasan_check_read+0x11/0x20 [ 83.070124][ T2663] masq_device_event+0x9b/0xd0 [ 83.074889][ T2663] raw_notifier_call_chain+0x90/0x100 [ 83.080279][ T2663] dev_close_many+0x32d/0x4d0 [ 83.085037][ T2663] ? __dev_open+0x4c0/0x4c0 [ 83.089970][ T2663] ? __kasan_check_read+0x11/0x20 [ 83.095261][ T2663] unregister_netdevice_many+0x44c/0x1990 [ 83.101097][ T2663] ? kmem_cache_free+0x100/0x320 [ 83.106586][ T2663] ? ____kasan_slab_free+0x130/0x160 [ 83.112001][ T2663] ? __kasan_check_write+0x14/0x20 [ 83.117602][ T2663] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 83.123059][ T2663] ? alloc_netdev_mqs+0xc90/0xc90 [ 83.128092][ T2663] ? queue_delayed_work_on+0x101/0x150 [ 83.133543][ T2663] ? __kasan_check_read+0x11/0x20 [ 83.138576][ T2663] unregister_netdevice_queue+0x31c/0x360 [ 83.144411][ T2663] ? __kasan_check_read+0x11/0x20 [ 83.149540][ T2663] ? list_netdevice+0x4c0/0x4c0 [ 83.154577][ T2663] ? linkwatch_fire_event+0x307/0x380 [ 83.159964][ T2663] __tun_detach+0xca6/0x1450 [ 83.164584][ T2663] tun_chr_close+0x92/0x140 [ 83.169104][ T2663] ? tun_chr_open+0x540/0x540 [ 83.173787][ T2663] __fput+0x20b/0x8b0 [ 83.177965][ T2663] ____fput+0x15/0x20 [ 83.182394][ T2663] task_work_run+0x127/0x190 [ 83.187186][ T2663] exit_to_user_mode_loop+0xd0/0xe0 [ 83.192491][ T2663] exit_to_user_mode_prepare+0x5a/0xa0 [ 83.198126][ T2663] syscall_exit_to_user_mode+0x1a/0x30 [ 83.203693][ T2663] do_syscall_64+0x58/0xa0 [ 83.208404][ T2663] ? clear_bhb_loop+0x50/0xa0 [ 83.213108][ T2663] ? clear_bhb_loop+0x50/0xa0 [ 83.218018][ T2663] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 83.224201][ T2663] RIP: 0033:0x7f525481f929 [ 83.228709][ T2663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.249739][ T2663] RSP: 002b:00007f5252e88038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 83.258177][ T2663] RAX: 0000000000000000 RBX: 00007f5254a46fa0 RCX: 00007f525481f929 [ 83.266155][ T2663] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 83.274210][ T2663] RBP: 00007f5252e88090 R08: 0000000000000000 R09: 0000000000000000 [ 83.282374][ T2663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.290493][ T2663] R13: 0000000000000000 R14: 00007f5254a46fa0 R15: 00007ffdf13f43d8 [ 83.299201][ T2663] [ 83.776523][ T2725] device syzkaller0 entered promiscuous mode [ 83.818467][ T2725] device sit0 entered promiscuous mode [ 83.921576][ T30] audit: type=1400 audit(1750303377.530:125): avc: denied { create } for pid=2737 comm="syz.4.949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 84.351362][ T30] audit: type=1400 audit(1750303377.960:126): avc: denied { create } for pid=2751 comm="syz.1.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 84.659666][ T2777] ref_ctr_offset mismatch. inode: 0x3ac offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 85.399766][ T30] audit: type=1400 audit(1750303379.010:127): avc: denied { create } for pid=2828 comm="syz.0.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 85.627119][ T2849] FAULT_INJECTION: forcing a failure. [ 85.627119][ T2849] name failslab, interval 1, probability 0, space 0, times 0 [ 85.639837][ T2849] CPU: 1 PID: 2849 Comm: syz.4.999 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 85.649682][ T2849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 85.659969][ T2849] Call Trace: [ 85.663373][ T2849] [ 85.666423][ T2849] __dump_stack+0x21/0x30 [ 85.670787][ T2849] dump_stack_lvl+0xee/0x150 [ 85.675502][ T2849] ? show_regs_print_info+0x20/0x20 [ 85.680744][ T2849] ? __kernel_text_address+0xa0/0x100 [ 85.686427][ T2849] dump_stack+0x15/0x20 [ 85.690800][ T2849] should_fail+0x3c1/0x510 [ 85.695259][ T2849] __should_failslab+0xa4/0xe0 [ 85.700064][ T2849] should_failslab+0x9/0x20 [ 85.705226][ T2849] slab_pre_alloc_hook+0x3b/0xe0 [ 85.710399][ T2849] ? dst_alloc+0x15c/0x1d0 [ 85.715494][ T2849] kmem_cache_alloc+0x44/0x260 [ 85.720416][ T2849] dst_alloc+0x15c/0x1d0 [ 85.724708][ T2849] ip_route_output_key_hash_rcu+0x11db/0x2060 [ 85.731112][ T2849] ip_route_output_flow+0x123/0x2d0 [ 85.736534][ T2849] ? ipv4_sk_update_pmtu+0x1320/0x1320 [ 85.742290][ T2849] ip_tunnel_xmit+0x6c0/0x21c0 [ 85.747223][ T2849] ? ip_tunnel_xmit+0x70/0x21c0 [ 85.752239][ T2849] ? unwind_get_return_address+0x4d/0x90 [ 85.757910][ T2849] ? ip4_dst_hoplimit+0x110/0x110 [ 85.763039][ T2849] ? skb_network_protocol+0x501/0x740 [ 85.768559][ T2849] ? gre_build_header+0x229/0x850 [ 85.773612][ T2849] ipgre_xmit+0x7c0/0xb30 [ 85.778043][ T2849] dev_hard_start_xmit+0x244/0x670 [ 85.783159][ T2849] __dev_queue_xmit+0x17bd/0x2d80 [ 85.788196][ T2849] ? dev_queue_xmit+0x20/0x20 [ 85.792926][ T2849] ? __kasan_check_write+0x14/0x20 [ 85.798124][ T2849] ? skb_release_data+0x1c6/0xa10 [ 85.803254][ T2849] ? __kasan_check_write+0x14/0x20 [ 85.808377][ T2849] ? pskb_expand_head+0xbe6/0x11d0 [ 85.813532][ T2849] dev_queue_xmit+0x17/0x20 [ 85.818032][ T2849] __bpf_redirect+0x68a/0xe60 [ 85.822717][ T2849] bpf_clone_redirect+0x242/0x380 [ 85.827758][ T2849] bpf_prog_973cd02a7a0e8181+0x56/0x158 [ 85.833446][ T2849] ? __kasan_slab_alloc+0xcf/0xf0 [ 85.838654][ T2849] ? __kasan_slab_alloc+0xbd/0xf0 [ 85.844222][ T2849] ? slab_post_alloc_hook+0x4f/0x2b0 [ 85.849931][ T2849] ? kmem_cache_alloc+0xf7/0x260 [ 85.855034][ T2849] ? __build_skb+0x2d/0x310 [ 85.859757][ T2849] ? build_skb+0x24/0x200 [ 85.864172][ T2849] ? bpf_prog_test_run_skb+0x279/0x1150 [ 85.870421][ T2849] ? bpf_prog_test_run+0x3d5/0x620 [ 85.875568][ T2849] ? __sys_bpf+0x52c/0x730 [ 85.880031][ T2849] ? __x64_sys_bpf+0x7c/0x90 [ 85.884648][ T2849] ? x64_sys_call+0x4b9/0x9a0 [ 85.889411][ T2849] ? do_syscall_64+0x4c/0xa0 [ 85.893996][ T2849] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 85.900071][ T2849] ? ktime_get+0x12f/0x160 [ 85.904498][ T2849] bpf_test_run+0x33d/0x8d0 [ 85.909187][ T2849] ? convert___skb_to_skb+0x4f0/0x4f0 [ 85.914910][ T2849] ? eth_get_headlen+0x1f0/0x1f0 [ 85.920039][ T2849] ? convert___skb_to_skb+0x41/0x4f0 [ 85.925361][ T2849] bpf_prog_test_run_skb+0x9ec/0x1150 [ 85.930888][ T2849] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 85.936818][ T2849] bpf_prog_test_run+0x3d5/0x620 [ 85.941772][ T2849] ? bpf_prog_query+0x230/0x230 [ 85.946663][ T2849] ? selinux_bpf+0xce/0xf0 [ 85.951233][ T2849] ? security_bpf+0x82/0xa0 [ 85.955775][ T2849] __sys_bpf+0x52c/0x730 [ 85.960394][ T2849] ? bpf_link_show_fdinfo+0x310/0x310 [ 85.965798][ T2849] ? debug_smp_processor_id+0x17/0x20 [ 85.971191][ T2849] __x64_sys_bpf+0x7c/0x90 [ 85.975635][ T2849] x64_sys_call+0x4b9/0x9a0 [ 85.980170][ T2849] do_syscall_64+0x4c/0xa0 [ 85.984602][ T2849] ? clear_bhb_loop+0x50/0xa0 [ 85.989555][ T2849] ? clear_bhb_loop+0x50/0xa0 [ 85.994359][ T2849] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 86.000387][ T2849] RIP: 0033:0x7f817213b929 [ 86.004987][ T2849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.025947][ T2849] RSP: 002b:00007f81707a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 86.034391][ T2849] RAX: ffffffffffffffda RBX: 00007f8172362fa0 RCX: 00007f817213b929 [ 86.042857][ T2849] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 86.051307][ T2849] RBP: 00007f81707a4090 R08: 0000000000000000 R09: 0000000000000000 [ 86.059936][ T2849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.068098][ T2849] R13: 0000000000000000 R14: 00007f8172362fa0 R15: 00007ffe41831f68 [ 86.076180][ T2849] [ 86.552844][ T2868] device wg2 entered promiscuous mode [ 87.097074][ T2911] device pim6reg1 entered promiscuous mode [ 88.253414][ T2846] syz.0.997 (2846) used greatest stack depth: 22112 bytes left [ 88.503081][ T285] syz-executor (285) used greatest stack depth: 21760 bytes left [ 88.656391][ T2959] device sit0 entered promiscuous mode [ 89.321805][ T2969] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.371132][ T2969] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.402840][ T2969] device bridge_slave_0 entered promiscuous mode [ 89.411395][ T2969] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.419550][ T2969] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.427279][ T2969] device bridge_slave_1 entered promiscuous mode [ 89.510138][ T2988] FAULT_INJECTION: forcing a failure. [ 89.510138][ T2988] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 89.552253][ T2988] CPU: 1 PID: 2988 Comm: syz.3.1049 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 89.562500][ T2988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 89.572727][ T2988] Call Trace: [ 89.576019][ T2988] [ 89.579006][ T2988] __dump_stack+0x21/0x30 [ 89.583443][ T2988] dump_stack_lvl+0xee/0x150 [ 89.588136][ T2988] ? show_regs_print_info+0x20/0x20 [ 89.593629][ T2988] dump_stack+0x15/0x20 [ 89.597932][ T2988] should_fail+0x3c1/0x510 [ 89.602368][ T2988] should_fail_usercopy+0x1a/0x20 [ 89.607499][ T2988] _copy_from_user+0x20/0xd0 [ 89.612094][ T2988] copy_from_bpfptr+0x6d/0x90 [ 89.616781][ T2988] bpf_prog_load+0xb1b/0x1550 [ 89.621483][ T2988] ? __kasan_check_write+0x14/0x20 [ 89.626642][ T2988] ? map_freeze+0x360/0x360 [ 89.631435][ T2988] ? selinux_bpf+0xc7/0xf0 [ 89.635881][ T2988] ? security_bpf+0x82/0xa0 [ 89.640395][ T2988] __sys_bpf+0x4c3/0x730 [ 89.644735][ T2988] ? bpf_link_show_fdinfo+0x310/0x310 [ 89.650462][ T2988] ? debug_smp_processor_id+0x17/0x20 [ 89.656369][ T2988] __x64_sys_bpf+0x7c/0x90 [ 89.661248][ T2988] x64_sys_call+0x4b9/0x9a0 [ 89.665764][ T2988] do_syscall_64+0x4c/0xa0 [ 89.670393][ T2988] ? clear_bhb_loop+0x50/0xa0 [ 89.675488][ T2988] ? clear_bhb_loop+0x50/0xa0 [ 89.680318][ T2988] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 89.686307][ T2988] RIP: 0033:0x7f525481f929 [ 89.691052][ T2988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.710949][ T2988] RSP: 002b:00007f5252e88038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 89.719470][ T2988] RAX: ffffffffffffffda RBX: 00007f5254a46fa0 RCX: 00007f525481f929 [ 89.727998][ T2988] RDX: 0000000000000080 RSI: 0000200000000140 RDI: 0000000000000005 [ 89.736176][ T2988] RBP: 00007f5252e88090 R08: 0000000000000000 R09: 0000000000000000 [ 89.744211][ T2988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.752360][ T2988] R13: 0000000000000001 R14: 00007f5254a46fa0 R15: 00007ffdf13f43d8 [ 89.760436][ T2988] [ 90.105734][ T30] audit: type=1400 audit(1750303383.720:128): avc: denied { create } for pid=2969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 90.134005][ T30] audit: type=1400 audit(1750303383.720:129): avc: denied { write } for pid=2969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 90.158292][ T30] audit: type=1400 audit(1750303383.720:130): avc: denied { read } for pid=2969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 90.196703][ T2969] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.204024][ T2969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.211424][ T2969] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.218584][ T2969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.257316][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.287736][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.449944][ T2969] device veth0_vlan entered promiscuous mode [ 90.499036][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.516901][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.581105][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.630289][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.676343][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.683719][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.695300][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.703783][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.711974][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.719158][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.728312][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.736845][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.745075][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.753365][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.763544][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 90.771997][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.780879][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.789148][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.806905][ T2969] device veth1_macvtap entered promiscuous mode [ 90.860000][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.871561][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.880794][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 90.902873][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 90.911712][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 91.188783][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 91.197584][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 91.206223][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 91.215084][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 91.382260][ T2969] syz-executor (2969) used greatest stack depth: 21696 bytes left [ 91.533422][ T628] device veth1_macvtap left promiscuous mode [ 91.539582][ T628] device veth0_vlan left promiscuous mode [ 92.019651][ T3047] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.027084][ T3047] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.034923][ T3047] device bridge_slave_0 entered promiscuous mode [ 92.067800][ T3047] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.075022][ T3047] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.102778][ T3047] device bridge_slave_1 entered promiscuous mode [ 92.397764][ T3080] device syzkaller0 entered promiscuous mode [ 92.475319][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.483159][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.511363][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.520456][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.529704][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.536894][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.546012][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.555018][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.564324][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.571506][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.579284][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.587765][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.623993][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.679557][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 92.733525][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.755272][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.763419][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.773707][ T3047] device veth0_vlan entered promiscuous mode [ 92.809892][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 92.820086][ T3047] device veth1_macvtap entered promiscuous mode [ 92.832083][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.875218][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.888986][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 93.380004][ T3126] FAULT_INJECTION: forcing a failure. [ 93.380004][ T3126] name failslab, interval 1, probability 0, space 0, times 0 [ 93.398544][ T3126] CPU: 1 PID: 3126 Comm: syz.1.1100 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 93.408474][ T3126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 93.418757][ T3126] Call Trace: [ 93.422151][ T3126] [ 93.425103][ T3126] __dump_stack+0x21/0x30 [ 93.429551][ T3126] dump_stack_lvl+0xee/0x150 [ 93.434247][ T3126] ? show_regs_print_info+0x20/0x20 [ 93.439480][ T3126] dump_stack+0x15/0x20 [ 93.443830][ T3126] should_fail+0x3c1/0x510 [ 93.448547][ T3126] __should_failslab+0xa4/0xe0 [ 93.453419][ T3126] should_failslab+0x9/0x20 [ 93.457968][ T3126] slab_pre_alloc_hook+0x3b/0xe0 [ 93.462939][ T3126] ? __d_alloc+0x2d/0x6a0 [ 93.467369][ T3126] kmem_cache_alloc+0x44/0x260 [ 93.472144][ T3126] __d_alloc+0x2d/0x6a0 [ 93.476328][ T3126] ? tipc_node_get_mtu+0x2b0/0x2b0 [ 93.481526][ T3126] d_alloc_pseudo+0x1d/0x70 [ 93.486221][ T3126] alloc_file_pseudo+0xc8/0x1f0 [ 93.491077][ T3126] ? alloc_empty_file_noaccount+0x80/0x80 [ 93.496805][ T3126] ? tipc_sk_finish_conn+0x571/0x7d0 [ 93.502107][ T3126] sock_alloc_file+0xba/0x260 [ 93.506886][ T3126] __sys_socketpair+0x2c3/0x590 [ 93.511764][ T3126] __x64_sys_socketpair+0x9b/0xb0 [ 93.516801][ T3126] x64_sys_call+0x36/0x9a0 [ 93.521416][ T3126] do_syscall_64+0x4c/0xa0 [ 93.525839][ T3126] ? clear_bhb_loop+0x50/0xa0 [ 93.530524][ T3126] ? clear_bhb_loop+0x50/0xa0 [ 93.535383][ T3126] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 93.541289][ T3126] RIP: 0033:0x7f26f0b52929 [ 93.545800][ T3126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.565509][ T3126] RSP: 002b:00007f26ef1bb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 93.573951][ T3126] RAX: ffffffffffffffda RBX: 00007f26f0d79fa0 RCX: 00007f26f0b52929 [ 93.581978][ T3126] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 93.590003][ T3126] RBP: 00007f26ef1bb090 R08: 0000000000000000 R09: 0000000000000000 [ 93.597998][ T3126] R10: 0000200000000240 R11: 0000000000000246 R12: 0000000000000001 [ 93.605977][ T3126] R13: 0000000000000000 R14: 00007f26f0d79fa0 R15: 00007ffd87433748 [ 93.613965][ T3126] [ 93.826286][ T628] device bridge_slave_1 left promiscuous mode [ 93.874008][ T628] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.071179][ T628] device bridge_slave_0 left promiscuous mode [ 94.094165][ T628] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.158316][ T628] device veth1_macvtap left promiscuous mode [ 94.173480][ T628] device veth0_vlan left promiscuous mode [ 94.314879][ T3117] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.322415][ T3117] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.330371][ T3117] device bridge_slave_0 entered promiscuous mode [ 94.342882][ T3117] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.352032][ T3117] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.421821][ T3117] device bridge_slave_1 entered promiscuous mode [ 94.618613][ T3169] device pim6reg1 entered promiscuous mode [ 94.824861][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.862607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.881796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.891209][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.899652][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.906740][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.926068][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 94.938825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.011584][ T30] audit: type=1400 audit(1750303388.620:131): avc: denied { create } for pid=3188 comm="syz.4.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 95.035448][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.116158][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.123379][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.149385][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.160791][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.213851][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 95.293310][ T3117] device veth0_vlan entered promiscuous mode [ 95.302856][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.318290][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.339459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.368153][ T3117] device veth1_macvtap entered promiscuous mode [ 95.377621][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 95.457778][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 95.469808][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 95.582058][ T3117] syz-executor (3117) used greatest stack depth: 21408 bytes left [ 95.853146][ T628] device bridge_slave_1 left promiscuous mode [ 95.859615][ T628] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.869389][ T628] device bridge_slave_0 left promiscuous mode [ 95.876563][ T628] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.885171][ T628] device veth1_macvtap left promiscuous mode [ 95.891527][ T628] device veth0_vlan left promiscuous mode [ 96.469483][ T3236] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.480562][ T3236] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.496830][ T3236] device bridge_slave_0 entered promiscuous mode [ 96.505504][ T3236] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.513204][ T3236] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.521393][ T3236] device bridge_slave_1 entered promiscuous mode [ 96.559009][ T3258] device bridge_slave_0 entered promiscuous mode [ 96.574650][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.841966][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.850133][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.895215][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.908382][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.918454][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.925642][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.934101][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.950265][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.959508][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.966626][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.975707][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.016242][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.025020][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.058175][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.073190][ T3236] device veth0_vlan entered promiscuous mode [ 97.120820][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.155420][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.216335][ T3236] device veth1_macvtap entered promiscuous mode [ 97.236716][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.251230][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.307667][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.338581][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.540444][ T628] device bridge_slave_1 left promiscuous mode [ 97.559517][ T628] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.570629][ T628] device bridge_slave_0 left promiscuous mode [ 97.577266][ T628] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.586126][ T628] device veth1_macvtap left promiscuous mode [ 97.592478][ T628] device veth0_vlan left promiscuous mode [ 97.873433][ T3236] syz-executor (3236) used greatest stack depth: 21088 bytes left [ 98.662243][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.687524][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.704646][ T3322] device bridge_slave_0 entered promiscuous mode [ 98.763377][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.822372][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.863746][ T3322] device bridge_slave_1 entered promiscuous mode [ 99.513338][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 99.521014][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.701181][ T628] device bridge_slave_1 left promiscuous mode [ 99.707745][ T628] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.715626][ T628] device bridge_slave_0 left promiscuous mode [ 99.722306][ T628] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.730241][ T628] device veth1_macvtap left promiscuous mode [ 99.736845][ T628] device veth0_vlan left promiscuous mode [ 99.884596][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 99.893664][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.902239][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.909303][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.917203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 99.926133][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.934446][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.941627][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.949452][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.080473][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.093231][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.112629][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.123310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.229239][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.241151][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.268700][ T3322] device veth0_vlan entered promiscuous mode [ 100.285212][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.293744][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.325148][ T3322] device veth1_macvtap entered promiscuous mode [ 100.393195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.401572][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.422565][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.430859][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.440426][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.475620][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.484654][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.493598][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.502396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 100.622863][ T3322] syz-executor (3322) used greatest stack depth: 20928 bytes left [ 101.564213][ T8] device bridge_slave_1 left promiscuous mode [ 101.570385][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.618730][ T8] device bridge_slave_0 left promiscuous mode [ 101.647518][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.685637][ T8] device veth1_macvtap left promiscuous mode [ 101.712862][ T8] device veth0_vlan left promiscuous mode [ 102.051567][ T3384] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.060705][ T3384] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.068702][ T3384] device bridge_slave_0 entered promiscuous mode [ 102.145912][ T3384] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.153120][ T3384] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.160716][ T3384] device bridge_slave_1 entered promiscuous mode [ 102.584369][ T3384] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.591468][ T3384] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.598964][ T3384] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.606018][ T3384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.678636][ T628] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.740183][ T628] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.758061][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.772631][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.844024][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.877183][ T628] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.884314][ T628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.893997][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.902430][ T628] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.909511][ T628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.955330][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.011480][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.061316][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 103.072986][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 103.123202][ T3384] device veth0_vlan entered promiscuous mode [ 103.132638][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 103.147680][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.260827][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.292509][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.313428][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 103.322058][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 103.424568][ T3384] device veth1_macvtap entered promiscuous mode [ 103.435090][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 103.443248][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 103.451513][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 103.521668][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 103.533753][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.944297][ T8] device bridge_slave_1 left promiscuous mode [ 104.950609][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.986224][ T8] device bridge_slave_0 left promiscuous mode [ 105.021916][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.067202][ T8] device veth1_macvtap left promiscuous mode [ 105.092205][ T8] device veth0_vlan left promiscuous mode [ 105.416695][ T3465] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.432209][ T3465] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.459097][ T3465] device bridge_slave_0 entered promiscuous mode [ 105.550059][ T3465] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.561896][ T3465] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.577755][ T3465] device bridge_slave_1 entered promiscuous mode [ 106.027882][ T3495] FAULT_INJECTION: forcing a failure. [ 106.027882][ T3495] name failslab, interval 1, probability 0, space 0, times 0 [ 106.051292][ T3495] CPU: 0 PID: 3495 Comm: syz.3.1235 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 106.061429][ T3495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 106.071685][ T3495] Call Trace: [ 106.075003][ T3495] [ 106.078034][ T3495] __dump_stack+0x21/0x30 [ 106.082509][ T3495] dump_stack_lvl+0xee/0x150 [ 106.087146][ T3495] ? show_regs_print_info+0x20/0x20 [ 106.092631][ T3495] ? dump_stack+0x9/0x20 [ 106.096909][ T3495] dump_stack+0x15/0x20 [ 106.101074][ T3495] should_fail+0x3c1/0x510 [ 106.105608][ T3495] __should_failslab+0xa4/0xe0 [ 106.110444][ T3495] should_failslab+0x9/0x20 [ 106.114988][ T3495] slab_pre_alloc_hook+0x3b/0xe0 [ 106.119981][ T3495] __kmalloc+0x6d/0x2c0 [ 106.124169][ T3495] ? kvmalloc_node+0x242/0x330 [ 106.129063][ T3495] kvmalloc_node+0x242/0x330 [ 106.133814][ T3495] ? vm_mmap+0xb0/0xb0 [ 106.138354][ T3495] btf_parse_type_sec+0x1b0/0x1b70 [ 106.143595][ T3495] ? btf_verifier_log+0x2a0/0x2a0 [ 106.148656][ T3495] ? btf_parse_hdr+0x60e/0x7f0 [ 106.153437][ T3495] btf_new_fd+0x4c5/0x920 [ 106.157806][ T3495] bpf_btf_load+0x6f/0x90 [ 106.162252][ T3495] __sys_bpf+0x515/0x730 [ 106.166606][ T3495] ? bpf_link_show_fdinfo+0x310/0x310 [ 106.169625][ T3465] device veth0_vlan entered promiscuous mode [ 106.172000][ T3495] __x64_sys_bpf+0x7c/0x90 [ 106.182386][ T3495] x64_sys_call+0x4b9/0x9a0 [ 106.186904][ T3495] do_syscall_64+0x4c/0xa0 [ 106.191341][ T3495] ? clear_bhb_loop+0x50/0xa0 [ 106.196056][ T3495] ? clear_bhb_loop+0x50/0xa0 [ 106.200762][ T3495] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 106.203921][ T3465] device veth1_macvtap entered promiscuous mode [ 106.206956][ T3495] RIP: 0033:0x7f525481f929 [ 106.217633][ T3495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 106.237777][ T3495] RSP: 002b:00007f5252e88038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 106.246326][ T3495] RAX: ffffffffffffffda RBX: 00007f5254a46fa0 RCX: 00007f525481f929 [ 106.254423][ T3495] RDX: 0000000000000020 RSI: 0000200000000380 RDI: 0000000000000012 [ 106.262668][ T3495] RBP: 00007f5252e88090 R08: 0000000000000000 R09: 0000000000000000 [ 106.270919][ T3495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.278890][ T3495] R13: 0000000000000000 R14: 00007f5254a46fa0 R15: 00007ffdf13f43d8 [ 106.286988][ T3495] [ 106.297735][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 106.312109][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 106.326414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.335162][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.343830][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 106.362735][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.370969][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.379142][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.389250][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 106.399684][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.407507][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.416275][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.425172][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.434041][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.441191][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.449197][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.458094][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.466870][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.474025][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.516552][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.381867][ T8] device bridge_slave_1 left promiscuous mode [ 107.388174][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.396027][ T8] device bridge_slave_0 left promiscuous mode [ 107.402460][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.412885][ T8] device veth1_macvtap left promiscuous mode [ 107.418911][ T8] device veth0_vlan left promiscuous mode [ 107.498072][ T3514] FAULT_INJECTION: forcing a failure. [ 107.498072][ T3514] name failslab, interval 1, probability 0, space 0, times 0 [ 107.510735][ T3514] CPU: 0 PID: 3514 Comm: syz.0.1242 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 107.520718][ T3514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 107.530788][ T3514] Call Trace: [ 107.534079][ T3514] [ 107.537029][ T3514] __dump_stack+0x21/0x30 [ 107.541350][ T3514] dump_stack_lvl+0xee/0x150 [ 107.545946][ T3514] ? show_regs_print_info+0x20/0x20 [ 107.551129][ T3514] dump_stack+0x15/0x20 [ 107.555293][ T3514] should_fail+0x3c1/0x510 [ 107.559695][ T3514] ? inet6_rt_notify+0x287/0x470 [ 107.564620][ T3514] __should_failslab+0xa4/0xe0 [ 107.569716][ T3514] should_failslab+0x9/0x20 [ 107.574206][ T3514] slab_pre_alloc_hook+0x3b/0xe0 [ 107.579137][ T3514] ? inet6_rt_notify+0x287/0x470 [ 107.584164][ T3514] ? inet6_rt_notify+0x287/0x470 [ 107.589105][ T3514] __kmalloc_track_caller+0x6c/0x2c0 [ 107.594477][ T3514] ? inet6_rt_notify+0x287/0x470 [ 107.599420][ T3514] ? inet6_rt_notify+0x287/0x470 [ 107.604360][ T3514] __alloc_skb+0x21a/0x740 [ 107.608779][ T3514] inet6_rt_notify+0x287/0x470 [ 107.613542][ T3514] ? rt6_nh_dump_exceptions+0x690/0x690 [ 107.619088][ T3514] ? call_fib_notifiers+0xa0/0xc0 [ 107.624112][ T3514] fib6_del+0xbf9/0xf60 [ 107.628280][ T3514] ? fib6_locate+0x550/0x550 [ 107.632957][ T3514] ? update_load_avg+0x410/0x1110 [ 107.638415][ T3514] ? fib6_ifdown+0x2eb/0x4e0 [ 107.643006][ T3514] fib6_clean_node+0x296/0x520 [ 107.647761][ T3514] ? node_free_rcu+0x30/0x30 [ 107.652346][ T3514] fib6_walk_continue+0x4fc/0x700 [ 107.657373][ T3514] fib6_walk+0x153/0x290 [ 107.661605][ T3514] fib6_clean_all+0x16a/0x230 [ 107.666274][ T3514] ? tracing_record_taskinfo+0x7c/0x220 [ 107.671827][ T3514] ? rt6_sync_down_dev+0x130/0x130 [ 107.676935][ T3514] ? fib6_del+0xf60/0xf60 [ 107.681263][ T3514] ? node_free_rcu+0x30/0x30 [ 107.685890][ T3514] ? rt6_sync_down_dev+0x130/0x130 [ 107.691019][ T3514] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 107.696838][ T3514] ? try_to_wake_up+0x611/0x1160 [ 107.701772][ T3514] rt6_disable_ip+0x119/0x700 [ 107.706453][ T3514] ? wake_up_process+0x10/0x20 [ 107.711222][ T3514] ? insert_work+0x287/0x310 [ 107.715840][ T3514] ? __queue_work+0x913/0xc60 [ 107.720966][ T3514] ? fib6_ifdown+0x4e0/0x4e0 [ 107.725577][ T3514] ? __kasan_check_read+0x11/0x20 [ 107.730704][ T3514] addrconf_ifdown+0x144/0x1880 [ 107.735562][ T3514] ? nf_nat_masq_schedule+0x229/0x4c0 [ 107.741023][ T3514] ? addrconf_cleanup+0x1c0/0x1c0 [ 107.746040][ T3514] ? __kasan_check_write+0x14/0x20 [ 107.751145][ T3514] ? mutex_unlock+0x89/0x220 [ 107.755920][ T3514] ? __mutex_lock_slowpath+0x10/0x10 [ 107.761228][ T3514] ? nf_nat_masq_schedule+0x4c0/0x4c0 [ 107.766612][ T3514] ? masq_device_event+0xd0/0xd0 [ 107.771567][ T3514] addrconf_notify+0x3bd/0xde0 [ 107.776361][ T3514] raw_notifier_call_chain+0x90/0x100 [ 107.781736][ T3514] __dev_notify_flags+0x28f/0x500 [ 107.786845][ T3514] ? __kasan_check_read+0x11/0x20 [ 107.791896][ T3514] ? __dev_change_flags+0x6a0/0x6a0 [ 107.797093][ T3514] ? __dev_change_flags+0x4bb/0x6a0 [ 107.802379][ T3514] ? dev_get_flags+0x1e0/0x1e0 [ 107.807148][ T3514] ? __kasan_slab_free+0x11/0x20 [ 107.812085][ T3514] dev_change_flags+0xe8/0x1a0 [ 107.816938][ T3514] dev_ifsioc+0x147/0xe70 [ 107.821384][ T3514] ? dev_ioctl+0xd10/0xd10 [ 107.825793][ T3514] ? __mutex_lock_slowpath+0xe/0x10 [ 107.830985][ T3514] ? mutex_lock+0x100/0x1a0 [ 107.835485][ T3514] ? wait_for_completion_killable_timeout+0x10/0x10 [ 107.842070][ T3514] ? dev_get_by_name_rcu+0xc8/0xf0 [ 107.847176][ T3514] dev_ioctl+0x560/0xd10 [ 107.851443][ T3514] sock_do_ioctl+0x22e/0x300 [ 107.856315][ T3514] ? sock_show_fdinfo+0xa0/0xa0 [ 107.861180][ T3514] ? selinux_file_ioctl+0x377/0x480 [ 107.866388][ T3514] sock_ioctl+0x4bc/0x6b0 [ 107.870910][ T3514] ? sock_poll+0x3d0/0x3d0 [ 107.875333][ T3514] ? __fget_files+0x2c4/0x320 [ 107.880012][ T3514] ? security_file_ioctl+0x84/0xa0 [ 107.885124][ T3514] ? sock_poll+0x3d0/0x3d0 [ 107.889536][ T3514] __se_sys_ioctl+0x121/0x1a0 [ 107.894396][ T3514] __x64_sys_ioctl+0x7b/0x90 [ 107.898986][ T3514] x64_sys_call+0x2f/0x9a0 [ 107.903406][ T3514] do_syscall_64+0x4c/0xa0 [ 107.907813][ T3514] ? clear_bhb_loop+0x50/0xa0 [ 107.912574][ T3514] ? clear_bhb_loop+0x50/0xa0 [ 107.917248][ T3514] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 107.923134][ T3514] RIP: 0033:0x7ff1a2472929 [ 107.927546][ T3514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.947585][ T3514] RSP: 002b:00007ff1a0adb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 107.955999][ T3514] RAX: ffffffffffffffda RBX: 00007ff1a2699fa0 RCX: 00007ff1a2472929 [ 107.963968][ T3514] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000004 [ 107.971934][ T3514] RBP: 00007ff1a0adb090 R08: 0000000000000000 R09: 0000000000000000 [ 107.979985][ T3514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.987955][ T3514] R13: 0000000000000000 R14: 00007ff1a2699fa0 R15: 00007ffdaf78bb78 [ 107.995931][ T3514] [ 108.008175][ T3523] device sit0 left promiscuous mode [ 108.096273][ T3525] device sit0 entered promiscuous mode [ 108.602244][ T3524] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.609521][ T3524] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.620364][ T3524] device bridge_slave_0 entered promiscuous mode [ 108.680849][ T3524] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.688158][ T3524] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.696396][ T3524] device bridge_slave_1 entered promiscuous mode [ 108.855384][ T3524] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.862506][ T3524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.869833][ T3524] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.877017][ T3524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.920918][ T3568] FAULT_INJECTION: forcing a failure. [ 108.920918][ T3568] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 108.940962][ T3568] CPU: 0 PID: 3568 Comm: syz.0.1257 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 108.950916][ T3568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 108.961699][ T3568] Call Trace: [ 108.964998][ T3568] [ 108.968046][ T3568] __dump_stack+0x21/0x30 [ 108.972403][ T3568] dump_stack_lvl+0xee/0x150 [ 108.977178][ T3568] ? show_regs_print_info+0x20/0x20 [ 108.982577][ T3568] ? rcu_gp_kthread_wake+0x90/0x90 [ 108.987727][ T3568] dump_stack+0x15/0x20 [ 108.991903][ T3568] should_fail+0x3c1/0x510 [ 108.996420][ T3568] should_fail_usercopy+0x1a/0x20 [ 109.002178][ T3568] _copy_to_user+0x20/0x90 [ 109.006620][ T3568] __htab_map_lookup_and_delete_batch+0x17d9/0x1c00 [ 109.013550][ T3568] ? htab_free_prealloced_timers+0x320/0x320 [ 109.020010][ T3568] htab_map_lookup_and_delete_batch+0x30/0x40 [ 109.026209][ T3568] ? htab_map_lookup_and_delete_elem+0x40/0x40 [ 109.032555][ T3568] bpf_map_do_batch+0x463/0x5f0 [ 109.037429][ T3568] __sys_bpf+0x5e3/0x730 [ 109.041695][ T3568] ? bpf_link_show_fdinfo+0x310/0x310 [ 109.047171][ T3568] ? debug_smp_processor_id+0x17/0x20 [ 109.053495][ T3568] __x64_sys_bpf+0x7c/0x90 [ 109.057928][ T3568] x64_sys_call+0x4b9/0x9a0 [ 109.062445][ T3568] do_syscall_64+0x4c/0xa0 [ 109.066865][ T3568] ? clear_bhb_loop+0x50/0xa0 [ 109.071552][ T3568] ? clear_bhb_loop+0x50/0xa0 [ 109.076237][ T3568] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 109.082264][ T3568] RIP: 0033:0x7ff1a2472929 [ 109.086688][ T3568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.106559][ T3568] RSP: 002b:00007ff1a0aba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 109.115013][ T3568] RAX: ffffffffffffffda RBX: 00007ff1a269a080 RCX: 00007ff1a2472929 [ 109.123120][ T3568] RDX: 0000000000000038 RSI: 0000200000000800 RDI: 0000000000000019 [ 109.131103][ T3568] RBP: 00007ff1a0aba090 R08: 0000000000000000 R09: 0000000000000000 [ 109.139078][ T3568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.147154][ T3568] R13: 0000000000000001 R14: 00007ff1a269a080 R15: 00007ffdaf78bb78 [ 109.155152][ T3568] [ 109.166494][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.174613][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.227008][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 109.234689][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.268436][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 109.279578][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.288836][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.295914][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.303602][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 109.311880][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.320394][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.327448][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.337791][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 109.346060][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.353821][ T3584] FAULT_INJECTION: forcing a failure. [ 109.353821][ T3584] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 109.367430][ T3583] device sit0 left promiscuous mode [ 109.367585][ T3584] CPU: 1 PID: 3584 Comm: syz.0.1264 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 109.382851][ T3584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 109.392924][ T3584] Call Trace: [ 109.396224][ T3584] [ 109.399154][ T3584] __dump_stack+0x21/0x30 [ 109.403505][ T3584] dump_stack_lvl+0xee/0x150 [ 109.408107][ T3584] ? show_regs_print_info+0x20/0x20 [ 109.413438][ T3584] dump_stack+0x15/0x20 [ 109.417621][ T3584] should_fail+0x3c1/0x510 [ 109.422139][ T3584] should_fail_usercopy+0x1a/0x20 [ 109.427354][ T3584] _copy_from_user+0x20/0xd0 [ 109.431989][ T3584] sock_do_ioctl+0x175/0x300 [ 109.436665][ T3584] ? sock_show_fdinfo+0xa0/0xa0 [ 109.441508][ T3584] ? selinux_file_ioctl+0x377/0x480 [ 109.446725][ T3584] ? ktime_get+0x12f/0x160 [ 109.451147][ T3584] ? lapic_next_event+0x5f/0x70 [ 109.456172][ T3584] sock_ioctl+0x4bc/0x6b0 [ 109.460596][ T3584] ? sock_poll+0x3d0/0x3d0 [ 109.465007][ T3584] ? __fget_files+0x2c4/0x320 [ 109.469698][ T3584] ? security_file_ioctl+0x84/0xa0 [ 109.474810][ T3584] ? sock_poll+0x3d0/0x3d0 [ 109.479309][ T3584] __se_sys_ioctl+0x121/0x1a0 [ 109.483989][ T3584] __x64_sys_ioctl+0x7b/0x90 [ 109.488661][ T3584] x64_sys_call+0x2f/0x9a0 [ 109.493075][ T3584] do_syscall_64+0x4c/0xa0 [ 109.497486][ T3584] ? clear_bhb_loop+0x50/0xa0 [ 109.502182][ T3584] ? clear_bhb_loop+0x50/0xa0 [ 109.506858][ T3584] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 109.512771][ T3584] RIP: 0033:0x7ff1a2472929 [ 109.517185][ T3584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.536957][ T3584] RSP: 002b:00007ff1a0aba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 109.545365][ T3584] RAX: ffffffffffffffda RBX: 00007ff1a269a080 RCX: 00007ff1a2472929 [ 109.553334][ T3584] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 000000000000000c [ 109.561501][ T3584] RBP: 00007ff1a0aba090 R08: 0000000000000000 R09: 0000000000000000 [ 109.569560][ T3584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.577707][ T3584] R13: 0000000000000000 R14: 00007ff1a269a080 R15: 00007ffdaf78bb78 [ 109.585850][ T3584] [ 109.676039][ T3586] device veth0_vlan left promiscuous mode [ 109.706593][ T3586] device veth0_vlan entered promiscuous mode [ 109.749741][ T3592] device wg2 entered promiscuous mode [ 109.787628][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 109.795865][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.806977][ T3584] device pim6reg1 entered promiscuous mode [ 109.859527][ T3524] device veth0_vlan entered promiscuous mode [ 109.940357][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 109.949032][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.958048][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 109.966189][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.976767][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 109.985217][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.994529][ T3524] device veth1_macvtap entered promiscuous mode [ 110.128384][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 110.151149][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.226258][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 110.278571][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 110.314693][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 110.356327][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 110.395956][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 111.573074][ T628] device bridge_slave_1 left promiscuous mode [ 111.579421][ T628] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.587230][ T628] device bridge_slave_0 left promiscuous mode [ 111.593615][ T628] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.601610][ T628] device veth1_macvtap left promiscuous mode [ 111.607716][ T628] device veth0_vlan left promiscuous mode [ 112.528894][ T3628] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.552905][ T30] audit: type=1400 audit(1750303406.170:132): avc: denied { create } for pid=3652 comm="syz.0.1288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 112.572512][ T3628] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.573082][ T3628] device bridge_slave_0 entered promiscuous mode [ 112.686210][ T3654] device pim6reg1 entered promiscuous mode [ 112.703096][ T3628] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.710536][ T3628] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.773803][ T3628] device bridge_slave_1 entered promiscuous mode [ 113.144169][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 113.157464][ T30] audit: type=1400 audit(1750303406.770:133): avc: denied { create } for pid=3676 comm="syz.1.1298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 113.187358][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 113.214260][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 113.242651][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 113.271510][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 113.311221][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 113.339006][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.346147][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 113.366802][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 113.375504][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 113.384283][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.391362][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 113.416778][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 113.438393][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 113.464167][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.478905][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.498482][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.513661][ T3628] device veth0_vlan entered promiscuous mode [ 113.558718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.570492][ T3628] device veth1_macvtap entered promiscuous mode [ 113.581352][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.605167][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 114.693096][ T8] device bridge_slave_1 left promiscuous mode [ 114.699340][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.707062][ T8] device bridge_slave_0 left promiscuous mode [ 114.713259][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.721152][ T8] device veth1_macvtap left promiscuous mode [ 114.727197][ T8] device veth0_vlan left promiscuous mode [ 115.048731][ T3737] FAULT_INJECTION: forcing a failure. [ 115.048731][ T3737] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 115.069119][ T3737] CPU: 1 PID: 3737 Comm: syz.0.1322 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 115.079063][ T3737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 115.089134][ T3737] Call Trace: [ 115.092614][ T3737] [ 115.095551][ T3737] __dump_stack+0x21/0x30 [ 115.100057][ T3737] dump_stack_lvl+0xee/0x150 [ 115.104643][ T3737] ? show_regs_print_info+0x20/0x20 [ 115.109936][ T3737] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 115.115742][ T3737] dump_stack+0x15/0x20 [ 115.119892][ T3737] should_fail+0x3c1/0x510 [ 115.124307][ T3737] should_fail_alloc_page+0x55/0x80 [ 115.129505][ T3737] prepare_alloc_pages+0x156/0x600 [ 115.134705][ T3737] ? __alloc_pages_bulk+0xab0/0xab0 [ 115.139983][ T3737] ? slab_post_alloc_hook+0x4f/0x2b0 [ 115.145275][ T3737] ? alloc_vmap_area+0x17a/0x1990 [ 115.150383][ T3737] ? __get_vm_area_node+0x14e/0x350 [ 115.155576][ T3737] ? __vmalloc_node_range+0xe8/0x840 [ 115.160856][ T3737] ? queue_stack_map_alloc+0xc3/0x210 [ 115.166312][ T3737] __alloc_pages+0x10a/0x440 [ 115.170986][ T3737] ? prep_new_page+0x110/0x110 [ 115.175764][ T3737] ? __kasan_check_write+0x14/0x20 [ 115.180876][ T3737] __get_free_pages+0x10/0x30 [ 115.185550][ T3737] kasan_populate_vmalloc_pte+0x29/0x120 [ 115.191186][ T3737] __apply_to_page_range+0x8b0/0xbf0 [ 115.196467][ T3737] ? kasan_populate_vmalloc+0x70/0x70 [ 115.201844][ T3737] ? kasan_populate_vmalloc+0x70/0x70 [ 115.207212][ T3737] apply_to_page_range+0x3b/0x50 [ 115.212166][ T3737] kasan_populate_vmalloc+0x60/0x70 [ 115.217456][ T3737] alloc_vmap_area+0x185c/0x1990 [ 115.222394][ T3737] ? vm_map_ram+0xa60/0xa60 [ 115.226891][ T3737] ? kmem_cache_alloc_trace+0x119/0x270 [ 115.232435][ T3737] ? __get_vm_area_node+0x11d/0x350 [ 115.237627][ T3737] __get_vm_area_node+0x14e/0x350 [ 115.242648][ T3737] __vmalloc_node_range+0xe8/0x840 [ 115.247939][ T3737] ? queue_stack_map_alloc+0xc3/0x210 [ 115.253407][ T3737] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 115.259559][ T3737] bpf_map_area_alloc+0xd5/0xe0 [ 115.264489][ T3737] ? queue_stack_map_alloc+0xc3/0x210 [ 115.269859][ T3737] queue_stack_map_alloc+0xc3/0x210 [ 115.275050][ T3737] map_create+0x455/0x21b0 [ 115.279546][ T3737] __sys_bpf+0x2cf/0x730 [ 115.283870][ T3737] ? bpf_link_show_fdinfo+0x310/0x310 [ 115.289242][ T3737] __x64_sys_bpf+0x7c/0x90 [ 115.293655][ T3737] x64_sys_call+0x4b9/0x9a0 [ 115.298152][ T3737] do_syscall_64+0x4c/0xa0 [ 115.302559][ T3737] ? clear_bhb_loop+0x50/0xa0 [ 115.307370][ T3737] ? clear_bhb_loop+0x50/0xa0 [ 115.312100][ T3737] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 115.317998][ T3737] RIP: 0033:0x7ff1a2472929 [ 115.322458][ T3737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.342151][ T3737] RSP: 002b:00007ff1a0adb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 115.350571][ T3737] RAX: ffffffffffffffda RBX: 00007ff1a2699fa0 RCX: 00007ff1a2472929 [ 115.358629][ T3737] RDX: 0000000000000048 RSI: 0000200000000640 RDI: 0000000000000000 [ 115.366686][ T3737] RBP: 00007ff1a0adb090 R08: 0000000000000000 R09: 0000000000000000 [ 115.374744][ T3737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.382816][ T3737] R13: 0000000000000000 R14: 00007ff1a2699fa0 R15: 00007ffdaf78bb78 [ 115.390819][ T3737] [ 115.559530][ T3728] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.665101][ T3728] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.673161][ T3728] device bridge_slave_0 entered promiscuous mode [ 115.697261][ T3728] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.704776][ T3728] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.775762][ T3728] device bridge_slave_1 entered promiscuous mode [ 116.124475][ T3768] device wg2 left promiscuous mode [ 116.141918][ T3768] device wg2 entered promiscuous mode [ 116.154265][ T3728] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.161417][ T3728] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.168838][ T3728] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.175931][ T3728] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.251622][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 116.260144][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.268145][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.292350][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 116.304223][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.311307][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.332466][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.352315][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.359394][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.491191][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 116.502638][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.563698][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 116.572021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 116.593436][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 116.603447][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.666107][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.673783][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.735486][ T3728] device veth0_vlan entered promiscuous mode [ 116.786219][ T3728] device veth1_macvtap entered promiscuous mode [ 116.832263][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 116.868407][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.916226][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 117.008420][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 117.051300][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 117.112662][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 117.121214][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 118.419641][ T3815] FAULT_INJECTION: forcing a failure. [ 118.419641][ T3815] name failslab, interval 1, probability 0, space 0, times 0 [ 118.433796][ T3815] CPU: 1 PID: 3815 Comm: syz.3.1351 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 118.443814][ T3815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 118.453989][ T3815] Call Trace: [ 118.457303][ T3815] [ 118.460245][ T3815] __dump_stack+0x21/0x30 [ 118.464586][ T3815] dump_stack_lvl+0xee/0x150 [ 118.469173][ T3815] ? show_regs_print_info+0x20/0x20 [ 118.474455][ T3815] dump_stack+0x15/0x20 [ 118.478609][ T3815] should_fail+0x3c1/0x510 [ 118.483021][ T3815] __should_failslab+0xa4/0xe0 [ 118.487782][ T3815] should_failslab+0x9/0x20 [ 118.492295][ T3815] slab_pre_alloc_hook+0x3b/0xe0 [ 118.497250][ T3815] __kmalloc+0x6d/0x2c0 [ 118.501429][ T3815] ? sk_prot_alloc+0xed/0x320 [ 118.506134][ T3815] ? check_stack_object+0x81/0x140 [ 118.511270][ T3815] sk_prot_alloc+0xed/0x320 [ 118.515783][ T3815] sk_alloc+0x38/0x430 [ 118.519849][ T3815] bpf_prog_test_run_skb+0x24b/0x1150 [ 118.525220][ T3815] ? __kasan_check_write+0x14/0x20 [ 118.530333][ T3815] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 118.536440][ T3815] bpf_prog_test_run+0x3d5/0x620 [ 118.541497][ T3815] ? bpf_prog_query+0x230/0x230 [ 118.546361][ T3815] ? selinux_bpf+0xce/0xf0 [ 118.550780][ T3815] ? security_bpf+0x82/0xa0 [ 118.555310][ T3815] __sys_bpf+0x52c/0x730 [ 118.559557][ T3815] ? bpf_link_show_fdinfo+0x310/0x310 [ 118.564928][ T3815] ? debug_smp_processor_id+0x17/0x20 [ 118.570386][ T3815] __x64_sys_bpf+0x7c/0x90 [ 118.574796][ T3815] x64_sys_call+0x4b9/0x9a0 [ 118.579311][ T3815] do_syscall_64+0x4c/0xa0 [ 118.583725][ T3815] ? clear_bhb_loop+0x50/0xa0 [ 118.588401][ T3815] ? clear_bhb_loop+0x50/0xa0 [ 118.593074][ T3815] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 118.598970][ T3815] RIP: 0033:0x7f525481f929 [ 118.603471][ T3815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 118.623161][ T3815] RSP: 002b:00007f5252e88038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 118.631575][ T3815] RAX: ffffffffffffffda RBX: 00007f5254a46fa0 RCX: 00007f525481f929 [ 118.639730][ T3815] RDX: 0000000000000050 RSI: 0000200000000380 RDI: 000000000000000a [ 118.647699][ T3815] RBP: 00007f5252e88090 R08: 0000000000000000 R09: 0000000000000000 [ 118.656110][ T3815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.664202][ T3815] R13: 0000000000000000 R14: 00007f5254a46fa0 R15: 00007ffdf13f43d8 [ 118.672332][ T3815] [ 118.825551][ T628] device bridge_slave_1 left promiscuous mode [ 118.832065][ T628] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.870379][ T628] device bridge_slave_0 left promiscuous mode [ 118.914422][ T628] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.948557][ T628] device veth1_macvtap left promiscuous mode [ 118.974333][ T628] device veth0_vlan left promiscuous mode [ 119.240489][ T3839] device veth0_vlan left promiscuous mode [ 119.248378][ T3839] device veth0_vlan entered promiscuous mode [ 119.436775][ T3830] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.450688][ T3830] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.479395][ T3830] device bridge_slave_0 entered promiscuous mode [ 119.507153][ T3830] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.554882][ T3830] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.711458][ T3830] device bridge_slave_1 entered promiscuous mode [ 120.319064][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.327101][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.359421][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 120.374333][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 120.389996][ T628] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.397121][ T628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.404961][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 120.413665][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 120.422543][ T628] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.429687][ T628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.572857][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 120.590655][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 120.598856][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 120.659113][ T3830] device veth0_vlan entered promiscuous mode [ 120.665888][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 120.684465][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 120.693923][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 120.705958][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.730099][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 120.741272][ T3830] device veth1_macvtap entered promiscuous mode [ 120.753382][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 122.632118][ C1] sched: RT throttling activated [ 122.639786][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 122.653398][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 123.643044][ T628] device bridge_slave_1 left promiscuous mode [ 123.649393][ T628] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.657335][ T628] device bridge_slave_0 left promiscuous mode [ 123.664111][ T628] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.672386][ T628] device veth1_macvtap left promiscuous mode [ 123.678403][ T628] device veth0_vlan left promiscuous mode [ 124.360101][ T3927] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.370190][ T3927] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.381561][ T3927] device bridge_slave_0 entered promiscuous mode [ 124.402674][ T3927] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.409741][ T3927] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.425796][ T3927] device bridge_slave_1 entered promiscuous mode [ 125.081496][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 125.097384][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.163246][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.216437][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.262810][ T628] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.269992][ T628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.283012][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 125.304425][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.329102][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.360895][ T628] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.368057][ T628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.381838][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 125.411065][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 125.560199][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 125.592485][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.670356][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 125.683919][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 125.702642][ T4005] syz.0.1427[4005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.702728][ T4005] syz.0.1427[4005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.716451][ T3927] device veth0_vlan entered promiscuous mode [ 125.759028][ T4007] syz.3.1428[4007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.759112][ T4007] syz.3.1428[4007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.811251][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.833198][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.863165][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.908619][ T3927] device veth1_macvtap entered promiscuous mode [ 125.936535][ T4005] bond_slave_1: mtu less than device minimum [ 125.948999][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 126.264507][ T4017] device syzkaller0 entered promiscuous mode [ 126.284152][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 126.297651][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.306930][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 126.316485][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 127.852971][ T628] device bridge_slave_1 left promiscuous mode [ 127.859120][ T628] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.866645][ T628] device bridge_slave_0 left promiscuous mode [ 127.873049][ T628] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.880836][ T628] device veth1_macvtap left promiscuous mode [ 127.887016][ T628] device veth0_vlan left promiscuous mode [ 128.523417][ T4060] FAULT_INJECTION: forcing a failure. [ 128.523417][ T4060] name failslab, interval 1, probability 0, space 0, times 0 [ 128.536377][ T4060] CPU: 0 PID: 4060 Comm: syz.0.1447 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 128.546304][ T4060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 128.556383][ T4060] Call Trace: [ 128.559676][ T4060] [ 128.562617][ T4060] __dump_stack+0x21/0x30 [ 128.567045][ T4060] dump_stack_lvl+0xee/0x150 [ 128.571646][ T4060] ? show_regs_print_info+0x20/0x20 [ 128.576959][ T4060] ? unwind_get_return_address+0x4d/0x90 [ 128.582613][ T4060] ? stack_trace_save+0xe0/0xe0 [ 128.587501][ T4060] dump_stack+0x15/0x20 [ 128.591929][ T4060] should_fail+0x3c1/0x510 [ 128.596484][ T4060] __should_failslab+0xa4/0xe0 [ 128.601706][ T4060] should_failslab+0x9/0x20 [ 128.606220][ T4060] slab_pre_alloc_hook+0x3b/0xe0 [ 128.611239][ T4060] ? dst_alloc+0x15c/0x1d0 [ 128.615675][ T4060] kmem_cache_alloc+0x44/0x260 [ 128.620457][ T4060] ? ipv6_sysctl_rtcache_flush+0x100/0x100 [ 128.626369][ T4060] dst_alloc+0x15c/0x1d0 [ 128.630803][ T4060] icmp6_dst_alloc+0xf5/0x560 [ 128.635481][ T4060] ? security_sk_classify_flow+0x7b/0x90 [ 128.641124][ T4060] ? icmpv6_flow_init+0xd2/0x130 [ 128.646160][ T4060] ndisc_send_skb+0x258/0xc70 [ 128.650933][ T4060] ? x64_sys_call+0x8ef/0x9a0 [ 128.655607][ T4060] ? do_syscall_64+0x4c/0xa0 [ 128.660239][ T4060] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.666352][ T4060] ? ndisc_alloc_skb+0x2b0/0x2b0 [ 128.671436][ T4060] ? memcpy+0x56/0x70 [ 128.675630][ T4060] ndisc_send_ns+0x842/0xaf0 [ 128.680234][ T4060] ? __bpf_trace_bpf_trace_printk+0x30/0x30 [ 128.686254][ T4060] ? ndisc_send_skb+0xc70/0xc70 [ 128.691152][ T4060] ? ipv6_chk_addr_and_flags+0x3e/0x60 [ 128.696634][ T4060] ndisc_solicit+0x30a/0x440 [ 128.701337][ T4060] ? ndisc_cleanup+0x40/0x40 [ 128.706035][ T4060] ? skb_clone+0x202/0x360 [ 128.710552][ T4060] ? ndisc_cleanup+0x40/0x40 [ 128.715249][ T4060] __neigh_event_send+0xcc3/0x11c0 [ 128.720492][ T4060] neigh_resolve_output+0x1e1/0x770 [ 128.725805][ T4060] ? __local_bh_enable_ip+0x58/0x80 [ 128.731194][ T4060] ? local_bh_enable+0x1f/0x30 [ 128.735953][ T4060] ? __kasan_check_read+0x11/0x20 [ 128.741068][ T4060] ? selinux_ip_postroute+0x24c/0xe10 [ 128.746537][ T4060] ip6_finish_output2+0x10b7/0x1760 [ 128.751833][ T4060] ? __ip6_finish_output+0x7d0/0x7d0 [ 128.757242][ T4060] ? __local_bh_enable_ip+0x58/0x80 [ 128.762530][ T4060] ? local_bh_enable+0x1f/0x30 [ 128.767291][ T4060] __ip6_finish_output+0x61e/0x7d0 [ 128.772658][ T4060] ip6_finish_output+0x31/0x240 [ 128.777505][ T4060] ? ip6_output+0x384/0x3b0 [ 128.782007][ T4060] ip6_output+0x1d1/0x3b0 [ 128.786335][ T4060] ? ac6_seq_show+0xf0/0xf0 [ 128.790837][ T4060] ? ip6_output+0x3b0/0x3b0 [ 128.795347][ T4060] ip6_local_out+0x21a/0x3d0 [ 128.800064][ T4060] ? dst_output+0x80/0x80 [ 128.804417][ T4060] ? __ip6_local_out+0x350/0x350 [ 128.809378][ T4060] ? __kasan_check_read+0x11/0x20 [ 128.814416][ T4060] ? ip6_setup_cork+0xd10/0x1290 [ 128.819438][ T4060] ip6_push_pending_frames+0x17d/0x2d0 [ 128.824996][ T4060] icmpv6_push_pending_frames+0x29f/0x440 [ 128.830820][ T4060] icmp6_send+0xf6d/0x14c0 [ 128.835250][ T4060] ? icmpv6_push_pending_frames+0x440/0x440 [ 128.841145][ T4060] ? numa_migrate_prep+0xd0/0xd0 [ 128.846088][ T4060] ? __skb_flow_dissect+0x520c/0x5930 [ 128.851455][ T4060] icmpv6_param_prob+0x2f/0x40 [ 128.856303][ T4060] ip6_parse_tlv+0x1a4c/0x1ba0 [ 128.861223][ T4060] ipv6_parse_hopopts+0x2a3/0x580 [ 128.866404][ T4060] ip6_rcv_core+0xca7/0x1390 [ 128.871022][ T4060] ipv6_rcv+0xca/0x210 [ 128.875104][ T4060] ? irqentry_exit+0x37/0x40 [ 128.879692][ T4060] ? exc_page_fault+0x5e/0xb0 [ 128.884475][ T4060] ? ip6_rcv_finish+0x360/0x360 [ 128.889419][ T4060] ? asm_exc_page_fault+0x27/0x30 [ 128.894443][ T4060] ? _copy_from_iter+0x181/0x1050 [ 128.899465][ T4060] ? ip6_rcv_finish+0x360/0x360 [ 128.904310][ T4060] __netif_receive_skb+0xc8/0x280 [ 128.909341][ T4060] ? _copy_from_iter+0x4ae/0x1050 [ 128.914357][ T4060] ? __kasan_check_write+0x14/0x20 [ 128.919465][ T4060] netif_receive_skb+0x98/0x3d0 [ 128.924487][ T4060] ? netif_receive_skb_core+0x100/0x100 [ 128.930044][ T4060] ? virtio_net_hdr_to_skb+0x9df/0x11c0 [ 128.935587][ T4060] tun_rx_batched+0x5e8/0x710 [ 128.940271][ T4060] ? local_bh_enable+0x30/0x30 [ 128.945031][ T4060] tun_get_user+0x279c/0x33c0 [ 128.949706][ T4060] ? __kasan_check_read+0x11/0x20 [ 128.954726][ T4060] ? tun_do_read+0x1c40/0x1c40 [ 128.959483][ T4060] ? kstrtouint_from_user+0x1a0/0x200 [ 128.964854][ T4060] ? kstrtol_from_user+0x260/0x260 [ 128.969956][ T4060] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 128.975760][ T4060] ? stack_map_pop_elem+0x24c/0x390 [ 128.980953][ T4060] ? avc_policy_seqno+0x1b/0x70 [ 128.985802][ T4060] ? selinux_file_permission+0x2aa/0x510 [ 128.991523][ T4060] tun_chr_write_iter+0x1eb/0x2e0 [ 128.996630][ T4060] vfs_write+0x802/0xf70 [ 129.000890][ T4060] ? file_end_write+0x1b0/0x1b0 [ 129.005846][ T4060] ? __fget_files+0x2c4/0x320 [ 129.010553][ T4060] ? __fdget_pos+0x1f7/0x380 [ 129.015267][ T4060] ? ksys_write+0x71/0x240 [ 129.019692][ T4060] ksys_write+0x140/0x240 [ 129.024037][ T4060] ? __ia32_sys_read+0x90/0x90 [ 129.028802][ T4060] ? debug_smp_processor_id+0x17/0x20 [ 129.034190][ T4060] __x64_sys_write+0x7b/0x90 [ 129.039158][ T4060] x64_sys_call+0x8ef/0x9a0 [ 129.043681][ T4060] do_syscall_64+0x4c/0xa0 [ 129.048097][ T4060] ? clear_bhb_loop+0x50/0xa0 [ 129.052766][ T4060] ? clear_bhb_loop+0x50/0xa0 [ 129.057438][ T4060] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 129.063340][ T4060] RIP: 0033:0x7ff1a2472929 [ 129.067783][ T4060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 129.087838][ T4060] RSP: 002b:00007ff1a0adb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 129.096264][ T4060] RAX: ffffffffffffffda RBX: 00007ff1a2699fa0 RCX: 00007ff1a2472929 [ 129.104662][ T4060] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 129.112832][ T4060] RBP: 00007ff1a0adb090 R08: 0000000000000000 R09: 0000000000000000 [ 129.120808][ T4060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 129.128795][ T4060] R13: 0000000000000000 R14: 00007ff1a2699fa0 R15: 00007ffdaf78bb78 [ 129.137313][ T4060] [ 129.723495][ T4052] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.730681][ T4052] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.738480][ T4052] device bridge_slave_0 entered promiscuous mode [ 129.844609][ T4052] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.851683][ T4052] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.883032][ T4052] device bridge_slave_1 entered promiscuous mode [ 129.915843][ T4077] device veth0_vlan left promiscuous mode [ 129.926178][ T4077] device veth0_vlan entered promiscuous mode [ 130.495618][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.507205][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.515212][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.525905][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.557279][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.643512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.693015][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.700220][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.783962][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.814987][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.831680][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.838870][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.847144][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.859135][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.922534][ T4052] device veth0_vlan entered promiscuous mode [ 130.944105][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.974222][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.987199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.001717][ T4052] device veth1_macvtap entered promiscuous mode [ 131.026622][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.076065][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.092775][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.158979][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.208360][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.291089][ T4119] FAULT_INJECTION: forcing a failure. [ 131.291089][ T4119] name failslab, interval 1, probability 0, space 0, times 0 [ 131.333010][ T4119] CPU: 1 PID: 4119 Comm: syz.4.1468 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 131.343411][ T4119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 131.353576][ T4119] Call Trace: [ 131.356877][ T4119] [ 131.359926][ T4119] __dump_stack+0x21/0x30 [ 131.364270][ T4119] dump_stack_lvl+0xee/0x150 [ 131.368878][ T4119] ? show_regs_print_info+0x20/0x20 [ 131.374091][ T4119] dump_stack+0x15/0x20 [ 131.378359][ T4119] should_fail+0x3c1/0x510 [ 131.382809][ T4119] __should_failslab+0xa4/0xe0 [ 131.387597][ T4119] should_failslab+0x9/0x20 [ 131.392121][ T4119] slab_pre_alloc_hook+0x3b/0xe0 [ 131.397102][ T4119] kmem_cache_alloc_trace+0x48/0x270 [ 131.402405][ T4119] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 131.408137][ T4119] selinux_sk_alloc_security+0x7e/0x1a0 [ 131.413781][ T4119] security_sk_alloc+0x72/0xa0 [ 131.418559][ T4119] sk_prot_alloc+0x108/0x320 [ 131.423158][ T4119] sk_alloc+0x38/0x430 [ 131.427320][ T4119] bpf_prog_test_run_skb+0x24b/0x1150 [ 131.432800][ T4119] ? __kasan_check_write+0x14/0x20 [ 131.438121][ T4119] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 131.444217][ T4119] bpf_prog_test_run+0x3d5/0x620 [ 131.449214][ T4119] ? bpf_prog_query+0x230/0x230 [ 131.454077][ T4119] ? selinux_bpf+0xce/0xf0 [ 131.458500][ T4119] ? security_bpf+0x82/0xa0 [ 131.463027][ T4119] __sys_bpf+0x52c/0x730 [ 131.467276][ T4119] ? bpf_link_show_fdinfo+0x310/0x310 [ 131.472658][ T4119] ? debug_smp_processor_id+0x17/0x20 [ 131.478067][ T4119] __x64_sys_bpf+0x7c/0x90 [ 131.482490][ T4119] x64_sys_call+0x4b9/0x9a0 [ 131.487002][ T4119] do_syscall_64+0x4c/0xa0 [ 131.491511][ T4119] ? clear_bhb_loop+0x50/0xa0 [ 131.496256][ T4119] ? clear_bhb_loop+0x50/0xa0 [ 131.500943][ T4119] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 131.506846][ T4119] RIP: 0033:0x7f817213b929 [ 131.511269][ T4119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.530976][ T4119] RSP: 002b:00007f81707a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.539397][ T4119] RAX: ffffffffffffffda RBX: 00007f8172362fa0 RCX: 00007f817213b929 [ 131.547464][ T4119] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 131.555464][ T4119] RBP: 00007f81707a4090 R08: 0000000000000000 R09: 0000000000000000 [ 131.563438][ T4119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.571505][ T4119] R13: 0000000000000000 R14: 00007f8172362fa0 R15: 00007ffe41831f68 [ 131.579494][ T4119] [ 132.972851][ T628] device bridge_slave_1 left promiscuous mode [ 132.978980][ T628] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.986502][ T628] device bridge_slave_0 left promiscuous mode [ 132.992718][ T628] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.000411][ T628] device veth1_macvtap left promiscuous mode [ 133.006452][ T628] device veth0_vlan left promiscuous mode [ 133.335357][ T4135] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.372229][ T4135] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.443169][ T4135] device bridge_slave_0 entered promiscuous mode [ 133.458887][ T4135] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.468916][ T4135] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.482932][ T4135] device bridge_slave_1 entered promiscuous mode [ 134.605098][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.649150][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.683976][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.697494][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.706170][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.713260][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.741709][ T4188] device sit0 left promiscuous mode [ 134.758065][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.766677][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.775577][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.784606][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.791700][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.810014][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.818266][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.835127][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.843702][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.881391][ T4188] device sit0 entered promiscuous mode [ 135.052685][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.061310][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.103637][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 135.117524][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.129198][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.137368][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.146255][ T4135] device veth0_vlan entered promiscuous mode [ 135.177041][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.191641][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.226007][ T4135] device veth1_macvtap entered promiscuous mode [ 135.245149][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.279240][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.288472][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.309242][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.317682][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.693776][ T306] device bridge_slave_1 left promiscuous mode [ 136.700312][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.708286][ T306] device bridge_slave_0 left promiscuous mode [ 136.714581][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.723043][ T306] device veth1_macvtap left promiscuous mode [ 136.729040][ T306] device veth0_vlan left promiscuous mode [ 137.417583][ T4228] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.467306][ T4251] FAULT_INJECTION: forcing a failure. [ 137.467306][ T4251] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.500276][ T4228] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.522272][ T4251] CPU: 0 PID: 4251 Comm: syz.0.1517 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 137.532221][ T4251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 137.542557][ T4251] Call Trace: [ 137.545847][ T4251] [ 137.548788][ T4251] __dump_stack+0x21/0x30 [ 137.553129][ T4251] dump_stack_lvl+0xee/0x150 [ 137.557721][ T4251] ? show_regs_print_info+0x20/0x20 [ 137.562609][ T4228] device bridge_slave_0 entered promiscuous mode [ 137.562919][ T4251] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 137.574957][ T4251] dump_stack+0x15/0x20 [ 137.579123][ T4251] should_fail+0x3c1/0x510 [ 137.583551][ T4251] should_fail_usercopy+0x1a/0x20 [ 137.588580][ T4251] _copy_to_user+0x20/0x90 [ 137.592953][ T4228] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.593002][ T4251] bpf_test_finish+0x20c/0x3b0 [ 137.600279][ T4228] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.605030][ T4251] ? convert_skb_to___skb+0x360/0x360 [ 137.605050][ T4251] ? convert_skb_to___skb+0x203/0x360 [ 137.605065][ T4251] bpf_prog_test_run_skb+0xbba/0x1150 [ 137.628276][ T4251] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 137.634290][ T4251] bpf_prog_test_run+0x3d5/0x620 [ 137.639324][ T4251] ? bpf_prog_query+0x230/0x230 [ 137.644195][ T4251] ? selinux_bpf+0xce/0xf0 [ 137.648642][ T4251] ? security_bpf+0x82/0xa0 [ 137.652900][ T4228] device bridge_slave_1 entered promiscuous mode [ 137.653173][ T4251] __sys_bpf+0x52c/0x730 [ 137.663851][ T4251] ? bpf_link_show_fdinfo+0x310/0x310 [ 137.669234][ T4251] ? __bpf_trace_sys_enter+0x62/0x70 [ 137.674526][ T4251] ? __traceiter_sys_enter+0x2a/0x40 [ 137.679825][ T4251] __x64_sys_bpf+0x7c/0x90 [ 137.684256][ T4251] x64_sys_call+0x4b9/0x9a0 [ 137.688769][ T4251] do_syscall_64+0x4c/0xa0 [ 137.693191][ T4251] ? clear_bhb_loop+0x50/0xa0 [ 137.697881][ T4251] ? clear_bhb_loop+0x50/0xa0 [ 137.702573][ T4251] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 137.708474][ T4251] RIP: 0033:0x7ff1a2472929 [ 137.712893][ T4251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.732577][ T4251] RSP: 002b:00007ff1a0adb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.741096][ T4251] RAX: ffffffffffffffda RBX: 00007ff1a2699fa0 RCX: 00007ff1a2472929 [ 137.749113][ T4251] RDX: 0000000000000050 RSI: 0000200000000880 RDI: 000000000000000a [ 137.757179][ T4251] RBP: 00007ff1a0adb090 R08: 0000000000000000 R09: 0000000000000000 [ 137.765159][ T4251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.773140][ T4251] R13: 0000000000000000 R14: 00007ff1a2699fa0 R15: 00007ffdaf78bb78 [ 137.781133][ T4251] [ 137.988389][ T4261] bond_slave_1: mtu less than device minimum [ 138.177067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 138.186707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.235807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.262714][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.305299][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.312424][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.340710][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.349411][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.358408][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.365569][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.417874][ T4281] device sit0 left promiscuous mode [ 138.526412][ T4287] device sit0 entered promiscuous mode [ 138.541650][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 138.555794][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.570053][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.640119][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.697447][ T4228] device veth0_vlan entered promiscuous mode [ 138.708013][ T30] audit: type=1400 audit(1750303432.320:134): avc: denied { create } for pid=4295 comm="syz.4.1534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 138.737056][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.745866][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.753854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.880826][ T30] audit: type=1400 audit(1750303432.380:135): avc: denied { create } for pid=4295 comm="syz.4.1534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 138.972449][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 138.980632][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.058157][ T4228] device veth1_macvtap entered promiscuous mode [ 139.156052][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 139.167499][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 139.196093][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.316764][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 139.325257][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.362812][ T8] device bridge_slave_1 left promiscuous mode [ 140.369064][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.377267][ T8] device bridge_slave_0 left promiscuous mode [ 140.383887][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.392578][ T8] device veth1_macvtap left promiscuous mode [ 140.398655][ T8] device veth0_vlan left promiscuous mode [ 141.463847][ T4340] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.480868][ T4355] FAULT_INJECTION: forcing a failure. [ 141.480868][ T4355] name failslab, interval 1, probability 0, space 0, times 0 [ 141.494753][ T4340] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.502599][ T4340] device bridge_slave_0 entered promiscuous mode [ 141.509038][ T4355] CPU: 0 PID: 4355 Comm: syz.3.1554 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 141.518939][ T4355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 141.528997][ T4355] Call Trace: [ 141.532368][ T4355] [ 141.535475][ T4355] __dump_stack+0x21/0x30 [ 141.539831][ T4355] dump_stack_lvl+0xee/0x150 [ 141.544420][ T4355] ? show_regs_print_info+0x20/0x20 [ 141.549623][ T4355] dump_stack+0x15/0x20 [ 141.553782][ T4355] should_fail+0x3c1/0x510 [ 141.558635][ T4355] __should_failslab+0xa4/0xe0 [ 141.563405][ T4355] should_failslab+0x9/0x20 [ 141.567999][ T4355] slab_pre_alloc_hook+0x3b/0xe0 [ 141.572939][ T4355] kmem_cache_alloc_trace+0x48/0x270 [ 141.578230][ T4355] ? __get_vm_area_node+0x11d/0x350 [ 141.583432][ T4355] __get_vm_area_node+0x11d/0x350 [ 141.588458][ T4355] __vmalloc_node_range+0xe8/0x840 [ 141.593574][ T4355] ? sock_map_alloc+0x202/0x330 [ 141.598431][ T4355] bpf_map_area_alloc+0xd5/0xe0 [ 141.603299][ T4355] ? sock_map_alloc+0x202/0x330 [ 141.608177][ T4355] sock_map_alloc+0x202/0x330 [ 141.612956][ T4355] map_create+0x455/0x21b0 [ 141.617383][ T4355] __sys_bpf+0x2cf/0x730 [ 141.621632][ T4355] ? bpf_link_show_fdinfo+0x310/0x310 [ 141.627009][ T4355] ? debug_smp_processor_id+0x17/0x20 [ 141.632383][ T4355] __x64_sys_bpf+0x7c/0x90 [ 141.636819][ T4355] x64_sys_call+0x4b9/0x9a0 [ 141.641412][ T4355] do_syscall_64+0x4c/0xa0 [ 141.645857][ T4355] ? clear_bhb_loop+0x50/0xa0 [ 141.650538][ T4355] ? clear_bhb_loop+0x50/0xa0 [ 141.655219][ T4355] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 141.661206][ T4355] RIP: 0033:0x7f525481f929 [ 141.665717][ T4355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.685417][ T4355] RSP: 002b:00007f5252e88038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 141.693836][ T4355] RAX: ffffffffffffffda RBX: 00007f5254a46fa0 RCX: 00007f525481f929 [ 141.702680][ T4355] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0600000000000000 [ 141.710652][ T4355] RBP: 00007f5252e88090 R08: 0000000000000000 R09: 0000000000000000 [ 141.718623][ T4355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.726596][ T4355] R13: 0000000000000000 R14: 00007f5254a46fa0 R15: 00007ffdf13f43d8 [ 141.734578][ T4355] [ 141.743045][ T4340] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.754026][ T4340] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.784585][ T4340] device bridge_slave_1 entered promiscuous mode [ 142.095061][ T4368] FAULT_INJECTION: forcing a failure. [ 142.095061][ T4368] name failslab, interval 1, probability 0, space 0, times 0 [ 142.108096][ T4368] CPU: 1 PID: 4368 Comm: syz.4.1560 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 142.117998][ T4368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 142.128152][ T4368] Call Trace: [ 142.131875][ T4368] [ 142.134808][ T4368] __dump_stack+0x21/0x30 [ 142.139232][ T4368] dump_stack_lvl+0xee/0x150 [ 142.143911][ T4368] ? show_regs_print_info+0x20/0x20 [ 142.149372][ T4368] ? kstrtouint_from_user+0x1a0/0x200 [ 142.154847][ T4368] dump_stack+0x15/0x20 [ 142.159295][ T4368] should_fail+0x3c1/0x510 [ 142.163723][ T4368] __should_failslab+0xa4/0xe0 [ 142.168492][ T4368] should_failslab+0x9/0x20 [ 142.173097][ T4368] slab_pre_alloc_hook+0x3b/0xe0 [ 142.178127][ T4368] __kmalloc+0x6d/0x2c0 [ 142.182284][ T4368] ? kvmalloc_node+0x242/0x330 [ 142.187050][ T4368] kvmalloc_node+0x242/0x330 [ 142.191692][ T4368] ? vm_mmap+0xb0/0xb0 [ 142.195762][ T4368] ? __fdget+0x1a1/0x230 [ 142.200009][ T4368] map_update_elem+0x2b7/0x740 [ 142.204774][ T4368] __sys_bpf+0x40c/0x730 [ 142.209017][ T4368] ? bpf_link_show_fdinfo+0x310/0x310 [ 142.214394][ T4368] ? debug_smp_processor_id+0x17/0x20 [ 142.219775][ T4368] __x64_sys_bpf+0x7c/0x90 [ 142.224192][ T4368] x64_sys_call+0x4b9/0x9a0 [ 142.228706][ T4368] do_syscall_64+0x4c/0xa0 [ 142.233120][ T4368] ? clear_bhb_loop+0x50/0xa0 [ 142.237883][ T4368] ? clear_bhb_loop+0x50/0xa0 [ 142.242572][ T4368] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 142.248479][ T4368] RIP: 0033:0x7f817213b929 [ 142.252895][ T4368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.272600][ T4368] RSP: 002b:00007f81707a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 142.281044][ T4368] RAX: ffffffffffffffda RBX: 00007f8172362fa0 RCX: 00007f817213b929 [ 142.289020][ T4368] RDX: 0000000000000020 RSI: 0000200000000940 RDI: 0000000000000002 [ 142.297166][ T4368] RBP: 00007f81707a4090 R08: 0000000000000000 R09: 0000000000000000 [ 142.305225][ T4368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.313201][ T4368] R13: 0000000000000000 R14: 00007f8172362fa0 R15: 00007ffe41831f68 [ 142.321198][ T4368] [ 142.465303][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.473567][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.503875][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 142.512406][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.564636][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.571810][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.653918][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 142.664573][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 142.673560][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.687094][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.694172][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.702570][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.710603][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.722515][ T4384] FAULT_INJECTION: forcing a failure. [ 142.722515][ T4384] name failslab, interval 1, probability 0, space 0, times 0 [ 142.738309][ T4384] CPU: 0 PID: 4384 Comm: syz.3.1565 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 142.748242][ T4384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 142.758560][ T4384] Call Trace: [ 142.761833][ T4384] [ 142.764767][ T4384] __dump_stack+0x21/0x30 [ 142.769129][ T4384] dump_stack_lvl+0xee/0x150 [ 142.773720][ T4384] ? show_regs_print_info+0x20/0x20 [ 142.778941][ T4384] dump_stack+0x15/0x20 [ 142.783105][ T4384] should_fail+0x3c1/0x510 [ 142.787625][ T4384] __should_failslab+0xa4/0xe0 [ 142.792409][ T4384] should_failslab+0x9/0x20 [ 142.796929][ T4384] slab_pre_alloc_hook+0x3b/0xe0 [ 142.801877][ T4384] ? kvasprintf_const+0xd7/0x240 [ 142.806828][ T4384] __kmalloc_track_caller+0x6c/0x2c0 [ 142.812122][ T4384] ? x64_sys_call+0x2f/0x9a0 [ 142.816716][ T4384] ? kvasprintf_const+0xd7/0x240 [ 142.821663][ T4384] kstrdup_const+0x55/0x90 [ 142.826103][ T4384] kvasprintf_const+0xd7/0x240 [ 142.830897][ T4384] kobject_set_name_vargs+0x61/0x110 [ 142.836204][ T4384] dev_set_name+0xd1/0x120 [ 142.840651][ T4384] ? get_device+0x30/0x30 [ 142.844995][ T4384] ? pm_runtime_init+0x258/0x330 [ 142.849942][ T4384] ? device_initialize+0x1e1/0x420 [ 142.855053][ T4384] netdev_register_kobject+0xb2/0x320 [ 142.860574][ T4384] ? raw_notifier_call_chain+0xe9/0x100 [ 142.866195][ T4384] register_netdevice+0xdfa/0x13a0 [ 142.871433][ T4384] ? netif_stacked_transfer_operstate+0x220/0x220 [ 142.877846][ T4384] ? mutex_unlock+0x89/0x220 [ 142.882512][ T4384] ? __mutex_lock_slowpath+0x10/0x10 [ 142.887810][ T4384] ppp_dev_configure+0x814/0xac0 [ 142.892847][ T4384] ppp_ioctl+0x620/0x16a0 [ 142.897254][ T4384] ? mutex_unlock+0x89/0x220 [ 142.901839][ T4384] ? ppp_poll+0x250/0x250 [ 142.906156][ T4384] ? security_file_ioctl+0x84/0xa0 [ 142.911340][ T4384] ? ppp_poll+0x250/0x250 [ 142.915658][ T4384] __se_sys_ioctl+0x121/0x1a0 [ 142.920323][ T4384] __x64_sys_ioctl+0x7b/0x90 [ 142.924986][ T4384] x64_sys_call+0x2f/0x9a0 [ 142.929496][ T4384] do_syscall_64+0x4c/0xa0 [ 142.933900][ T4384] ? clear_bhb_loop+0x50/0xa0 [ 142.938567][ T4384] ? clear_bhb_loop+0x50/0xa0 [ 142.943236][ T4384] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 142.949127][ T4384] RIP: 0033:0x7f525481f929 [ 142.953552][ T4384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.973200][ T4384] RSP: 002b:00007f5252e88038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 142.981718][ T4384] RAX: ffffffffffffffda RBX: 00007f5254a46fa0 RCX: 00007f525481f929 [ 142.989690][ T4384] RDX: 000000110e22fff6 RSI: 00000000c004743e RDI: 0000000000000008 [ 142.997662][ T4384] RBP: 00007f5252e88090 R08: 0000000000000000 R09: 0000000000000000 [ 143.005627][ T4384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.013592][ T4384] R13: 0000000000000000 R14: 00007f5254a46fa0 R15: 00007ffdf13f43d8 [ 143.021631][ T4384] [ 143.058723][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.100001][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 143.112584][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.120804][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.130881][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.144941][ T4340] device veth0_vlan entered promiscuous mode [ 143.225168][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.233979][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.293815][ T4340] device veth1_macvtap entered promiscuous mode [ 143.304118][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 143.333102][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.369671][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.470791][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 143.479388][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.842994][ T30] audit: type=1400 audit(1750303437.450:136): avc: denied { create } for pid=4428 comm="syz.4.1580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 145.173104][ T8] device bridge_slave_1 left promiscuous mode [ 145.179289][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.187107][ T8] device bridge_slave_0 left promiscuous mode [ 145.193472][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.201268][ T8] device veth1_macvtap left promiscuous mode [ 145.207362][ T8] device veth0_vlan left promiscuous mode [ 145.537978][ T4436] syzkaller0: refused to change device tx_queue_len [ 145.835961][ T4441] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.870159][ T4441] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.882677][ T4441] device bridge_slave_0 entered promiscuous mode [ 145.957054][ T4441] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.965933][ T4441] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.973562][ T4441] device bridge_slave_1 entered promiscuous mode [ 146.489259][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 146.530557][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.604676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.614992][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.623564][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.630620][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.650758][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.665580][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.682329][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.689412][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.712237][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.720321][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.794494][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.839225][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 146.865231][ T4441] device veth0_vlan entered promiscuous mode [ 146.897126][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 146.912611][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 146.939201][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 146.980285][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 147.016696][ T4441] device veth1_macvtap entered promiscuous mode [ 147.129604][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 147.153355][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 148.613363][ T306] device bridge_slave_1 left promiscuous mode [ 148.619553][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.627332][ T306] device bridge_slave_0 left promiscuous mode [ 148.633542][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.641376][ T306] device veth1_macvtap left promiscuous mode [ 148.647652][ T306] device veth0_vlan left promiscuous mode [ 149.323806][ T4523] FAULT_INJECTION: forcing a failure. [ 149.323806][ T4523] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 149.372291][ T4523] CPU: 1 PID: 4523 Comm: syz.0.1607 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 149.382301][ T4523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 149.392556][ T4523] Call Trace: [ 149.395849][ T4523] [ 149.398789][ T4523] __dump_stack+0x21/0x30 [ 149.403140][ T4523] dump_stack_lvl+0xee/0x150 [ 149.407843][ T4523] ? show_regs_print_info+0x20/0x20 [ 149.413059][ T4523] ? debug_smp_processor_id+0x17/0x20 [ 149.418463][ T4523] dump_stack+0x15/0x20 [ 149.422722][ T4523] should_fail+0x3c1/0x510 [ 149.427340][ T4523] should_fail_usercopy+0x1a/0x20 [ 149.432375][ T4523] copy_fpstate_to_sigframe+0x6d4/0x9a0 [ 149.437940][ T4523] ? fpregs_set+0x540/0x540 [ 149.442458][ T4523] ? get_signal+0x13da/0x1480 [ 149.447168][ T4523] ? fpu__alloc_mathframe+0x88/0x150 [ 149.452470][ T4523] arch_do_signal_or_restart+0x5e3/0x10f0 [ 149.458199][ T4523] ? __send_signal+0x8f6/0xc30 [ 149.462984][ T4523] ? send_signal+0x422/0x580 [ 149.467588][ T4523] ? get_sigframe_size+0x10/0x10 [ 149.472535][ T4523] ? force_sig_info_to_task+0x344/0x3f0 [ 149.478098][ T4523] ? force_sig+0xb7/0x100 [ 149.482447][ T4523] ? send_sig+0x70/0x70 [ 149.486617][ T4523] exit_to_user_mode_loop+0xa7/0xe0 [ 149.491832][ T4523] exit_to_user_mode_prepare+0x5a/0xa0 [ 149.497304][ T4523] irqentry_exit_to_user_mode+0x9/0x10 [ 149.502774][ T4523] irqentry_exit+0x12/0x40 [ 149.507289][ T4523] exc_general_protection+0x1e4/0x270 [ 149.512670][ T4523] ? debug_smp_processor_id+0x17/0x20 [ 149.518492][ T4523] ? do_syscall_64+0x58/0xa0 [ 149.523099][ T4523] asm_exc_general_protection+0x27/0x30 [ 149.528757][ T4523] RIP: 0033:0x7ff1a244b479 [ 149.533182][ T4523] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 149.553064][ T4523] RSP: 002b:00007ff1a0ada7c8 EFLAGS: 00010283 [ 149.559147][ T4523] RAX: 0000000000000999 RBX: 00007ff1a0adad30 RCX: 00007ff1a2659120 [ 149.567147][ T4523] RDX: 9999999999999999 RSI: 00007ff1a24f483c RDI: 9999999999999999 [ 149.575169][ T4523] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 149.583166][ T4523] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 149.591150][ T4523] R13: 00007ff1a0adaeb0 R14: 9999999999999999 R15: 0000000000000000 [ 149.599150][ T4523] [ 149.894457][ T4524] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.980839][ T4524] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.032741][ T4524] device bridge_slave_0 entered promiscuous mode [ 150.048696][ T4524] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.072274][ T4524] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.095128][ T4524] device bridge_slave_1 entered promiscuous mode [ 150.208038][ T4538] FAULT_INJECTION: forcing a failure. [ 150.208038][ T4538] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 150.231560][ T4538] CPU: 1 PID: 4538 Comm: syz.1.1614 Not tainted 5.15.185-syzkaller-00339-ge678c93d43cc #0 [ 150.241603][ T4538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 150.251684][ T4538] Call Trace: [ 150.254980][ T4538] [ 150.257919][ T4538] __dump_stack+0x21/0x30 [ 150.262263][ T4538] dump_stack_lvl+0xee/0x150 [ 150.266953][ T4538] ? show_regs_print_info+0x20/0x20 [ 150.272191][ T4538] dump_stack+0x15/0x20 [ 150.276379][ T4538] should_fail+0x3c1/0x510 [ 150.280830][ T4538] should_fail_usercopy+0x1a/0x20 [ 150.285881][ T4538] _copy_from_user+0x20/0xd0 [ 150.292664][ T4538] generic_map_update_batch+0x4a3/0x740 [ 150.298248][ T4538] ? generic_map_delete_batch+0x510/0x510 [ 150.303983][ T4538] ? __fdget+0x1a1/0x230 [ 150.308333][ T4538] ? generic_map_delete_batch+0x510/0x510 [ 150.314055][ T4538] bpf_map_do_batch+0x463/0x5f0 [ 150.318907][ T4538] __sys_bpf+0x5e3/0x730 [ 150.323146][ T4538] ? bpf_link_show_fdinfo+0x310/0x310 [ 150.331384][ T4538] ? __kasan_check_write+0x14/0x20 [ 150.336612][ T4538] ? switch_fpu_return+0x15d/0x2c0 [ 150.341725][ T4538] __x64_sys_bpf+0x7c/0x90 [ 150.346184][ T4538] x64_sys_call+0x4b9/0x9a0 [ 150.350772][ T4538] do_syscall_64+0x4c/0xa0 [ 150.355186][ T4538] ? clear_bhb_loop+0x50/0xa0 [ 150.359860][ T4538] ? clear_bhb_loop+0x50/0xa0 [ 150.364536][ T4538] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 150.370428][ T4538] RIP: 0033:0x7f26f0b52929 [ 150.374844][ T4538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.397319][ T4538] RSP: 002b:00007f26ef1bb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 150.407877][ T4538] RAX: ffffffffffffffda RBX: 00007f26f0d79fa0 RCX: 00007f26f0b52929 [ 150.415870][ T4538] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 150.423852][ T4538] RBP: 00007f26ef1bb090 R08: 0000000000000000 R09: 0000000000000000 [ 150.431822][ T4538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 150.439877][ T4538] R13: 0000000000000000 R14: 00007f26f0d79fa0 R15: 00007ffd87433748 [ 150.447854][ T4538] [ 152.068322][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 152.082820][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 152.109810][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 152.118421][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 152.127099][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.134206][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.142868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 152.151352][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.162409][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.169468][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.212357][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 152.233226][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 152.274133][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.312857][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 152.342566][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.361226][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 152.369761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 152.418423][ T4524] device veth0_vlan entered promiscuous mode [ 152.428287][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 152.452799][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.497349][ T4524] device veth1_macvtap entered promiscuous mode [ 152.536684][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.556724][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.602534][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 152.692899][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.702473][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 152.742879][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 152.751517][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 152.792086][ T30] audit: type=1400 audit(1750303446.400:137): avc: denied { create } for pid=4564 comm="syz.0.1623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 152.827078][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 152.866375][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.002824][ T306] device bridge_slave_1 left promiscuous mode [ 155.008960][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.016585][ T306] device bridge_slave_0 left promiscuous mode [ 155.022780][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.030555][ T306] device veth1_macvtap left promiscuous mode [ 155.036599][ T306] device veth0_vlan left promiscuous mode [ 155.895640][ T4605] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.908736][ T4605] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.916498][ T4605] device bridge_slave_0 entered promiscuous mode [ 155.932926][ T4624] device veth1_macvtap left promiscuous mode [ 155.960604][ T4605] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.968257][ T4605] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.983250][ T4605] device bridge_slave_1 entered promiscuous mode [ 156.353998][ T4631] device wg2 entered promiscuous mode [ 156.973307][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.981202][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.996691][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.072577][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 157.080838][ T306] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.088211][ T306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.096009][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 157.105086][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 157.113707][ T306] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.120766][ T306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.143553][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 157.162057][ T4656] device sit0 left promiscuous mode [ 157.208089][ T4657] device sit0 entered promiscuous mode [ 157.438602][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.447532][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.456051][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.500966][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.530264][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 157.543247][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 157.603407][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 157.616599][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 157.706718][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 157.715043][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 157.754094][ T4605] device veth0_vlan entered promiscuous mode [ 157.975069][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.005742][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.050335][ T4605] device veth1_macvtap entered promiscuous mode [ 158.098614][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 158.116694][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 158.152978][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 158.192902][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.973074][ T45] device bridge_slave_1 left promiscuous mode [ 159.979428][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.987131][ T45] device bridge_slave_0 left promiscuous mode [ 159.993703][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.001687][ T45] device veth1_macvtap left promiscuous mode [ 160.007774][ T45] device veth0_vlan left promiscuous mode [ 160.622759][ T4708] device veth0_vlan left promiscuous mode [ 160.793834][ T4708] device veth0_vlan entered promiscuous mode [ 160.922783][ T30] audit: type=1400 audit(1750303454.540:138): avc: denied { ioctl } for pid=4714 comm="syz.0.1675" path="socket:[37859]" dev="sockfs" ino=37859 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 161.149803][ T4709] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.156897][ T4709] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.164381][ T4709] device bridge_slave_0 entered promiscuous mode [ 161.241389][ T4709] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.248580][ T4709] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.256284][ T4709] device bridge_slave_1 entered promiscuous mode [ 163.106788][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.117649][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.367445][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.375957][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.384526][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.392898][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.400120][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.407643][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.416123][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.429216][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.436286][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.444021][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.452048][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.472735][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.544680][ T4709] device veth0_vlan entered promiscuous mode [ 163.553023][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.561585][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.569759][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.659668][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.675404][ T4709] device veth1_macvtap entered promiscuous mode [ 163.703429][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.712922][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.826556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.842549][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=1039 state=3 status=67 (errno 32: Broken pipe) [ 164.062534][ T30] audit: type=1400 audit(1750303457.680:139): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[359]" dev="pipefs" ino=359 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 164.832896][ T10] device bridge_slave_1 left promiscuous mode [ 164.839051][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.846925][ T10] device bridge_slave_0 left promiscuous mode [ 164.853158][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.861360][ T10] device veth1_macvtap left promiscuous mode [ 164.867474][ T10] device veth0_vlan left promiscuous mode [ 165.533656][ T281] syz-executor (281) used greatest stack depth: 20672 bytes left [ 166.254267][ T10] device veth1_macvtap left promiscuous mode [ 166.260290][ T10] device veth0_vlan left promiscuous mode [ 166.266342][ T10] device veth0_vlan left promiscuous mode [ 166.272427][ T10] device veth1_macvtap left promiscuous mode [ 166.278415][ T10] device veth0_vlan left promiscuous mode [ 168.453563][ T10] device veth1_macvtap left promiscuous mode [ 168.459590][ T10] device veth0_vlan left promiscuous mode [ 169.221864][ T30] audit: type=1400 audit(1750303462.830:140): avc: denied { read } for pid=4769 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 195) OK Stopping crond: stopped /usr/sbin/crond (pid 185) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 139) [ 169.372901][ T30] audit: type=1400 audit(1750303462.990:141): avc: denied { search } for pid=4781 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 169.457412][ T30] audit: type=1400 audit(1750303463.070:142): avc: denied { write } for pid=140 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 169.487708][ T30] audit: type=1400 audit(1750303463.070:143): avc: denied { remove_name } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 169.509981][ T30] audit: type=1400 audit(1750303463.070:144): avc: denied { unlink } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 169.532849][ T30] audit: type=1400 audit(1750303463.100:145): avc: denied { unlink } for pid=140 comm="dhcpcd" name="pid" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping iptables: [ 169.568680][ T30] audit: type=1400 audit(1750303463.180:146): avc: denied { search } for pid=4795 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 169.590394][ T30] audit: type=1400 audit(1750303463.180:147): avc: denied { write } for pid=4795 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 169.614214][ T30] audit: type=1400 audit(1750303463.180:148): avc: denied { add_name } for pid=4795 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 169.636145][ T30] audit: type=1400 audit(1750303463.180:149): avc: denied { create } for pid=4795 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 Stopping system message bus: done Stopping klogd: OK Stopping acpid: OK Stopping syslogd: stopped /sbin/syslogd (pid 83) OK umount: devtmpfs busy - remounted read-only [ 171.070118][ T4815] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. The system is gSent SIGKILL to all processes Requesting system poweroff [ 173.105052][ T4816] kvm: exiting hardware virtualization [ 173.111235][ T4816] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 173.117816][ T4816] ACPI: PM: Preparing to enter system sleep state S5 [ 173.124806][ T4816] reboot: Power down serialport: VM disconnected.