last executing test programs: 48.158527507s ago: executing program 2 (id=441): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/382], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2, @perf_bp={0x0, 0x1}, 0x10000, 0x6, 0x7, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b9010360fe40f000009e0ff008001fffffe1000087e9450077fbac141411ac1414e0be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) (fail_nth: 27) 47.690105791s ago: executing program 2 (id=443): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x2}, @array={0x0, 0x0, 0x0, 0xa, 0x3, {0x0, 0x2000000}}]}}, 0x0, 0x3e}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x1cb0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) close(0x3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x50) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x2, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x13, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000080000000000000500000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe0000000066090000ffffffffdbaaf0ffa0000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffd5000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000005c9800000000000056080000000000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 47.598092135s ago: executing program 2 (id=446): socketpair(0x1e, 0x3, 0x1, &(0x7f0000000000)) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7369fcc3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="f098794bc787f0e62ad243130d9d4b6bc5ab4a3f4659796f8938b336bb7b322c39e6a6c368ccb134456fa447fb9f925df573d72ba5fba022e71e6fa1e1827d6bdf37789b626e507ee2023829556b3c5ac2bc0e20ee", &(0x7f0000000140)=""/82}, 0x20) 47.526806812s ago: executing program 2 (id=447): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x7}, [@generic={0x6b, 0x1, 0xe, 0x18}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x702, 0xe, 0x700, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 47.472673691s ago: executing program 2 (id=450): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000349b25b0f390e2a0a15ebd4f2020702500000000002020205c1af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0x4}}, @typedef={0x2, 0x0, 0x0, 0x8, 0x2}, @float={0x4, 0x0, 0x0, 0x10, 0x2}]}, {0x0, [0x0, 0x5f, 0x0, 0x61]}}, 0x0, 0x5e}, 0x28) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x702, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000001c0)={'macsec0\x00', @remote}) 47.470856091s ago: executing program 2 (id=451): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7f9}, 0x104101, 0x7, 0x0, 0x1, 0x8000, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x9) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r3, &(0x7f0000000040)='FROZEN\x00', 0x7) r4 = openat$cgroup_procs(r0, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r5, &(0x7f0000000300), 0x2, 0x0) r6 = syz_clone(0x60054000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x9, 0xb, 0x4, 0x2, 0x0, 0x9, 0x51001, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0xc, @perf_config_ext={0x8, 0x3}, 0x8080, 0x5, 0xd, 0x0, 0x1d, 0x3ff, 0x8, 0x0, 0x0, 0x0, 0x8}, r6, 0xc, 0xffffffffffffffff, 0x8) openat$cgroup(r5, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) write$cgroup_pid(r4, &(0x7f0000000180)=r6, 0x12) r8 = openat$cgroup_ro(r0, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r7, 0x80082407, &(0x7f0000000240)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000003c0)=ANY=[], &(0x7f00000004c0)=""/247, 0x47, 0xf7, 0x1, 0x1, 0x10000, @value=r8}, 0x28) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000008140)={&(0x7f0000008000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00007e05000000010000000000000e2200000000000000007fff000000000c0400000000712e2e00"], 0x0, 0x39}, 0x28) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x29, &(0x7f00000000c0)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791210000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x880, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) 32.388242268s ago: executing program 32 (id=451): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7f9}, 0x104101, 0x7, 0x0, 0x1, 0x8000, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x9) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r3, &(0x7f0000000040)='FROZEN\x00', 0x7) r4 = openat$cgroup_procs(r0, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r5, &(0x7f0000000300), 0x2, 0x0) r6 = syz_clone(0x60054000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x9, 0xb, 0x4, 0x2, 0x0, 0x9, 0x51001, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0xc, @perf_config_ext={0x8, 0x3}, 0x8080, 0x5, 0xd, 0x0, 0x1d, 0x3ff, 0x8, 0x0, 0x0, 0x0, 0x8}, r6, 0xc, 0xffffffffffffffff, 0x8) openat$cgroup(r5, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) write$cgroup_pid(r4, &(0x7f0000000180)=r6, 0x12) r8 = openat$cgroup_ro(r0, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r7, 0x80082407, &(0x7f0000000240)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000003c0)=ANY=[], &(0x7f00000004c0)=""/247, 0x47, 0xf7, 0x1, 0x1, 0x10000, @value=r8}, 0x28) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000008140)={&(0x7f0000008000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00007e05000000010000000000000e2200000000000000007fff000000000c0400000000712e2e00"], 0x0, 0x39}, 0x28) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x29, &(0x7f00000000c0)=r10, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791210000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x880, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) 26.34488625s ago: executing program 1 (id=126): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x6, 0x4, 0xc, 0xb, 0x0, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r1}, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x88f}, [@call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={r3, 0x0, 0x28, 0x0, &(0x7f0000000280)="e3006a670004ec67838717bd86dd420d000000d7584909070c8ea465a1c17b2b9b5416107d121c14", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x50) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={&(0x7f0000000340)='./file0\x00', r0}, 0x18) (async) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x7}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r8}, 0xc) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) (rerun: 64) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x10005, [{0x2, 0x5, 0xa}]}, @var={0x4, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x30, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f00000001c0)=""/257, 0x4a, 0x101, 0x6}, 0x28) (async, rerun: 32) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, 0x0) (async, rerun: 32) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000740)={&(0x7f0000000580)="b4447838fc0a3885a30be3d0e3ad3f34887c9cb5d3980631acbcb905343a94fee212396a8257041872636481748e7f875e571d851b3e6d4d0bd968937e31197a64715b16f2ae8c13b36d7c46081d8dc1e8de7521ae1a815a2ffe66df6ef7aa57374ec229f9546c88900e71cbe9fd46446ec7ef4245c7b95d3b74025d6c5333b57ef968c182a3e10f17c85b411f3911aae7c936097f247149508d6f42dcca59513882", &(0x7f0000000640)=""/208, &(0x7f0000000840)="ccd9092340ff0432db78e0ef3cf2bce1c017b02b1b80aee929128f3d9fa4d482a4e9dd56f02bb9708e196791e6283de7b749786886a094e04a69ec096d63f0f3bd122182d20c30ec87e8d8ac7a1ebb7d38d3faa04b19c201", &(0x7f00000008c0)="ad75c8fd5d63f497b21ffec76c2e9b54709824e94e0d36e7454b9b9181e2db6fd5011c7f83a18b00fb98394318cccde389dc9601303651c3bf37d782cf3d7d965f4620ba6309398284c6dd88bf8c28e1f735ceeac9afe12c315ead9cbffe7db83af38fd0f0e2ec74", 0x33b1, r9, 0x4}, 0x38) (async) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@decl_tag={0xc, 0x0, 0x0, 0x11, 0x4, 0x5}]}, {0x0, [0x580ccfe6603c518d]}}, &(0x7f0000000b80)=""/5, 0x2b, 0x5, 0x0, 0x7}, 0x28) (async) r11 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r11, &(0x7f0000000240)}, 0x20) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x8, 0x7, 0x0, 0x3, 0x10900, r7, 0x5b, '\x00', 0x0, r9, 0x2, 0x0, 0x5, 0x0, @void, @value, @value=r9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x4, 0x5, &(0x7f0000000940)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @generic={0x6, 0x4, 0x4, 0xff, 0x8}], &(0x7f0000000980)='syzkaller\x00', 0x7fffffff, 0x7b, &(0x7f0000000b00)=""/123, 0x40f00, 0x61, '\x00', 0x0, @fallback=0xa, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c00)={0x0, 0xe, 0x7}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000cc0)=[r6, r11, r6, r6, r7, r12, r6, r9, r0], 0x0, 0x10, 0x100}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x23}, 0x50) 20.539512526s ago: executing program 1 (id=126): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x6, 0x4, 0xc, 0xb, 0x0, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r1}, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x88f}, [@call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={r3, 0x0, 0x28, 0x0, &(0x7f0000000280)="e3006a670004ec67838717bd86dd420d000000d7584909070c8ea465a1c17b2b9b5416107d121c14", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x50) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={&(0x7f0000000340)='./file0\x00', r0}, 0x18) (async) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x7}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r8}, 0xc) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) (rerun: 64) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x10005, [{0x2, 0x5, 0xa}]}, @var={0x4, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x30, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f00000001c0)=""/257, 0x4a, 0x101, 0x6}, 0x28) (async, rerun: 32) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, 0x0) (async, rerun: 32) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000740)={&(0x7f0000000580)="b4447838fc0a3885a30be3d0e3ad3f34887c9cb5d3980631acbcb905343a94fee212396a8257041872636481748e7f875e571d851b3e6d4d0bd968937e31197a64715b16f2ae8c13b36d7c46081d8dc1e8de7521ae1a815a2ffe66df6ef7aa57374ec229f9546c88900e71cbe9fd46446ec7ef4245c7b95d3b74025d6c5333b57ef968c182a3e10f17c85b411f3911aae7c936097f247149508d6f42dcca59513882", &(0x7f0000000640)=""/208, &(0x7f0000000840)="ccd9092340ff0432db78e0ef3cf2bce1c017b02b1b80aee929128f3d9fa4d482a4e9dd56f02bb9708e196791e6283de7b749786886a094e04a69ec096d63f0f3bd122182d20c30ec87e8d8ac7a1ebb7d38d3faa04b19c201", &(0x7f00000008c0)="ad75c8fd5d63f497b21ffec76c2e9b54709824e94e0d36e7454b9b9181e2db6fd5011c7f83a18b00fb98394318cccde389dc9601303651c3bf37d782cf3d7d965f4620ba6309398284c6dd88bf8c28e1f735ceeac9afe12c315ead9cbffe7db83af38fd0f0e2ec74", 0x33b1, r9, 0x4}, 0x38) (async) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@decl_tag={0xc, 0x0, 0x0, 0x11, 0x4, 0x5}]}, {0x0, [0x580ccfe6603c518d]}}, &(0x7f0000000b80)=""/5, 0x2b, 0x5, 0x0, 0x7}, 0x28) (async) r11 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r11, &(0x7f0000000240)}, 0x20) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x8, 0x7, 0x0, 0x3, 0x10900, r7, 0x5b, '\x00', 0x0, r9, 0x2, 0x0, 0x5, 0x0, @void, @value, @value=r9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x4, 0x5, &(0x7f0000000940)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @generic={0x6, 0x4, 0x4, 0xff, 0x8}], &(0x7f0000000980)='syzkaller\x00', 0x7fffffff, 0x7b, &(0x7f0000000b00)=""/123, 0x40f00, 0x61, '\x00', 0x0, @fallback=0xa, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c00)={0x0, 0xe, 0x7}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000cc0)=[r6, r11, r6, r6, r7, r12, r6, r9, r0], 0x0, 0x10, 0x100}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x23}, 0x50) 14.336484699s ago: executing program 1 (id=126): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x6, 0x4, 0xc, 0xb, 0x0, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r1}, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x88f}, [@call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={r3, 0x0, 0x28, 0x0, &(0x7f0000000280)="e3006a670004ec67838717bd86dd420d000000d7584909070c8ea465a1c17b2b9b5416107d121c14", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x50) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={&(0x7f0000000340)='./file0\x00', r0}, 0x18) (async) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x7}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r8}, 0xc) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) (rerun: 64) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x10005, [{0x2, 0x5, 0xa}]}, @var={0x4, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x30, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f00000001c0)=""/257, 0x4a, 0x101, 0x6}, 0x28) (async, rerun: 32) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, 0x0) (async, rerun: 32) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000740)={&(0x7f0000000580)="b4447838fc0a3885a30be3d0e3ad3f34887c9cb5d3980631acbcb905343a94fee212396a8257041872636481748e7f875e571d851b3e6d4d0bd968937e31197a64715b16f2ae8c13b36d7c46081d8dc1e8de7521ae1a815a2ffe66df6ef7aa57374ec229f9546c88900e71cbe9fd46446ec7ef4245c7b95d3b74025d6c5333b57ef968c182a3e10f17c85b411f3911aae7c936097f247149508d6f42dcca59513882", &(0x7f0000000640)=""/208, &(0x7f0000000840)="ccd9092340ff0432db78e0ef3cf2bce1c017b02b1b80aee929128f3d9fa4d482a4e9dd56f02bb9708e196791e6283de7b749786886a094e04a69ec096d63f0f3bd122182d20c30ec87e8d8ac7a1ebb7d38d3faa04b19c201", &(0x7f00000008c0)="ad75c8fd5d63f497b21ffec76c2e9b54709824e94e0d36e7454b9b9181e2db6fd5011c7f83a18b00fb98394318cccde389dc9601303651c3bf37d782cf3d7d965f4620ba6309398284c6dd88bf8c28e1f735ceeac9afe12c315ead9cbffe7db83af38fd0f0e2ec74", 0x33b1, r9, 0x4}, 0x38) (async) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@decl_tag={0xc, 0x0, 0x0, 0x11, 0x4, 0x5}]}, {0x0, [0x580ccfe6603c518d]}}, &(0x7f0000000b80)=""/5, 0x2b, 0x5, 0x0, 0x7}, 0x28) (async) r11 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r11, &(0x7f0000000240)}, 0x20) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x8, 0x7, 0x0, 0x3, 0x10900, r7, 0x5b, '\x00', 0x0, r9, 0x2, 0x0, 0x5, 0x0, @void, @value, @value=r9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x4, 0x5, &(0x7f0000000940)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @generic={0x6, 0x4, 0x4, 0xff, 0x8}], &(0x7f0000000980)='syzkaller\x00', 0x7fffffff, 0x7b, &(0x7f0000000b00)=""/123, 0x40f00, 0x61, '\x00', 0x0, @fallback=0xa, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c00)={0x0, 0xe, 0x7}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000cc0)=[r6, r11, r6, r6, r7, r12, r6, r9, r0], 0x0, 0x10, 0x100}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x23}, 0x50) 10.763526674s ago: executing program 1 (id=126): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x6, 0x4, 0xc, 0xb, 0x0, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r1}, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x88f}, [@call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={r3, 0x0, 0x28, 0x0, &(0x7f0000000280)="e3006a670004ec67838717bd86dd420d000000d7584909070c8ea465a1c17b2b9b5416107d121c14", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x50) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={&(0x7f0000000340)='./file0\x00', r0}, 0x18) (async) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x7}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r8}, 0xc) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) (rerun: 64) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x10005, [{0x2, 0x5, 0xa}]}, @var={0x4, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x30, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f00000001c0)=""/257, 0x4a, 0x101, 0x6}, 0x28) (async, rerun: 32) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, 0x0) (async, rerun: 32) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000740)={&(0x7f0000000580)="b4447838fc0a3885a30be3d0e3ad3f34887c9cb5d3980631acbcb905343a94fee212396a8257041872636481748e7f875e571d851b3e6d4d0bd968937e31197a64715b16f2ae8c13b36d7c46081d8dc1e8de7521ae1a815a2ffe66df6ef7aa57374ec229f9546c88900e71cbe9fd46446ec7ef4245c7b95d3b74025d6c5333b57ef968c182a3e10f17c85b411f3911aae7c936097f247149508d6f42dcca59513882", &(0x7f0000000640)=""/208, &(0x7f0000000840)="ccd9092340ff0432db78e0ef3cf2bce1c017b02b1b80aee929128f3d9fa4d482a4e9dd56f02bb9708e196791e6283de7b749786886a094e04a69ec096d63f0f3bd122182d20c30ec87e8d8ac7a1ebb7d38d3faa04b19c201", &(0x7f00000008c0)="ad75c8fd5d63f497b21ffec76c2e9b54709824e94e0d36e7454b9b9181e2db6fd5011c7f83a18b00fb98394318cccde389dc9601303651c3bf37d782cf3d7d965f4620ba6309398284c6dd88bf8c28e1f735ceeac9afe12c315ead9cbffe7db83af38fd0f0e2ec74", 0x33b1, r9, 0x4}, 0x38) (async) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@decl_tag={0xc, 0x0, 0x0, 0x11, 0x4, 0x5}]}, {0x0, [0x580ccfe6603c518d]}}, &(0x7f0000000b80)=""/5, 0x2b, 0x5, 0x0, 0x7}, 0x28) (async) r11 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r11, &(0x7f0000000240)}, 0x20) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x8, 0x7, 0x0, 0x3, 0x10900, r7, 0x5b, '\x00', 0x0, r9, 0x2, 0x0, 0x5, 0x0, @void, @value, @value=r9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x4, 0x5, &(0x7f0000000940)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @generic={0x6, 0x4, 0x4, 0xff, 0x8}], &(0x7f0000000980)='syzkaller\x00', 0x7fffffff, 0x7b, &(0x7f0000000b00)=""/123, 0x40f00, 0x61, '\x00', 0x0, @fallback=0xa, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c00)={0x0, 0xe, 0x7}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000cc0)=[r6, r11, r6, r6, r7, r12, r6, r9, r0], 0x0, 0x10, 0x100}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x23}, 0x50) 3.630318896s ago: executing program 1 (id=126): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x6, 0x4, 0xc, 0xb, 0x0, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r1}, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x88f}, [@call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={r3, 0x0, 0x28, 0x0, &(0x7f0000000280)="e3006a670004ec67838717bd86dd420d000000d7584909070c8ea465a1c17b2b9b5416107d121c14", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x50) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={&(0x7f0000000340)='./file0\x00', r0}, 0x18) (async) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x7}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r8}, 0xc) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) (rerun: 64) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x10005, [{0x2, 0x5, 0xa}]}, @var={0x4, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x30, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f00000001c0)=""/257, 0x4a, 0x101, 0x6}, 0x28) (async, rerun: 32) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, 0x0) (async, rerun: 32) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000740)={&(0x7f0000000580)="b4447838fc0a3885a30be3d0e3ad3f34887c9cb5d3980631acbcb905343a94fee212396a8257041872636481748e7f875e571d851b3e6d4d0bd968937e31197a64715b16f2ae8c13b36d7c46081d8dc1e8de7521ae1a815a2ffe66df6ef7aa57374ec229f9546c88900e71cbe9fd46446ec7ef4245c7b95d3b74025d6c5333b57ef968c182a3e10f17c85b411f3911aae7c936097f247149508d6f42dcca59513882", &(0x7f0000000640)=""/208, &(0x7f0000000840)="ccd9092340ff0432db78e0ef3cf2bce1c017b02b1b80aee929128f3d9fa4d482a4e9dd56f02bb9708e196791e6283de7b749786886a094e04a69ec096d63f0f3bd122182d20c30ec87e8d8ac7a1ebb7d38d3faa04b19c201", &(0x7f00000008c0)="ad75c8fd5d63f497b21ffec76c2e9b54709824e94e0d36e7454b9b9181e2db6fd5011c7f83a18b00fb98394318cccde389dc9601303651c3bf37d782cf3d7d965f4620ba6309398284c6dd88bf8c28e1f735ceeac9afe12c315ead9cbffe7db83af38fd0f0e2ec74", 0x33b1, r9, 0x4}, 0x38) (async) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@decl_tag={0xc, 0x0, 0x0, 0x11, 0x4, 0x5}]}, {0x0, [0x580ccfe6603c518d]}}, &(0x7f0000000b80)=""/5, 0x2b, 0x5, 0x0, 0x7}, 0x28) (async) r11 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r11, &(0x7f0000000240)}, 0x20) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x8, 0x7, 0x0, 0x3, 0x10900, r7, 0x5b, '\x00', 0x0, r9, 0x2, 0x0, 0x5, 0x0, @void, @value, @value=r9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x4, 0x5, &(0x7f0000000940)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @generic={0x6, 0x4, 0x4, 0xff, 0x8}], &(0x7f0000000980)='syzkaller\x00', 0x7fffffff, 0x7b, &(0x7f0000000b00)=""/123, 0x40f00, 0x61, '\x00', 0x0, @fallback=0xa, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c00)={0x0, 0xe, 0x7}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000cc0)=[r6, r11, r6, r6, r7, r12, r6, r9, r0], 0x0, 0x10, 0x100}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x23}, 0x50) 1.294690848s ago: executing program 3 (id=727): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x20, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0xa002a0, 0x0, 0x0, 0x0, 0x0, 0x6414, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x10010, 0x2c2b, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffc000000002, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f0000000340)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$LINK_DETACH(0x22, &(0x7f00000003c0)=r2, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000780)='ns/cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e000000620a00ff000000006100081900000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) 1.20015289s ago: executing program 5 (id=728): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x2}, @array={0x0, 0x0, 0x0, 0xa, 0x3, {0x0, 0x2000000}}]}}, 0x0, 0x3e}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x1cb0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) close(0x3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x50) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x2, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x13, 0x1c, &(0x7f0000000d80)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe0000000066090000ffffffffdbaaf0ffa0000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffd50000000800000018220000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000005c9800000000000056080000000000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.117479965s ago: executing program 3 (id=730): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) (async) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8911, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x3, 0x10}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00', 0x1}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8924, &(0x7f0000000080)) 1.072527467s ago: executing program 0 (id=731): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x9e}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x34}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1010000}, 0x90) 1.063205495s ago: executing program 5 (id=732): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0x0, 0x0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000010000)) (async) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000010000)) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, 0x0, 0x5) (async) write$cgroup_subtree(r4, 0x0, 0x5) write$cgroup_subtree(r4, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2d, 'pids'}]}, 0xb) (async) write$cgroup_subtree(r4, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2d, 'pids'}]}, 0xb) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000240)=0x800020025) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x4}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x4}, 0x94) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r1}, 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x5, 0x10001, 0x8, 0x1}, 0x50) close(r5) 969.423748ms ago: executing program 0 (id=733): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="076370757374015364637075"], 0x12) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x80001, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xfffffffffffffd86}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 902.203146ms ago: executing program 0 (id=734): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0x17, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000008000218110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000007000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 839.572304ms ago: executing program 0 (id=735): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000003f0000004000000042000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000a80), 0x1007, r0}, 0x38) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x24, 0x0, 0x0, &(0x7f0000001300)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6af}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0xb, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000010000000000000000000000711818000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x56}, 0x28) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0xe, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000080)={r0, &(0x7f0000001b80), &(0x7f0000001c40)=""/245}, 0x20) 703.76814ms ago: executing program 4 (id=736): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd4, 0xd4, 0x6, [@ptr={0x8001}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @type_tag={0x4, 0x0, 0x0, 0x12, 0x4}, @enum64={0xa, 0x4, 0x0, 0x13, 0x1, 0xa, [{0xf, 0xa5a, 0x7}, {0x9, 0x5, 0x8}, {0x1, 0xa7, 0x6}, {0x8, 0x629e, 0x1}]}, @const={0x7, 0x0, 0x0, 0xa, 0x3}, @enum64={0xe, 0x5, 0x0, 0x13, 0x0, 0x1, [{0x9, 0x8, 0x8}, {0x5, 0x9, 0x7}, {0x6, 0x9, 0xc5e}, {0x6, 0xf, 0xffffffff}, {0x10, 0x40, 0xff}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x30, 0x0, 0x31, 0x7}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x48, 0x0, 0xc, 0x5}]}, {0x0, [0x30, 0x0, 0x0, 0x2e]}}, &(0x7f0000000240)=""/48, 0xf2, 0x30, 0x0, 0x7}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x20, &(0x7f00000004c0)={&(0x7f0000000300)=""/130, 0x82, 0x0, &(0x7f00000003c0)=""/243, 0xf3}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x10, 0x14, &(0x7f0000000540)=@raw=[@tail_call, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x10001}}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x5}, @ldst={0x2, 0x1, 0x2, 0x8, 0x6, 0x40}], &(0x7f0000000600)='syzkaller\x00', 0x498421c7, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x1, 0x7, 0xd0b19a4, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f00000006c0)=[0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000700)=[{0x4, 0x4, 0xd, 0xb}, {0x0, 0x4, 0x3, 0xb}, {0x3, 0x4, 0x2, 0xb}], 0x10, 0x1}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x2, 0x3, 0x2, 0x9, 0x9, 0x40, 0x4}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x6d, '\x00', r1, @fallback=0x16, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x2, 0xc, 0xffffffff, 0x1}, 0x10, r3, r4, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, '\x00', r1, r2, 0x1, 0x2, 0x3}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000940)={0x1, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000980), &(0x7f00000009c0)}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d00)={0x1b, 0x0, 0x0, 0x5, 0x0, 0x1, 0x401, '\x00', r1, r2, 0x0, 0x2, 0x5}, 0x50) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000d80)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8e, '\x00', 0x0, r2, 0x2, 0x3, 0x5}, 0x50) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e00)={r0, 0x1, 0x10}, 0xc) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x1e, 0x23, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4a56}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@exit, @generic={0x9, 0xe, 0xe, 0xdb7e, 0x7}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x4}, @map_fd={0x18, 0x0, 0x1, 0x0, r7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r8}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b80)='GPL\x00', 0x9, 0xff, &(0x7f0000000bc0)=""/255, 0x41100, 0x0, '\x00', r1, @fallback=0x1a, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000cc0)={0x4, 0x0, 0x8, 0x10}, 0x10, r3, 0xffffffffffffffff, 0x2, &(0x7f0000000e40)=[0xffffffffffffffff, 0x1, r9, r10, r11, 0xffffffffffffffff], &(0x7f0000000e80)=[{0x1, 0x2, 0x2, 0x4}, {0x3, 0x1, 0xa, 0x1}], 0x10, 0x4}, 0x94) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{r11, 0xffffffffffffffff}, &(0x7f0000000f80), &(0x7f0000000fc0)=r12}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r5) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001040)={0xffffffffffffffff, r5, 0x4, r12}, 0x10) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x72dfa20a7aca895f, 0x2, &(0x7f00000010c0)=@raw=[@btf_id={0x18, 0x4, 0x3, 0x0, 0x5}], &(0x7f0000001100)='GPL\x00', 0x9, 0x35, &(0x7f0000001140)=""/53, 0x41000, 0x38, '\x00', r1, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x4, 0x10, 0x1000}, 0x10, 0x0, r12, 0x5, &(0x7f0000001200)=[r10, r11], &(0x7f0000001240)=[{0x4, 0x2, 0x5, 0x7}, {0x4, 0x3, 0x5, 0x6}, {0x0, 0x2, 0x0, 0x9}, {0x97fd, 0x2, 0x10, 0x4}, {0x1, 0x4, 0x9, 0xa}], 0x10, 0x7f}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000013c0)={{r4}, &(0x7f0000001080), &(0x7f0000001380)=r14}, 0x20) close(r13) r15 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001600)=@o_path={&(0x7f00000015c0)='./file0\x00', 0x0, 0x8, r13}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000016c0)={{r11, 0xffffffffffffffff}, &(0x7f0000001640), &(0x7f0000001680)='%ps \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x18, 0x1, &(0x7f0000001400)=@raw=[@call={0x85, 0x0, 0x0, 0xd}], &(0x7f0000001440)='GPL\x00', 0xeb7a, 0xd2, &(0x7f0000001480)=""/210, 0x0, 0x33, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000001580)={0x7, 0x4}, 0x8, 0x10, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001700)=[r15, r16, r14], &(0x7f0000001740)=[{0x1, 0x2, 0x0, 0x7}, {0x5, 0x2, 0x10, 0x1}], 0x10, 0x787}, 0x94) bpf$LINK_DETACH(0x22, &(0x7f0000001840), 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001a40)={r8, &(0x7f0000001880)="84a4aa4dcc40487a4de5eeb3783f4aa2b270031a7e9194cb7eaa1a7452ed7f752c5133914732c31ee178f313cc52db519ac41ed7d6e7cc2c79ff93f314947eaeb54ce787bd24bf36702844ec868680cc7cdaea90546a918b75b849e18e0a0b17ecbc2d06de587941810e99b2dfbaeee54d8898174284214fa3b19401b05048505521938a144ef91a95d179c2e63d5e9e0bc45e2dea6caecead1f323dda7d20db7c21ab25a0917e242564f28f91411fcb7be318aa97fc172cb7b80a427f0afc", &(0x7f0000001940)=""/219}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001a80)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x5, '\x00', r1, r2, 0x1, 0x2, 0x3}, 0x50) syz_clone(0x400000, &(0x7f0000001b00)="ebd855db687b4d6e0e1018b5222de388e5481ed2cbc9d4c2a34c6e0ce9f06ec4e2c8567da1625823866da0bb5b6ff1e639bf3136622df7eaa71af7b129d0b9cb38fd7d30654211aa51f72cc50039bee2026edf9a66dc", 0x56, &(0x7f0000001b80), &(0x7f0000001bc0), &(0x7f0000001c00)="184c289ee899e03144bd3bc75bc6d16032d82d41452f7933193d65205434429bbb88f1fd4d380796ffd76c6ab4364646713635980df8cd5a4526d3d7da0ec20ca0dee3e3634f305eb7c83c1b872459d061b6a23c6b886968f7ccbac9913170394f4e29232b2d0e397c99ded328dc4d739f7df99fbb173c4707522ab0c46633a6a605d49dab043be995522e98ee4603b1480529809179840ebcf1311d366b") r17 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001cc0)={0x1b, 0x0, 0x0, 0xa, 0x0, r10, 0x7b, '\x00', r1, r2, 0x4, 0x5, 0x2}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001dc0)={r17, 0x58, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002040)={0x6, 0x2, &(0x7f0000001e00)=@raw=[@map_fd={0x18, 0x4, 0x1, 0x0, r11}], &(0x7f0000001e40)='GPL\x00', 0x6, 0xad, &(0x7f0000001e80)=""/173, 0x41000, 0x10, '\x00', r18, 0x25, r2, 0x8, &(0x7f0000001f40)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001f80)={0x3, 0x2, 0x5e, 0x10001}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001fc0)=[r16], &(0x7f0000002000)=[{0x5, 0x5, 0xb, 0x2}, {0x0, 0x3, 0xc, 0x2}, {0x3, 0x2, 0xf, 0x1}, {0x1, 0x3, 0x5, 0x9}], 0x10, 0x4}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000002140)=r12, 0x4) 572.652845ms ago: executing program 4 (id=737): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ac0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xba}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000001840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000000704000044ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008b000008500000069000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000e80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 572.008855ms ago: executing program 5 (id=738): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x3, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r0}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000ffb00000000000000000000004000000bb7f1af8c600feff0000000a9500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x7000000}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xd, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x24}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="000000000001000000000000000000002246f53d", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r3, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r7, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000001500)=[{0x0}, {&(0x7f00000001c0)="b339033c124a24fc7a6c55f0bbc1cb9722034656987111149d651725325c64573fb7fc46e19ac95e448f82582080c8492e9131d673a5018edf95a9b09b16df9a53cb15be8287372b76650e3bde684dcd138cee3d7697735e8487dca005d10aa222ebd05e1be77f29f2e1f190424906ca5f185cb896065d769c8afff2b8a2b5bbc066112b8efae6162816cdf4370f29a1b90a07e4b853d285996f7d934a30cad5a54b1c0aa1088d79a5d6dff44e220bc6936558e7649fec915f7b3de19cca93ba5da94d5603", 0xc5}, {0x0}, {&(0x7f0000000380)="a0921d2f5d5dc14f3c2c0e402a88a82375bf9c355d9900aa1c42309325b6b5f4", 0x20}], 0x4}, 0x40880) recvmsg(r8, &(0x7f0000004ec0)={0x0, 0x0, 0x0}, 0x40010020) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)={0x1b, 0x0, 0x0, 0x1, 0x0, r4, 0xb67f, '\x00', r5, r6, 0x5, 0x0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x16, 0x3, 0x0, &(0x7f0000000480)='syzkaller\x00'}, 0x94) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x14, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x2, 0x83, &(0x7f00000004c0)=""/131, 0x40f00, 0x43, '\x00', r5, @lirc_mode2, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0x3, 0x5, 0xff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000980), 0x10, 0x4}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 544.82946ms ago: executing program 4 (id=739): r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000040)={'b', ' *:* ', 'r\x00'}, 0x8) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@fallback=r0, 0x11, 0x1, 0x31f, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8010, r0}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r4, r1, 0x30, 0x10, 0x0, @void, @value=r5, @void, @void, r3}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@cgroup=r4, r5, 0x1c, 0x14, r2, @void, @value=r1, @void, @void, r3}, 0x20) openat$cgroup(r4, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) close(r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r2, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xae, &(0x7f0000000480)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x7e, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={r2, 0xffffffffffffffff}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000700)={r2, r7}, 0xc) bpf$ENABLE_STATS(0x20, &(0x7f0000000740), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f00000007c0)={0x1, 0x9, [@random="defeedd11a4c", @remote, @random="ba9bb85dd46c", @random="d492073ea3cd", @multicast, @multicast, @multicast, @multicast, @random="edfd4918bd8d"]}) sendmsg$tipc(r2, &(0x7f0000000a80)={&(0x7f0000000800)=@name={0x1e, 0x2, 0x2, {{0x1, 0x2}, 0x3}}, 0x10, &(0x7f0000000940)=[{&(0x7f0000000840)="573f3d88108f7f70e7bc7c771cdf88c74048c8e04a9dcaa6d4b4c527ea5abdc31436316d4ffd942af269b85c83549df2edd63519bdcba494a50452b13996ea829b09bdcbf77b20233c3ca1edd6283a2fbb2677c147b9c988e585d251e5f7564dd29e3fa9b99ec7001013dff798d02f685391218e348a1def7370bce3636a7f77206ecedb11aed720cfc2887860ac464b3442fdff341fb1b215cec54ba328e46123665065ac9a26f185089c5e06adfba6b8011eb799b13437404801fce4dd7358f2da6a56d150f2c4d1fe5ea0dc6e8d0c223478ffff853f29710ae8c2600bb062", 0xe0}], 0x1, &(0x7f0000000980)="33eb9a6cb50ccfc31ebcabe212a1f12160842e44f89bbe215fe3a8421d998dbfd6f81a58671096c8422a4e80cee6071dc9edccc869da957639ecc07026d77bb3c662509ec2f3e6af4f58ceed80b2e20bbe69c44a77e3cc1766b3e458b73875e35249241dac74f51b7471288c2c4cdae60d89c64819e89c4228e6b81a075235822535ae4ed5760ef8560d35f151f1eda4fcdcee3141e5e677df32630e0731e72451018fd351b743b3f35d8db099e85ac1e6845d02a5bf6d0954f703fbf445110fd998773fecd53798c125b96e486b12", 0xcf, 0x24008840}, 0x44011) r8 = syz_clone(0x40000000, &(0x7f0000000ac0)="a1ecb3ea48c8b45c05d6339f33b55c89590470899542fe3e821c1613e8797d8ebcbc46d735461caa658171d6ce6b", 0x2e, &(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)="69f24ed31b5d2e072c720631ed7fef26ea0989e364893515d1a4890b725eff411795ca7eb89556b01c7612d419171beb3ce7e50011354e24058984fd2862991b5280cc69d4eb758cf9ae") r9 = syz_open_procfs$namespace(r8, &(0x7f0000000c00)='ns/ipc\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000dc0)={r2, &(0x7f0000000c40)="13d14a27835f3da19106e09bfa416acb7d2550e53c4aa4f0f69534d8a4697d4adee028b956b3513d07a89a3e46ac43318e26bf226b0758c8a2215dc5be271c8f18728c0c8814cccea300e97504550381ce06b0", &(0x7f0000000cc0)=""/204}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000e00)) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001040)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x3, '\x00', r6, r2, 0x2, 0x5, 0x1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x18, 0xd, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0x7, 0x3, 0x6, 0x30, 0x10}, @map_val={0x18, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x3}]}, &(0x7f0000000ec0)='GPL\x00', 0x2, 0x97, &(0x7f0000000f00)=""/151, 0x41000, 0x2, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000fc0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001000)={0x0, 0x4, 0x4, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000010c0)=[r7, r2, r7, r7, 0xffffffffffffffff, r10, r2], 0x0, 0x10, 0x4}, 0x94) openat$cgroup_procs(r4, &(0x7f00000011c0)='tasks\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001440)={0x11, 0x5, &(0x7f0000001200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x60db0d20, 0x0, 0x0, 0x0, 0x80000001}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000}]}, &(0x7f0000001240)='GPL\x00', 0xe5c, 0xa, &(0x7f0000001280)=""/10, 0x40f00, 0x0, '\x00', r6, 0x0, r2, 0x8, &(0x7f00000012c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000001300)={0x3, 0x5, 0x7ff, 0x8}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001340)=[r10, r7, r7, r10, r2, r9], &(0x7f0000001380)=[{0x4, 0x1, 0x7, 0x4}, {0x1, 0x4, 0x1, 0xa}, {0x2, 0x4, 0x10, 0x4}, {0x4, 0x5, 0x6}, {0x0, 0x3, 0x0, 0x9}, {0x4, 0xc, 0x5, 0xc}, {0x5, 0x4, 0xb, 0x6}, {0x5, 0x5, 0x0, 0x9}, {0x3, 0x3, 0xc, 0x7}, {0x5, 0x3, 0x10, 0x3}], 0x10, 0x800}, 0x94) r11 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001540)={r11, r7, 0x0, 0x2, &(0x7f0000001500)='#\x00'}, 0x30) bpf$MAP_CREATE(0x0, &(0x7f0000001580)=@bloom_filter={0x1e, 0x9, 0x2, 0x3, 0x14000, r10, 0xf, '\x00', r6, r2, 0x0, 0x2, 0x0, 0x9, @void, @value, @value=r2}, 0x50) 403.980744ms ago: executing program 3 (id=740): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465c4d40c9fc564e0bbfc7553358380b3a1f59916ffc9bf0bdf81524f07fb2819bf5774fedda52e39c90af27db5b56024df96b4673b4e8d5467e114604ea09b290a248a120c9c6e69f603ff0e80677eeba68562eb8ae2bcd87cef9000000a39c15a7ef365cc27dfeac7bb40e9048517354b0ca4f9cf8b59ee6fa003fe1f2c4c15f20a07db4583a462d8be6602186fd68ee14a19e9b5381791cbf0ceb42122b8635a66ce6b5b92356081bc0f18a0ca83dbc08c2daa235197f1496679a9813c1efa26001b3f486ebfaae85c4d0b96778478ae5355e6f923b1105696904fa93fa915ab8e1e0d7f31ebd19455e6827cd493907bf9d00"/382], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2, @perf_bp={0x0, 0x1}, 0x10000, 0x6, 0x7, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b9010360fe40f000009e0ff008001fffffe1000087e9456077fbac141411ac1414e0be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 349.432584ms ago: executing program 0 (id=741): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000011c0)={r0, &(0x7f00000000c0)="be3c8b060b4d30b44de0a24b77eae0da4af4b76f74077c63af26b530de572bcf32358569ca43c1fb295004054d99aa4f5449328dc5fe5fa84c63ffdfbed692561c208304d2c890c37b90c227c7ddf0f689bc39edfd51729777508b54175dd1b5a81fd57e2d32365ce8021f8ae0333379d622ba6858dee654f35c8ef83de1596bbfe68e33b8dc7377ebcadae3dcfbc19720d36f528dcfc5b05035aeef64b2bf053565d1ba8678f585a7a29a433c194b9213e1d9d67e468bf293bd058db17f157d39343150851de050c4fe511e420046ae53c9aec18f7e4940fff4dcd0c579d10004560acfd77f0718cd57aeb4034900da", &(0x7f00000001c0)=""/4096}, 0x20) 348.402544ms ago: executing program 0 (id=742): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xe, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18000020010000000000000000000000a5000000a000000030a5f55457721a1757da3ac8131d7b481d"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x63, '\x00', 0x0, @sk_skb=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x7}, 0x4000, 0x0, 0x7fff, 0x6, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x36d8}, 0x0, 0xf7ffffbfffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="400180d13c9eb3af", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000c00)=ANY=[@ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000280)='5', 0x1}], 0x1}, 0x4040005) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x4}, 0x10541, 0xc8, 0x9, 0x0, 0x0, 0x2, 0xaa6e, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r5) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="0900000017000000080000000400000042000000", @ANYRES32=0x1, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200000000000000e7ff0000000010000000006e6f0979555400"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x1000, r7}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x2, 0x0, 0x0, 0x0, 0x7, 0x810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2005, 0x2, @perf_bp={&(0x7f00000002c0), 0xa}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x100000000000002, 0xffffffffffffffff, 0x9) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r8, 0x702, 0xe, 0x0, &(0x7f0000000580)="e460334470d8d400eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 337.433752ms ago: executing program 4 (id=743): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x2}, @array={0x0, 0x0, 0x0, 0xa, 0x3, {0x0, 0x2000000}}]}}, 0x0, 0x3e}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x1cb0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) close(0x3) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x50) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x2, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x13, 0x1c, &(0x7f0000000d80)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe0000000066090000ffffffffdbaaf0ffa0000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffd50000000800000018220000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000005c9800000000000056080000000000008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 321.63533ms ago: executing program 3 (id=744): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="076370757374015364637075"], 0x12) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x80001, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xfffffffffffffd86}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) 170.096782ms ago: executing program 3 (id=745): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0xc, &(0x7f0000000dc0)=ANY=[@ANYBLOB="1800000000000000000000000000000885000000110000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000b986c12a850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[], &(0x7f0000000000)=""/138, 0x4a, 0x8a, 0x1}, 0x28) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000000)='./file1\x00') r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu&\t\t') r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000180)={@fallback=r1, r1, 0x10, 0x0, 0x0, @void, @value=r1}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)=ANY=[], 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x3, 0x0, 0x10, 0xfc, 0x0, 0x0, 0x200, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x3}, 0x0, 0xc8, 0x9, 0x7, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x8, 0x0, 0x200000000000}, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6334ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc0008"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) close(r1) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000540000005000000070000006b111800"/32], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0}, 0x94) 151.916438ms ago: executing program 4 (id=746): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x9e}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x34}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x90) 79.551825ms ago: executing program 4 (id=747): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x0, 0x8, &(0x7f00000002c0), &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, 0x0, 0x0, 0x4, 0xc7, &(0x7f0000000140)=""/199, 0x0, 0x40}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg(0xffffffffffffffff, 0x0, 0x20004004) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x98040, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0xf) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, 0x0, 0x20000014) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002440)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720ac4ff000000007110cb00000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7f7bf4d2c1cd3a437120111", @ANYRES32=r4, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r5) socketpair(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r5, &(0x7f0000000080), 0x11ffffce1) close(r6) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 79.039905ms ago: executing program 5 (id=748): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0x17, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000f000218110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000007000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 78.225585ms ago: executing program 3 (id=749): bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000200)={0xfffffffffffffffc, 0x0, 0x0}, 0x10000) sendmsg$inet(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000000)="cd", 0x1}], 0x1}, 0x8004) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x2}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10010, 0x2c2b, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x702, 0xe, 0x0, &(0x7f0000000580)="e460334470d8d400eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001340)) (async) recvmsg$unix(r0, &(0x7f0000000200)={0xfffffffffffffffc, 0x0, 0x0}, 0x10000) (async) sendmsg$inet(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000000)="cd", 0x1}], 0x1}, 0x8004) (async) close(r1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) (async) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x2}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x10010, 0x2c2b, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x702, 0xe, 0x0, &(0x7f0000000580)="e460334470d8d400eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) 1.378331ms ago: executing program 5 (id=750): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ac0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xba}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000001840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000000704000044ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008d000008500000069000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000e80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 353.171µs ago: executing program 5 (id=751): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x80000, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000180)=r0, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000100)) write$cgroup_pid(r0, &(0x7f00000005c0), 0x12) perf_event_open(&(0x7f0000000100)={0x8, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0xb0d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x2, 0xffffffffffffffff, 0x0) close(0x3) close(0x4) 0s ago: executing program 1 (id=126): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x6, 0x4, 0xc, 0xb, 0x0, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r1}, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x88f}, [@call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a80)={r3, 0x0, 0x28, 0x0, &(0x7f0000000280)="e3006a670004ec67838717bd86dd420d000000d7584909070c8ea465a1c17b2b9b5416107d121c14", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x50) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={&(0x7f0000000340)='./file0\x00', r0}, 0x18) (async) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) (async, rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x7}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r8}, 0xc) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) (rerun: 64) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@struct={0x8, 0x1, 0x0, 0xf, 0x0, 0x10005, [{0x2, 0x5, 0xa}]}, @var={0x4, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x30, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f00000001c0)=""/257, 0x4a, 0x101, 0x6}, 0x28) (async, rerun: 32) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, 0x0) (async, rerun: 32) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000740)={&(0x7f0000000580)="b4447838fc0a3885a30be3d0e3ad3f34887c9cb5d3980631acbcb905343a94fee212396a8257041872636481748e7f875e571d851b3e6d4d0bd968937e31197a64715b16f2ae8c13b36d7c46081d8dc1e8de7521ae1a815a2ffe66df6ef7aa57374ec229f9546c88900e71cbe9fd46446ec7ef4245c7b95d3b74025d6c5333b57ef968c182a3e10f17c85b411f3911aae7c936097f247149508d6f42dcca59513882", &(0x7f0000000640)=""/208, &(0x7f0000000840)="ccd9092340ff0432db78e0ef3cf2bce1c017b02b1b80aee929128f3d9fa4d482a4e9dd56f02bb9708e196791e6283de7b749786886a094e04a69ec096d63f0f3bd122182d20c30ec87e8d8ac7a1ebb7d38d3faa04b19c201", &(0x7f00000008c0)="ad75c8fd5d63f497b21ffec76c2e9b54709824e94e0d36e7454b9b9181e2db6fd5011c7f83a18b00fb98394318cccde389dc9601303651c3bf37d782cf3d7d965f4620ba6309398284c6dd88bf8c28e1f735ceeac9afe12c315ead9cbffe7db83af38fd0f0e2ec74", 0x33b1, r9, 0x4}, 0x38) (async) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@decl_tag={0xc, 0x0, 0x0, 0x11, 0x4, 0x5}]}, {0x0, [0x580ccfe6603c518d]}}, &(0x7f0000000b80)=""/5, 0x2b, 0x5, 0x0, 0x7}, 0x28) (async) r11 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r11, &(0x7f0000000240)}, 0x20) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x8, 0x7, 0x0, 0x3, 0x10900, r7, 0x5b, '\x00', 0x0, r9, 0x2, 0x0, 0x5, 0x0, @void, @value, @value=r9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x4, 0x5, &(0x7f0000000940)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @generic={0x6, 0x4, 0x4, 0xff, 0x8}], &(0x7f0000000980)='syzkaller\x00', 0x7fffffff, 0x7b, &(0x7f0000000b00)=""/123, 0x40f00, 0x61, '\x00', 0x0, @fallback=0xa, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c00)={0x0, 0xe, 0x7}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000cc0)=[r6, r11, r6, r6, r7, r12, r6, r9, r0], 0x0, 0x10, 0x100}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x23}, 0x50) kernel console output (not intermixed with test programs): _64_after_hwframe+0x66/0xd0 [ 66.923400][ T1707] ? __kasan_check_read+0x11/0x20 [ 66.928415][ T1707] ? bpf_test_timer_continue+0x146/0x4a0 [ 66.934042][ T1707] bpf_test_run+0x351/0x900 [ 66.938541][ T1707] ? convert___skb_to_skb+0x4f0/0x4f0 [ 66.943912][ T1707] ? eth_get_headlen+0x200/0x200 [ 66.948843][ T1707] ? convert___skb_to_skb+0x41/0x4f0 [ 66.954128][ T1707] bpf_prog_test_run_skb+0x9ec/0x1150 [ 66.959495][ T1707] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 66.965380][ T1707] bpf_prog_test_run+0x3d5/0x630 [ 66.970307][ T1707] ? bpf_prog_query+0x230/0x230 [ 66.975146][ T1707] ? selinux_bpf+0xce/0xf0 [ 66.979553][ T1707] ? security_bpf+0x82/0xa0 [ 66.984050][ T1707] __sys_bpf+0x590/0x7d0 [ 66.988281][ T1707] ? bpf_link_show_fdinfo+0x330/0x330 [ 66.993647][ T1707] ? debug_smp_processor_id+0x17/0x20 [ 66.999018][ T1707] __x64_sys_bpf+0x7c/0x90 [ 67.003425][ T1707] x64_sys_call+0x4b9/0x9a0 [ 67.007919][ T1707] do_syscall_64+0x4c/0xa0 [ 67.012328][ T1707] ? clear_bhb_loop+0x50/0xa0 [ 67.016994][ T1707] ? clear_bhb_loop+0x50/0xa0 [ 67.021664][ T1707] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 67.027568][ T1707] RIP: 0033:0x7f91ac5b4799 [ 67.031987][ T1707] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 67.051585][ T1707] RSP: 002b:00007f91ab00f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 67.059994][ T1707] RAX: ffffffffffffffda RBX: 00007f91ac82dfa0 RCX: 00007f91ac5b4799 [ 67.067960][ T1707] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 67.075929][ T1707] RBP: 00007f91ab00f090 R08: 0000000000000000 R09: 0000000000000000 [ 67.083893][ T1707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 67.091871][ T1707] R13: 00007f91ac82e038 R14: 00007f91ac82dfa0 R15: 00007ffc2ee31398 [ 67.099848][ T1707] [ 67.121845][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 67.160478][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 67.172617][ T1618] device veth1_macvtap entered promiscuous mode [ 67.362292][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 67.370577][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 67.427341][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 67.436437][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 67.518005][ T1726] device wg2 entered promiscuous mode [ 67.538664][ T1731] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 67.548980][ T1731] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 67.562862][ T1731] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 67.572115][ T1731] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 67.581404][ T1731] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 67.606830][ T1731] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 67.622835][ T1731] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 67.681896][ T1731] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 67.694649][ T1731] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 67.723266][ T1731] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 68.617426][ T1746] ¥: port 1(dummy0) entered blocking state [ 68.623319][ T1746] ¥: port 1(dummy0) entered disabled state [ 68.629362][ T1746] device dummy0 entered promiscuous mode [ 68.687354][ T1753] FAULT_INJECTION: forcing a failure. [ 68.687354][ T1753] name failslab, interval 1, probability 0, space 0, times 0 [ 68.704327][ T1753] CPU: 0 PID: 1753 Comm: syz.0.406 Tainted: G W syzkaller #0 [ 68.713026][ T1753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 68.723072][ T1753] Call Trace: [ 68.726362][ T1753] [ 68.729280][ T1753] __dump_stack+0x21/0x30 [ 68.733601][ T1753] dump_stack_lvl+0x110/0x170 [ 68.738265][ T1753] ? show_regs_print_info+0x20/0x20 [ 68.743454][ T1753] dump_stack+0x15/0x20 [ 68.747601][ T1753] should_fail+0x3c1/0x510 [ 68.752002][ T1753] __should_failslab+0xa4/0xe0 [ 68.756756][ T1753] should_failslab+0x9/0x20 [ 68.761250][ T1753] slab_pre_alloc_hook+0x3b/0xe0 [ 68.766174][ T1753] ? skb_clone+0x1cf/0x360 [ 68.770594][ T1753] kmem_cache_alloc+0x44/0x260 [ 68.775354][ T1753] skb_clone+0x1cf/0x360 [ 68.779595][ T1753] bpf_clone_redirect+0x17c/0x4b0 [ 68.784620][ T1753] bpf_prog_801cabf80fc815cd+0x59/0xd10 [ 68.790152][ T1753] ? __kasan_slab_alloc+0xcf/0xf0 [ 68.795197][ T1753] ? __kasan_slab_alloc+0xbd/0xf0 [ 68.800296][ T1753] ? slab_post_alloc_hook+0x4f/0x2b0 [ 68.805569][ T1753] ? kmem_cache_alloc+0xf7/0x260 [ 68.810755][ T1753] ? __build_skb+0x2d/0x310 [ 68.815351][ T1753] ? build_skb+0x24/0x200 [ 68.819669][ T1753] ? bpf_prog_test_run_skb+0x279/0x1150 [ 68.825202][ T1753] ? bpf_prog_test_run+0x3d5/0x630 [ 68.830390][ T1753] ? __sys_bpf+0x590/0x7d0 [ 68.834810][ T1753] ? __x64_sys_bpf+0x7c/0x90 [ 68.839402][ T1753] ? x64_sys_call+0x4b9/0x9a0 [ 68.844068][ T1753] ? do_syscall_64+0x4c/0xa0 [ 68.848650][ T1753] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 68.854718][ T1753] ? __kasan_check_read+0x11/0x20 [ 68.859728][ T1753] ? bpf_test_timer_continue+0x146/0x4a0 [ 68.865353][ T1753] bpf_test_run+0x351/0x900 [ 68.869850][ T1753] ? convert___skb_to_skb+0x4f0/0x4f0 [ 68.875216][ T1753] ? eth_get_headlen+0x200/0x200 [ 68.880145][ T1753] ? convert___skb_to_skb+0x41/0x4f0 [ 68.885417][ T1753] bpf_prog_test_run_skb+0x9ec/0x1150 [ 68.890778][ T1753] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 68.896656][ T1753] bpf_prog_test_run+0x3d5/0x630 [ 68.901587][ T1753] ? bpf_prog_query+0x230/0x230 [ 68.906423][ T1753] ? selinux_bpf+0xce/0xf0 [ 68.910829][ T1753] ? security_bpf+0x82/0xa0 [ 68.915319][ T1753] __sys_bpf+0x590/0x7d0 [ 68.919557][ T1753] ? bpf_link_show_fdinfo+0x330/0x330 [ 68.924918][ T1753] ? debug_smp_processor_id+0x17/0x20 [ 68.930282][ T1753] __x64_sys_bpf+0x7c/0x90 [ 68.934689][ T1753] x64_sys_call+0x4b9/0x9a0 [ 68.939270][ T1753] do_syscall_64+0x4c/0xa0 [ 68.943670][ T1753] ? clear_bhb_loop+0x50/0xa0 [ 68.948331][ T1753] ? clear_bhb_loop+0x50/0xa0 [ 68.952991][ T1753] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 68.958871][ T1753] RIP: 0033:0x7f65bd50e799 [ 68.963279][ T1753] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 68.983052][ T1753] RSP: 002b:00007f65bbf69028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 68.991460][ T1753] RAX: ffffffffffffffda RBX: 00007f65bd787fa0 RCX: 00007f65bd50e799 [ 68.999453][ T1753] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 69.007425][ T1753] RBP: 00007f65bbf69090 R08: 0000000000000000 R09: 0000000000000000 [ 69.015402][ T1753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 69.023370][ T1753] R13: 00007f65bd788038 R14: 00007f65bd787fa0 R15: 00007ffd93f4c5d8 [ 69.031337][ T1753] [ 69.045419][ T8] device bridge_slave_1 left promiscuous mode [ 69.051569][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.147491][ T8] device bridge_slave_0 left promiscuous mode [ 69.170664][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.265008][ T8] device veth1_macvtap left promiscuous mode [ 69.271053][ T8] device veth0_vlan left promiscuous mode [ 69.718704][ T1789] device sit0 entered promiscuous mode [ 69.906095][ T1756] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.913336][ T1756] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.920731][ T1756] device bridge_slave_0 entered promiscuous mode [ 69.928705][ T1756] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.936249][ T1756] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.944392][ T1815] FAULT_INJECTION: forcing a failure. [ 69.944392][ T1815] name failslab, interval 1, probability 0, space 0, times 0 [ 69.948684][ T1756] device bridge_slave_1 entered promiscuous mode [ 69.961058][ T1815] CPU: 0 PID: 1815 Comm: syz.4.425 Tainted: G W syzkaller #0 [ 69.971990][ T1815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 69.982048][ T1815] Call Trace: [ 69.985330][ T1815] [ 69.988406][ T1815] __dump_stack+0x21/0x30 [ 69.992750][ T1815] dump_stack_lvl+0x110/0x170 [ 69.997956][ T1815] ? show_regs_print_info+0x20/0x20 [ 70.003157][ T1815] dump_stack+0x15/0x20 [ 70.007389][ T1815] should_fail+0x3c1/0x510 [ 70.011789][ T1815] __should_failslab+0xa4/0xe0 [ 70.016561][ T1815] should_failslab+0x9/0x20 [ 70.021069][ T1815] slab_pre_alloc_hook+0x3b/0xe0 [ 70.026005][ T1815] ? skb_clone+0x1cf/0x360 [ 70.030408][ T1815] kmem_cache_alloc+0x44/0x260 [ 70.035168][ T1815] skb_clone+0x1cf/0x360 [ 70.039399][ T1815] bpf_clone_redirect+0x17c/0x4b0 [ 70.044408][ T1815] bpf_prog_801cabf80fc815cd+0x59/0xa70 [ 70.049935][ T1815] ? __kasan_slab_alloc+0xcf/0xf0 [ 70.054942][ T1815] ? __kasan_slab_alloc+0xbd/0xf0 [ 70.059945][ T1815] ? slab_post_alloc_hook+0x4f/0x2b0 [ 70.065211][ T1815] ? kmem_cache_alloc+0xf7/0x260 [ 70.070128][ T1815] ? __build_skb+0x2d/0x310 [ 70.074614][ T1815] ? build_skb+0x24/0x200 [ 70.078926][ T1815] ? bpf_prog_test_run_skb+0x279/0x1150 [ 70.084455][ T1815] ? bpf_prog_test_run+0x3d5/0x630 [ 70.089549][ T1815] ? __sys_bpf+0x590/0x7d0 [ 70.093944][ T1815] ? __x64_sys_bpf+0x7c/0x90 [ 70.098515][ T1815] ? x64_sys_call+0x4b9/0x9a0 [ 70.103171][ T1815] ? do_syscall_64+0x4c/0xa0 [ 70.107749][ T1815] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 70.113804][ T1815] ? __kasan_check_read+0x11/0x20 [ 70.118822][ T1815] ? bpf_test_timer_continue+0x146/0x4a0 [ 70.124452][ T1815] bpf_test_run+0x351/0x900 [ 70.128950][ T1815] ? convert___skb_to_skb+0x4f0/0x4f0 [ 70.134313][ T1815] ? eth_get_headlen+0x200/0x200 [ 70.139263][ T1815] ? convert___skb_to_skb+0x41/0x4f0 [ 70.144537][ T1815] bpf_prog_test_run_skb+0x9ec/0x1150 [ 70.149896][ T1815] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 70.155771][ T1815] bpf_prog_test_run+0x3d5/0x630 [ 70.160688][ T1815] ? bpf_prog_query+0x230/0x230 [ 70.165522][ T1815] ? selinux_bpf+0xce/0xf0 [ 70.169934][ T1815] ? security_bpf+0x82/0xa0 [ 70.174417][ T1815] __sys_bpf+0x590/0x7d0 [ 70.178646][ T1815] ? bpf_link_show_fdinfo+0x330/0x330 [ 70.184010][ T1815] ? debug_smp_processor_id+0x17/0x20 [ 70.189370][ T1815] __x64_sys_bpf+0x7c/0x90 [ 70.193773][ T1815] x64_sys_call+0x4b9/0x9a0 [ 70.198288][ T1815] do_syscall_64+0x4c/0xa0 [ 70.202690][ T1815] ? clear_bhb_loop+0x50/0xa0 [ 70.207462][ T1815] ? clear_bhb_loop+0x50/0xa0 [ 70.212164][ T1815] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 70.218064][ T1815] RIP: 0033:0x7f3d899a8799 [ 70.222468][ T1815] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 70.242060][ T1815] RSP: 002b:00007f3d88403028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 70.250468][ T1815] RAX: ffffffffffffffda RBX: 00007f3d89c21fa0 RCX: 00007f3d899a8799 [ 70.258425][ T1815] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 70.266391][ T1815] RBP: 00007f3d88403090 R08: 0000000000000000 R09: 0000000000000000 [ 70.274356][ T1815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 70.282317][ T1815] R13: 00007f3d89c22038 R14: 00007f3d89c21fa0 R15: 00007ffd87ae05c8 [ 70.290281][ T1815] [ 70.428440][ T1756] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.435536][ T1756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.442824][ T1756] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.449840][ T1756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.856499][ T1827] device syzkaller0 entered promiscuous mode [ 70.881027][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.890975][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.939131][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.958629][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.969863][ T1866] FAULT_INJECTION: forcing a failure. [ 70.969863][ T1866] name failslab, interval 1, probability 0, space 0, times 0 [ 70.983687][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.984292][ T1866] CPU: 1 PID: 1866 Comm: syz.2.441 Tainted: G W syzkaller #0 [ 70.994618][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.000425][ T1866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 71.008853][ T415] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.018442][ T1866] Call Trace: [ 71.018448][ T1866] [ 71.018455][ T1866] __dump_stack+0x21/0x30 [ 71.018477][ T1866] dump_stack_lvl+0x110/0x170 [ 71.025515][ T415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.028741][ T1866] ? show_regs_print_info+0x20/0x20 [ 71.032406][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.035960][ T1866] dump_stack+0x15/0x20 [ 71.040941][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.047802][ T1866] should_fail+0x3c1/0x510 [ 71.047828][ T1866] __should_failslab+0xa4/0xe0 [ 71.047845][ T1866] should_failslab+0x9/0x20 [ 71.047859][ T1866] slab_pre_alloc_hook+0x3b/0xe0 [ 71.053921][ T415] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.061083][ T1866] ? skb_clone+0x1cf/0x360 [ 71.065271][ T415] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.073165][ T1866] kmem_cache_alloc+0x44/0x260 [ 71.073186][ T1866] skb_clone+0x1cf/0x360 [ 71.119372][ T1866] bpf_clone_redirect+0x17c/0x4b0 [ 71.124406][ T1866] bpf_prog_801cabf80fc815cd+0x59/0x434 [ 71.129949][ T1866] ? __kasan_slab_alloc+0xcf/0xf0 [ 71.134972][ T1866] ? __kasan_slab_alloc+0xbd/0xf0 [ 71.139995][ T1866] ? slab_post_alloc_hook+0x4f/0x2b0 [ 71.145293][ T1866] ? kmem_cache_alloc+0xf7/0x260 [ 71.150233][ T1866] ? __build_skb+0x2d/0x310 [ 71.154752][ T1866] ? build_skb+0x24/0x200 [ 71.159090][ T1866] ? bpf_prog_test_run_skb+0x279/0x1150 [ 71.164986][ T1866] ? bpf_prog_test_run+0x3d5/0x630 [ 71.170103][ T1866] ? __sys_bpf+0x590/0x7d0 [ 71.174613][ T1866] ? __x64_sys_bpf+0x7c/0x90 [ 71.179204][ T1866] ? x64_sys_call+0x4b9/0x9a0 [ 71.183880][ T1866] ? do_syscall_64+0x4c/0xa0 [ 71.188478][ T1866] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 71.193725][ T1756] device veth0_vlan entered promiscuous mode [ 71.194551][ T1866] ? __kasan_check_read+0x11/0x20 [ 71.205526][ T1866] ? bpf_test_timer_continue+0x146/0x4a0 [ 71.207544][ T1756] device veth1_macvtap entered promiscuous mode [ 71.211164][ T1866] bpf_test_run+0x351/0x900 [ 71.211190][ T1866] ? convert___skb_to_skb+0x4f0/0x4f0 [ 71.227244][ T1866] ? eth_get_headlen+0x200/0x200 [ 71.232277][ T1866] ? convert___skb_to_skb+0x41/0x4f0 [ 71.237553][ T1866] bpf_prog_test_run_skb+0x9ec/0x1150 [ 71.243004][ T1866] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 71.248889][ T1866] bpf_prog_test_run+0x3d5/0x630 [ 71.253817][ T1866] ? bpf_prog_query+0x230/0x230 [ 71.258661][ T1866] ? selinux_bpf+0xce/0xf0 [ 71.263062][ T1866] ? security_bpf+0x82/0xa0 [ 71.267637][ T1866] __sys_bpf+0x590/0x7d0 [ 71.271947][ T1866] ? bpf_link_show_fdinfo+0x330/0x330 [ 71.277318][ T1866] ? debug_smp_processor_id+0x17/0x20 [ 71.282677][ T1866] __x64_sys_bpf+0x7c/0x90 [ 71.287087][ T1866] x64_sys_call+0x4b9/0x9a0 [ 71.291582][ T1866] do_syscall_64+0x4c/0xa0 [ 71.295978][ T1866] ? clear_bhb_loop+0x50/0xa0 [ 71.300648][ T1866] ? clear_bhb_loop+0x50/0xa0 [ 71.305306][ T1866] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 71.311182][ T1866] RIP: 0033:0x7f91ac5b4799 [ 71.315749][ T1866] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 71.335340][ T1866] RSP: 002b:00007f91ab00f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 71.343994][ T1866] RAX: ffffffffffffffda RBX: 00007f91ac82dfa0 RCX: 00007f91ac5b4799 [ 71.351985][ T1866] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 71.359963][ T1866] RBP: 00007f91ab00f090 R08: 0000000000000000 R09: 0000000000000000 [ 71.367916][ T1866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 71.375881][ T1866] R13: 00007f91ac82e038 R14: 00007f91ac82dfa0 R15: 00007ffc2ee31398 [ 71.383841][ T1866] [ 71.400272][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.408448][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.416947][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.427723][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.437285][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 71.446181][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.464984][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 71.476511][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.486627][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 71.501326][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 71.509584][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 71.517904][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 71.528228][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 71.540153][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 71.549700][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 71.558821][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.566527][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.630124][ T1887] device macsec0 left promiscuous mode [ 71.651414][ T1889] device syzkaller0 entered promiscuous mode [ 72.652340][ T8] device bridge_slave_1 left promiscuous mode [ 72.658468][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.666011][ T8] device bridge_slave_0 left promiscuous mode [ 72.672235][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.679960][ T8] device veth1_macvtap left promiscuous mode [ 72.686157][ T8] device veth0_vlan left promiscuous mode [ 72.705122][ T1901] FAULT_INJECTION: forcing a failure. [ 72.705122][ T1901] name failslab, interval 1, probability 0, space 0, times 0 [ 72.749405][ T1901] CPU: 1 PID: 1901 Comm: syz.4.454 Tainted: G W syzkaller #0 [ 72.758144][ T1901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 72.768196][ T1901] Call Trace: [ 72.771473][ T1901] [ 72.774392][ T1901] __dump_stack+0x21/0x30 [ 72.778718][ T1901] dump_stack_lvl+0x110/0x170 [ 72.783382][ T1901] ? show_regs_print_info+0x20/0x20 [ 72.788570][ T1901] dump_stack+0x15/0x20 [ 72.792712][ T1901] should_fail+0x3c1/0x510 [ 72.797117][ T1901] __should_failslab+0xa4/0xe0 [ 72.801868][ T1901] should_failslab+0x9/0x20 [ 72.806374][ T1901] slab_pre_alloc_hook+0x3b/0xe0 [ 72.811427][ T1901] ? skb_clone+0x1cf/0x360 [ 72.815840][ T1901] kmem_cache_alloc+0x44/0x260 [ 72.820593][ T1901] skb_clone+0x1cf/0x360 [ 72.824822][ T1901] bpf_clone_redirect+0x17c/0x4b0 [ 72.829839][ T1901] bpf_prog_801cabf80fc815cd+0x59/0x1dc [ 72.835374][ T1901] ? __kasan_slab_alloc+0xcf/0xf0 [ 72.840469][ T1901] ? __kasan_slab_alloc+0xbd/0xf0 [ 72.845479][ T1901] ? slab_post_alloc_hook+0x4f/0x2b0 [ 72.850753][ T1901] ? kmem_cache_alloc+0xf7/0x260 [ 72.855762][ T1901] ? __build_skb+0x2d/0x310 [ 72.860253][ T1901] ? build_skb+0x24/0x200 [ 72.864565][ T1901] ? bpf_prog_test_run_skb+0x279/0x1150 [ 72.870200][ T1901] ? bpf_prog_test_run+0x3d5/0x630 [ 72.875314][ T1901] ? __sys_bpf+0x590/0x7d0 [ 72.879745][ T1901] ? __x64_sys_bpf+0x7c/0x90 [ 72.884318][ T1901] ? x64_sys_call+0x4b9/0x9a0 [ 72.888985][ T1901] ? do_syscall_64+0x4c/0xa0 [ 72.893565][ T1901] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 72.899648][ T1901] ? __kasan_check_read+0x11/0x20 [ 72.904683][ T1901] ? kvm_sched_clock_read+0x18/0x40 [ 72.909871][ T1901] ? sched_clock+0x9/0x10 [ 72.914188][ T1901] bpf_test_run+0x54b/0x900 [ 72.918686][ T1901] ? convert___skb_to_skb+0x4f0/0x4f0 [ 72.924052][ T1901] ? eth_get_headlen+0x200/0x200 [ 72.928992][ T1901] ? convert___skb_to_skb+0x41/0x4f0 [ 72.934274][ T1901] bpf_prog_test_run_skb+0x9ec/0x1150 [ 72.939641][ T1901] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 72.945526][ T1901] bpf_prog_test_run+0x3d5/0x630 [ 72.950454][ T1901] ? bpf_prog_query+0x230/0x230 [ 72.955293][ T1901] ? selinux_bpf+0xce/0xf0 [ 72.959700][ T1901] ? security_bpf+0x82/0xa0 [ 72.964191][ T1901] __sys_bpf+0x590/0x7d0 [ 72.968421][ T1901] ? bpf_link_show_fdinfo+0x330/0x330 [ 72.973785][ T1901] ? debug_smp_processor_id+0x17/0x20 [ 72.979150][ T1901] __x64_sys_bpf+0x7c/0x90 [ 72.983555][ T1901] x64_sys_call+0x4b9/0x9a0 [ 72.988048][ T1901] do_syscall_64+0x4c/0xa0 [ 72.992454][ T1901] ? clear_bhb_loop+0x50/0xa0 [ 72.997115][ T1901] ? clear_bhb_loop+0x50/0xa0 [ 73.001782][ T1901] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 73.007664][ T1901] RIP: 0033:0x7f3d899a8799 [ 73.012067][ T1901] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 73.031680][ T1901] RSP: 002b:00007f3d88403028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 73.040097][ T1901] RAX: ffffffffffffffda RBX: 00007f3d89c21fa0 RCX: 00007f3d899a8799 [ 73.048058][ T1901] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 73.056020][ T1901] RBP: 00007f3d88403090 R08: 0000000000000000 R09: 0000000000000000 [ 73.063982][ T1901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 73.071938][ T1901] R13: 00007f3d89c22038 R14: 00007f3d89c21fa0 R15: 00007ffd87ae05c8 [ 73.079928][ T1901] [ 73.273540][ T1898] @ÿ: renamed from bond_slave_0 [ 73.515462][ T1905] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.522641][ T1905] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.530082][ T1905] device bridge_slave_0 entered promiscuous mode [ 73.540698][ T1905] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.548065][ T1905] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.555702][ T1905] device bridge_slave_1 entered promiscuous mode [ 73.698733][ T1905] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.705808][ T1905] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.713113][ T1905] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.720136][ T1905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.744686][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.753693][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.761492][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.784743][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.793197][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.800245][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.807905][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.817530][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.824601][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.832244][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.840295][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.860403][ T1905] device veth0_vlan entered promiscuous mode [ 73.873111][ T1905] device veth1_macvtap entered promiscuous mode [ 73.904863][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 73.913301][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 73.921264][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 73.928734][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 73.936301][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 73.948343][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 73.961504][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 75.372976][ T1958] FAULT_INJECTION: forcing a failure. [ 75.372976][ T1958] name failslab, interval 1, probability 0, space 0, times 0 [ 75.402259][ T1958] CPU: 1 PID: 1958 Comm: syz.0.466 Tainted: G W syzkaller #0 [ 75.410972][ T1958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 75.421035][ T1958] Call Trace: [ 75.424319][ T1958] [ 75.427271][ T1958] __dump_stack+0x21/0x30 [ 75.431613][ T1958] dump_stack_lvl+0x110/0x170 [ 75.436307][ T1958] ? show_regs_print_info+0x20/0x20 [ 75.441514][ T1958] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 75.443077][ T30] audit: type=1400 audit(1773261260.817:138): avc: denied { create } for pid=1956 comm="syz.3.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 75.447591][ T1958] dump_stack+0x15/0x20 [ 75.447614][ T1958] should_fail+0x3c1/0x510 [ 75.475457][ T1958] ? skb_ensure_writable+0x2e7/0x460 [ 75.480751][ T1958] __should_failslab+0xa4/0xe0 [ 75.485522][ T1958] should_failslab+0x9/0x20 [ 75.490045][ T1958] slab_pre_alloc_hook+0x3b/0xe0 [ 75.494990][ T1958] ? skb_ensure_writable+0x2e7/0x460 [ 75.500283][ T1958] ? skb_ensure_writable+0x2e7/0x460 [ 75.505577][ T1958] __kmalloc_track_caller+0x6c/0x2c0 [ 75.510889][ T1958] ? skb_ensure_writable+0x2e7/0x460 [ 75.516184][ T1958] ? skb_ensure_writable+0x2e7/0x460 [ 75.521478][ T1958] pskb_expand_head+0x11b/0x11d0 [ 75.526428][ T1958] ? __copy_skb_header+0x437/0x600 [ 75.531548][ T1958] ? __kasan_check_write+0x14/0x20 [ 75.536667][ T1958] ? __skb_clone+0x47a/0x790 [ 75.541269][ T1958] skb_ensure_writable+0x2e7/0x460 [ 75.546384][ T1958] bpf_clone_redirect+0x1dd/0x4b0 [ 75.551418][ T1958] bpf_prog_801cabf80fc815cd+0x59/0x538 [ 75.556963][ T1958] ? __kasan_slab_alloc+0xcf/0xf0 [ 75.561982][ T1958] ? __kasan_slab_alloc+0xbd/0xf0 [ 75.566999][ T1958] ? slab_post_alloc_hook+0x4f/0x2b0 [ 75.572267][ T1958] ? kmem_cache_alloc+0xf7/0x260 [ 75.577187][ T1958] ? __build_skb+0x2d/0x310 [ 75.581677][ T1958] ? build_skb+0x24/0x200 [ 75.585993][ T1958] ? bpf_prog_test_run_skb+0x279/0x1150 [ 75.591520][ T1958] ? bpf_prog_test_run+0x3d5/0x630 [ 75.596696][ T1958] ? __sys_bpf+0x590/0x7d0 [ 75.601099][ T1958] ? __x64_sys_bpf+0x7c/0x90 [ 75.605675][ T1958] ? x64_sys_call+0x4b9/0x9a0 [ 75.610331][ T1958] ? do_syscall_64+0x4c/0xa0 [ 75.614906][ T1958] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 75.620965][ T1958] ? __kasan_check_read+0x11/0x20 [ 75.625972][ T1958] ? bpf_test_timer_continue+0x146/0x4a0 [ 75.631587][ T1958] bpf_test_run+0x351/0x900 [ 75.636076][ T1958] ? convert___skb_to_skb+0x4f0/0x4f0 [ 75.641525][ T1958] ? eth_get_headlen+0x200/0x200 [ 75.646445][ T1958] ? convert___skb_to_skb+0x41/0x4f0 [ 75.651741][ T1958] bpf_prog_test_run_skb+0x9ec/0x1150 [ 75.657110][ T1958] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 75.662992][ T1958] bpf_prog_test_run+0x3d5/0x630 [ 75.667916][ T1958] ? bpf_prog_query+0x230/0x230 [ 75.672744][ T1958] ? selinux_bpf+0xce/0xf0 [ 75.677141][ T1958] ? security_bpf+0x82/0xa0 [ 75.681623][ T1958] __sys_bpf+0x590/0x7d0 [ 75.685845][ T1958] ? bpf_link_show_fdinfo+0x330/0x330 [ 75.691200][ T1958] ? debug_smp_processor_id+0x17/0x20 [ 75.696553][ T1958] __x64_sys_bpf+0x7c/0x90 [ 75.700951][ T1958] x64_sys_call+0x4b9/0x9a0 [ 75.705436][ T1958] do_syscall_64+0x4c/0xa0 [ 75.709836][ T1958] ? clear_bhb_loop+0x50/0xa0 [ 75.714490][ T1958] ? clear_bhb_loop+0x50/0xa0 [ 75.719149][ T1958] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 75.725037][ T1958] RIP: 0033:0x7f65bd50e799 [ 75.729435][ T1958] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 75.749196][ T1958] RSP: 002b:00007f65bbf69028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 75.757592][ T1958] RAX: ffffffffffffffda RBX: 00007f65bd787fa0 RCX: 00007f65bd50e799 [ 75.765545][ T1958] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 75.773498][ T1958] RBP: 00007f65bbf69090 R08: 0000000000000000 R09: 0000000000000000 [ 75.781539][ T1958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 75.789490][ T1958] R13: 00007f65bd788038 R14: 00007f65bd787fa0 R15: 00007ffd93f4c5d8 [ 75.797538][ T1958] [ 75.829390][ T1961] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.836511][ T1961] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.844260][ T1961] device bridge_slave_0 entered promiscuous mode [ 75.851650][ T1961] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.858826][ T1961] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.866297][ T1961] device bridge_slave_1 entered promiscuous mode [ 75.876749][ T8] device bridge_slave_1 left promiscuous mode [ 75.887077][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.895412][ T8] device bridge_slave_0 left promiscuous mode [ 75.901650][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.910032][ T8] device veth1_macvtap left promiscuous mode [ 75.916267][ T8] device veth0_vlan left promiscuous mode [ 76.017464][ T1973] 6±ÿ: renamed from team_slave_1 [ 76.065577][ T1961] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.072720][ T1961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.080097][ T1961] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.087165][ T1961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.158822][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.166588][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.177652][ T783] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.274496][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.286385][ T783] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.293474][ T783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.345633][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.363252][ T1992] FAULT_INJECTION: forcing a failure. [ 76.363252][ T1992] name failslab, interval 1, probability 0, space 0, times 0 [ 76.376768][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.389513][ T1992] CPU: 0 PID: 1992 Comm: syz.3.479 Tainted: G W syzkaller #0 [ 76.398306][ T1992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 76.408355][ T1992] Call Trace: [ 76.411628][ T1992] [ 76.414553][ T1992] __dump_stack+0x21/0x30 [ 76.418888][ T1992] dump_stack_lvl+0x110/0x170 [ 76.423563][ T1992] ? show_regs_print_info+0x20/0x20 [ 76.428760][ T1992] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 76.434840][ T1992] dump_stack+0x15/0x20 [ 76.438991][ T1992] should_fail+0x3c1/0x510 [ 76.443402][ T1992] ? skb_ensure_writable+0x2e7/0x460 [ 76.448677][ T1992] __should_failslab+0xa4/0xe0 [ 76.453433][ T1992] should_failslab+0x9/0x20 [ 76.457930][ T1992] slab_pre_alloc_hook+0x3b/0xe0 [ 76.462865][ T1992] ? skb_ensure_writable+0x2e7/0x460 [ 76.468138][ T1992] ? skb_ensure_writable+0x2e7/0x460 [ 76.473410][ T1992] __kmalloc_track_caller+0x6c/0x2c0 [ 76.478774][ T1992] ? skb_ensure_writable+0x2e7/0x460 [ 76.484133][ T1992] ? skb_ensure_writable+0x2e7/0x460 [ 76.489408][ T1992] pskb_expand_head+0x11b/0x11d0 [ 76.494337][ T1992] ? __copy_skb_header+0x437/0x600 [ 76.499438][ T1992] ? __kasan_check_write+0x14/0x20 [ 76.504535][ T1992] ? __skb_clone+0x47a/0x790 [ 76.509134][ T1992] skb_ensure_writable+0x2e7/0x460 [ 76.514239][ T1992] bpf_clone_redirect+0x1dd/0x4b0 [ 76.519256][ T1992] bpf_prog_801cabf80fc815cd+0x59/0x228 [ 76.524795][ T1992] ? __kasan_slab_alloc+0xcf/0xf0 [ 76.529811][ T1992] ? __kasan_slab_alloc+0xbd/0xf0 [ 76.534823][ T1992] ? slab_post_alloc_hook+0x4f/0x2b0 [ 76.540093][ T1992] ? kmem_cache_alloc+0xf7/0x260 [ 76.545108][ T1992] ? __build_skb+0x2d/0x310 [ 76.549599][ T1992] ? build_skb+0x24/0x200 [ 76.553919][ T1992] ? bpf_prog_test_run_skb+0x279/0x1150 [ 76.559458][ T1992] ? bpf_prog_test_run+0x3d5/0x630 [ 76.564556][ T1992] ? __sys_bpf+0x590/0x7d0 [ 76.569045][ T1992] ? __x64_sys_bpf+0x7c/0x90 [ 76.573620][ T1992] ? x64_sys_call+0x4b9/0x9a0 [ 76.578284][ T1992] ? do_syscall_64+0x4c/0xa0 [ 76.582861][ T1992] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 76.588924][ T1992] ? __kasan_check_read+0x11/0x20 [ 76.593935][ T1992] ? kvm_sched_clock_read+0x18/0x40 [ 76.599120][ T1992] ? sched_clock+0x9/0x10 [ 76.603522][ T1992] bpf_test_run+0x54b/0x900 [ 76.608018][ T1992] ? convert___skb_to_skb+0x4f0/0x4f0 [ 76.613380][ T1992] ? eth_get_headlen+0x200/0x200 [ 76.618307][ T1992] ? convert___skb_to_skb+0x41/0x4f0 [ 76.623580][ T1992] bpf_prog_test_run_skb+0x9ec/0x1150 [ 76.628948][ T1992] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 76.634830][ T1992] bpf_prog_test_run+0x3d5/0x630 [ 76.639758][ T1992] ? bpf_prog_query+0x230/0x230 [ 76.644636][ T1992] ? selinux_bpf+0xce/0xf0 [ 76.649051][ T1992] ? security_bpf+0x82/0xa0 [ 76.653558][ T1992] __sys_bpf+0x590/0x7d0 [ 76.657803][ T1992] ? bpf_link_show_fdinfo+0x330/0x330 [ 76.663168][ T1992] ? debug_smp_processor_id+0x17/0x20 [ 76.668530][ T1992] __x64_sys_bpf+0x7c/0x90 [ 76.672947][ T1992] x64_sys_call+0x4b9/0x9a0 [ 76.677441][ T1992] do_syscall_64+0x4c/0xa0 [ 76.681845][ T1992] ? clear_bhb_loop+0x50/0xa0 [ 76.686511][ T1992] ? clear_bhb_loop+0x50/0xa0 [ 76.691182][ T1992] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 76.697066][ T1992] RIP: 0033:0x7f17cc072799 [ 76.701478][ T1992] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 76.721074][ T1992] RSP: 002b:00007f17caacd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 76.729494][ T1992] RAX: ffffffffffffffda RBX: 00007f17cc2ebfa0 RCX: 00007f17cc072799 [ 76.737470][ T1992] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 76.745436][ T1992] RBP: 00007f17caacd090 R08: 0000000000000000 R09: 0000000000000000 [ 76.753396][ T1992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 76.761357][ T1992] R13: 00007f17cc2ec038 R14: 00007f17cc2ebfa0 R15: 00007fff0a8b9b38 [ 76.769328][ T1992] [ 76.807489][ T1961] device veth0_vlan entered promiscuous mode [ 76.821351][ T1961] device veth1_macvtap entered promiscuous mode [ 76.844116][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 76.869426][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.880455][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.890715][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.899434][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.928410][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 76.937681][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.946408][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 76.954971][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 78.382727][ T2020] FAULT_INJECTION: forcing a failure. [ 78.382727][ T2020] name failslab, interval 1, probability 0, space 0, times 0 [ 78.405112][ T2020] CPU: 0 PID: 2020 Comm: syz.4.490 Tainted: G W syzkaller #0 [ 78.413950][ T2020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 78.424006][ T2020] Call Trace: [ 78.427277][ T2020] [ 78.430192][ T2020] __dump_stack+0x21/0x30 [ 78.434512][ T2020] dump_stack_lvl+0x110/0x170 [ 78.439175][ T2020] ? show_regs_print_info+0x20/0x20 [ 78.444359][ T2020] dump_stack+0x15/0x20 [ 78.448637][ T2020] should_fail+0x3c1/0x510 [ 78.453066][ T2020] __should_failslab+0xa4/0xe0 [ 78.457838][ T2020] should_failslab+0x9/0x20 [ 78.462344][ T2020] slab_pre_alloc_hook+0x3b/0xe0 [ 78.467270][ T2020] ? skb_clone+0x1cf/0x360 [ 78.471680][ T2020] kmem_cache_alloc+0x44/0x260 [ 78.476437][ T2020] skb_clone+0x1cf/0x360 [ 78.480670][ T2020] bpf_clone_redirect+0x17c/0x4b0 [ 78.485697][ T2020] bpf_prog_801cabf80fc815cd+0x59/0x750 [ 78.491232][ T2020] ? __kasan_slab_alloc+0xcf/0xf0 [ 78.496248][ T2020] ? __kasan_slab_alloc+0xbd/0xf0 [ 78.501251][ T2020] ? slab_post_alloc_hook+0x4f/0x2b0 [ 78.506517][ T2020] ? kmem_cache_alloc+0xf7/0x260 [ 78.511436][ T2020] ? __build_skb+0x2d/0x310 [ 78.515923][ T2020] ? build_skb+0x24/0x200 [ 78.520234][ T2020] ? bpf_prog_test_run_skb+0x279/0x1150 [ 78.525762][ T2020] ? bpf_prog_test_run+0x3d5/0x630 [ 78.530859][ T2020] ? __sys_bpf+0x590/0x7d0 [ 78.535255][ T2020] ? __x64_sys_bpf+0x7c/0x90 [ 78.539822][ T2020] ? x64_sys_call+0x4b9/0x9a0 [ 78.544478][ T2020] ? do_syscall_64+0x4c/0xa0 [ 78.549051][ T2020] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 78.555106][ T2020] ? __kasan_check_read+0x11/0x20 [ 78.560112][ T2020] ? bpf_test_timer_continue+0x146/0x4a0 [ 78.565731][ T2020] bpf_test_run+0x351/0x900 [ 78.570225][ T2020] ? convert___skb_to_skb+0x4f0/0x4f0 [ 78.575578][ T2020] ? eth_get_headlen+0x200/0x200 [ 78.580508][ T2020] ? convert___skb_to_skb+0x41/0x4f0 [ 78.585773][ T2020] bpf_prog_test_run_skb+0x9ec/0x1150 [ 78.591134][ T2020] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 78.597005][ T2020] bpf_prog_test_run+0x3d5/0x630 [ 78.601924][ T2020] ? bpf_prog_query+0x230/0x230 [ 78.606755][ T2020] ? selinux_bpf+0xce/0xf0 [ 78.611150][ T2020] ? security_bpf+0x82/0xa0 [ 78.615653][ T2020] __sys_bpf+0x590/0x7d0 [ 78.619887][ T2020] ? bpf_link_show_fdinfo+0x330/0x330 [ 78.625243][ T2020] ? debug_smp_processor_id+0x17/0x20 [ 78.630599][ T2020] __x64_sys_bpf+0x7c/0x90 [ 78.634999][ T2020] x64_sys_call+0x4b9/0x9a0 [ 78.639487][ T2020] do_syscall_64+0x4c/0xa0 [ 78.643891][ T2020] ? clear_bhb_loop+0x50/0xa0 [ 78.648546][ T2020] ? clear_bhb_loop+0x50/0xa0 [ 78.653200][ T2020] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 78.659164][ T2020] RIP: 0033:0x7f3d899a8799 [ 78.663568][ T2020] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 78.683155][ T2020] RSP: 002b:00007f3d88403028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 78.691550][ T2020] RAX: ffffffffffffffda RBX: 00007f3d89c21fa0 RCX: 00007f3d899a8799 [ 78.699500][ T2020] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 78.707453][ T2020] RBP: 00007f3d88403090 R08: 0000000000000000 R09: 0000000000000000 [ 78.715406][ T2020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 78.723356][ T2020] R13: 00007f3d89c22038 R14: 00007f3d89c21fa0 R15: 00007ffd87ae05c8 [ 78.731311][ T2020] [ 78.842038][ T2034] device sit0 left promiscuous mode [ 78.912335][ T8] device bridge_slave_1 left promiscuous mode [ 78.918652][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.926281][ T8] device bridge_slave_0 left promiscuous mode [ 78.932657][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.940872][ T8] device veth1_macvtap left promiscuous mode [ 78.946999][ T8] device veth0_vlan left promiscuous mode [ 79.059885][ T30] audit: type=1400 audit(1773261264.437:139): avc: denied { create } for pid=2041 comm="syz.4.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 79.123184][ T2035] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.130241][ T2035] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.154993][ T2035] device bridge_slave_0 entered promiscuous mode [ 79.172885][ T2035] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.180043][ T2035] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.188021][ T2035] device bridge_slave_1 entered promiscuous mode [ 79.245854][ T2035] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.252946][ T2035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.260254][ T2035] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.267320][ T2035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.293536][ T783] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.310563][ T783] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.377826][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.408362][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.439696][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.448007][ T783] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.455079][ T783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.462653][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.470904][ T783] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.477979][ T783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.496379][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.516638][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.564130][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.597684][ T2035] device veth0_vlan entered promiscuous mode [ 79.606918][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.621549][ T2035] device veth1_macvtap entered promiscuous mode [ 79.628759][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.639755][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.649302][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.672041][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.685311][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 81.152405][ T8] device bridge_slave_1 left promiscuous mode [ 81.158552][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.166064][ T8] device bridge_slave_0 left promiscuous mode [ 81.172297][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.180096][ T8] device veth1_macvtap left promiscuous mode [ 81.186156][ T8] device veth0_vlan left promiscuous mode [ 81.239120][ T2070] FAULT_INJECTION: forcing a failure. [ 81.239120][ T2070] name failslab, interval 1, probability 0, space 0, times 0 [ 81.251850][ T2070] CPU: 0 PID: 2070 Comm: syz.0.505 Tainted: G W syzkaller #0 [ 81.260516][ T2070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 81.270640][ T2070] Call Trace: [ 81.273907][ T2070] [ 81.276820][ T2070] __dump_stack+0x21/0x30 [ 81.281140][ T2070] dump_stack_lvl+0x110/0x170 [ 81.285797][ T2070] ? show_regs_print_info+0x20/0x20 [ 81.290975][ T2070] dump_stack+0x15/0x20 [ 81.295111][ T2070] should_fail+0x3c1/0x510 [ 81.299508][ T2070] __should_failslab+0xa4/0xe0 [ 81.304346][ T2070] should_failslab+0x9/0x20 [ 81.308831][ T2070] slab_pre_alloc_hook+0x3b/0xe0 [ 81.313756][ T2070] ? skb_clone+0x1cf/0x360 [ 81.318155][ T2070] kmem_cache_alloc+0x44/0x260 [ 81.322897][ T2070] skb_clone+0x1cf/0x360 [ 81.327115][ T2070] bpf_clone_redirect+0x17c/0x4b0 [ 81.332121][ T2070] bpf_prog_801cabf80fc815cd+0x59/0x52c [ 81.337649][ T2070] ? __kasan_slab_alloc+0xcf/0xf0 [ 81.342653][ T2070] ? __kasan_slab_alloc+0xbd/0xf0 [ 81.347654][ T2070] ? slab_post_alloc_hook+0x4f/0x2b0 [ 81.352918][ T2070] ? kmem_cache_alloc+0xf7/0x260 [ 81.357834][ T2070] ? __build_skb+0x2d/0x310 [ 81.362320][ T2070] ? build_skb+0x24/0x200 [ 81.366627][ T2070] ? bpf_prog_test_run_skb+0x279/0x1150 [ 81.372153][ T2070] ? bpf_prog_test_run+0x3d5/0x630 [ 81.377330][ T2070] ? __sys_bpf+0x590/0x7d0 [ 81.381723][ T2070] ? __x64_sys_bpf+0x7c/0x90 [ 81.386379][ T2070] ? x64_sys_call+0x4b9/0x9a0 [ 81.391035][ T2070] ? do_syscall_64+0x4c/0xa0 [ 81.395607][ T2070] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 81.401665][ T2070] ? exc_int3+0xf/0x70 [ 81.405716][ T2070] ? asm_exc_int3+0x3a/0x40 [ 81.410203][ T2070] ? bpf_test_run+0x32a/0x900 [ 81.414949][ T2070] ? bpf_test_run+0x326/0x900 [ 81.419781][ T2070] bpf_test_run+0x351/0x900 [ 81.424266][ T2070] ? convert___skb_to_skb+0x4f0/0x4f0 [ 81.429618][ T2070] ? eth_get_headlen+0x200/0x200 [ 81.434535][ T2070] ? convert___skb_to_skb+0x41/0x4f0 [ 81.439799][ T2070] bpf_prog_test_run_skb+0x9ec/0x1150 [ 81.445153][ T2070] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 81.451026][ T2070] bpf_prog_test_run+0x3d5/0x630 [ 81.455944][ T2070] ? bpf_prog_query+0x230/0x230 [ 81.460773][ T2070] ? selinux_bpf+0xce/0xf0 [ 81.465168][ T2070] ? security_bpf+0x82/0xa0 [ 81.469650][ T2070] __sys_bpf+0x590/0x7d0 [ 81.473872][ T2070] ? bpf_link_show_fdinfo+0x330/0x330 [ 81.479223][ T2070] ? debug_smp_processor_id+0x17/0x20 [ 81.484575][ T2070] __x64_sys_bpf+0x7c/0x90 [ 81.488968][ T2070] x64_sys_call+0x4b9/0x9a0 [ 81.493452][ T2070] do_syscall_64+0x4c/0xa0 [ 81.497853][ T2070] ? clear_bhb_loop+0x50/0xa0 [ 81.502508][ T2070] ? clear_bhb_loop+0x50/0xa0 [ 81.507161][ T2070] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 81.513043][ T2070] RIP: 0033:0x7f65bd50e799 [ 81.517449][ T2070] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 81.537040][ T2070] RSP: 002b:00007f65bbf69028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 81.545433][ T2070] RAX: ffffffffffffffda RBX: 00007f65bd787fa0 RCX: 00007f65bd50e799 [ 81.553387][ T2070] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 81.561346][ T2070] RBP: 00007f65bbf69090 R08: 0000000000000000 R09: 0000000000000000 [ 81.569307][ T2070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 81.577254][ T2070] R13: 00007f65bd788038 R14: 00007f65bd787fa0 R15: 00007ffd93f4c5d8 [ 81.585211][ T2070] [ 81.830032][ T2077] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.881776][ T2077] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.013642][ T2077] device bridge_slave_0 entered promiscuous mode [ 82.092840][ T2077] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.099966][ T2077] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.107951][ T2077] device bridge_slave_1 entered promiscuous mode [ 82.941134][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 82.949061][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.052543][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.060986][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.101921][ T783] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.108977][ T783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.122139][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.140731][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.149167][ T783] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.156230][ T783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.164819][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.173423][ T2107] tap0: tun_chr_ioctl cmd 1074025677 [ 83.185249][ T2107] tap0: linktype set to 773 [ 83.275171][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.295963][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.422693][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.431090][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.449448][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 83.460316][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 83.483911][ T2077] device veth0_vlan entered promiscuous mode [ 83.538642][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 83.547699][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.562408][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.580156][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 83.651649][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 83.660032][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 83.683205][ T2077] device veth1_macvtap entered promiscuous mode [ 83.708098][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 83.728093][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 83.747250][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 83.760232][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 83.769037][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 83.783091][ T2111] FAULT_INJECTION: forcing a failure. [ 83.783091][ T2111] name failslab, interval 1, probability 0, space 0, times 0 [ 83.795831][ T2111] CPU: 1 PID: 2111 Comm: syz.3.517 Tainted: G W syzkaller #0 [ 83.804507][ T2111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 83.814554][ T2111] Call Trace: [ 83.817816][ T2111] [ 83.820732][ T2111] __dump_stack+0x21/0x30 [ 83.825052][ T2111] dump_stack_lvl+0x110/0x170 [ 83.829710][ T2111] ? show_regs_print_info+0x20/0x20 [ 83.834885][ T2111] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 83.840939][ T2111] dump_stack+0x15/0x20 [ 83.845073][ T2111] should_fail+0x3c1/0x510 [ 83.849472][ T2111] ? skb_ensure_writable+0x2e7/0x460 [ 83.854735][ T2111] __should_failslab+0xa4/0xe0 [ 83.859481][ T2111] should_failslab+0x9/0x20 [ 83.863981][ T2111] slab_pre_alloc_hook+0x3b/0xe0 [ 83.868903][ T2111] ? skb_ensure_writable+0x2e7/0x460 [ 83.874167][ T2111] ? skb_ensure_writable+0x2e7/0x460 [ 83.879441][ T2111] __kmalloc_track_caller+0x6c/0x2c0 [ 83.884726][ T2111] ? skb_ensure_writable+0x2e7/0x460 [ 83.890000][ T2111] ? skb_ensure_writable+0x2e7/0x460 [ 83.895267][ T2111] pskb_expand_head+0x11b/0x11d0 [ 83.900187][ T2111] ? __copy_skb_header+0x437/0x600 [ 83.905279][ T2111] ? __kasan_check_write+0x14/0x20 [ 83.910369][ T2111] ? __skb_clone+0x47a/0x790 [ 83.914942][ T2111] skb_ensure_writable+0x2e7/0x460 [ 83.920031][ T2111] bpf_clone_redirect+0x1dd/0x4b0 [ 83.925037][ T2111] bpf_prog_801cabf80fc815cd+0x59/0xfd4 [ 83.930560][ T2111] ? __kasan_slab_alloc+0xcf/0xf0 [ 83.935558][ T2111] ? __kasan_slab_alloc+0xbd/0xf0 [ 83.940559][ T2111] ? slab_post_alloc_hook+0x4f/0x2b0 [ 83.945823][ T2111] ? kmem_cache_alloc+0xf7/0x260 [ 83.950738][ T2111] ? __build_skb+0x2d/0x310 [ 83.955228][ T2111] ? build_skb+0x24/0x200 [ 83.959535][ T2111] ? bpf_prog_test_run_skb+0x279/0x1150 [ 83.965068][ T2111] ? bpf_prog_test_run+0x3d5/0x630 [ 83.970163][ T2111] ? __sys_bpf+0x590/0x7d0 [ 83.974573][ T2111] ? __x64_sys_bpf+0x7c/0x90 [ 83.979154][ T2111] ? x64_sys_call+0x4b9/0x9a0 [ 83.983819][ T2111] ? do_syscall_64+0x4c/0xa0 [ 83.988391][ T2111] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 83.994445][ T2111] ? __kasan_check_read+0x11/0x20 [ 83.999448][ T2111] ? bpf_test_timer_continue+0x146/0x4a0 [ 84.005062][ T2111] bpf_test_run+0x351/0x900 [ 84.009547][ T2111] ? convert___skb_to_skb+0x4f0/0x4f0 [ 84.014898][ T2111] ? eth_get_headlen+0x200/0x200 [ 84.019819][ T2111] ? convert___skb_to_skb+0x41/0x4f0 [ 84.025082][ T2111] bpf_prog_test_run_skb+0x9ec/0x1150 [ 84.030593][ T2111] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 84.036488][ T2111] bpf_prog_test_run+0x3d5/0x630 [ 84.041425][ T2111] ? bpf_prog_query+0x230/0x230 [ 84.046256][ T2111] ? selinux_bpf+0xce/0xf0 [ 84.050653][ T2111] ? security_bpf+0x82/0xa0 [ 84.055666][ T2111] __sys_bpf+0x590/0x7d0 [ 84.059888][ T2111] ? bpf_link_show_fdinfo+0x330/0x330 [ 84.065242][ T2111] ? debug_smp_processor_id+0x17/0x20 [ 84.070620][ T2111] __x64_sys_bpf+0x7c/0x90 [ 84.075026][ T2111] x64_sys_call+0x4b9/0x9a0 [ 84.079509][ T2111] do_syscall_64+0x4c/0xa0 [ 84.083906][ T2111] ? clear_bhb_loop+0x50/0xa0 [ 84.088560][ T2111] ? clear_bhb_loop+0x50/0xa0 [ 84.093214][ T2111] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 84.099097][ T2111] RIP: 0033:0x7f17cc072799 [ 84.103498][ T2111] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 84.123950][ T2111] RSP: 002b:00007f17caacd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 84.132360][ T2111] RAX: ffffffffffffffda RBX: 00007f17cc2ebfa0 RCX: 00007f17cc072799 [ 84.140320][ T2111] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 84.148280][ T2111] RBP: 00007f17caacd090 R08: 0000000000000000 R09: 0000000000000000 [ 84.156255][ T2111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 84.164218][ T2111] R13: 00007f17cc2ec038 R14: 00007f17cc2ebfa0 R15: 00007fff0a8b9b38 [ 84.172194][ T2111] [ 85.198810][ T8] device bridge_slave_1 left promiscuous mode [ 85.216770][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.242219][ T8] device bridge_slave_0 left promiscuous mode [ 85.248561][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.271088][ T8] device veth1_macvtap left promiscuous mode [ 85.277207][ T8] device veth0_vlan left promiscuous mode [ 86.438089][ T2140] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.472158][ T2140] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.479671][ T2140] device bridge_slave_0 entered promiscuous mode [ 86.506334][ T2140] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.552614][ T2140] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.560114][ T2140] device bridge_slave_1 entered promiscuous mode [ 86.770019][ T2165] FAULT_INJECTION: forcing a failure. [ 86.770019][ T2165] name failslab, interval 1, probability 0, space 0, times 0 [ 86.836983][ T2165] CPU: 1 PID: 2165 Comm: syz.0.533 Tainted: G W syzkaller #0 [ 86.845684][ T2165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 86.855739][ T2165] Call Trace: [ 86.859013][ T2165] [ 86.861937][ T2165] __dump_stack+0x21/0x30 [ 86.866270][ T2165] dump_stack_lvl+0x110/0x170 [ 86.870946][ T2165] ? show_regs_print_info+0x20/0x20 [ 86.876137][ T2165] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 86.882203][ T2165] dump_stack+0x15/0x20 [ 86.886358][ T2165] should_fail+0x3c1/0x510 [ 86.890765][ T2165] ? skb_ensure_writable+0x2e7/0x460 [ 86.896045][ T2165] __should_failslab+0xa4/0xe0 [ 86.900804][ T2165] should_failslab+0x9/0x20 [ 86.905301][ T2165] slab_pre_alloc_hook+0x3b/0xe0 [ 86.910244][ T2165] ? skb_ensure_writable+0x2e7/0x460 [ 86.915525][ T2165] ? skb_ensure_writable+0x2e7/0x460 [ 86.920895][ T2165] __kmalloc_track_caller+0x6c/0x2c0 [ 86.926179][ T2165] ? skb_ensure_writable+0x2e7/0x460 [ 86.931555][ T2165] ? skb_ensure_writable+0x2e7/0x460 [ 86.936837][ T2165] pskb_expand_head+0x11b/0x11d0 [ 86.941792][ T2165] ? __copy_skb_header+0x437/0x600 [ 86.946905][ T2165] ? __kasan_check_write+0x14/0x20 [ 86.952101][ T2165] ? __skb_clone+0x47a/0x790 [ 86.956686][ T2165] skb_ensure_writable+0x2e7/0x460 [ 86.961794][ T2165] bpf_clone_redirect+0x1dd/0x4b0 [ 86.966818][ T2165] bpf_prog_801cabf80fc815cd+0x59/0x2d0 [ 86.972365][ T2165] ? __kasan_slab_alloc+0xcf/0xf0 [ 86.977386][ T2165] ? __kasan_slab_alloc+0xbd/0xf0 [ 86.982402][ T2165] ? slab_post_alloc_hook+0x4f/0x2b0 [ 86.987679][ T2165] ? kmem_cache_alloc+0xf7/0x260 [ 86.992616][ T2165] ? __build_skb+0x2d/0x310 [ 86.997122][ T2165] ? build_skb+0x24/0x200 [ 87.001450][ T2165] ? bpf_prog_test_run_skb+0x279/0x1150 [ 87.007078][ T2165] ? bpf_prog_test_run+0x3d5/0x630 [ 87.012184][ T2165] ? __sys_bpf+0x590/0x7d0 [ 87.016591][ T2165] ? __x64_sys_bpf+0x7c/0x90 [ 87.021178][ T2165] ? x64_sys_call+0x4b9/0x9a0 [ 87.025851][ T2165] ? do_syscall_64+0x4c/0xa0 [ 87.030447][ T2165] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 87.036516][ T2165] ? __kasan_check_read+0x11/0x20 [ 87.041664][ T2165] ? bpf_test_timer_continue+0x146/0x4a0 [ 87.047313][ T2165] bpf_test_run+0x351/0x900 [ 87.051823][ T2165] ? convert___skb_to_skb+0x4f0/0x4f0 [ 87.057212][ T2165] ? eth_get_headlen+0x200/0x200 [ 87.062149][ T2165] ? convert___skb_to_skb+0x41/0x4f0 [ 87.067427][ T2165] bpf_prog_test_run_skb+0x9ec/0x1150 [ 87.072794][ T2165] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 87.078682][ T2165] bpf_prog_test_run+0x3d5/0x630 [ 87.083626][ T2165] ? bpf_prog_query+0x230/0x230 [ 87.088472][ T2165] ? selinux_bpf+0xce/0xf0 [ 87.092884][ T2165] ? security_bpf+0x82/0xa0 [ 87.097828][ T2165] __sys_bpf+0x590/0x7d0 [ 87.102081][ T2165] ? bpf_link_show_fdinfo+0x330/0x330 [ 87.107459][ T2165] ? debug_smp_processor_id+0x17/0x20 [ 87.112829][ T2165] __x64_sys_bpf+0x7c/0x90 [ 87.117241][ T2165] x64_sys_call+0x4b9/0x9a0 [ 87.121738][ T2165] do_syscall_64+0x4c/0xa0 [ 87.126162][ T2165] ? clear_bhb_loop+0x50/0xa0 [ 87.130846][ T2165] ? clear_bhb_loop+0x50/0xa0 [ 87.135529][ T2165] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 87.141425][ T2165] RIP: 0033:0x7f65bd50e799 [ 87.145837][ T2165] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 87.165452][ T2165] RSP: 002b:00007f65bbf69028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 87.173873][ T2165] RAX: ffffffffffffffda RBX: 00007f65bd787fa0 RCX: 00007f65bd50e799 [ 87.182273][ T2165] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 87.190241][ T2165] RBP: 00007f65bbf69090 R08: 0000000000000000 R09: 0000000000000000 [ 87.198305][ T2165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 87.206280][ T2165] R13: 00007f65bd788038 R14: 00007f65bd787fa0 R15: 00007ffd93f4c5d8 [ 87.214256][ T2165] [ 87.351195][ T2140] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.358395][ T2140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.365715][ T2140] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.372760][ T2140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.413218][ T783] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.420992][ T783] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.445308][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.454240][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.466980][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.485549][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.493988][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.501040][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.582401][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 87.612120][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 87.651427][ T783] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.658522][ T783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 87.742850][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 87.761175][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 87.828595][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 87.852722][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 87.908317][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 87.923301][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 87.955478][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 87.970041][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.990083][ T2140] device veth0_vlan entered promiscuous mode [ 88.031546][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 88.049453][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 88.075209][ T2140] device veth1_macvtap entered promiscuous mode [ 88.102078][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 88.115490][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 88.132522][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 88.152828][ T2171] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.159878][ T2171] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.212316][ T2171] device bridge_slave_0 entered promiscuous mode [ 88.237339][ T2171] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.252016][ T2171] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.267369][ T2171] device bridge_slave_1 entered promiscuous mode [ 88.294422][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 88.305096][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 88.321489][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 88.350744][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 88.544485][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.602153][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.737760][ T2201] device wg2 left promiscuous mode [ 88.906671][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.936572][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.976280][ T415] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.983368][ T415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.022246][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.041521][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.059126][ T415] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.066217][ T415] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.088253][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.105003][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.129134][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.153256][ T2171] device veth0_vlan entered promiscuous mode [ 89.169302][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 89.184148][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.202381][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.219492][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.256520][ T2171] device veth1_macvtap entered promiscuous mode [ 89.271373][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 89.280189][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 89.289572][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 90.527186][ T2217] FAULT_INJECTION: forcing a failure. [ 90.527186][ T2217] name failslab, interval 1, probability 0, space 0, times 0 [ 90.539946][ T2217] CPU: 0 PID: 2217 Comm: syz.4.548 Tainted: G W syzkaller #0 [ 90.548636][ T2217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 90.558695][ T2217] Call Trace: [ 90.561979][ T2217] [ 90.564909][ T2217] __dump_stack+0x21/0x30 [ 90.569247][ T2217] dump_stack_lvl+0x110/0x170 [ 90.573923][ T2217] ? show_regs_print_info+0x20/0x20 [ 90.579114][ T2217] dump_stack+0x15/0x20 [ 90.583249][ T2217] should_fail+0x3c1/0x510 [ 90.587646][ T2217] __should_failslab+0xa4/0xe0 [ 90.592388][ T2217] should_failslab+0x9/0x20 [ 90.596871][ T2217] slab_pre_alloc_hook+0x3b/0xe0 [ 90.601791][ T2217] ? skb_clone+0x1cf/0x360 [ 90.606202][ T2217] kmem_cache_alloc+0x44/0x260 [ 90.610946][ T2217] skb_clone+0x1cf/0x360 [ 90.615164][ T2217] bpf_clone_redirect+0x17c/0x4b0 [ 90.620168][ T2217] bpf_prog_801cabf80fc815cd+0x59/0xda8 [ 90.625689][ T2217] ? __kasan_slab_alloc+0xcf/0xf0 [ 90.630689][ T2217] ? __kasan_slab_alloc+0xbd/0xf0 [ 90.635688][ T2217] ? slab_post_alloc_hook+0x4f/0x2b0 [ 90.640953][ T2217] ? kmem_cache_alloc+0xf7/0x260 [ 90.645873][ T2217] ? __build_skb+0x2d/0x310 [ 90.650354][ T2217] ? build_skb+0x24/0x200 [ 90.654659][ T2217] ? bpf_prog_test_run_skb+0x279/0x1150 [ 90.660185][ T2217] ? bpf_prog_test_run+0x3d5/0x630 [ 90.665273][ T2217] ? __sys_bpf+0x590/0x7d0 [ 90.669662][ T2217] ? __x64_sys_bpf+0x7c/0x90 [ 90.674344][ T2217] ? x64_sys_call+0x4b9/0x9a0 [ 90.679003][ T2217] ? do_syscall_64+0x4c/0xa0 [ 90.683577][ T2217] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 90.689630][ T2217] ? __kasan_check_read+0x11/0x20 [ 90.694635][ T2217] ? bpf_test_timer_continue+0x146/0x4a0 [ 90.700250][ T2217] bpf_test_run+0x351/0x900 [ 90.704738][ T2217] ? convert___skb_to_skb+0x4f0/0x4f0 [ 90.710088][ T2217] ? eth_get_headlen+0x200/0x200 [ 90.715004][ T2217] ? convert___skb_to_skb+0x41/0x4f0 [ 90.720263][ T2217] bpf_prog_test_run_skb+0x9ec/0x1150 [ 90.725615][ T2217] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 90.731484][ T2217] bpf_prog_test_run+0x3d5/0x630 [ 90.736400][ T2217] ? bpf_prog_query+0x230/0x230 [ 90.741225][ T2217] ? selinux_bpf+0xce/0xf0 [ 90.745620][ T2217] ? security_bpf+0x82/0xa0 [ 90.750101][ T2217] __sys_bpf+0x590/0x7d0 [ 90.754317][ T2217] ? bpf_link_show_fdinfo+0x330/0x330 [ 90.759671][ T2217] ? debug_smp_processor_id+0x17/0x20 [ 90.765020][ T2217] __x64_sys_bpf+0x7c/0x90 [ 90.769413][ T2217] x64_sys_call+0x4b9/0x9a0 [ 90.773897][ T2217] do_syscall_64+0x4c/0xa0 [ 90.778299][ T2217] ? clear_bhb_loop+0x50/0xa0 [ 90.782958][ T2217] ? clear_bhb_loop+0x50/0xa0 [ 90.787615][ T2217] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 90.793488][ T2217] RIP: 0033:0x7f3d899a8799 [ 90.797887][ T2217] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 90.817645][ T2217] RSP: 002b:00007f3d88403028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 90.826300][ T2217] RAX: ffffffffffffffda RBX: 00007f3d89c21fa0 RCX: 00007f3d899a8799 [ 90.834252][ T2217] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 90.842199][ T2217] RBP: 00007f3d88403090 R08: 0000000000000000 R09: 0000000000000000 [ 90.850150][ T2217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 90.858099][ T2217] R13: 00007f3d89c22038 R14: 00007f3d89c21fa0 R15: 00007ffd87ae05c8 [ 90.866052][ T2217] [ 90.980264][ T2218] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.988776][ T2218] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.996491][ T2218] device bridge_slave_0 entered promiscuous mode [ 91.011835][ T2218] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.021434][ T2218] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.029581][ T2218] device bridge_slave_1 entered promiscuous mode [ 91.050502][ T2260] FAULT_INJECTION: forcing a failure. [ 91.050502][ T2260] name failslab, interval 1, probability 0, space 0, times 0 [ 91.071066][ T2260] CPU: 1 PID: 2260 Comm: syz.0.559 Tainted: G W syzkaller #0 [ 91.079777][ T2260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 91.089836][ T2260] Call Trace: [ 91.093111][ T2260] [ 91.096028][ T2260] __dump_stack+0x21/0x30 [ 91.100345][ T2260] dump_stack_lvl+0x110/0x170 [ 91.105008][ T2260] ? show_regs_print_info+0x20/0x20 [ 91.110188][ T2260] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 91.116245][ T2260] dump_stack+0x15/0x20 [ 91.120382][ T2260] should_fail+0x3c1/0x510 [ 91.124781][ T2260] ? skb_ensure_writable+0x2e7/0x460 [ 91.130049][ T2260] __should_failslab+0xa4/0xe0 [ 91.134797][ T2260] should_failslab+0x9/0x20 [ 91.139283][ T2260] slab_pre_alloc_hook+0x3b/0xe0 [ 91.144200][ T2260] ? skb_ensure_writable+0x2e7/0x460 [ 91.149470][ T2260] ? skb_ensure_writable+0x2e7/0x460 [ 91.154733][ T2260] __kmalloc_track_caller+0x6c/0x2c0 [ 91.160008][ T2260] ? skb_ensure_writable+0x2e7/0x460 [ 91.165270][ T2260] ? skb_ensure_writable+0x2e7/0x460 [ 91.170536][ T2260] pskb_expand_head+0x11b/0x11d0 [ 91.175457][ T2260] ? __copy_skb_header+0x437/0x600 [ 91.180551][ T2260] ? __kasan_check_write+0x14/0x20 [ 91.185644][ T2260] ? __skb_clone+0x47a/0x790 [ 91.190216][ T2260] skb_ensure_writable+0x2e7/0x460 [ 91.195308][ T2260] bpf_clone_redirect+0x1dd/0x4b0 [ 91.200319][ T2260] bpf_prog_801cabf80fc815cd+0x59/0xab8 [ 91.205843][ T2260] ? __kasan_slab_alloc+0xcf/0xf0 [ 91.210851][ T2260] ? __kasan_slab_alloc+0xbd/0xf0 [ 91.215853][ T2260] ? slab_post_alloc_hook+0x4f/0x2b0 [ 91.221129][ T2260] ? kmem_cache_alloc+0xf7/0x260 [ 91.226045][ T2260] ? __build_skb+0x2d/0x310 [ 91.230532][ T2260] ? build_skb+0x24/0x200 [ 91.234842][ T2260] ? bpf_prog_test_run_skb+0x279/0x1150 [ 91.240373][ T2260] ? bpf_prog_test_run+0x3d5/0x630 [ 91.245467][ T2260] ? __sys_bpf+0x590/0x7d0 [ 91.249863][ T2260] ? __x64_sys_bpf+0x7c/0x90 [ 91.254432][ T2260] ? x64_sys_call+0x4b9/0x9a0 [ 91.259090][ T2260] ? do_syscall_64+0x4c/0xa0 [ 91.263663][ T2260] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 91.269723][ T2260] ? __kasan_check_read+0x11/0x20 [ 91.274729][ T2260] ? bpf_test_timer_continue+0x146/0x4a0 [ 91.280350][ T2260] bpf_test_run+0x351/0x900 [ 91.284838][ T2260] ? convert___skb_to_skb+0x4f0/0x4f0 [ 91.290192][ T2260] ? eth_get_headlen+0x200/0x200 [ 91.295116][ T2260] ? convert___skb_to_skb+0x41/0x4f0 [ 91.300383][ T2260] bpf_prog_test_run_skb+0x9ec/0x1150 [ 91.305738][ T2260] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 91.311615][ T2260] bpf_prog_test_run+0x3d5/0x630 [ 91.316533][ T2260] ? bpf_prog_query+0x230/0x230 [ 91.321362][ T2260] ? selinux_bpf+0xce/0xf0 [ 91.325808][ T2260] ? security_bpf+0x82/0xa0 [ 91.330318][ T2260] __sys_bpf+0x590/0x7d0 [ 91.334542][ T2260] ? bpf_link_show_fdinfo+0x330/0x330 [ 91.339904][ T2260] ? debug_smp_processor_id+0x17/0x20 [ 91.345270][ T2260] __x64_sys_bpf+0x7c/0x90 [ 91.349671][ T2260] x64_sys_call+0x4b9/0x9a0 [ 91.354163][ T2260] do_syscall_64+0x4c/0xa0 [ 91.358572][ T2260] ? clear_bhb_loop+0x50/0xa0 [ 91.363263][ T2260] ? clear_bhb_loop+0x50/0xa0 [ 91.367937][ T2260] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 91.373824][ T2260] RIP: 0033:0x7f65bd50e799 [ 91.378221][ T2260] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 91.397814][ T2260] RSP: 002b:00007f65bbf69028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 91.406215][ T2260] RAX: ffffffffffffffda RBX: 00007f65bd787fa0 RCX: 00007f65bd50e799 [ 91.414182][ T2260] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 91.422138][ T2260] RBP: 00007f65bbf69090 R08: 0000000000000000 R09: 0000000000000000 [ 91.430094][ T2260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 91.438045][ T2260] R13: 00007f65bd788038 R14: 00007f65bd787fa0 R15: 00007ffd93f4c5d8 [ 91.446004][ T2260] [ 91.540380][ T783] device bridge_slave_1 left promiscuous mode [ 91.591989][ T783] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.604700][ T783] device bridge_slave_0 left promiscuous mode [ 91.658192][ T783] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.760884][ T783] device veth1_macvtap left promiscuous mode [ 91.812730][ T30] audit: type=1400 audit(1773261277.197:140): avc: denied { create } for pid=2265 comm="syz.0.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 91.833147][ T783] device veth0_vlan left promiscuous mode [ 92.146940][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.175258][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.190369][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.212307][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.235068][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.242160][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.265123][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.280935][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.289477][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.296540][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.304524][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.381896][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.420866][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.479545][ T2218] device veth0_vlan entered promiscuous mode [ 92.493685][ T2218] device veth1_macvtap entered promiscuous mode [ 92.502744][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 92.532835][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 92.541013][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 92.548686][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.579274][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 92.639311][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.680997][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.689681][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 92.698170][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 93.552450][ T783] device bridge_slave_1 left promiscuous mode [ 93.558605][ T783] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.566192][ T783] device bridge_slave_0 left promiscuous mode [ 93.572492][ T783] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.580133][ T783] device veth1_macvtap left promiscuous mode [ 93.586344][ T783] device veth0_vlan left promiscuous mode [ 94.450661][ T2304] FAULT_INJECTION: forcing a failure. [ 94.450661][ T2304] name failslab, interval 1, probability 0, space 0, times 0 [ 94.456491][ T30] audit: type=1400 audit(1773261279.827:141): avc: denied { create } for pid=2303 comm="syz.4.573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 94.471839][ T2304] CPU: 0 PID: 2304 Comm: syz.5.571 Tainted: G W syzkaller #0 [ 94.491208][ T2304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 94.501263][ T2304] Call Trace: [ 94.504544][ T2304] [ 94.507468][ T2304] __dump_stack+0x21/0x30 [ 94.511799][ T2304] dump_stack_lvl+0x110/0x170 [ 94.516475][ T2304] ? show_regs_print_info+0x20/0x20 [ 94.521674][ T2304] dump_stack+0x15/0x20 [ 94.525835][ T2304] should_fail+0x3c1/0x510 [ 94.530256][ T2304] __should_failslab+0xa4/0xe0 [ 94.535021][ T2304] should_failslab+0x9/0x20 [ 94.539521][ T2304] slab_pre_alloc_hook+0x3b/0xe0 [ 94.544461][ T2304] ? skb_clone+0x1cf/0x360 [ 94.548887][ T2304] kmem_cache_alloc+0x44/0x260 [ 94.553648][ T2304] skb_clone+0x1cf/0x360 [ 94.557892][ T2304] bpf_clone_redirect+0x17c/0x4b0 [ 94.562914][ T2304] bpf_prog_801cabf80fc815cd+0x59/0xad0 [ 94.568457][ T2304] ? __kasan_slab_alloc+0xcf/0xf0 [ 94.573477][ T2304] ? __kasan_slab_alloc+0xbd/0xf0 [ 94.578496][ T2304] ? slab_post_alloc_hook+0x4f/0x2b0 [ 94.583788][ T2304] ? kmem_cache_alloc+0xf7/0x260 [ 94.588720][ T2304] ? __build_skb+0x2d/0x310 [ 94.593208][ T2304] ? build_skb+0x24/0x200 [ 94.597519][ T2304] ? bpf_prog_test_run_skb+0x279/0x1150 [ 94.603049][ T2304] ? bpf_prog_test_run+0x3d5/0x630 [ 94.608150][ T2304] ? __sys_bpf+0x590/0x7d0 [ 94.612550][ T2304] ? __x64_sys_bpf+0x7c/0x90 [ 94.617118][ T2304] ? x64_sys_call+0x4b9/0x9a0 [ 94.621779][ T2304] ? do_syscall_64+0x4c/0xa0 [ 94.626358][ T2304] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 94.632419][ T2304] ? __kasan_check_read+0x11/0x20 [ 94.637431][ T2304] ? bpf_test_timer_continue+0x146/0x4a0 [ 94.643048][ T2304] bpf_test_run+0x351/0x900 [ 94.647536][ T2304] ? convert___skb_to_skb+0x4f0/0x4f0 [ 94.652896][ T2304] ? eth_get_headlen+0x200/0x200 [ 94.657816][ T2304] ? convert___skb_to_skb+0x41/0x4f0 [ 94.663083][ T2304] bpf_prog_test_run_skb+0x9ec/0x1150 [ 94.668449][ T2304] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 94.674328][ T2304] bpf_prog_test_run+0x3d5/0x630 [ 94.679251][ T2304] ? bpf_prog_query+0x230/0x230 [ 94.684092][ T2304] ? selinux_bpf+0xce/0xf0 [ 94.688496][ T2304] ? security_bpf+0x82/0xa0 [ 94.692992][ T2304] __sys_bpf+0x590/0x7d0 [ 94.697216][ T2304] ? bpf_link_show_fdinfo+0x330/0x330 [ 94.702569][ T2304] ? debug_smp_processor_id+0x17/0x20 [ 94.707923][ T2304] __x64_sys_bpf+0x7c/0x90 [ 94.712324][ T2304] x64_sys_call+0x4b9/0x9a0 [ 94.716814][ T2304] do_syscall_64+0x4c/0xa0 [ 94.721219][ T2304] ? clear_bhb_loop+0x50/0xa0 [ 94.725880][ T2304] ? clear_bhb_loop+0x50/0xa0 [ 94.730539][ T2304] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 94.736415][ T2304] RIP: 0033:0x7f054a77f799 [ 94.740816][ T2304] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 94.760408][ T2304] RSP: 002b:00007f05491da028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 94.768809][ T2304] RAX: ffffffffffffffda RBX: 00007f054a9f8fa0 RCX: 00007f054a77f799 [ 94.776768][ T2304] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 94.784720][ T2304] RBP: 00007f05491da090 R08: 0000000000000000 R09: 0000000000000000 [ 94.792679][ T2304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 94.800634][ T2304] R13: 00007f054a9f9038 R14: 00007f054a9f8fa0 R15: 00007ffe9a15bcd8 [ 94.808596][ T2304] [ 94.822669][ T2307] @ÿ: renamed from bond_slave_0 [ 95.056421][ T2311] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.147884][ T2311] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.184296][ T2311] device bridge_slave_0 entered promiscuous mode [ 95.270116][ T2311] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.396828][ T2311] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.404373][ T2311] device bridge_slave_1 entered promiscuous mode [ 95.661407][ T2344] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.670507][ T2344] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.905623][ T2345] device bridge_slave_1 left promiscuous mode [ 95.975118][ T2345] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.059154][ T2345] device bridge_slave_0 left promiscuous mode [ 96.073752][ T2345] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.337484][ T2358] FAULT_INJECTION: forcing a failure. [ 96.337484][ T2358] name failslab, interval 1, probability 0, space 0, times 0 [ 96.355142][ T2358] CPU: 0 PID: 2358 Comm: syz.5.589 Tainted: G W syzkaller #0 [ 96.363853][ T2358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 96.373904][ T2358] Call Trace: [ 96.377183][ T2358] [ 96.380108][ T2358] __dump_stack+0x21/0x30 [ 96.384442][ T2358] dump_stack_lvl+0x110/0x170 [ 96.389121][ T2358] ? show_regs_print_info+0x20/0x20 [ 96.394315][ T2358] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 96.400382][ T2358] dump_stack+0x15/0x20 [ 96.404538][ T2358] should_fail+0x3c1/0x510 [ 96.408951][ T2358] ? skb_ensure_writable+0x2e7/0x460 [ 96.414238][ T2358] __should_failslab+0xa4/0xe0 [ 96.419013][ T2358] should_failslab+0x9/0x20 [ 96.423651][ T2358] slab_pre_alloc_hook+0x3b/0xe0 [ 96.428607][ T2358] ? skb_ensure_writable+0x2e7/0x460 [ 96.433889][ T2358] ? skb_ensure_writable+0x2e7/0x460 [ 96.439174][ T2358] __kmalloc_track_caller+0x6c/0x2c0 [ 96.444456][ T2358] ? skb_ensure_writable+0x2e7/0x460 [ 96.449736][ T2358] ? skb_ensure_writable+0x2e7/0x460 [ 96.455015][ T2358] pskb_expand_head+0x11b/0x11d0 [ 96.460039][ T2358] ? __copy_skb_header+0x437/0x600 [ 96.465152][ T2358] ? __kasan_check_write+0x14/0x20 [ 96.470262][ T2358] ? __skb_clone+0x47a/0x790 [ 96.474854][ T2358] skb_ensure_writable+0x2e7/0x460 [ 96.479964][ T2358] bpf_clone_redirect+0x1dd/0x4b0 [ 96.484989][ T2358] bpf_prog_801cabf80fc815cd+0x59/0x9ac [ 96.490616][ T2358] ? __kasan_slab_alloc+0xcf/0xf0 [ 96.495633][ T2358] ? __kasan_slab_alloc+0xbd/0xf0 [ 96.500659][ T2358] ? slab_post_alloc_hook+0x4f/0x2b0 [ 96.505962][ T2358] ? kmem_cache_alloc+0xf7/0x260 [ 96.510914][ T2358] ? __build_skb+0x2d/0x310 [ 96.515418][ T2358] ? build_skb+0x24/0x200 [ 96.519764][ T2358] ? bpf_prog_test_run_skb+0x279/0x1150 [ 96.525319][ T2358] ? bpf_prog_test_run+0x3d5/0x630 [ 96.530440][ T2358] ? __sys_bpf+0x590/0x7d0 [ 96.534857][ T2358] ? __x64_sys_bpf+0x7c/0x90 [ 96.539445][ T2358] ? x64_sys_call+0x4b9/0x9a0 [ 96.544116][ T2358] ? do_syscall_64+0x4c/0xa0 [ 96.548704][ T2358] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 96.554776][ T2358] ? __kasan_check_read+0x11/0x20 [ 96.559802][ T2358] ? bpf_test_timer_continue+0x146/0x4a0 [ 96.565441][ T2358] bpf_test_run+0x351/0x900 [ 96.569947][ T2358] ? convert___skb_to_skb+0x4f0/0x4f0 [ 96.575315][ T2358] ? eth_get_headlen+0x200/0x200 [ 96.580259][ T2358] ? convert___skb_to_skb+0x41/0x4f0 [ 96.585543][ T2358] bpf_prog_test_run_skb+0x9ec/0x1150 [ 96.590921][ T2358] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 96.596819][ T2358] bpf_prog_test_run+0x3d5/0x630 [ 96.601768][ T2358] ? bpf_prog_query+0x230/0x230 [ 96.606622][ T2358] ? selinux_bpf+0xce/0xf0 [ 96.611018][ T2358] ? security_bpf+0x82/0xa0 [ 96.615503][ T2358] __sys_bpf+0x590/0x7d0 [ 96.619721][ T2358] ? bpf_link_show_fdinfo+0x330/0x330 [ 96.625077][ T2358] ? debug_smp_processor_id+0x17/0x20 [ 96.630423][ T2358] __x64_sys_bpf+0x7c/0x90 [ 96.634815][ T2358] x64_sys_call+0x4b9/0x9a0 [ 96.639294][ T2358] do_syscall_64+0x4c/0xa0 [ 96.643690][ T2358] ? clear_bhb_loop+0x50/0xa0 [ 96.648342][ T2358] ? clear_bhb_loop+0x50/0xa0 [ 96.652990][ T2358] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 96.658858][ T2358] RIP: 0033:0x7f054a77f799 [ 96.663247][ T2358] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 96.682831][ T2358] RSP: 002b:00007f05491da028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 96.691482][ T2358] RAX: ffffffffffffffda RBX: 00007f054a9f8fa0 RCX: 00007f054a77f799 [ 96.699434][ T2358] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 96.707495][ T2358] RBP: 00007f05491da090 R08: 0000000000000000 R09: 0000000000000000 [ 96.715453][ T2358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 96.723404][ T2358] R13: 00007f054a9f9038 R14: 00007f054a9f8fa0 R15: 00007ffe9a15bcd8 [ 96.731359][ T2358] [ 96.769781][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 96.787299][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.802190][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.831334][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.839924][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.846986][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.866497][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.876874][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.896262][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.903338][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.928248][ T2372] device syzkaller0 entered promiscuous mode [ 96.955480][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 96.964508][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 96.992466][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 97.021153][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 97.041479][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.113274][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.121810][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.168071][ T2311] device veth0_vlan entered promiscuous mode [ 97.252232][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.280342][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.341732][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.400760][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.482849][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.514513][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.609543][ T2311] device veth1_macvtap entered promiscuous mode [ 97.712289][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.752323][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.760673][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.958427][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 98.021646][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 98.082972][ T2394] FAULT_INJECTION: forcing a failure. [ 98.082972][ T2394] name failslab, interval 1, probability 0, space 0, times 0 [ 98.135377][ T2394] CPU: 1 PID: 2394 Comm: syz.4.603 Tainted: G W syzkaller #0 [ 98.144096][ T2394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 98.154154][ T2394] Call Trace: [ 98.157433][ T2394] [ 98.160360][ T2394] __dump_stack+0x21/0x30 [ 98.164689][ T2394] dump_stack_lvl+0x110/0x170 [ 98.169366][ T2394] ? show_regs_print_info+0x20/0x20 [ 98.174556][ T2394] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 98.180621][ T2394] dump_stack+0x15/0x20 [ 98.184773][ T2394] should_fail+0x3c1/0x510 [ 98.189184][ T2394] ? skb_ensure_writable+0x2e7/0x460 [ 98.194461][ T2394] __should_failslab+0xa4/0xe0 [ 98.199240][ T2394] should_failslab+0x9/0x20 [ 98.203734][ T2394] slab_pre_alloc_hook+0x3b/0xe0 [ 98.208664][ T2394] ? skb_ensure_writable+0x2e7/0x460 [ 98.213947][ T2394] ? skb_ensure_writable+0x2e7/0x460 [ 98.219226][ T2394] __kmalloc_track_caller+0x6c/0x2c0 [ 98.224507][ T2394] ? skb_ensure_writable+0x2e7/0x460 [ 98.229787][ T2394] ? skb_ensure_writable+0x2e7/0x460 [ 98.235062][ T2394] pskb_expand_head+0x11b/0x11d0 [ 98.240005][ T2394] ? __copy_skb_header+0x437/0x600 [ 98.245131][ T2394] ? __kasan_check_write+0x14/0x20 [ 98.250251][ T2394] ? __skb_clone+0x47a/0x790 [ 98.254839][ T2394] skb_ensure_writable+0x2e7/0x460 [ 98.259949][ T2394] bpf_clone_redirect+0x1dd/0x4b0 [ 98.264973][ T2394] bpf_prog_801cabf80fc815cd+0x59/0x754 [ 98.270525][ T2394] ? __kasan_slab_alloc+0xcf/0xf0 [ 98.275545][ T2394] ? __kasan_slab_alloc+0xbd/0xf0 [ 98.280562][ T2394] ? slab_post_alloc_hook+0x4f/0x2b0 [ 98.285842][ T2394] ? kmem_cache_alloc+0xf7/0x260 [ 98.290777][ T2394] ? __build_skb+0x2d/0x310 [ 98.295283][ T2394] ? build_skb+0x24/0x200 [ 98.299604][ T2394] ? bpf_prog_test_run_skb+0x279/0x1150 [ 98.305148][ T2394] ? bpf_prog_test_run+0x3d5/0x630 [ 98.310255][ T2394] ? __sys_bpf+0x590/0x7d0 [ 98.314661][ T2394] ? __x64_sys_bpf+0x7c/0x90 [ 98.319250][ T2394] ? x64_sys_call+0x4b9/0x9a0 [ 98.323919][ T2394] ? do_syscall_64+0x4c/0xa0 [ 98.328507][ T2394] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 98.334577][ T2394] ? __kasan_check_read+0x11/0x20 [ 98.339696][ T2394] ? bpf_test_timer_continue+0x146/0x4a0 [ 98.345328][ T2394] bpf_test_run+0x351/0x900 [ 98.349832][ T2394] ? convert___skb_to_skb+0x4f0/0x4f0 [ 98.355197][ T2394] ? eth_get_headlen+0x200/0x200 [ 98.360133][ T2394] ? convert___skb_to_skb+0x41/0x4f0 [ 98.365417][ T2394] bpf_prog_test_run_skb+0x9ec/0x1150 [ 98.370789][ T2394] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 98.376678][ T2394] bpf_prog_test_run+0x3d5/0x630 [ 98.381612][ T2394] ? bpf_prog_query+0x230/0x230 [ 98.386454][ T2394] ? selinux_bpf+0xce/0xf0 [ 98.390869][ T2394] ? security_bpf+0x82/0xa0 [ 98.395363][ T2394] __sys_bpf+0x590/0x7d0 [ 98.399602][ T2394] ? bpf_link_show_fdinfo+0x330/0x330 [ 98.404971][ T2394] ? debug_smp_processor_id+0x17/0x20 [ 98.410351][ T2394] __x64_sys_bpf+0x7c/0x90 [ 98.414765][ T2394] x64_sys_call+0x4b9/0x9a0 [ 98.419263][ T2394] do_syscall_64+0x4c/0xa0 [ 98.423674][ T2394] ? clear_bhb_loop+0x50/0xa0 [ 98.428343][ T2394] ? clear_bhb_loop+0x50/0xa0 [ 98.433019][ T2394] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 98.438941][ T2394] RIP: 0033:0x7f3d899a8799 [ 98.443354][ T2394] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 98.462954][ T2394] RSP: 002b:00007f3d88403028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 98.471368][ T2394] RAX: ffffffffffffffda RBX: 00007f3d89c21fa0 RCX: 00007f3d899a8799 [ 98.479338][ T2394] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 98.487311][ T2394] RBP: 00007f3d88403090 R08: 0000000000000000 R09: 0000000000000000 [ 98.495373][ T2394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 98.503346][ T2394] R13: 00007f3d89c22038 R14: 00007f3d89c21fa0 R15: 00007ffd87ae05c8 [ 98.511320][ T2394] [ 100.422519][ T783] device bridge_slave_1 left promiscuous mode [ 100.430510][ T783] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.438406][ T783] device bridge_slave_0 left promiscuous mode [ 100.482373][ T783] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.518561][ T783] device veth1_macvtap left promiscuous mode [ 100.572524][ T783] device veth0_vlan left promiscuous mode [ 101.288470][ T2448] FAULT_INJECTION: forcing a failure. [ 101.288470][ T2448] name failslab, interval 1, probability 0, space 0, times 0 [ 101.325428][ T2448] CPU: 0 PID: 2448 Comm: syz.5.621 Tainted: G W syzkaller #0 [ 101.334136][ T2448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 101.344197][ T2448] Call Trace: [ 101.347473][ T2448] [ 101.350401][ T2448] __dump_stack+0x21/0x30 [ 101.354745][ T2448] dump_stack_lvl+0x110/0x170 [ 101.359429][ T2448] ? show_regs_print_info+0x20/0x20 [ 101.364633][ T2448] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 101.366300][ T2422] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.370698][ T2448] dump_stack+0x15/0x20 [ 101.381831][ T2448] should_fail+0x3c1/0x510 [ 101.386247][ T2448] ? skb_ensure_writable+0x2e7/0x460 [ 101.391518][ T2448] __should_failslab+0xa4/0xe0 [ 101.396270][ T2448] should_failslab+0x9/0x20 [ 101.400847][ T2448] slab_pre_alloc_hook+0x3b/0xe0 [ 101.405771][ T2448] ? skb_ensure_writable+0x2e7/0x460 [ 101.411046][ T2448] ? skb_ensure_writable+0x2e7/0x460 [ 101.416318][ T2448] __kmalloc_track_caller+0x6c/0x2c0 [ 101.421590][ T2448] ? skb_ensure_writable+0x2e7/0x460 [ 101.426859][ T2448] ? skb_ensure_writable+0x2e7/0x460 [ 101.432131][ T2448] pskb_expand_head+0x11b/0x11d0 [ 101.437061][ T2448] ? __copy_skb_header+0x437/0x600 [ 101.442159][ T2448] ? __kasan_check_write+0x14/0x20 [ 101.447258][ T2448] ? __skb_clone+0x47a/0x790 [ 101.451834][ T2448] skb_ensure_writable+0x2e7/0x460 [ 101.456929][ T2448] bpf_clone_redirect+0x1dd/0x4b0 [ 101.461943][ T2448] bpf_prog_801cabf80fc815cd+0x59/0x6c0 [ 101.467476][ T2448] ? __kasan_slab_alloc+0xcf/0xf0 [ 101.472482][ T2448] ? __kasan_slab_alloc+0xbd/0xf0 [ 101.477487][ T2448] ? slab_post_alloc_hook+0x4f/0x2b0 [ 101.482770][ T2448] ? kmem_cache_alloc+0xf7/0x260 [ 101.487782][ T2448] ? __build_skb+0x2d/0x310 [ 101.492271][ T2448] ? build_skb+0x24/0x200 [ 101.496585][ T2448] ? bpf_prog_test_run_skb+0x279/0x1150 [ 101.502117][ T2448] ? bpf_prog_test_run+0x3d5/0x630 [ 101.507212][ T2448] ? __sys_bpf+0x590/0x7d0 [ 101.511608][ T2448] ? __x64_sys_bpf+0x7c/0x90 [ 101.516182][ T2448] ? x64_sys_call+0x4b9/0x9a0 [ 101.520846][ T2448] ? do_syscall_64+0x4c/0xa0 [ 101.525433][ T2448] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 101.531495][ T2448] ? __kasan_check_read+0x11/0x20 [ 101.536507][ T2448] ? bpf_test_timer_continue+0x146/0x4a0 [ 101.542128][ T2448] bpf_test_run+0x351/0x900 [ 101.546628][ T2448] ? convert___skb_to_skb+0x4f0/0x4f0 [ 101.552016][ T2448] ? eth_get_headlen+0x200/0x200 [ 101.556946][ T2448] ? convert___skb_to_skb+0x41/0x4f0 [ 101.562233][ T2448] bpf_prog_test_run_skb+0x9ec/0x1150 [ 101.567598][ T2448] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 101.573480][ T2448] bpf_prog_test_run+0x3d5/0x630 [ 101.578412][ T2448] ? bpf_prog_query+0x230/0x230 [ 101.583255][ T2448] ? selinux_bpf+0xce/0xf0 [ 101.587663][ T2448] ? security_bpf+0x82/0xa0 [ 101.592155][ T2448] __sys_bpf+0x590/0x7d0 [ 101.596389][ T2448] ? bpf_link_show_fdinfo+0x330/0x330 [ 101.601753][ T2448] ? debug_smp_processor_id+0x17/0x20 [ 101.607116][ T2448] __x64_sys_bpf+0x7c/0x90 [ 101.611522][ T2448] x64_sys_call+0x4b9/0x9a0 [ 101.616026][ T2448] do_syscall_64+0x4c/0xa0 [ 101.620429][ T2448] ? clear_bhb_loop+0x50/0xa0 [ 101.625094][ T2448] ? clear_bhb_loop+0x50/0xa0 [ 101.629758][ T2448] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 101.635647][ T2448] RIP: 0033:0x7f054a77f799 [ 101.640056][ T2448] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 101.659657][ T2448] RSP: 002b:00007f05491da028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 101.668063][ T2448] RAX: ffffffffffffffda RBX: 00007f054a9f8fa0 RCX: 00007f054a77f799 [ 101.676024][ T2448] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 101.683983][ T2448] RBP: 00007f05491da090 R08: 0000000000000000 R09: 0000000000000000 [ 101.691942][ T2448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 101.699907][ T2448] R13: 00007f054a9f9038 R14: 00007f054a9f8fa0 R15: 00007ffe9a15bcd8 [ 101.707876][ T2448] [ 101.742019][ T2422] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.749555][ T2422] device bridge_slave_0 entered promiscuous mode [ 101.820084][ T2422] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.847777][ T2422] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.858306][ T2422] device bridge_slave_1 entered promiscuous mode [ 101.947462][ T30] audit: type=1400 audit(1773261287.327:142): avc: denied { create } for pid=2454 comm="syz.0.624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 102.906072][ T2488] FAULT_INJECTION: forcing a failure. [ 102.906072][ T2488] name failslab, interval 1, probability 0, space 0, times 0 [ 102.919259][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.927168][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.935063][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 102.943931][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.952446][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.959499][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.975682][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 102.988638][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.002000][ T2488] CPU: 1 PID: 2488 Comm: syz.0.636 Tainted: G W syzkaller #0 [ 103.010708][ T2488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 103.020784][ T2488] Call Trace: [ 103.024065][ T2488] [ 103.026991][ T2488] __dump_stack+0x21/0x30 [ 103.031340][ T2488] dump_stack_lvl+0x110/0x170 [ 103.036042][ T2488] ? show_regs_print_info+0x20/0x20 [ 103.041263][ T2488] dump_stack+0x15/0x20 [ 103.045428][ T2488] should_fail+0x3c1/0x510 [ 103.049852][ T2488] __should_failslab+0xa4/0xe0 [ 103.054625][ T2488] should_failslab+0x9/0x20 [ 103.059132][ T2488] slab_pre_alloc_hook+0x3b/0xe0 [ 103.064059][ T2488] ? skb_clone+0x1cf/0x360 [ 103.068459][ T2488] kmem_cache_alloc+0x44/0x260 [ 103.073208][ T2488] skb_clone+0x1cf/0x360 [ 103.077438][ T2488] bpf_clone_redirect+0x17c/0x4b0 [ 103.082451][ T2488] bpf_prog_801cabf80fc815cd+0x59/0x22c [ 103.087981][ T2488] ? __kasan_slab_alloc+0xcf/0xf0 [ 103.093253][ T2488] ? __kasan_slab_alloc+0xbd/0xf0 [ 103.098257][ T2488] ? slab_post_alloc_hook+0x4f/0x2b0 [ 103.103580][ T2488] ? kmem_cache_alloc+0xf7/0x260 [ 103.108502][ T2488] ? __build_skb+0x2d/0x310 [ 103.112992][ T2488] ? build_skb+0x24/0x200 [ 103.117305][ T2488] ? bpf_prog_test_run_skb+0x279/0x1150 [ 103.122844][ T2488] ? bpf_prog_test_run+0x3d5/0x630 [ 103.127954][ T2488] ? __sys_bpf+0x590/0x7d0 [ 103.132353][ T2488] ? __x64_sys_bpf+0x7c/0x90 [ 103.136920][ T2488] ? x64_sys_call+0x4b9/0x9a0 [ 103.141583][ T2488] ? do_syscall_64+0x4c/0xa0 [ 103.146177][ T2488] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 103.152246][ T2488] ? __kasan_check_read+0x11/0x20 [ 103.157256][ T2488] ? bpf_test_timer_continue+0x146/0x4a0 [ 103.162916][ T2488] bpf_test_run+0x351/0x900 [ 103.167410][ T2488] ? convert___skb_to_skb+0x4f0/0x4f0 [ 103.172851][ T2488] ? eth_get_headlen+0x200/0x200 [ 103.177774][ T2488] ? convert___skb_to_skb+0x41/0x4f0 [ 103.183039][ T2488] bpf_prog_test_run_skb+0x9ec/0x1150 [ 103.188393][ T2488] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 103.194269][ T2488] bpf_prog_test_run+0x3d5/0x630 [ 103.199187][ T2488] ? bpf_prog_query+0x230/0x230 [ 103.204015][ T2488] ? selinux_bpf+0xce/0xf0 [ 103.208410][ T2488] ? security_bpf+0x82/0xa0 [ 103.212891][ T2488] __sys_bpf+0x590/0x7d0 [ 103.217113][ T2488] ? bpf_link_show_fdinfo+0x330/0x330 [ 103.222473][ T2488] ? debug_smp_processor_id+0x17/0x20 [ 103.227828][ T2488] __x64_sys_bpf+0x7c/0x90 [ 103.232330][ T2488] x64_sys_call+0x4b9/0x9a0 [ 103.236837][ T2488] do_syscall_64+0x4c/0xa0 [ 103.241239][ T2488] ? clear_bhb_loop+0x50/0xa0 [ 103.245917][ T2488] ? clear_bhb_loop+0x50/0xa0 [ 103.250579][ T2488] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 103.256458][ T2488] RIP: 0033:0x7f65bd50e799 [ 103.260856][ T2488] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 103.280445][ T2488] RSP: 002b:00007f65bbf69028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 103.288852][ T2488] RAX: ffffffffffffffda RBX: 00007f65bd787fa0 RCX: 00007f65bd50e799 [ 103.296898][ T2488] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 103.304944][ T2488] RBP: 00007f65bbf69090 R08: 0000000000000000 R09: 0000000000000000 [ 103.312903][ T2488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 103.320859][ T2488] R13: 00007f65bd788038 R14: 00007f65bd787fa0 R15: 00007ffd93f4c5d8 [ 103.328827][ T2488] [ 103.343814][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.350862][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.381908][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 103.605455][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 103.614600][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.798065][ T2500] device syzkaller0 entered promiscuous mode [ 103.807462][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 103.815641][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.860139][ T2422] device veth0_vlan entered promiscuous mode [ 103.872924][ T2422] device veth1_macvtap entered promiscuous mode [ 103.894238][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 103.904381][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 103.934845][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 103.942924][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.951046][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 103.959328][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 103.967757][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 103.975761][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.992325][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.010161][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 104.018586][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.031707][ T2518] device sit0 entered promiscuous mode [ 104.065781][ T2528] FAULT_INJECTION: forcing a failure. [ 104.065781][ T2528] name failslab, interval 1, probability 0, space 0, times 0 [ 104.088725][ T2528] CPU: 0 PID: 2528 Comm: syz.0.650 Tainted: G W syzkaller #0 [ 104.097431][ T2528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 104.107497][ T2528] Call Trace: [ 104.110781][ T2528] [ 104.113712][ T2528] __dump_stack+0x21/0x30 [ 104.118045][ T2528] dump_stack_lvl+0x110/0x170 [ 104.122719][ T2528] ? show_regs_print_info+0x20/0x20 [ 104.127971][ T2528] dump_stack+0x15/0x20 [ 104.132136][ T2528] should_fail+0x3c1/0x510 [ 104.136559][ T2528] __should_failslab+0xa4/0xe0 [ 104.141325][ T2528] should_failslab+0x9/0x20 [ 104.145832][ T2528] slab_pre_alloc_hook+0x3b/0xe0 [ 104.150771][ T2528] ? skb_clone+0x1cf/0x360 [ 104.155197][ T2528] kmem_cache_alloc+0x44/0x260 [ 104.159973][ T2528] skb_clone+0x1cf/0x360 [ 104.164223][ T2528] bpf_clone_redirect+0x17c/0x4b0 [ 104.169267][ T2528] bpf_prog_801cabf80fc815cd+0x59/0x498 [ 104.174817][ T2528] ? __kasan_slab_alloc+0xcf/0xf0 [ 104.179844][ T2528] ? __kasan_slab_alloc+0xbd/0xf0 [ 104.184863][ T2528] ? slab_post_alloc_hook+0x4f/0x2b0 [ 104.190150][ T2528] ? kmem_cache_alloc+0xf7/0x260 [ 104.195096][ T2528] ? __build_skb+0x2d/0x310 [ 104.199603][ T2528] ? build_skb+0x24/0x200 [ 104.203937][ T2528] ? bpf_prog_test_run_skb+0x279/0x1150 [ 104.209483][ T2528] ? bpf_prog_test_run+0x3d5/0x630 [ 104.214587][ T2528] ? __sys_bpf+0x590/0x7d0 [ 104.219001][ T2528] ? __x64_sys_bpf+0x7c/0x90 [ 104.223582][ T2528] ? x64_sys_call+0x4b9/0x9a0 [ 104.228249][ T2528] ? do_syscall_64+0x4c/0xa0 [ 104.232834][ T2528] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 104.238907][ T2528] ? __kasan_check_read+0x11/0x20 [ 104.243926][ T2528] ? bpf_test_timer_continue+0x146/0x4a0 [ 104.249556][ T2528] bpf_test_run+0x351/0x900 [ 104.254152][ T2528] ? convert___skb_to_skb+0x4f0/0x4f0 [ 104.259523][ T2528] ? eth_get_headlen+0x200/0x200 [ 104.264465][ T2528] ? convert___skb_to_skb+0x41/0x4f0 [ 104.269744][ T2528] bpf_prog_test_run_skb+0x9ec/0x1150 [ 104.275112][ T2528] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 104.280997][ T2528] bpf_prog_test_run+0x3d5/0x630 [ 104.285930][ T2528] ? bpf_prog_query+0x230/0x230 [ 104.290783][ T2528] ? selinux_bpf+0xce/0xf0 [ 104.295192][ T2528] ? security_bpf+0x82/0xa0 [ 104.299696][ T2528] __sys_bpf+0x590/0x7d0 [ 104.303939][ T2528] ? bpf_link_show_fdinfo+0x330/0x330 [ 104.309306][ T2528] ? debug_smp_processor_id+0x17/0x20 [ 104.314675][ T2528] __x64_sys_bpf+0x7c/0x90 [ 104.319082][ T2528] x64_sys_call+0x4b9/0x9a0 [ 104.323589][ T2528] do_syscall_64+0x4c/0xa0 [ 104.328010][ T2528] ? clear_bhb_loop+0x50/0xa0 [ 104.332681][ T2528] ? clear_bhb_loop+0x50/0xa0 [ 104.337351][ T2528] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 104.343247][ T2528] RIP: 0033:0x7f65bd50e799 [ 104.347673][ T2528] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 104.367273][ T2528] RSP: 002b:00007f65bbf69028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 104.375697][ T2528] RAX: ffffffffffffffda RBX: 00007f65bd787fa0 RCX: 00007f65bd50e799 [ 104.383666][ T2528] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 104.391641][ T2528] RBP: 00007f65bbf69090 R08: 0000000000000000 R09: 0000000000000000 [ 104.399611][ T2528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 104.407587][ T2528] R13: 00007f65bd788038 R14: 00007f65bd787fa0 R15: 00007ffd93f4c5d8 [ 104.415581][ T2528] [ 104.594313][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 104.602786][ T415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.782416][ T2549] device pim6reg1 entered promiscuous mode [ 104.847440][ T2554] device sit0 entered promiscuous mode [ 106.192445][ T783] device bridge_slave_1 left promiscuous mode [ 106.198595][ T783] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.206115][ T783] device bridge_slave_0 left promiscuous mode [ 106.212364][ T783] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.220051][ T783] device veth1_macvtap left promiscuous mode [ 106.226110][ T783] device veth0_vlan left promiscuous mode [ 106.665000][ T2571] FAULT_INJECTION: forcing a failure. [ 106.665000][ T2571] name failslab, interval 1, probability 0, space 0, times 0 [ 106.679524][ T2571] CPU: 1 PID: 2571 Comm: syz.4.666 Tainted: G W syzkaller #0 [ 106.688222][ T2571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 106.698552][ T2571] Call Trace: [ 106.701835][ T2571] [ 106.704766][ T2571] __dump_stack+0x21/0x30 [ 106.709097][ T2571] dump_stack_lvl+0x110/0x170 [ 106.713789][ T2571] ? show_regs_print_info+0x20/0x20 [ 106.718996][ T2571] dump_stack+0x15/0x20 [ 106.723158][ T2571] should_fail+0x3c1/0x510 [ 106.727575][ T2571] __should_failslab+0xa4/0xe0 [ 106.732338][ T2571] should_failslab+0x9/0x20 [ 106.736837][ T2571] slab_pre_alloc_hook+0x3b/0xe0 [ 106.741769][ T2571] ? skb_clone+0x1cf/0x360 [ 106.746181][ T2571] kmem_cache_alloc+0x44/0x260 [ 106.750942][ T2571] skb_clone+0x1cf/0x360 [ 106.756047][ T2571] bpf_clone_redirect+0x17c/0x4b0 [ 106.761072][ T2571] bpf_prog_801cabf80fc815cd+0x59/0xde4 [ 106.766621][ T2571] ? __kasan_slab_alloc+0xcf/0xf0 [ 106.771687][ T2571] ? __kasan_slab_alloc+0xbd/0xf0 [ 106.776713][ T2571] ? slab_post_alloc_hook+0x4f/0x2b0 [ 106.782006][ T2571] ? kmem_cache_alloc+0xf7/0x260 [ 106.786942][ T2571] ? __build_skb+0x2d/0x310 [ 106.791454][ T2571] ? build_skb+0x24/0x200 [ 106.795881][ T2571] ? bpf_prog_test_run_skb+0x279/0x1150 [ 106.801422][ T2571] ? bpf_prog_test_run+0x3d5/0x630 [ 106.806534][ T2571] ? __sys_bpf+0x590/0x7d0 [ 106.810943][ T2571] ? __x64_sys_bpf+0x7c/0x90 [ 106.816047][ T2571] ? x64_sys_call+0x4b9/0x9a0 [ 106.820724][ T2571] ? do_syscall_64+0x4c/0xa0 [ 106.825306][ T2571] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 106.831376][ T2571] ? __kasan_check_read+0x11/0x20 [ 106.836396][ T2571] ? bpf_test_timer_continue+0x146/0x4a0 [ 106.842029][ T2571] bpf_test_run+0x351/0x900 [ 106.846632][ T2571] ? convert___skb_to_skb+0x4f0/0x4f0 [ 106.851995][ T2571] ? eth_get_headlen+0x200/0x200 [ 106.856927][ T2571] ? convert___skb_to_skb+0x41/0x4f0 [ 106.862205][ T2571] bpf_prog_test_run_skb+0x9ec/0x1150 [ 106.867576][ T2571] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 106.873475][ T2571] bpf_prog_test_run+0x3d5/0x630 [ 106.878412][ T2571] ? bpf_prog_query+0x230/0x230 [ 106.883262][ T2571] ? selinux_bpf+0xce/0xf0 [ 106.887674][ T2571] ? security_bpf+0x82/0xa0 [ 106.892167][ T2571] __sys_bpf+0x590/0x7d0 [ 106.896400][ T2571] ? bpf_link_show_fdinfo+0x330/0x330 [ 106.901771][ T2571] ? debug_smp_processor_id+0x17/0x20 [ 106.907140][ T2571] __x64_sys_bpf+0x7c/0x90 [ 106.911557][ T2571] x64_sys_call+0x4b9/0x9a0 [ 106.916057][ T2571] do_syscall_64+0x4c/0xa0 [ 106.920465][ T2571] ? clear_bhb_loop+0x50/0xa0 [ 106.925139][ T2571] ? clear_bhb_loop+0x50/0xa0 [ 106.929804][ T2571] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 106.935716][ T2571] RIP: 0033:0x7f3d899a8799 [ 106.940126][ T2571] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 106.959724][ T2571] RSP: 002b:00007f3d88403028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 106.968232][ T2571] RAX: ffffffffffffffda RBX: 00007f3d89c21fa0 RCX: 00007f3d899a8799 [ 106.976547][ T2571] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 106.984512][ T2571] RBP: 00007f3d88403090 R08: 0000000000000000 R09: 0000000000000000 [ 106.992473][ T2571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 107.000443][ T2571] R13: 00007f3d89c22038 R14: 00007f3d89c21fa0 R15: 00007ffd87ae05c8 [ 107.008411][ T2571] [ 107.182499][ T2579] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.189555][ T2579] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.197162][ T2579] device bridge_slave_0 entered promiscuous mode [ 107.204333][ T2579] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.211384][ T2579] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.218854][ T2579] device bridge_slave_1 entered promiscuous mode [ 107.607690][ T2618] FAULT_INJECTION: forcing a failure. [ 107.607690][ T2618] name failslab, interval 1, probability 0, space 0, times 0 [ 107.620382][ T2618] CPU: 1 PID: 2618 Comm: syz.4.679 Tainted: G W syzkaller #0 [ 107.629066][ T2618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 107.639125][ T2618] Call Trace: [ 107.642404][ T2618] [ 107.645337][ T2618] __dump_stack+0x21/0x30 [ 107.649674][ T2618] dump_stack_lvl+0x110/0x170 [ 107.654361][ T2618] ? show_regs_print_info+0x20/0x20 [ 107.659559][ T2618] dump_stack+0x15/0x20 [ 107.663719][ T2618] should_fail+0x3c1/0x510 [ 107.668136][ T2618] __should_failslab+0xa4/0xe0 [ 107.672908][ T2618] should_failslab+0x9/0x20 [ 107.677412][ T2618] slab_pre_alloc_hook+0x3b/0xe0 [ 107.682357][ T2618] ? skb_clone+0x1cf/0x360 [ 107.686778][ T2618] kmem_cache_alloc+0x44/0x260 [ 107.691541][ T2618] skb_clone+0x1cf/0x360 [ 107.695783][ T2618] bpf_clone_redirect+0x17c/0x4b0 [ 107.700803][ T2618] bpf_prog_801cabf80fc815cd+0x59/0x6b0 [ 107.706344][ T2618] ? __kasan_slab_alloc+0xcf/0xf0 [ 107.711367][ T2618] ? __kasan_slab_alloc+0xbd/0xf0 [ 107.716385][ T2618] ? slab_post_alloc_hook+0x4f/0x2b0 [ 107.721671][ T2618] ? kmem_cache_alloc+0xf7/0x260 [ 107.726610][ T2618] ? __build_skb+0x2d/0x310 [ 107.731109][ T2618] ? build_skb+0x24/0x200 [ 107.735432][ T2618] ? bpf_prog_test_run_skb+0x279/0x1150 [ 107.740976][ T2618] ? bpf_prog_test_run+0x3d5/0x630 [ 107.746084][ T2618] ? __sys_bpf+0x590/0x7d0 [ 107.750491][ T2618] ? __x64_sys_bpf+0x7c/0x90 [ 107.755067][ T2618] ? x64_sys_call+0x4b9/0x9a0 [ 107.759731][ T2618] ? do_syscall_64+0x4c/0xa0 [ 107.764311][ T2618] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 107.770421][ T2618] ? __kasan_check_read+0x11/0x20 [ 107.775432][ T2618] ? bpf_test_timer_continue+0x146/0x4a0 [ 107.781052][ T2618] bpf_test_run+0x351/0x900 [ 107.785542][ T2618] ? convert___skb_to_skb+0x4f0/0x4f0 [ 107.790901][ T2618] ? eth_get_headlen+0x200/0x200 [ 107.795826][ T2618] ? convert___skb_to_skb+0x41/0x4f0 [ 107.801094][ T2618] bpf_prog_test_run_skb+0x9ec/0x1150 [ 107.806452][ T2618] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 107.812326][ T2618] bpf_prog_test_run+0x3d5/0x630 [ 107.817251][ T2618] ? bpf_prog_query+0x230/0x230 [ 107.822084][ T2618] ? selinux_bpf+0xce/0xf0 [ 107.826486][ T2618] ? security_bpf+0x82/0xa0 [ 107.830978][ T2618] __sys_bpf+0x590/0x7d0 [ 107.835218][ T2618] ? bpf_link_show_fdinfo+0x330/0x330 [ 107.840578][ T2618] ? debug_smp_processor_id+0x17/0x20 [ 107.845931][ T2618] __x64_sys_bpf+0x7c/0x90 [ 107.850328][ T2618] x64_sys_call+0x4b9/0x9a0 [ 107.854826][ T2618] do_syscall_64+0x4c/0xa0 [ 107.859228][ T2618] ? clear_bhb_loop+0x50/0xa0 [ 107.863888][ T2618] ? clear_bhb_loop+0x50/0xa0 [ 107.868551][ T2618] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 107.874435][ T2618] RIP: 0033:0x7f3d899a8799 [ 107.878834][ T2618] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 107.898424][ T2618] RSP: 002b:00007f3d88403028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 107.906829][ T2618] RAX: ffffffffffffffda RBX: 00007f3d89c21fa0 RCX: 00007f3d899a8799 [ 107.914784][ T2618] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 107.922750][ T2618] RBP: 00007f3d88403090 R08: 0000000000000000 R09: 0000000000000000 [ 107.930707][ T2618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 107.938670][ T2618] R13: 00007f3d89c22038 R14: 00007f3d89c21fa0 R15: 00007ffd87ae05c8 [ 107.946641][ T2618] [ 108.018567][ T2579] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.025662][ T2579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.032990][ T2579] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.040015][ T2579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.123018][ T2579] device veth0_vlan entered promiscuous mode [ 108.159274][ T2579] device veth1_macvtap entered promiscuous mode [ 108.340368][ T2635] Ÿë: port 1(veth0_vlan) entered blocking state [ 108.361184][ T2635] Ÿë: port 1(veth0_vlan) entered disabled state [ 108.386797][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.413277][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.423125][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.433228][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 108.442730][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 108.451459][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.459754][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.467938][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.476532][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.484652][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.492168][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.499621][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.113059][ T415] device bridge_slave_1 left promiscuous mode [ 109.119318][ T415] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.126985][ T415] device bridge_slave_0 left promiscuous mode [ 109.133281][ T415] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.141066][ T415] device veth1_macvtap left promiscuous mode [ 109.147169][ T415] device veth0_vlan left promiscuous mode [ 110.300238][ T2646] tap0: tun_chr_ioctl cmd 1074812118 [ 111.721744][ C0] sched: RT throttling activated [ 111.721744][ C1] sched: RT throttling activated [ 111.723276][ T2653] FAULT_INJECTION: forcing a failure. [ 111.723276][ T2653] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 111.757194][ T2653] CPU: 1 PID: 2653 Comm: syz.5.691 Tainted: G W syzkaller #0 [ 111.765916][ T2653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 111.775973][ T2653] Call Trace: [ 111.779253][ T2653] [ 111.782184][ T2653] __dump_stack+0x21/0x30 [ 111.786520][ T2653] dump_stack_lvl+0x110/0x170 [ 111.791212][ T2653] ? show_regs_print_info+0x20/0x20 [ 111.796418][ T2653] dump_stack+0x15/0x20 [ 111.800580][ T2653] should_fail+0x3c1/0x510 [ 111.805000][ T2653] should_fail_alloc_page+0x55/0x80 [ 111.810203][ T2653] prepare_alloc_pages+0x156/0x610 [ 111.812608][ T2655] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.815315][ T2653] ? __alloc_pages_bulk+0xad0/0xad0 [ 111.815338][ T2653] ? do_softirq+0xe9/0x130 [ 111.822529][ T2655] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.827508][ T2653] ? __local_bh_enable_ip+0x80/0x80 [ 111.832375][ T2655] device bridge_slave_0 entered promiscuous mode [ 111.838898][ T2653] __alloc_pages+0x11d/0x460 [ 111.838919][ T2653] ? prep_new_page+0x110/0x110 [ 111.844918][ T2655] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.850402][ T2653] ? __dev_queue_xmit+0x19ac/0x2da0 [ 111.855092][ T2655] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.859708][ T2653] new_slab+0xa1/0x4d0 [ 111.867359][ T2655] device bridge_slave_1 entered promiscuous mode [ 111.871953][ T2653] ___slab_alloc+0x381/0x810 [ 111.871975][ T2653] ? skb_clone+0x1cf/0x360 [ 111.898269][ T2653] ? skb_clone+0x1cf/0x360 [ 111.902695][ T2653] __slab_alloc+0x49/0x90 [ 111.907028][ T2653] ? skb_clone+0x1cf/0x360 [ 111.911453][ T2653] kmem_cache_alloc+0x138/0x260 [ 111.916306][ T2653] skb_clone+0x1cf/0x360 [ 111.920557][ T2653] bpf_clone_redirect+0x17c/0x4b0 [ 111.925566][ T2655] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.925584][ T2653] bpf_prog_801cabf80fc815cd+0x59/0x568 [ 111.932643][ T2655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.938123][ T2653] ? __kasan_slab_alloc+0xcf/0xf0 [ 111.945449][ T2655] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.950299][ T2653] ? __kasan_slab_alloc+0xbd/0xf0 [ 111.957326][ T2655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.962293][ T2653] ? slab_post_alloc_hook+0x4f/0x2b0 [ 111.962314][ T2653] ? kmem_cache_alloc+0xf7/0x260 [ 111.979666][ T2653] ? __build_skb+0x2d/0x310 [ 111.984176][ T2653] ? build_skb+0x24/0x200 [ 111.988510][ T2653] ? bpf_prog_test_run_skb+0x279/0x1150 [ 111.994042][ T2653] ? bpf_prog_test_run+0x3d5/0x630 [ 111.999157][ T2653] ? __sys_bpf+0x590/0x7d0 [ 112.003575][ T2653] ? __x64_sys_bpf+0x7c/0x90 [ 112.008152][ T2653] ? x64_sys_call+0x4b9/0x9a0 [ 112.012806][ T2653] ? do_syscall_64+0x4c/0xa0 [ 112.017377][ T2653] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 112.023427][ T2653] ? __kasan_check_read+0x11/0x20 [ 112.028434][ T2653] ? bpf_test_timer_continue+0x146/0x4a0 [ 112.034046][ T2653] bpf_test_run+0x351/0x900 [ 112.038534][ T2653] ? convert___skb_to_skb+0x4f0/0x4f0 [ 112.043884][ T2653] ? eth_get_headlen+0x200/0x200 [ 112.048804][ T2653] ? convert___skb_to_skb+0x41/0x4f0 [ 112.054072][ T2653] bpf_prog_test_run_skb+0x9ec/0x1150 [ 112.059431][ T2653] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 112.065300][ T2653] bpf_prog_test_run+0x3d5/0x630 [ 112.070217][ T2653] ? bpf_prog_query+0x230/0x230 [ 112.075075][ T2653] ? selinux_bpf+0xce/0xf0 [ 112.079490][ T2653] ? security_bpf+0x82/0xa0 [ 112.083968][ T2653] __sys_bpf+0x590/0x7d0 [ 112.088185][ T2653] ? bpf_link_show_fdinfo+0x330/0x330 [ 112.093533][ T2653] ? debug_smp_processor_id+0x17/0x20 [ 112.098881][ T2653] __x64_sys_bpf+0x7c/0x90 [ 112.103276][ T2653] x64_sys_call+0x4b9/0x9a0 [ 112.107759][ T2653] do_syscall_64+0x4c/0xa0 [ 112.112157][ T2653] ? clear_bhb_loop+0x50/0xa0 [ 112.116827][ T2653] ? clear_bhb_loop+0x50/0xa0 [ 112.121479][ T2653] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 112.127353][ T2653] RIP: 0033:0x7f054a77f799 [ 112.131838][ T2653] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 112.151423][ T2653] RSP: 002b:00007f05491b9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 112.159817][ T2653] RAX: ffffffffffffffda RBX: 00007f054a9f9090 RCX: 00007f054a77f799 [ 112.167770][ T2653] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 112.175894][ T2653] RBP: 00007f05491b9090 R08: 0000000000000000 R09: 0000000000000000 [ 112.183852][ T2653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 112.191820][ T2653] R13: 00007f054a9f9128 R14: 00007f054a9f9090 R15: 00007ffe9a15bcd8 [ 112.199786][ T2653] [ 114.763512][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.770975][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.778920][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.786806][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.819417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.827769][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.834840][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.870982][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.890318][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.897411][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.945721][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 114.954124][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.963735][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 114.972080][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.988322][ T2655] device veth0_vlan entered promiscuous mode [ 115.016974][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 115.086088][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 115.096472][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 115.104866][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 115.118960][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 115.134832][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 115.147928][ T2655] device veth1_macvtap entered promiscuous mode [ 115.181246][ T2691] tap0: tun_chr_ioctl cmd 2147767507 [ 115.187003][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 115.207565][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 115.294739][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 115.322663][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.351363][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.404893][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 115.414243][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.475114][ T415] device bridge_slave_1 left promiscuous mode [ 116.481266][ T415] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.488729][ T415] device bridge_slave_0 left promiscuous mode [ 116.494919][ T415] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.502808][ T415] device veth1_macvtap left promiscuous mode [ 116.508805][ T415] device veth0_vlan left promiscuous mode [ 117.878942][ T2746] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.886076][ T2746] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.894373][ T2746] device bridge_slave_0 entered promiscuous mode [ 117.903638][ T2746] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.910717][ T2746] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.920673][ T2746] device bridge_slave_1 entered promiscuous mode [ 118.089092][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 118.161112][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 118.388937][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.404688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.413328][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.420364][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.463503][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.471931][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.480175][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.487228][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.507867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 118.580895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 118.612189][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 118.692422][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 118.716591][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.770488][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.779100][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 118.788485][ T2746] device veth0_vlan entered promiscuous mode [ 118.832367][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 118.941824][ T2746] device veth1_macvtap entered promiscuous mode [ 118.966374][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 118.993250][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 119.017916][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 119.031268][ T783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=126 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 119.132187][ T30] audit: type=1400 audit(1773261304.517:143): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14536]" dev="pipefs" ino=14536 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 120.352712][ T10] Ÿë: port 1(veth0_vlan) entered disabled state [ 120.360232][ T10] device bridge_slave_1 left promiscuous mode [ 120.366386][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.373779][ T10] device bridge_slave_0 left promiscuous mode [ 120.379858][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.387612][ T10] device bridge_slave_1 left promiscuous mode [ 120.393800][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.401412][ T10] device bridge_slave_0 left promiscuous mode [ 120.407631][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.415569][ T10] device dummy0 left promiscuous mode [ 120.420975][ T10] ¥: port 1(dummy0) entered disabled state [ 120.427785][ T10] device bridge_slave_1 left promiscuous mode [ 120.433898][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.441398][ T10] device bridge_slave_0 left promiscuous mode [ 120.447532][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.456216][ T10] device veth1_macvtap left promiscuous mode [ 120.462229][ T10] device veth0_vlan left promiscuous mode [ 120.468151][ T10] device veth0_vlan left promiscuous mode [ 120.474120][ T10] device veth1_macvtap left promiscuous mode [ 120.480113][ T10] device veth0_vlan left promiscuous mode [ 120.486349][ T10] device veth1_macvtap left promiscuous mode [ 120.492486][ T10] device veth0_vlan left promiscuous mode