last executing test programs: 25.798269633s ago: executing program 3 (id=3504): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x1f63, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 19.344272813s ago: executing program 3 (id=3504): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x1f63, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 15.788548921s ago: executing program 3 (id=3504): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x1f63, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 11.518627177s ago: executing program 0 (id=3949): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000380)=r4) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 11.304635529s ago: executing program 0 (id=3951): r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000940)=@o_path={&(0x7f0000000900)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000447401957fff100000000", @ANYRES32=0x1, @ANYBLOB='\x00'/18, @ANYRES32=0x0], 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000006000000060000000030000000300000000000009feffffff0e0000000000000c020000000000ae72800b000d000000000e000000000000000c00000002000000010000000100000007000000020000930c0000000600000000000000fdffff0705000000ff07000003000000002e00"], &(0x7f0000000380)=""/81, 0x7b, 0x51, 0x0, 0x0, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r2, 0x4004743c, 0xf0ff1f00000000) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007500000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r6, r5}, 0xc) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r7) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES32, @ANYRES16], 0x10) socketpair(0x1e, 0xa, 0x80, &(0x7f0000000b00)) 10.915599643s ago: executing program 3 (id=3504): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x1f63, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 8.953990674s ago: executing program 0 (id=3954): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8e20, 0xa2a}, 0x100220, 0x0, 0x80000000, 0x3, 0x2, 0x72a0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000006900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x9, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000001000000000000000000000071181b000000000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000073113400000000008510000002000000b7000000000000009500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @ptr]}, {0x0, [0x0, 0x0, 0x61]}}, 0x0, 0x39}, 0x28) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.time\x00', 0x26e1, 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000040)={r3}, 0x8) close(r4) mkdir(0x0, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000008000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000058000000bf0900000000000066090600000003e704000000060000001801"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x3, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x84}}, &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000800)={0xffffffffffffffff, 0x0}, 0x20) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000010340)=@base={0x18, 0x4, 0x3399, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, r2, 0x4002, 0x5}, 0x50) r5 = openat$cgroup_devices(r4, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000100)={'c', ' *:* ', 'rwm\x00'}, 0xa) 7.590286708s ago: executing program 4 (id=3967): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x17, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000000b, 0x0, 0x0, 0x0, 0x6}, [@generic={0x73, 0x1, 0x1, 0x6}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x440, 0x0, 0x7, 0x0, 0x0, 0x80001, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1d}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}], 0x50}, 0x100) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@fallback, 0x1, 0x1, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="170000000400000000000000", @ANYRES32, @ANYBLOB="93a812e08117467957ea21461ca15294fc6fee9e55dca48fa53f9626a967496273e9c63a1d6d8a1187e21f20b059cba6e40f0254e34af0dcc4e88e037afba707455a63e9a34bf45abe820000000000000000000000000000000061", @ANYRES64=r8], 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000900)=ANY=[@ANYRES32=r2, @ANYRES32=r5, @ANYBLOB="250000f316000000765094504a7b5c23b04dbd3f92a27b8ed8fd3ffb9d4306e4381b9ff4108ad711410d43dfe91061b7c74c3cce25a8dd8fcdc88e4a59c0e64300c4fd5bdefafefc306ca02dcb5c04d31f4adf07aaf9261da78b9f14be9dc1ba56ee5275e44980a1e1b1260a3f794e04706eb90c6fa5039874e810119b33ced599a719028fe1e036869eb2bd87205b03a6b5928cdab5485cc35e8a7093faa90d9f9fafdb5129d21927ac4d49998a6fa430444039bbf13173c17af9b204b5e6b4ef618e892a176fc16c5c754873634c07e4", @ANYRES32, @ANYBLOB, @ANYRES32=r7, @ANYBLOB, @ANYRES64=r8], 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x5}, 0x18ba0}, 0x0, 0xffffffffffffffff, r6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000002340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="9daa00000000000061101000000000a3ef00000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18c0ab22a3ea83d13644df918449d500000000000000000000000000000004000000bb7f1a00c600"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 7.510739429s ago: executing program 4 (id=3970): r0 = gettid() r1 = perf_event_open(0x0, r0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000003c0)}, 0x0, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a000000095"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x140, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8, 0x7}, 0x0, 0x0, 0x0, 0x8, 0xffc, 0x200a, 0x7, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfebf, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f086dd", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0x36) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@generic={0x0, 0x2000000, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000ff0700000000000000000000850000002a00000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfe103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x8}, 0x2000, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) openat$tun(0xffffffffffffff9c, 0x0, 0x72140, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5f9f}, 0x0, 0x1, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 6.50275519s ago: executing program 4 (id=3975): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18001d0000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x17, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000380)=r4) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 6.316121802s ago: executing program 4 (id=3979): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x4}, 0x50) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 6.248496283s ago: executing program 3 (id=3504): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x1f63, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 4.116276905s ago: executing program 0 (id=3981): bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8e20, 0xa2a}, 0x100220, 0x0, 0x80000000, 0x3, 0x2, 0x72a0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r0, 0x2000012, 0xff0, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)=r1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0x1, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x18, 0xf8, 0x9, 0x5, 0x10000, 0xffffffffffffffff, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x50) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x0, 0xc}, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1e000000d0010000040000000000000004000000", @ANYRES32, @ANYBLOB="10f7e86d0000bb0697f7e3f600000000000000000000000000001a906ce5ac19769c453dcb9c3f15e9f511ec9fd30b39409617a163d78859d9a017ea31daa8704c598ee104792b8976920b0144bf2c64ed72212dd52cdc07338a6bc03a2d0a8e05f48af041c8", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000040000000200"/28], 0x50) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x19, &(0x7f0000000400)=ANY=[@ANYBLOB="180000008f000000000000000b00400018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000086000000bf0900000000000055090100000000009500000000000000bd0a060000000000d500f4ff0100030018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000006500000006000000bf91000000000000b702000003000000850000002a000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x7, 0x1000, &(0x7f0000000cc0)=""/4096, 0x41100, 0x2f}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x11, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000001}}, @jmp={0x5, 0x0, 0x1, 0x0, 0x8, 0x20, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000000400)='GPL\x00', 0x6a, 0xb5, &(0x7f0000000440)=""/181, 0xa456c18bf084443a, 0x20, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0xa, 0x8, 0x7fff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0x1, r4, r5, r6, r7], 0x0, 0x10, 0xc}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3000000, 0xffffffff}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x22}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) 4.114528466s ago: executing program 4 (id=3984): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b00"/14, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x20, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000e000000bf09000000000000550901000074f6967d00000000000000180100002020709000000000002020207baaf8ff00000000bda100000000000027010000f8ffffffb702000008000000b7030000000000002500000006000000be91000000000000b502ecffffff00008500000005000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="1e030a004d8c71ef2685634a8270e7123a0000"], 0xffdd) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) 3.600671611s ago: executing program 4 (id=3986): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x1000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r4, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000100000000000000010000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000000000085000000a5000000b7080000000000007b8af8ff00000000b7080000001000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0), 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x17, &(0x7f0000000180)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @map_val={0x18, 0x4, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x80}], &(0x7f0000000380)='syzkaller\x00', 0x9, 0x4f, &(0x7f00000003c0)=""/79, 0x41000, 0x68, '\x00', 0x0, 0x25, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x3, 0x3}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000540)=[{0x3, 0x4, 0x9, 0x7}, {0x1, 0x1, 0xf, 0xb}, {0x4, 0x1, 0xf, 0x4}, {0x0, 0x1, 0xa, 0x8}, {0x2, 0x1, 0x1, 0x7}], 0x10, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0xc, 0x9, 0x0, 0x1, 0x2000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x80ffffff}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x5}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 2.958054538s ago: executing program 1 (id=3987): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="12000000040000000400000005"], 0x50) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="05"], 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@map=r1, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1c, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000deffffff6a0a00ff00000000850000002b000000b70000000000000095000000000000009cc6b3fcd62c7d376238975d43a4505f80fc88943c4f0cf08e467b592f868ee30a0e8c1bf176db2a6b2f01806fd3d5707bfd2d84aaa3b1d4e984c46ea7e2a447a36f5662403e1b2be4cc7c2683908a0d411a9872971c5c77f0979b34e1ad837ff0d10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8d0d26b5069f8a98f7dc8f772fd0e17c9b9101644f8c06b74635fc9f9de9ca3c0ec0cb9bf4e418d076df4c7df0a70f2bdf4000000000000b0c2940dd8e263aa743f7555193161f45346b1004006000000e1ffff8816326d7d25c32aac1c7d5b5be399f6609876b5887437a172fbc02a74135b29194e533583f76e412dff048f0000000000000000b2728a0481e9f0da43bb6cfb851cd364ff19002cc93c1c13ca67fdc6c238342033070000004a9fb6a6991ddb737d527d6acb15426415b6e8b14fdfa2c6e94bd0339454c13ad3e328a100000000b515a1000000000000140eb2e9c15b6c8f6198282df27badac8500bc7d202e099009ca515007e5f009735200040000001896d46cdac0abb841d9f96e2e6a19b7bf661c01800000d77d6165f253683cd8dc926518c699a2b14fb2bb40425dee631368340711a8c47318d5d13085938c3ec5c39b540b34157b0330aa16bd0998607f0ecea84919712d36"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r5, 0xffff0000, 0xf0, 0xe200, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000780)={'pim6reg0\x00', 0x400}) ioctl$TUNSETCARRIER(r7, 0x400454e2, &(0x7f00000000c0)=0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000440), &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdb, &(0x7f00000004c0)=[{}], 0x8, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x3e, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_ext={0x1c, 0x22, &(0x7f00000003c0)=ANY=[], &(0x7f0000000540)='GPL\x00', 0x3ff, 0x0, 0x0, 0x41100, 0x24, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x5, 0x4, 0xd}, 0x10, 0x176b1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r9 = bpf$ITER_CREATE(0xb, 0x0, 0x0) close(r9) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1a, 0x3, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r10, 0x4}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_lsm={0x1d, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000008000000000000000300000018190000", @ANYRES32, @ANYBLOB="00000000000000004300800008000000183a000003000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000184a000008000000000000be5f2c9800b610540000000040"], &(0x7f0000000380)='GPL\x00', 0x7f, 0x0, 0x0, 0x0, 0x2, '\x00', r8, 0x1b, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x1, 0xe, 0x2, 0x7ff}, 0x10, r10, 0x0, 0x0, 0x0, &(0x7f0000000500), 0x10, 0x800}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x15, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf1, 0x0, 0x0, 0x0, 0x80000001}, [@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @jmp={0x5, 0x0, 0x7, 0xb, 0x2, 0x100, 0xffffffffffffffff}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f00000004c0)='GPL\x00', 0x3, 0xf, &(0x7f0000000500)=""/15, 0x41100, 0x1, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000540)={0x0, 0xe, 0x6, 0x9}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000580)=[{0x5, 0x1, 0xb}, {0x2, 0x4, 0x2, 0x3}, {0x2, 0x4, 0xb}, {0x2, 0x5, 0xd}], 0x10, 0xc85}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x16, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.636289881s ago: executing program 2 (id=3989): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x95, 0x0, &(0x7f0000000100)="b9ff03076044238cb89e14f0890647e0ffff00004000638877fbac14140cac14140c07029f89052f87e577ca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28f", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=@framed={{0x7d, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x1d}}, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='@}.**.[,\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(r3, 0x0, 0x2, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000d0ffffff000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b706000014000000b7030000b00d00008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b5090200000000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018200000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7010000080000004608f0ff76000000bf9800000000000079080000000000008500000005000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.598835902s ago: executing program 1 (id=3990): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x12, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000008000000000000001cda0000611108000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffff8, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 1.749731871s ago: executing program 2 (id=3991): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0xf, &(0x7f0000000d80)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x38, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x17, 0x1ffffee6, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bb00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x23}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000004c0)=ANY=[@ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="05"], 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x20}, 0x3) 1.690845002s ago: executing program 1 (id=3992): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65ed}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x25}, 0x0, 0x0, 0x0, 0x9, 0xd, 0xd, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r3) write$cgroup_devices(r3, &(0x7f00000005c0)=ANY=[], 0xfffffeff) write$cgroup_int(r3, &(0x7f0000000300)=0x6, 0x12) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{0xff, 0x7, 0x4, 0xb}, {0x8, 0x1, 0x6, 0x8}, {0x3ff, 0x7, 0xd6, 0x400}]}) 1.635915742s ago: executing program 1 (id=3993): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x22}, 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000900)={r0, &(0x7f00000008c0)}, 0x20) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100), 0x48) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x200010, 0x40, 0x3, 0x41}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x8, &(0x7f0000000540)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000640)='syzkaller\x00', 0x7, 0xf9, &(0x7f0000000080)=""/249}, 0x24) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001f7ff04b7050000040000006a0a00fe00000000850000000a000000b70000000000000095000000000000009cc6b3fcd62c061c6238975d43a4505f80e39c9f3c530cf08e467b592f868ee3b0a435df0a0e8c1bf176db2a6b2feb4b77d339707bfd2d84aaa3b1d4e984c46ea7e2b347a36f5662403e1b2be4284322a4908a0d411a9872971c7c56f0979bd10b97163c066d0e196bf02f46c7953ab1abdaf90a70f2bdf4000200000000b0c2c125080963f63223b7b80197aa3161f45346b100000000000000000089070000009876b588743794298b79dc192dff048fc207c81f28bdd3e26a1a8a0481e9f0da43bb6ca66e2f55a9ff19ffcafe3e64be06000000000000005064caec04a367c23d9fb6a6991ddb737d527d6acb15426406991c3b404984dfa2c6e94bd0339454c13a0100000082c15dc760a313e3b3ca5d3393404029e98fa883c71949a34d84030323e3d54fc5b29d27643453ad9211e3550ee5520211d9370175133f260c6882a146880b9387f1beb5418618bc83a3becf9bb57da7ba8b913c685fc6700848dc6665d73248c1f74e08ad04ce905faf32706e0000249a028044ede964362cfb2f30a246c3b2f60000fc4deb91da1368b0960b8d69bd99c64893d44f962524429dc058528e7e541c903869d96989b9a986620cb2c95c83f2a082c52764f49e51188f9418b01bcd8ae164acdac95318ec8b2c6feacdcf4b528e5e58219bc54f6ad5679e7f430e6960ed048c46e1dccca05bfa1d67c83795eae2d31968c055d325a9c794ef88b30c2de4a274878b73c05ffa88b7073be648b12bb1fee58958d6a6f31bfe568215dfbde59dad00008a73b40f09cf018cd496b36050d7fd45e3620c28f76749262e33e16429a6da35ceb1a989de81c3f8b8bc348ef2ac3781b847611fcb0a26acafdd6d9a1b17dcb9f7c493d8f8cd344a1d470ca0d6f16ab0293774b5509fb0e7113936d59d5a60dbd84a938476adeebab9ff44f531bb0200000000000000cc1fbc455a64fd449284f71761092a0302000000000000008a05d36fd9b814b4292745418c92d944763a4bf5e138d810e29a31f08f7dea7762d2d8f7e1d24cabe17ad4135d8872935ceac6eb4f046f2acc1b0efb4438abddcabb4e4e72705edfa2cddb01f44c850e4ea450aab72b589bec83bbb688e659fb426cb43d0ee993516fd4e867232cde69b6ffad447dcd92e0ef8234ff850ec3948dd1fa7afb77d951fe4abf618121b7894c106beb49a71c62df5544ef221973432ccc7e62b151eb898a01010a7ec5acd0a5dcb2de443880c8a682515d1da9a3048744acb44384d1591df789883c0560495cb0cb32283529926d25e5c7f481112ab8a82247e927fb6f256830dab3671f00500d36a17790bab7d0e89e6c15314f2b963bfc867953476b0505c7d728326d666f39e82cfcf7e7a85df288d75df24c5e4d529c349923f9a4fb882310391dd58b4cbd8def239a227724d39c3e6c40e20e07e68a22888a5c3941b7a765b92bcb37f302487bcbd93ccf3a104021ff34ddf7ffcca1a04eae963e25516a114573779b24a341dfb2e80f1f345c6d96493ffc2a18478b5bf3aab2ea59c51cf0678e1a57d0ea042d911548ff612002ddb2d54d42fbdde42b56887003d27468225b2594a05044baf314113e8894680600000000000000db6b56557a5adad95cb9a69d4de50642b4b9d6d3ba7eb534c88d443ac8b3685135dfc4da06e7f8695be614c557caed7eb0120516e1351fed7d8ffa31c8f4be364185469cfc5f25c90d71bce745dd2d58a30e0844f12c4cbbdd7a08465e665c2620d78673dfb6d9263ed7def8924cfcd48a8a3534f1a3eac9ee9f18a18106ba3d7c7a62330f5c0e98cb7982dd7bad02c8dba9c13894185bfc4bd2520b6e2043fcb3fc5eb55ecf9e6e363ea2ac40a14a6faa21b0f5a0fdb6487c51ef12c27b30255bc4f8813be88beeb5aa6f6a4151cfb90644e50630ed474df7d1635afcb1ea3f6c47b5acbba2ce5099a9387c7acb9bbd1da497611ceda25049e48ddacccbb58dddaf9a3510d65383829a51e0f416661fa80ca1eaaa6cf0824305ba4ec80400c50ffe83ccb0e6fef321190c58aca8c7c8c6d26ff5cbc2cadebda8e1219e04f8dacffd33db1a0a2e74c9eb978d80a12d0b5327bfd053000000000000000000be0d02a14708504412fa93d335992b2983c5addc191b4a21c7b340d0536b01958e15315eb5f3f9f4992c18f666359f40295fa73284c4b607669bae75bd68c3e2b770c324a0ab26b6065d7ea6a7bd80052db57506ec7cc861bf3998d07484c66630ca8173fea3f06ed1dfc70a8b90418e2dc76137e0f68cb1c8a908aef9f0f85647dba54e05028c33d94d463fb20d2e7547184b8d3611e45dff02144387f342ef9b9bf650e9d049bf65258a7bc094a6965e24611c077e1ca0891362a9d68f3ec7610c0449acf18459500f024f9b75885cd79ba32776e4a511c8a4ad922b00000000000000a9241220dfbf7d02ef507ec6fc7f5d37d835f7bed71283c431b9d8cbd9003972bf1dc6a71bedad8e19efc3edd2a7a7e555d5f3176af69920471e6e5bcb8966c813c132d65e2b99d3015e06b372e1aefaae14ee3fbc6349af362c19b59c214de66912d1a9a98d92dc197a51c29443de62caca334c46d110e50896fe50d0477771d387f40c8ef05750ca651e6e69a237dcf78666d6ab2bda1f853525494e4efdd93be38bb5fc671f8794002d7a951fd336aaf4ed1166cb459df70218c571ba1c40b028234505e5477e268326af8812c2fbb8785a223fce0a0601c2a3b58bea8c6216eadabcabe86ab46e4cd3d58ef7ce8d3c4b0bc5952e81dfc0a490d8568db6f9c51fe703c6864fae0053d2f91f49e977cdc1962dbc28c29471a72199862bc8fc6e211d136ecc87185f2437c4fce146d8579cab4fba94b2b613c9b8148d05e0690a4c4ab35aabc45801d2b82081e62b23a01b58b1ffb624f63ad2246796796160cd3682374364edac52f1becb7c6eff50823b75fb2ef516ec4ec1cb20a2535b504502d744f2099674e58f2c117c980cf0d041c8ea5c4f166bab4aa5ed200ef4dcff96f7c9c1ab8c22db0f439b23b04bcd41ffc3a0e01976ca1cf43e12d7d72f3faa4979faabd62e2dc54a980eae4d5e8c6498de331c3aba1144ef1190ea6cda641d9416c4560cab2d819eac7b04c70f141754c3ffd79da363fe8859afee531710caf1b2bf5a51142f4755cbb700c28083525a9093790096cb93417f1216000000000000000000000000000040ceb244e4cae2b65a76d41793aabccd3d0c50486eae0000000000007c012779c14ca94759266200229b58c12279817869e831cade7b09ddffffff9d93e2ad25eed43c0b9ee4fd209b5b919a42f676b9d7236fc8dd5040899d0676291407ce9ac8101dd3512f5b3ac8cf8179d1749de324000030d0f942ec4604c28d5c287d1435956784003a53eb5fe535ead8857acf0166dbd9f30a9b9c8a9b9faf1356faf269cded935b07863e4fdad8aab52686c81babd1c08f6700a2fadd413443022ea5c774ffefdd426abed08d437a4db48611fc82a18ab9f54758a1aad86d95cd186ceb55fafa3930090467b8b7bb8ae7e1c8b4b4106a381cb67fdb86def4de2076dc538bb97502b4b4350e633dc0a53d2f64ec521f6fa1cd02843a5e16074d86c9a01bc5cfae0245f1fab843c633446f5f3a43226109b7dafe7815773bd6969f04cbe15236b90000000000000000000000000000000000000000000000000000ff0779b9c005da21073c6d9680d4e547cb727addb2efe11b8b3a706569f1522b57d71bb0beccab7c8fe9e1330b2f501b2ac3cf4eba7ceda6ff8a0c8b18c5e9e2f505e833217557abb257d61af8e8c473a7585436730db75da167481ab8921fe051b250f8d8ef9c8481bb28a137d15040b0181c28dfad7c17b30c452a64c43a1167b948247c33abc765a6ba695c3cea5e32a4d1ae2dcbec2ff4268e03aad15efc6004e6b3d7f0edf8b5d4ae7846a6d43c16c90b7c5dc13ac2ff0439ab693498964cad2bb533bcd240778b7e49145c48efde42b44c01517f1a7c7707b4c4fc0900e7086ec40354504590696282286db9030f0320e2fcba8723939005347b3f744ff1973431000000000000000000000000000000000000003495d69aaf9a1d83e83511a3bf44fe753b8ad83bc34ea4d46b397e000ff267c50122aa5aaf8474ec2e57d960d963900bef84a4b3c7dd01ae4d6b5522aa8a35ae7996e298bcfea4d3677a67b52041ec21ae8003aa1c9969178b1b00e4d12ac9741fd788fb6260ec043c013907523c77f8acc20b9e2fd224ca8f0000b2b10991881e0a12f4e1c4f54b9ca7c9a0c8298d60b8b6eaa023418992d6d62b0e9faca4a3b3a805e859137cd933ef5eb8db16f159f32505725da51414562d064b551246dacd586f42d04d3fed3c087bb52ae4bc09f3846c785d1b278e661ed01fbc2415288bc9c808c4aef648d431b3029da0dec8886c3ee9cad996843d00a3b5eb54e270dd2e96c8f2fdb4c27c2d1bd467f2a14867dec67730d8a68329839d9feff688dfbe25c73f936338e7b057980da58a6303d95f17712d01005a1066ae457ae32925ce658b559c1182a74e267da57fe25b19153f1cdebaddf3f7a3479c09f2303d000000000000000000000000000000b17fedd6b6501a47d0e5b510f4a4fab5a62d5fa7e8ead851b01dbfdfe5823c2600"/3432], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000080)="5aee41dea43e63a3f7fb7f110000", 0x0, 0xf004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000000400000000000000c37f0000a10000009500000000000000e53b6604a87a1295883f7cd6443a7f9851fb6bffe2ad335a3811620eb136b489099a7de488b303760ca93c979e45841422928b728a1dbabafdb4a332690b425d7fb50af5d35efb61ddac32debd7f8a424317ac"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x17, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x22) 1.460029434s ago: executing program 0 (id=3994): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x1f63, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000d0df00850000001b"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0xc0126080, 0x0, 0x1100, 0x0, 0x0, 0x0) 1.007974489s ago: executing program 2 (id=3995): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x7, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x20, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0xfffffffffffffd00}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r2, 0x2000012, 0xe, 0x0, &(0x7f0000000c40)="63eced8e46dc33c9e9b986000000", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(r1, 0x1, 0x49, &(0x7f00000000c0), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1943}, 0x5000, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x830d}, 0x100600, 0x2, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000300000000000000000000000000000000000000000000000105"], 0x0, 0x42}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f0000000300)=r0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001980)={r3, 0xe0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, &(0x7f0000001580)=[0x0, 0x0, 0x0], &(0x7f00000015c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2a, &(0x7f0000001600)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001640), &(0x7f0000001680), 0x8, 0xd, 0x8, 0x8, &(0x7f00000016c0)}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a40)={0x18, 0x11, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8120000, 0x0, 0x0, 0x0, 0xbe}, [@map_idx_val={0x18, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @alu={0x28758b3ca2296075, 0x0, 0xa, 0x5, 0x7, 0x30, 0x1}, @generic={0x3, 0x7, 0x9, 0x7, 0x1000}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000001500)='GPL\x00', 0xd, 0x0, 0x0, 0x41100, 0x32, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000019c0)={0x1, 0xf, 0x651bf02d, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001a00)=[r7], 0x0, 0x10, 0x6}, 0x94) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) sendmsg$sock(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000001180)="0ec0fac61727a5b99f619eee9e5af133f6c7a689f1637e6291991dfec99354a1a9f352bd4258e0719dd61c94cbd17b9e77adaab9f4d65761815074373a5d156749fc87a2360dd4fbff75ae74b315b94fa9c68c0b731d016013644b258031e9f3b8e2cf09b4d0e736716e071cd5553c306e70ce2e08cd0a27b58a5bc485a3cdcd6c9b79b1645eec321d365ab68723e7815b5f8cee074e70fc1bb713a1a8fc908e25a0f730a3f4d3a5a3826c5882cdc3c389a292bf6ace4df33b3afa4910e29a23bd25a29b4c63b88d2c033d3a26f83d924a6924e9346e727f48fa3d04cacf4cef83f736", 0xe3}, {&(0x7f0000001280)="e1e61cb4590ca9db51d7cd74a2f9a2f0120f8b1c49fbcd268b27a4b7d4fc502b31ab2481b91dd90d11c2ff5c1f2556736b4314e0989bf0cbfab3f40a", 0x3c}, {&(0x7f00000012c0)="b664583beb3ba087cbffae04cc67cdb257f2752522af91639004e65e7b97084d640c6ea6e5df561f66e32008af9135ac888c5032715e8ba2dcbf3f6a13d7c7a69d7265c329b05f431931acc6106cd15e98d32b0dbfe70a7a5d1b25353bb530686a8f7e4a8d713d7fd57317b160b085325ab15c338b4259d000c9a460c0aec79309c540b353181393faec449a03882a586e6fae63", 0x94}, {&(0x7f0000001380)="dc313a1d953bca52dac2e30b9b99000d972ec286a733bb8875391fd5e0d84248b2cca58a67528faf5fbc811857cb5ccf71826690b65c61d0bde8c82cd4a1422a01478822213ba2335614be8016c28ac24abfe558c5e45f060f02a03abd2cf4c0e3721c0ad2cc018e86c7b4d22ed4aec21908cdfb0d14e31e3a221540ef6d", 0x7e}], 0x4, &(0x7f0000001440)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x347}}], 0x60}, 0x0) r9 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000240)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000"], 0xfdef) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r10, 0x5, 0xb68, 0x4, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)=@generic={&(0x7f0000000080)='./file0\x00', r8}, 0x18) 949.863279ms ago: executing program 1 (id=3996): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000005a0000008500000022000000180100002020702500000000002020200100000000000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x1b, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000380)=r4) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 540.407094ms ago: executing program 0 (id=3997): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'pim6reg\x00', 0x112}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x4, 0x4}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000100)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xb, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4}, 0x94) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x100}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000000)={'vcan0\x00', 0x400}) write$cgroup_subtree(r6, &(0x7f0000000700)=ANY=[], 0x280) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x12, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000010000000000000000000000711813000000000095"], &(0x7f0000000000)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r3, &(0x7f0000003b40)={&(0x7f0000000540)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000003a00)=[{&(0x7f00000005c0)=""/73, 0x49}, {&(0x7f00000006c0)=""/164, 0xa4}, {&(0x7f0000000780)=""/114, 0x72}, {&(0x7f0000002a00)=""/4096, 0x1000}], 0x4, &(0x7f0000003a40)=""/216, 0xd8}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="61122800000000006113140000000000bf1000000000000025000200091b00003d030100000000008701000000000000bc26000000000000bf67000000000000150300000ee600f0670200001400000015030000ffffffffbf050000000000000f650000000000006507f4ff02000400070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d56825c4bf261d1ec069e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe70305863f970eac3510ac99b798f8125f1c322c2a154a8a8d"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x88}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000240)='\xff\xff\xff\xff\xff\xff') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000007112c7000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) 472.523464ms ago: executing program 1 (id=3998): perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4040, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x10a, 0x0, 0xffff8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x10000000001, 0xffffffffffffffff, 0x0) syz_clone(0x61801680, 0x0, 0x1f, 0x0, 0x0, 0x0) close(0x3) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x55) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r2, &(0x7f00000000c0)="ad", &(0x7f0000000000)=""/3, 0x2}, 0x20) (async, rerun: 32) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r2, 0x0, &(0x7f0000000500)=""/166}, 0x20) (async, rerun: 32) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRESHEX=r3, @ANYBLOB="00000000000000000000000000000000000000000000000000000000cd6c153e543af04f873a8b7632ec3086f8f8c7"], 0x50) (async) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x5, &(0x7f00000000c0), 0x10}, 0x94) (async) r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, @perf_config_ext={0xd, 0x400009}, 0x0, 0x0, 0x0, 0x2, 0x7}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdb, &(0x7f00000004c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x3e, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001040)={0x6, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="8ef8e22e78bc9e269e44daf2a5ed65fd0ef8307b6ea6a1a064fe1820a0b662f9f3dc0ac041602f8ae332128bd16c4395d9703cf63d8869bb59f07a855d1d2d439a56827144f50eac6416f9d3419a49a5fdaf60656e758533c3db98a1dd411e137bfd691c4a216c89826c0260bd89af25d85a5b2b832972485d17bb5e9d6c07c0ed68f7cf4a7931cd2deed914e4018f23fbbca0a4a6f8b86fec6bf039e17d5cba61266f6070021bd7ca48e64af209863eb6bca57e41fdc30d1c716f667b37f8aa86b60a5daa2b28cd9a0ce8d4c4ef102021ea0ad6043f8750af7f031c932c1b77e092b3", @ANYRES32=r7, @ANYBLOB, @ANYRESOCT=r9, @ANYRESDEC], &(0x7f0000000340)='GPL\x00', 0xffff, 0x7, &(0x7f0000000380)=""/7, 0x1f00, 0x40, '\x00', r8, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000008c0)={0x5, 0x2, 0x1, 0x7}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000900)=[{0x0, 0x1, 0x3, 0x9}, {0x3, 0x3, 0xf, 0x7}], 0x10, 0x2}, 0x94) (async, rerun: 64) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@const={0x4, 0x0, 0x0, 0xa, 0x2}, @typedef={0x6, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000680)=""/65, 0x35, 0x41, 0x0, 0xf}, 0x28) (rerun: 64) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={r4, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_ext={0x1c, 0x2c, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, [@alu={0x7, 0x1, 0x9, 0xb, 0x1, 0x18, 0xfffffffffffffff0}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4436}}, @alu={0x4, 0x1, 0xd, 0x7, 0xa, 0x100, 0xfffffffffffffffc}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff9}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @call={0x85, 0x0, 0x0, 0x62}]}, &(0x7f0000000540)='GPL\x00', 0x3ff, 0xbd, &(0x7f0000000580)=""/189, 0x41100, 0x24, '\x00', r8, 0x0, r10, 0x8, &(0x7f0000000740)={0x5, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x176b1, r6, 0x0, &(0x7f0000000800)=[r11, r4, r4], 0x0, 0x10, 0x1}, 0x94) (async) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x7, 0x1c}, 0xc) (async, rerun: 32) r13 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x476f3fca, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x50) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x2a, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffff6f}, {}, {}, [@call={0x85, 0x0, 0x0, 0x7d}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x200}, @func, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x706}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @alu={0x0, 0x0, 0x1, 0x0, 0xb, 0x30, 0xfffffffffffffff0}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x1b, &(0x7f0000000200)=""/27, 0x41000, 0x5e, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0x1, 0x8001, 0x8}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000400)=[r12, r13], &(0x7f0000000440)=[{0x0, 0x4, 0x10, 0x4}, {0x4, 0x4, 0xa, 0x6}, {0x1, 0x2, 0x1, 0x6}, {0x0, 0x3, 0xd, 0x5}, {0x4, 0x2, 0x6, 0x9}, {0x3, 0x5, 0x10, 0x3}], 0x10, 0x10}, 0x94) 143.006908ms ago: executing program 2 (id=3999): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000013"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001780)=""/4071, 0xfe7}], 0x12, 0x0, 0x0, 0x406}, 0x40020000) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0xfffe}], 0x1}, 0x0) 110.633168ms ago: executing program 2 (id=4000): openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x14, 0x4, 0x8, 0x8, 0x40080, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0xc, &(0x7f00000007c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {}, {0x85, 0x0, 0x0, 0x33}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.time\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 497.28µs ago: executing program 2 (id=4001): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x95, 0x0, &(0x7f0000000100)="b9ff03076044238cb89e14f0890647e0ffff00004000638877fbac14140cac14140c07029f89052f87e577ca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28f", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=@framed={{0x7d, 0xa, 0xa, 0x0, 0x0, 0x71, 0x10, 0x1d}}, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='@}.**.[,\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_subtree(r3, 0x0, 0x2, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000d0ffffff000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b706000014000000b7030000000d3f008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b5090200000000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018200000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7010000080000004608f0ff76000000bf9800000000000079080000000000008500000005000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 0s ago: executing program 3 (id=3504): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x1f63, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): 692] _copy_from_user+0x1e/0xc0 [ 320.337378][ T9692] __sys_bpf+0x2a0/0x850 [ 320.341659][ T9692] ? bpf_link_show_fdinfo+0x330/0x330 [ 320.347153][ T9692] ? __cfi_sched_clock_cpu+0x10/0x10 [ 320.352459][ T9692] __x64_sys_bpf+0x7c/0x90 [ 320.356899][ T9692] x64_sys_call+0x488/0x9a0 [ 320.361420][ T9692] do_syscall_64+0x4c/0xa0 [ 320.365876][ T9692] ? clear_bhb_loop+0x30/0x80 [ 320.370667][ T9692] ? clear_bhb_loop+0x30/0x80 [ 320.375398][ T9692] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 320.381411][ T9692] RIP: 0033:0x7efc0079cdd9 [ 320.386024][ T9692] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 320.406101][ T9692] RSP: 002b:00007efc0168d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 320.414810][ T9692] RAX: ffffffffffffffda RBX: 00007efc00a15fa0 RCX: 00007efc0079cdd9 [ 320.422823][ T9692] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 320.430822][ T9692] RBP: 00007efc0168d090 R08: 0000000000000000 R09: 0000000000000000 [ 320.438823][ T9692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.446907][ T9692] R13: 00007efc00a16038 R14: 00007efc00a15fa0 R15: 00007ffe5fc31758 [ 320.454988][ T9692] [ 320.470421][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 320.489643][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 320.542373][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 320.570879][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.585673][ T9647] device veth0_vlan entered promiscuous mode [ 320.606502][ T9703] device syzkaller0 entered promiscuous mode [ 320.613160][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.624433][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.709094][ T9647] device veth1_macvtap entered promiscuous mode [ 320.716242][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 320.747850][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.844278][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 320.890616][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 320.950721][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 320.994783][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 321.038374][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.465048][ T9732] FAULT_INJECTION: forcing a failure. [ 321.465048][ T9732] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 321.502127][ T9732] CPU: 0 PID: 9732 Comm: syz.2.3112 Not tainted syzkaller #0 [ 321.509646][ T9732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 321.519805][ T9732] Call Trace: [ 321.523086][ T9732] [ 321.526025][ T9732] __dump_stack+0x21/0x24 [ 321.530367][ T9732] dump_stack_lvl+0x110/0x170 [ 321.535046][ T9732] ? __cfi_dump_stack_lvl+0x8/0x8 [ 321.540069][ T9732] ? memcpy+0x56/0x70 [ 321.544074][ T9732] dump_stack+0x15/0x24 [ 321.548255][ T9732] should_fail_ex+0x3d4/0x520 [ 321.553016][ T9732] should_fail+0xb/0x10 [ 321.557250][ T9732] should_fail_usercopy+0x1a/0x20 [ 321.562271][ T9732] strncpy_from_user+0x24/0x2d0 [ 321.567177][ T9732] bpf_prog_load+0x1fe/0x16a0 [ 321.571872][ T9732] ? map_freeze+0x390/0x390 [ 321.576403][ T9732] ? selinux_bpf+0xc7/0xf0 [ 321.580849][ T9732] ? security_bpf+0x93/0xb0 [ 321.585369][ T9732] __sys_bpf+0x57b/0x850 [ 321.589643][ T9732] ? bpf_link_show_fdinfo+0x330/0x330 [ 321.595053][ T9732] ? irqentry_exit+0x37/0x40 [ 321.599769][ T9732] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 321.605691][ T9732] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 321.611857][ T9732] __x64_sys_bpf+0x7c/0x90 [ 321.616295][ T9732] x64_sys_call+0x488/0x9a0 [ 321.620886][ T9732] do_syscall_64+0x4c/0xa0 [ 321.625391][ T9732] ? clear_bhb_loop+0x30/0x80 [ 321.630063][ T9732] ? clear_bhb_loop+0x30/0x80 [ 321.634736][ T9732] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 321.640714][ T9732] RIP: 0033:0x7efc0079cdd9 [ 321.645140][ T9732] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 321.664747][ T9732] RSP: 002b:00007efc0168d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 321.673161][ T9732] RAX: ffffffffffffffda RBX: 00007efc00a15fa0 RCX: 00007efc0079cdd9 [ 321.681154][ T9732] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 321.689124][ T9732] RBP: 00007efc0168d090 R08: 0000000000000000 R09: 0000000000000000 [ 321.697100][ T9732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 321.705215][ T9732] R13: 00007efc00a16038 R14: 00007efc00a15fa0 R15: 00007ffe5fc31758 [ 321.713295][ T9732] [ 322.258093][ T9728] device syzkaller0 entered promiscuous mode [ 322.300934][ T9746] device syzkaller0 entered promiscuous mode [ 322.718358][ T9767] device syzkaller0 entered promiscuous mode [ 322.833528][ T9771] device syzkaller0 entered promiscuous mode [ 322.940094][ T9776] device syzkaller0 entered promiscuous mode [ 323.080630][ T9779] device syzkaller0 entered promiscuous mode [ 323.178113][ T43] device veth0 left promiscuous mode [ 323.191584][ T43] bridge0: port 3(veth0) entered disabled state [ 323.224372][ T43] device bridge_slave_1 left promiscuous mode [ 323.237520][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.249077][ T43] device bridge_slave_0 left promiscuous mode [ 323.264197][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.299346][ T43] device veth1_macvtap left promiscuous mode [ 323.305773][ T43] device veth0_vlan left promiscuous mode [ 323.846258][ T9808] -: renamed from syzkaller0 [ 324.137620][ T9818] device syzkaller0 entered promiscuous mode [ 324.157864][ T9819] device syzkaller0 entered promiscuous mode [ 324.222557][ T9826] FAULT_INJECTION: forcing a failure. [ 324.222557][ T9826] name failslab, interval 1, probability 0, space 0, times 0 [ 324.301959][ T9826] CPU: 1 PID: 9826 Comm: syz.0.3138 Not tainted syzkaller #0 [ 324.309598][ T9826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 324.319762][ T9826] Call Trace: [ 324.323068][ T9826] [ 324.326022][ T9826] __dump_stack+0x21/0x24 [ 324.330382][ T9826] dump_stack_lvl+0x110/0x170 [ 324.335090][ T9826] ? __cfi_dump_stack_lvl+0x8/0x8 [ 324.340146][ T9826] dump_stack+0x15/0x24 [ 324.344330][ T9826] should_fail_ex+0x3d4/0x520 [ 324.349041][ T9826] __should_failslab+0xac/0xf0 [ 324.353842][ T9826] should_failslab+0x9/0x20 [ 324.358372][ T9826] kmem_cache_alloc_node+0x42/0x340 [ 324.363593][ T9826] ? alloc_vmap_area+0x184/0x18b0 [ 324.368632][ T9826] alloc_vmap_area+0x184/0x18b0 [ 324.373534][ T9826] ? vm_map_ram+0x930/0x930 [ 324.378041][ T9826] ? __kasan_kmalloc+0x95/0xb0 [ 324.382820][ T9826] ? kmalloc_node_trace+0x3d/0xb0 [ 324.387934][ T9826] __get_vm_area_node+0x160/0x360 [ 324.393309][ T9826] __vmalloc_node_range+0x326/0x1430 [ 324.398605][ T9826] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 324.404246][ T9826] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 324.409978][ T9826] ? __cfi___vmalloc_node_range+0x10/0x10 [ 324.415711][ T9826] ? __cfi_selinux_capable+0x10/0x10 [ 324.421001][ T9826] ? irqentry_exit+0x37/0x40 [ 324.425600][ T9826] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 324.431152][ T9826] __vmalloc+0x79/0x90 [ 324.435223][ T9826] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 324.440880][ T9826] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 324.446284][ T9826] bpf_prog_alloc+0x22/0x1c0 [ 324.450903][ T9826] bpf_prog_load+0x825/0x16a0 [ 324.455605][ T9826] ? map_freeze+0x390/0x390 [ 324.460207][ T9826] ? selinux_bpf+0xc7/0xf0 [ 324.464774][ T9826] ? security_bpf+0x93/0xb0 [ 324.469287][ T9826] __sys_bpf+0x57b/0x850 [ 324.473550][ T9826] ? bpf_link_show_fdinfo+0x330/0x330 [ 324.479102][ T9826] ? __cfi_ksys_write+0x10/0x10 [ 324.483968][ T9826] ? debug_smp_processor_id+0x17/0x20 [ 324.489357][ T9826] __x64_sys_bpf+0x7c/0x90 [ 324.493773][ T9826] x64_sys_call+0x488/0x9a0 [ 324.498365][ T9826] do_syscall_64+0x4c/0xa0 [ 324.502786][ T9826] ? clear_bhb_loop+0x30/0x80 [ 324.507469][ T9826] ? clear_bhb_loop+0x30/0x80 [ 324.512158][ T9826] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 324.518141][ T9826] RIP: 0033:0x7f1c0979cdd9 [ 324.522566][ T9826] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 324.542173][ T9826] RSP: 002b:00007f1c0a67b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 324.551027][ T9826] RAX: ffffffffffffffda RBX: 00007f1c09a15fa0 RCX: 00007f1c0979cdd9 [ 324.559089][ T9826] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 324.567073][ T9826] RBP: 00007f1c0a67b090 R08: 0000000000000000 R09: 0000000000000000 [ 324.575042][ T9826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 324.583106][ T9826] R13: 00007f1c09a16038 R14: 00007f1c09a15fa0 R15: 00007fffe393fe98 [ 324.591168][ T9826] [ 324.666896][ T9826] syz.0.3138: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 324.684689][ T9826] CPU: 1 PID: 9826 Comm: syz.0.3138 Not tainted syzkaller #0 [ 324.692265][ T9826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 324.702357][ T9826] Call Trace: [ 324.705664][ T9826] [ 324.708618][ T9826] __dump_stack+0x21/0x24 [ 324.712981][ T9826] dump_stack_lvl+0x110/0x170 [ 324.717684][ T9826] ? __cfi_dump_stack_lvl+0x8/0x8 [ 324.722756][ T9826] dump_stack+0x15/0x24 [ 324.726939][ T9826] warn_alloc+0x1dc/0x200 [ 324.731309][ T9826] ? __cfi_warn_alloc+0x10/0x10 [ 324.736267][ T9826] ? __get_vm_area_node+0x175/0x360 [ 324.741702][ T9826] __vmalloc_node_range+0x34b/0x1430 [ 324.747026][ T9826] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 324.752779][ T9826] ? __cfi___vmalloc_node_range+0x10/0x10 [ 324.758534][ T9826] ? __cfi_selinux_capable+0x10/0x10 [ 324.763856][ T9826] ? irqentry_exit+0x37/0x40 [ 324.768482][ T9826] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 324.774060][ T9826] __vmalloc+0x79/0x90 [ 324.778334][ T9826] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 324.783999][ T9826] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 324.789513][ T9826] bpf_prog_alloc+0x22/0x1c0 [ 324.794356][ T9826] bpf_prog_load+0x825/0x16a0 [ 324.799170][ T9826] ? map_freeze+0x390/0x390 [ 324.803719][ T9826] ? selinux_bpf+0xc7/0xf0 [ 324.808169][ T9826] ? security_bpf+0x93/0xb0 [ 324.812713][ T9826] __sys_bpf+0x57b/0x850 [ 324.816984][ T9826] ? bpf_link_show_fdinfo+0x330/0x330 [ 324.822470][ T9826] ? __cfi_ksys_write+0x10/0x10 [ 324.827348][ T9826] ? debug_smp_processor_id+0x17/0x20 [ 324.832752][ T9826] __x64_sys_bpf+0x7c/0x90 [ 324.837281][ T9826] x64_sys_call+0x488/0x9a0 [ 324.841926][ T9826] do_syscall_64+0x4c/0xa0 [ 324.846681][ T9826] ? clear_bhb_loop+0x30/0x80 [ 324.851424][ T9826] ? clear_bhb_loop+0x30/0x80 [ 324.856118][ T9826] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 324.862196][ T9826] RIP: 0033:0x7f1c0979cdd9 [ 324.866619][ T9826] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 324.887183][ T9826] RSP: 002b:00007f1c0a67b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 324.895864][ T9826] RAX: ffffffffffffffda RBX: 00007f1c09a15fa0 RCX: 00007f1c0979cdd9 [ 324.903929][ T9826] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 324.912087][ T9826] RBP: 00007f1c0a67b090 R08: 0000000000000000 R09: 0000000000000000 [ 324.920054][ T9826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 324.928024][ T9826] R13: 00007f1c09a16038 R14: 00007f1c09a15fa0 R15: 00007fffe393fe98 [ 324.936007][ T9826] [ 325.034437][ T9826] Mem-Info: [ 325.038068][ T9826] active_anon:7749 inactive_anon:75 isolated_anon:0 [ 325.038068][ T9826] active_file:29382 inactive_file:2533 isolated_file:0 [ 325.038068][ T9826] unevictable:0 dirty:399 writeback:0 [ 325.038068][ T9826] slab_reclaimable:7552 slab_unreclaimable:89481 [ 325.038068][ T9826] mapped:29577 shmem:163 pagetables:641 [ 325.038068][ T9826] sec_pagetables:0 bounce:0 [ 325.038068][ T9826] kernel_misc_reclaimable:0 [ 325.038068][ T9826] free:1502689 free_pcp:3319 free_cma:0 [ 325.084289][ T9826] Node 0 active_anon:30996kB inactive_anon:300kB active_file:117528kB inactive_file:10132kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:118308kB dirty:1596kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4520kB pagetables:2564kB sec_pagetables:0kB all_unreclaimable? no [ 325.121008][ T9826] DMA32 free:2966484kB boost:0kB min:31276kB low:39092kB high:46908kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971888kB mlocked:0kB bounce:0kB free_pcp:5404kB local_pcp:5348kB free_cma:0kB [ 325.149979][ T9826] lowmem_reserve[]: 0 3932 3932 3932 [ 325.155479][ T9826] Normal free:3044272kB boost:0kB min:42448kB low:53060kB high:63672kB reserved_highatomic:0KB active_anon:30996kB inactive_anon:300kB active_file:117528kB inactive_file:10132kB unevictable:0kB writepending:1596kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:14832kB local_pcp:13272kB free_cma:0kB [ 325.189704][ T9826] lowmem_reserve[]: 0 0 0 0 [ 325.194539][ T9826] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2966484kB [ 325.210686][ T9826] Normal: 2062*4kB (UME) 1355*8kB (ME) 992*16kB (UME) 669*32kB (UME) 511*64kB (UME) 476*128kB (UME) 306*256kB (UME) 216*512kB (UME) 126*1024kB (UME) 56*2048kB (UME) 601*4096kB (UM) = 3044336kB [ 325.229978][ T9826] 32151 total pagecache pages [ 325.235274][ T9826] 73 pages in swap cache [ 325.239572][ T9826] Free swap = 124144kB [ 325.252783][ T9826] Total swap = 124996kB [ 325.259432][ T9826] 2097051 pages RAM [ 325.263555][ T9826] 0 pages HighMem/MovableOnly [ 325.268944][ T9826] 347479 pages reserved [ 325.273495][ T9826] 0 pages cma reserved [ 325.810756][ T9854] device syzkaller0 entered promiscuous mode [ 325.881243][ T9856] device syzkaller0 entered promiscuous mode [ 326.293505][ T9893] device syzkaller0 entered promiscuous mode [ 326.321194][ T9894] device syzkaller0 entered promiscuous mode [ 326.863255][ T9919] device syzkaller0 entered promiscuous mode [ 327.693980][ T9954] device syzkaller0 entered promiscuous mode [ 327.713238][ T9956] device syzkaller0 entered promiscuous mode [ 327.903514][ T9973] device syzkaller0 entered promiscuous mode [ 328.265170][ T9988] device syzkaller0 entered promiscuous mode [ 328.308974][ T9992] device syzkaller0 entered promiscuous mode [ 328.465649][ T9996] device syzkaller0 entered promiscuous mode [ 328.759269][T10005] device syzkaller0 entered promiscuous mode [ 328.924247][T10024] device syzkaller0 entered promiscuous mode [ 329.085590][T10033] device syzkaller0 entered promiscuous mode [ 329.530761][T10054] device syzkaller0 entered promiscuous mode [ 329.648729][T10058] device syzkaller0 entered promiscuous mode [ 330.110777][T10074] device syzkaller0 entered promiscuous mode [ 330.351379][T10087] erspan0: mtu less than device minimum [ 330.537867][T10099] device syzkaller0 entered promiscuous mode [ 330.576591][T10103] device syzkaller0 entered promiscuous mode [ 330.633333][T10107] device syzkaller0 entered promiscuous mode [ 330.901732][T10134] -: renamed from syzkaller0 [ 330.995195][T10136] device syzkaller0 entered promiscuous mode [ 331.286754][T10151] device syzkaller0 entered promiscuous mode [ 331.331404][T10153] device syzkaller0 entered promiscuous mode [ 331.447974][T10157] device syzkaller0 entered promiscuous mode [ 332.280870][T10192] device syzkaller0 entered promiscuous mode [ 332.386930][T10193] device syzkaller0 entered promiscuous mode [ 332.487584][T10193] syzkaller0: tun_net_xmit 1280 [ 332.492566][T10193] syzkaller0: create flow: hash 2866486700 index 2 [ 332.542038][T10190] syzkaller0: delete flow: hash 2866486700 index 2 [ 332.596400][T10216] device syzkaller0 entered promiscuous mode [ 332.879678][T10241] device syzkaller0 entered promiscuous mode [ 332.932586][T10243] device syzkaller0 entered promiscuous mode [ 333.023594][T10251] device syzkaller0 entered promiscuous mode [ 333.127695][ T28] audit: type=1400 audit(1778533021.834:162): avc: denied { setattr } for pid=10252 comm="syz.4.3300" path="/proc/781" dev="proc" ino=49680 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 333.176859][T10251] syzkaller0: create flow: hash 2866486700 index 2 [ 333.228270][ T309] syzkaller0: tun_net_xmit 48 [ 333.238707][T10250] syzkaller0: delete flow: hash 2866486700 index 2 [ 333.302354][T10259] device syzkaller0 entered promiscuous mode [ 333.516699][T10266] device syzkaller0 entered promiscuous mode [ 334.232880][T10286] device syzkaller0 entered promiscuous mode [ 334.282552][T10290] device syzkaller0 entered promiscuous mode [ 334.790197][T10338] device syzkaller0 entered promiscuous mode [ 334.811783][T10336] device syzkaller0 entered promiscuous mode [ 334.829448][T10337] device syzkaller0 entered promiscuous mode [ 335.423313][T10380] device syzkaller0 entered promiscuous mode [ 335.753677][T10389] device syzkaller0 entered promiscuous mode [ 335.923516][T10394] device syzkaller0 entered promiscuous mode [ 336.358113][T10414] device syzkaller0 entered promiscuous mode [ 336.553147][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 336.726550][T10440] device syzkaller0 entered promiscuous mode [ 336.855504][T10459] device syzkaller0 entered promiscuous mode [ 336.936041][T10464] device syzkaller0 entered promiscuous mode [ 337.453213][T10492] ref_ctr_offset mismatch. inode: 0x219 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 337.907984][T10503] device syzkaller0 entered promiscuous mode [ 337.991398][T10514] device syzkaller0 entered promiscuous mode [ 338.364877][T10538] device veth0_vlan left promiscuous mode [ 338.376082][T10538] device veth0_vlan entered promiscuous mode [ 339.146420][T10554] device syzkaller0 entered promiscuous mode [ 339.206048][T10563] device syzkaller0 entered promiscuous mode [ 339.286255][T10573] FAULT_INJECTION: forcing a failure. [ 339.286255][T10573] name failslab, interval 1, probability 0, space 0, times 0 [ 339.303364][T10573] CPU: 0 PID: 10573 Comm: syz.2.3411 Not tainted syzkaller #0 [ 339.311071][T10573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 339.321158][T10573] Call Trace: [ 339.324472][T10573] [ 339.327417][T10573] __dump_stack+0x21/0x24 [ 339.331766][T10573] dump_stack_lvl+0x110/0x170 [ 339.336459][T10573] ? __cfi_dump_stack_lvl+0x8/0x8 [ 339.341498][T10573] ? stack_trace_save+0xa6/0xf0 [ 339.346443][T10573] dump_stack+0x15/0x24 [ 339.350612][T10573] should_fail_ex+0x3d4/0x520 [ 339.355327][T10573] __should_failslab+0xac/0xf0 [ 339.360215][T10573] should_failslab+0x9/0x20 [ 339.364722][T10573] kmem_cache_alloc_node+0x42/0x340 [ 339.369926][T10573] ? dup_task_struct+0x5a/0x7e0 [ 339.374775][T10573] dup_task_struct+0x5a/0x7e0 [ 339.379464][T10573] ? __kasan_check_write+0x14/0x20 [ 339.385013][T10573] copy_process+0x5d6/0x3510 [ 339.389611][T10573] ? __kasan_check_write+0x14/0x20 [ 339.394721][T10573] ? idle_dummy+0x10/0x10 [ 339.399066][T10573] kernel_clone+0x22f/0x820 [ 339.403575][T10573] ? __cfi_kernel_clone+0x10/0x10 [ 339.408799][T10573] ? __kasan_check_write+0x14/0x20 [ 339.414020][T10573] ? mutex_unlock+0x8f/0x230 [ 339.418890][T10573] __x64_sys_clone+0x193/0x200 [ 339.423816][T10573] ? __cfi___x64_sys_clone+0x10/0x10 [ 339.429121][T10573] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 339.435810][T10573] x64_sys_call+0x990/0x9a0 [ 339.440323][T10573] do_syscall_64+0x4c/0xa0 [ 339.444740][T10573] ? clear_bhb_loop+0x30/0x80 [ 339.449441][T10573] ? clear_bhb_loop+0x30/0x80 [ 339.454129][T10573] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 339.460031][T10573] RIP: 0033:0x7efc0079cdd9 [ 339.464470][T10573] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 339.484086][T10573] RSP: 002b:00007efc0168cfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 339.492608][T10573] RAX: ffffffffffffffda RBX: 00007efc00a15fa0 RCX: 00007efc0079cdd9 [ 339.500928][T10573] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000002802000 [ 339.508902][T10573] RBP: 00007efc0168d090 R08: 0000000000000000 R09: 0000000000000000 [ 339.516877][T10573] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 339.524861][T10573] R13: 00007efc00a16038 R14: 00007efc00a15fa0 R15: 00007ffe5fc31758 [ 339.533015][T10573] [ 339.677046][T10591] device syzkaller0 entered promiscuous mode [ 339.973476][T10600] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 340.062350][T10608] device syzkaller0 entered promiscuous mode [ 340.440140][T10628] FAULT_INJECTION: forcing a failure. [ 340.440140][T10628] name failslab, interval 1, probability 0, space 0, times 0 [ 340.456237][T10629] device syzkaller0 entered promiscuous mode [ 340.464036][T10628] CPU: 1 PID: 10628 Comm: syz.4.3431 Not tainted syzkaller #0 [ 340.471705][T10628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 340.481924][T10628] Call Trace: [ 340.485224][T10628] [ 340.488178][T10628] __dump_stack+0x21/0x24 [ 340.492535][T10628] dump_stack_lvl+0x110/0x170 [ 340.497238][T10628] ? __cfi_dump_stack_lvl+0x8/0x8 [ 340.502302][T10628] dump_stack+0x15/0x24 [ 340.506580][T10628] should_fail_ex+0x3d4/0x520 [ 340.511537][T10628] ? prepare_creds+0x2f/0x640 [ 340.516265][T10628] __should_failslab+0xac/0xf0 [ 340.521147][T10628] should_failslab+0x9/0x20 [ 340.525672][T10628] kmem_cache_alloc+0x3b/0x330 [ 340.530468][T10628] prepare_creds+0x2f/0x640 [ 340.535079][T10628] ? memcpy+0x56/0x70 [ 340.539085][T10628] copy_creds+0xe4/0x640 [ 340.543364][T10628] copy_process+0x84b/0x3510 [ 340.547982][T10628] ? __kasan_check_write+0x14/0x20 [ 340.553116][T10628] ? idle_dummy+0x10/0x10 [ 340.557491][T10628] kernel_clone+0x22f/0x820 [ 340.562026][T10628] ? __cfi_kernel_clone+0x10/0x10 [ 340.567169][T10628] ? __kasan_check_write+0x14/0x20 [ 340.572302][T10628] ? mutex_unlock+0x8f/0x230 [ 340.576946][T10628] __x64_sys_clone+0x193/0x200 [ 340.581738][T10628] ? __cfi___x64_sys_clone+0x10/0x10 [ 340.587059][T10628] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 340.593172][T10628] x64_sys_call+0x990/0x9a0 [ 340.597878][T10628] do_syscall_64+0x4c/0xa0 [ 340.602335][T10628] ? clear_bhb_loop+0x30/0x80 [ 340.607058][T10628] ? clear_bhb_loop+0x30/0x80 [ 340.611769][T10628] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 340.617691][T10628] RIP: 0033:0x7f01d319cdd9 [ 340.622139][T10628] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 340.641854][T10628] RSP: 002b:00007f01d3fb2fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 340.650351][T10628] RAX: ffffffffffffffda RBX: 00007f01d3415fa0 RCX: 00007f01d319cdd9 [ 340.658432][T10628] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000002802000 [ 340.666525][T10628] RBP: 00007f01d3fb3090 R08: 0000000000000000 R09: 0000000000000000 [ 340.674642][T10628] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 340.682645][T10628] R13: 00007f01d3416038 R14: 00007f01d3415fa0 R15: 00007fffa145ebb8 [ 340.690857][T10628] [ 341.111023][T10649] device syzkaller0 entered promiscuous mode [ 341.162035][T10663] device syzkaller0 entered promiscuous mode [ 341.579945][T10685] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 341.662557][T10688] device syzkaller0 entered promiscuous mode [ 342.109080][T10714] FAULT_INJECTION: forcing a failure. [ 342.109080][T10714] name failslab, interval 1, probability 0, space 0, times 0 [ 342.149992][T10714] CPU: 1 PID: 10714 Comm: syz.3.3462 Not tainted syzkaller #0 [ 342.157523][T10714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 342.167604][T10714] Call Trace: [ 342.170907][T10714] [ 342.173858][T10714] __dump_stack+0x21/0x24 [ 342.178217][T10714] dump_stack_lvl+0x110/0x170 [ 342.182930][T10714] ? __cfi_dump_stack_lvl+0x8/0x8 [ 342.188068][T10714] dump_stack+0x15/0x24 [ 342.192422][T10714] should_fail_ex+0x3d4/0x520 [ 342.197115][T10714] __should_failslab+0xac/0xf0 [ 342.201905][T10714] ? security_prepare_creds+0x4e/0x150 [ 342.207385][T10714] should_failslab+0x9/0x20 [ 342.211909][T10714] __kmem_cache_alloc_node+0x3d/0x2c0 [ 342.217302][T10714] ? security_prepare_creds+0x4e/0x150 [ 342.222769][T10714] __kmalloc+0xa1/0x1e0 [ 342.226923][T10714] ? prepare_creds+0x2f/0x640 [ 342.231604][T10714] security_prepare_creds+0x4e/0x150 [ 342.236895][T10714] prepare_creds+0x456/0x640 [ 342.241572][T10714] copy_creds+0xe4/0x640 [ 342.245821][T10714] copy_process+0x84b/0x3510 [ 342.250425][T10714] ? __kasan_check_write+0x14/0x20 [ 342.255537][T10714] ? idle_dummy+0x10/0x10 [ 342.259879][T10714] kernel_clone+0x22f/0x820 [ 342.264391][T10714] ? __cfi_kernel_clone+0x10/0x10 [ 342.269529][T10714] ? __kasan_check_write+0x14/0x20 [ 342.274641][T10714] ? mutex_unlock+0x8f/0x230 [ 342.279237][T10714] __x64_sys_clone+0x193/0x200 [ 342.284044][T10714] ? __cfi___x64_sys_clone+0x10/0x10 [ 342.289431][T10714] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 342.295591][T10714] x64_sys_call+0x990/0x9a0 [ 342.300193][T10714] do_syscall_64+0x4c/0xa0 [ 342.304613][T10714] ? clear_bhb_loop+0x30/0x80 [ 342.309471][T10714] ? clear_bhb_loop+0x30/0x80 [ 342.314152][T10714] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 342.320142][T10714] RIP: 0033:0x7fda3359cdd9 [ 342.324563][T10714] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 342.344435][T10714] RSP: 002b:00007fda34451fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 342.352848][T10714] RAX: ffffffffffffffda RBX: 00007fda33815fa0 RCX: 00007fda3359cdd9 [ 342.360824][T10714] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000002802000 [ 342.368972][T10714] RBP: 00007fda34452090 R08: 0000000000000000 R09: 0000000000000000 [ 342.377038][T10714] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 342.385192][T10714] R13: 00007fda33816038 R14: 00007fda33815fa0 R15: 00007ffedec377a8 [ 342.393172][T10714] [ 342.441679][T10715] device syzkaller0 entered promiscuous mode [ 342.782819][T10749] device syzkaller0 entered promiscuous mode [ 342.881079][T10761] device syzkaller0 entered promiscuous mode [ 343.759213][T10809] device syzkaller0 entered promiscuous mode [ 343.893671][T10810] device syzkaller0 entered promiscuous mode [ 344.186464][T10816] device syzkaller0 entered promiscuous mode [ 344.246726][T10832] FAULT_INJECTION: forcing a failure. [ 344.246726][T10832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 344.260185][T10832] CPU: 0 PID: 10832 Comm: syz.2.3500 Not tainted syzkaller #0 [ 344.267676][T10832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 344.277755][T10832] Call Trace: [ 344.281064][T10832] [ 344.284013][T10832] __dump_stack+0x21/0x24 [ 344.288374][T10832] dump_stack_lvl+0x110/0x170 [ 344.293085][T10832] ? __cfi_dump_stack_lvl+0x8/0x8 [ 344.298148][T10832] ? _parse_integer+0x2a/0x40 [ 344.302950][T10832] dump_stack+0x15/0x24 [ 344.307128][T10832] should_fail_ex+0x3d4/0x520 [ 344.311824][T10832] should_fail+0xb/0x10 [ 344.316258][T10832] should_fail_usercopy+0x1a/0x20 [ 344.321390][T10832] _copy_from_user+0x1e/0xc0 [ 344.326021][T10832] ___sys_sendmsg+0x1c3/0x360 [ 344.330718][T10832] ? __sys_sendmsg+0x290/0x290 [ 344.335510][T10832] ? __kasan_check_write+0x14/0x20 [ 344.340649][T10832] ? proc_fail_nth_write+0x180/0x200 [ 344.345956][T10832] ? vfs_write+0xa2c/0xce0 [ 344.350404][T10832] ? __fdget+0x19c/0x220 [ 344.354667][T10832] __x64_sys_sendmsg+0x205/0x2d0 [ 344.359623][T10832] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 344.365128][T10832] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 344.371396][T10832] x64_sys_call+0x171/0x9a0 [ 344.375922][T10832] do_syscall_64+0x4c/0xa0 [ 344.380356][T10832] ? clear_bhb_loop+0x30/0x80 [ 344.385145][T10832] ? clear_bhb_loop+0x30/0x80 [ 344.389851][T10832] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 344.395779][T10832] RIP: 0033:0x7efc0079cdd9 [ 344.400218][T10832] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 344.419843][T10832] RSP: 002b:00007efc0168d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 344.428286][T10832] RAX: ffffffffffffffda RBX: 00007efc00a15fa0 RCX: 00007efc0079cdd9 [ 344.436328][T10832] RDX: 0000000000004800 RSI: 0000200000000780 RDI: 0000000000000006 [ 344.444323][T10832] RBP: 00007efc0168d090 R08: 0000000000000000 R09: 0000000000000000 [ 344.452326][T10832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.460425][T10832] R13: 00007efc00a16038 R14: 00007efc00a15fa0 R15: 00007ffe5fc31758 [ 344.468435][T10832] [ 345.693161][T10857] device syzkaller0 entered promiscuous mode [ 345.713655][T10850] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.731200][T10850] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.775282][T10850] device bridge_slave_0 entered promiscuous mode [ 345.814372][T10850] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.821749][T10850] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.862113][T10850] device bridge_slave_1 entered promiscuous mode [ 346.054336][T10850] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.061814][T10850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.069263][T10850] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.076328][T10850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.139910][T10878] device syzkaller0 entered promiscuous mode [ 346.222186][ T6854] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.234549][ T6854] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.268271][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.312713][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.435972][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 346.457890][ T6854] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.465100][ T6854] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.505229][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 346.550079][ T6854] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.557232][ T6854] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.609733][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 346.621162][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 346.719633][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 346.768226][T10850] device veth0_vlan entered promiscuous mode [ 346.791717][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 346.811238][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.870340][T10850] device veth1_macvtap entered promiscuous mode [ 346.902271][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.927423][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.957478][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 346.985834][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 347.013785][ T6854] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 347.107540][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 347.134452][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 347.188836][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 347.224189][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 347.548399][T10902] FAULT_INJECTION: forcing a failure. [ 347.548399][T10902] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 347.594290][T10902] CPU: 1 PID: 10902 Comm: syz.2.3522 Not tainted syzkaller #0 [ 347.601845][T10902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 347.611924][T10902] Call Trace: [ 347.615285][T10902] [ 347.618243][T10902] __dump_stack+0x21/0x24 [ 347.622605][T10902] dump_stack_lvl+0x110/0x170 [ 347.627309][T10902] ? __cfi_dump_stack_lvl+0x8/0x8 [ 347.632398][T10902] dump_stack+0x15/0x24 [ 347.636584][T10902] should_fail_ex+0x3d4/0x520 [ 347.641290][T10902] should_fail_alloc_page+0x61/0x90 [ 347.646526][T10902] prepare_alloc_pages+0x148/0x600 [ 347.651670][T10902] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 347.656896][T10902] ? kasan_set_track+0x60/0x70 [ 347.661687][T10902] ? kasan_save_alloc_info+0x25/0x30 [ 347.666994][T10902] ? __kasan_slab_alloc+0x72/0x80 [ 347.672044][T10902] ? slab_post_alloc_hook+0x4f/0x2d0 [ 347.677350][T10902] __alloc_pages+0x15b/0x610 [ 347.681965][T10902] ? __cfi___alloc_pages+0x10/0x10 [ 347.687104][T10902] ? __kasan_check_write+0x14/0x20 [ 347.692237][T10902] ? _raw_spin_lock+0x94/0xf0 [ 347.696952][T10902] ? __cfi__raw_spin_lock+0x10/0x10 [ 347.702217][T10902] __get_free_pages+0xe/0x30 [ 347.707089][T10902] kasan_populate_vmalloc_pte+0x29/0x120 [ 347.712756][T10902] __apply_to_page_range+0x8de/0xc80 [ 347.718336][T10902] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 347.724671][T10902] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 347.730954][T10902] apply_to_page_range+0x3b/0x50 [ 347.735926][T10902] kasan_populate_vmalloc+0x60/0x70 [ 347.741158][T10902] alloc_vmap_area+0x1779/0x18b0 [ 347.746248][T10902] ? vm_map_ram+0x930/0x930 [ 347.750791][T10902] ? __kasan_kmalloc+0x95/0xb0 [ 347.755583][T10902] ? kmalloc_node_trace+0x3d/0xb0 [ 347.760901][T10902] __get_vm_area_node+0x160/0x360 [ 347.766048][T10902] __vmalloc_node_range+0x326/0x1430 [ 347.771449][T10902] ? copy_process+0x5d6/0x3510 [ 347.776282][T10902] ? kasan_save_alloc_info+0x25/0x30 [ 347.781586][T10902] ? __cfi___vmalloc_node_range+0x10/0x10 [ 347.787438][T10902] ? __slab_alloc+0x6b/0xa0 [ 347.792081][T10902] ? arch_dup_task_struct+0x42/0xc0 [ 347.797303][T10902] ? memcpy+0x56/0x70 [ 347.801316][T10902] dup_task_struct+0x3ae/0x7e0 [ 347.806235][T10902] ? copy_process+0x5d6/0x3510 [ 347.811031][T10902] ? __kasan_check_write+0x14/0x20 [ 347.816171][T10902] copy_process+0x5d6/0x3510 [ 347.820789][T10902] ? __kasan_check_write+0x14/0x20 [ 347.825916][T10902] ? idle_dummy+0x10/0x10 [ 347.830278][T10902] kernel_clone+0x22f/0x820 [ 347.834822][T10902] ? __cfi_kernel_clone+0x10/0x10 [ 347.839910][T10902] ? __kasan_check_write+0x14/0x20 [ 347.845044][T10902] ? mutex_unlock+0x8f/0x230 [ 347.849698][T10902] __x64_sys_clone+0x193/0x200 [ 347.854494][T10902] ? __cfi___x64_sys_clone+0x10/0x10 [ 347.859826][T10902] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 347.865928][T10902] x64_sys_call+0x990/0x9a0 [ 347.870646][T10902] do_syscall_64+0x4c/0xa0 [ 347.875267][T10902] ? clear_bhb_loop+0x30/0x80 [ 347.879972][T10902] ? clear_bhb_loop+0x30/0x80 [ 347.884765][T10902] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 347.890773][T10902] RIP: 0033:0x7efc0079cdd9 [ 347.895234][T10902] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 347.915022][T10902] RSP: 002b:00007efc0168cfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 347.923474][T10902] RAX: ffffffffffffffda RBX: 00007efc00a15fa0 RCX: 00007efc0079cdd9 [ 347.931485][T10902] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000002802000 [ 347.939665][T10902] RBP: 00007efc0168d090 R08: 0000000000000000 R09: 0000000000000000 [ 347.947749][T10902] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 347.955787][T10902] R13: 00007efc00a16038 R14: 00007efc00a15fa0 R15: 00007ffe5fc31758 [ 347.963958][T10902] [ 348.281778][T10904] device syzkaller0 entered promiscuous mode [ 348.418869][ T3852] device bridge_slave_1 left promiscuous mode [ 348.433903][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.455789][ T3852] device bridge_slave_0 left promiscuous mode [ 348.461987][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.494988][ T3852] device veth1_macvtap left promiscuous mode [ 348.803948][T10902] syz.2.3522: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 348.833858][T10902] CPU: 0 PID: 10902 Comm: syz.2.3522 Not tainted syzkaller #0 [ 348.841378][T10902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 348.851633][T10902] Call Trace: [ 348.854936][T10902] [ 348.857877][T10902] __dump_stack+0x21/0x24 [ 348.862371][T10902] dump_stack_lvl+0x110/0x170 [ 348.867335][T10902] ? __cfi_dump_stack_lvl+0x8/0x8 [ 348.872401][T10902] ? pr_cont_kernfs_name+0x133/0x160 [ 348.877777][T10902] dump_stack+0x15/0x24 [ 348.882208][T10902] warn_alloc+0x1dc/0x200 [ 348.886568][T10902] ? __cfi_warn_alloc+0x10/0x10 [ 348.891454][T10902] ? __get_vm_area_node+0x175/0x360 [ 348.896680][T10902] __vmalloc_node_range+0x34b/0x1430 [ 348.902009][T10902] ? kasan_save_alloc_info+0x25/0x30 [ 348.907411][T10902] ? __cfi___vmalloc_node_range+0x10/0x10 [ 348.913169][T10902] ? __slab_alloc+0x6b/0xa0 [ 348.917698][T10902] ? arch_dup_task_struct+0x42/0xc0 [ 348.922908][T10902] ? memcpy+0x56/0x70 [ 348.926896][T10902] dup_task_struct+0x3ae/0x7e0 [ 348.931696][T10902] ? copy_process+0x5d6/0x3510 [ 348.936578][T10902] ? __kasan_check_write+0x14/0x20 [ 348.941709][T10902] copy_process+0x5d6/0x3510 [ 348.946325][T10902] ? __kasan_check_write+0x14/0x20 [ 348.951452][T10902] ? idle_dummy+0x10/0x10 [ 348.955940][T10902] kernel_clone+0x22f/0x820 [ 348.960542][T10902] ? __cfi_kernel_clone+0x10/0x10 [ 348.965674][T10902] ? __kasan_check_write+0x14/0x20 [ 348.970808][T10902] ? mutex_unlock+0x8f/0x230 [ 348.975413][T10902] __x64_sys_clone+0x193/0x200 [ 348.980201][T10902] ? __cfi___x64_sys_clone+0x10/0x10 [ 348.985587][T10902] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 348.991687][T10902] x64_sys_call+0x990/0x9a0 [ 348.996314][T10902] do_syscall_64+0x4c/0xa0 [ 349.000765][T10902] ? clear_bhb_loop+0x30/0x80 [ 349.005542][T10902] ? clear_bhb_loop+0x30/0x80 [ 349.010246][T10902] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 349.016141][T10902] RIP: 0033:0x7efc0079cdd9 [ 349.020560][T10902] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 349.040172][T10902] RSP: 002b:00007efc0168cfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 349.048592][T10902] RAX: ffffffffffffffda RBX: 00007efc00a15fa0 RCX: 00007efc0079cdd9 [ 349.056570][T10902] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000002802000 [ 349.064627][T10902] RBP: 00007efc0168d090 R08: 0000000000000000 R09: 0000000000000000 [ 349.072602][T10902] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 349.080583][T10902] R13: 00007efc00a16038 R14: 00007efc00a15fa0 R15: 00007ffe5fc31758 [ 349.088581][T10902] [ 349.214207][T10902] Mem-Info: [ 349.217412][T10902] active_anon:11323 inactive_anon:49292 isolated_anon:0 [ 349.217412][T10902] active_file:29462 inactive_file:2546 isolated_file:0 [ 349.217412][T10902] unevictable:0 dirty:411 writeback:0 [ 349.217412][T10902] slab_reclaimable:7560 slab_unreclaimable:76702 [ 349.217412][T10902] mapped:30685 shmem:52736 pagetables:638 [ 349.217412][T10902] sec_pagetables:0 bounce:0 [ 349.217412][T10902] kernel_misc_reclaimable:0 [ 349.217412][T10902] free:1457592 free_pcp:7576 free_cma:0 [ 349.274355][T10902] Node 0 active_anon:45292kB inactive_anon:191868kB active_file:117848kB inactive_file:10184kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:122740kB dirty:1644kB writeback:0kB shmem:205744kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4684kB pagetables:2552kB sec_pagetables:0kB all_unreclaimable? no [ 349.338805][T10902] DMA32 free:2966484kB boost:0kB min:31276kB low:39092kB high:46908kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971888kB mlocked:0kB bounce:0kB free_pcp:5404kB local_pcp:5348kB free_cma:0kB [ 349.581412][T10907] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.588655][T10907] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.596648][T10907] device bridge_slave_0 entered promiscuous mode [ 349.604109][T10907] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.611272][T10907] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.618430][T10902] lowmem_reserve[]: 0 3932 3932 3932 [ 349.623783][T10902] Normal free:2904556kB boost:0kB min:42448kB low:53060kB high:63672kB reserved_highatomic:0KB active_anon:45192kB inactive_anon:134368kB active_file:117848kB inactive_file:10184kB unevictable:0kB writepending:1644kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:52256kB local_pcp:25984kB free_cma:0kB [ 349.694335][T10907] device bridge_slave_1 entered promiscuous mode [ 349.773860][T10902] lowmem_reserve[]: 0 0 0 0 [ 349.779308][T10902] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2966484kB [ 349.853868][T10902] Normal: 1332*4kB (UME) 849*8kB (UME) 793*16kB (ME) 1837*32kB (UME) 664*64kB (UME) 429*128kB (UME) 158*256kB (UME) 114*512kB (UME) 76*1024kB (UME) 58*2048kB (UME) 601*4096kB (UM) = 2938120kB [ 349.905387][T10902] 61000 total pagecache pages [ 349.910263][T10902] 81 pages in swap cache [ 349.914739][T10902] Free swap = 124376kB [ 349.921228][T10902] Total swap = 124996kB [ 349.930868][T10902] 2097051 pages RAM [ 349.935209][T10913] device syzkaller0 entered promiscuous mode [ 349.937093][T10902] 0 pages HighMem/MovableOnly [ 349.953702][T10902] 347479 pages reserved [ 349.961977][T10902] 0 pages cma reserved [ 350.023444][T10907] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.030664][T10907] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.038300][T10907] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.045467][T10907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.297272][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.311137][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.565183][T10931] device syzkaller0 entered promiscuous mode [ 350.632013][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 350.642769][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 350.675997][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 350.686344][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 350.695692][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.702774][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.756337][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 350.843343][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.871441][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.879042][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.917866][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 350.928918][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 351.018439][T10929] syzkaller0: delete flow: hash 2866486700 index 2 [ 351.039827][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 351.056324][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 351.202818][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 351.216389][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 351.237441][T10907] device veth0_vlan entered promiscuous mode [ 351.251275][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 351.269784][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.307575][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 351.333614][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.373247][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 351.411069][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 351.456777][T10907] device veth1_macvtap entered promiscuous mode [ 351.577745][T10956] device syzkaller0 entered promiscuous mode [ 351.589420][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 351.604793][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 351.662875][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 351.694644][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 351.791230][ T3852] device bridge_slave_1 left promiscuous mode [ 351.798526][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.808005][ T3852] device bridge_slave_0 left promiscuous mode [ 351.814793][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.837066][ T3852] device veth1_macvtap left promiscuous mode [ 351.843219][ T3852] device veth0_vlan left promiscuous mode [ 352.552347][T10969] device syzkaller0 entered promiscuous mode [ 353.225734][T10981] FAULT_INJECTION: forcing a failure. [ 353.225734][T10981] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 353.243882][T10981] CPU: 0 PID: 10981 Comm: syz.4.3543 Not tainted syzkaller #0 [ 353.251392][T10981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 353.261476][T10981] Call Trace: [ 353.264840][T10981] [ 353.267771][T10981] __dump_stack+0x21/0x24 [ 353.272372][T10981] dump_stack_lvl+0x110/0x170 [ 353.277169][T10981] ? __cfi_dump_stack_lvl+0x8/0x8 [ 353.282199][T10981] dump_stack+0x15/0x24 [ 353.286439][T10981] should_fail_ex+0x3d4/0x520 [ 353.291131][T10981] should_fail+0xb/0x10 [ 353.295289][T10981] should_fail_usercopy+0x1a/0x20 [ 353.300340][T10981] _copy_to_user+0x1e/0x90 [ 353.304867][T10981] simple_read_from_buffer+0xe9/0x160 [ 353.310340][T10981] proc_fail_nth_read+0x1a6/0x220 [ 353.315398][T10981] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 353.321150][T10981] ? security_file_permission+0x94/0xb0 [ 353.326710][T10981] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 353.332252][T10981] vfs_read+0x27a/0x910 [ 353.336486][T10981] ? __cfi_vfs_read+0x10/0x10 [ 353.341156][T10981] ? __kasan_check_write+0x14/0x20 [ 353.346445][T10981] ? mutex_lock+0x93/0x1b0 [ 353.350862][T10981] ? __cfi_mutex_lock+0x10/0x10 [ 353.355708][T10981] ? __fdget_pos+0x2cd/0x380 [ 353.360292][T10981] ? ksys_read+0x71/0x250 [ 353.364617][T10981] ksys_read+0x149/0x250 [ 353.368977][T10981] ? __cfi_ksys_read+0x10/0x10 [ 353.373759][T10981] ? debug_smp_processor_id+0x17/0x20 [ 353.379127][T10981] __x64_sys_read+0x7b/0x90 [ 353.383624][T10981] x64_sys_call+0x2f/0x9a0 [ 353.388031][T10981] do_syscall_64+0x4c/0xa0 [ 353.392458][T10981] ? clear_bhb_loop+0x30/0x80 [ 353.397148][T10981] ? clear_bhb_loop+0x30/0x80 [ 353.401928][T10981] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 353.407836][T10981] RIP: 0033:0x7f01d315d60e [ 353.412256][T10981] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 353.431862][T10981] RSP: 002b:00007f01d3fb2fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 353.440372][T10981] RAX: ffffffffffffffda RBX: 00007f01d3fb36c0 RCX: 00007f01d315d60e [ 353.448555][T10981] RDX: 000000000000000f RSI: 00007f01d3fb30a0 RDI: 0000000000000007 [ 353.456605][T10981] RBP: 00007f01d3fb3090 R08: 0000000000000000 R09: 0000000000000000 [ 353.464768][T10981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.472745][T10981] R13: 00007f01d3416038 R14: 00007f01d3415fa0 R15: 00007fffa145ebb8 [ 353.480830][T10981] [ 353.493739][T10966] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.500914][T10966] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.508586][T10966] device bridge_slave_0 entered promiscuous mode [ 353.516888][T10966] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.524050][T10966] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.531696][T10966] device bridge_slave_1 entered promiscuous mode [ 353.877581][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 353.891448][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.947809][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 353.957338][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.972543][ T452] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.979665][ T452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.987251][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 353.996186][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.005348][ T452] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.012491][ T452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.034438][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 354.055017][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.072273][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 354.100821][T10997] device syzkaller0 entered promiscuous mode [ 354.136806][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 354.171905][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 354.181741][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 354.189872][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 354.268295][ T3852] device bridge_slave_1 left promiscuous mode [ 354.278797][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.287355][ T3852] device bridge_slave_0 left promiscuous mode [ 354.293724][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.308533][ T3852] device veth1_macvtap left promiscuous mode [ 354.315159][ T3852] device veth0_vlan left promiscuous mode [ 354.535322][T10966] device veth0_vlan entered promiscuous mode [ 354.625199][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 354.657211][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 354.782954][T10966] device veth1_macvtap entered promiscuous mode [ 354.837778][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 354.864432][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 354.892432][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 354.938663][T11020] device syzkaller0 entered promiscuous mode [ 354.967912][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 354.999297][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 355.085988][T11022] device syzkaller0 entered promiscuous mode [ 355.140270][T11019] syzkaller0: tun_net_xmit 1280 [ 355.149228][T11019] syzkaller0: create flow: hash 2866486700 index 2 [ 355.189813][T11016] syzkaller0: delete flow: hash 2866486700 index 2 [ 355.970745][T11038] device syzkaller0 entered promiscuous mode [ 356.249102][T11042] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.308172][T11042] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.364130][T11042] device bridge_slave_0 entered promiscuous mode [ 356.464100][T11042] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.475759][T11042] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.483461][T11042] device bridge_slave_1 entered promiscuous mode [ 356.802619][T11069] device syzkaller0 entered promiscuous mode [ 356.839470][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.849243][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.877501][T11071] device syzkaller0 entered promiscuous mode [ 356.916870][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.925648][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.934220][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.941301][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.979159][ T3852] device bridge_slave_1 left promiscuous mode [ 356.989958][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.009790][ T3852] device bridge_slave_0 left promiscuous mode [ 357.023604][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.039516][ T3852] device veth1_macvtap left promiscuous mode [ 357.045931][ T3852] device veth0_vlan left promiscuous mode [ 357.195666][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.203319][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.212150][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.221026][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.228256][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.250774][T11077] device syzkaller0 entered promiscuous mode [ 357.266015][T11082] device syzkaller0 entered promiscuous mode [ 357.290790][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.310417][T11074] syzkaller0: tun_net_xmit 1280 [ 357.324727][T11074] syzkaller0: create flow: hash 2866486700 index 2 [ 357.344055][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.356327][T11073] syzkaller0: delete flow: hash 2866486700 index 2 [ 357.399164][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 357.474388][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 357.489398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.380321][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 360.377825][T11042] device veth0_vlan entered promiscuous mode [ 360.392231][T11042] device veth1_macvtap entered promiscuous mode [ 361.414674][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 361.444443][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 361.460032][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 361.504318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 361.528659][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 362.556819][T11122] device syzkaller0 entered promiscuous mode [ 362.843159][T11123] device syzkaller0 entered promiscuous mode [ 362.860136][T11126] device syzkaller0 entered promiscuous mode [ 363.124798][T11127] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.195809][T11127] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.252650][T11127] device bridge_slave_0 entered promiscuous mode [ 363.492854][T11127] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.509095][T11127] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.534502][T11127] device bridge_slave_1 entered promiscuous mode [ 364.088095][T11182] device syzkaller0 entered promiscuous mode [ 364.102006][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 364.128207][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.201680][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 364.214229][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 364.223018][T10972] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.230207][T10972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.237931][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 364.246619][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 364.258141][T10972] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.265317][T10972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.278393][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 364.287212][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.301743][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 364.422942][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 364.455103][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.479968][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 364.501251][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.541450][T11127] device veth0_vlan entered promiscuous mode [ 364.555218][ T3852] device bridge_slave_1 left promiscuous mode [ 364.563644][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.585099][ T3852] device bridge_slave_0 left promiscuous mode [ 364.601059][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.639912][ T3852] device veth1_macvtap left promiscuous mode [ 364.665248][ T3852] device veth0_vlan left promiscuous mode [ 365.028996][T11127] device veth1_macvtap entered promiscuous mode [ 365.044776][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 365.121351][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 365.152010][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 365.189001][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 365.197652][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 366.204853][ T3852] device bridge_slave_1 left promiscuous mode [ 366.215431][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.243477][ T3852] device bridge_slave_0 left promiscuous mode [ 366.273473][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.305416][ T3852] device veth1_macvtap left promiscuous mode [ 366.331815][ T3852] device veth0_vlan left promiscuous mode [ 366.771943][T11234] device syzkaller0 entered promiscuous mode [ 366.857037][T11237] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.864318][T11237] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.877717][T11237] device bridge_slave_0 entered promiscuous mode [ 366.892998][T11237] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.901192][T11237] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.908979][T11237] device bridge_slave_1 entered promiscuous mode [ 367.134054][T11276] device syzkaller0 entered promiscuous mode [ 367.541576][T11288] device syzkaller0 entered promiscuous mode [ 367.756247][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 367.784645][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.812696][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 367.834473][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.851188][ T540] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.858338][ T540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.866682][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 367.875303][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 367.885863][ T540] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.892932][ T540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.966951][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 367.977739][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 367.987639][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 368.017853][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 368.029055][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 368.219505][T11322] device syzkaller0 entered promiscuous mode [ 368.284263][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 368.293100][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 368.334874][T11237] device veth0_vlan entered promiscuous mode [ 368.372842][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 368.415310][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 368.474518][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 368.482263][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 368.568033][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 368.582724][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 368.601467][T11339] device syzkaller0 entered promiscuous mode [ 368.681346][T11237] device veth1_macvtap entered promiscuous mode [ 368.939729][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 368.947694][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 368.956183][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 369.204786][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 369.213318][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 370.183335][T11370] device syzkaller0 entered promiscuous mode [ 370.240377][T11372] device syzkaller0 entered promiscuous mode [ 370.433210][T11382] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.441479][T11382] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.449263][T11382] device bridge_slave_0 entered promiscuous mode [ 370.475865][T11382] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.482985][T11382] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.490792][T11382] device bridge_slave_1 entered promiscuous mode [ 370.559776][ T3852] device bridge_slave_1 left promiscuous mode [ 370.576881][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.638771][ T3852] device bridge_slave_0 left promiscuous mode [ 370.684814][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.736500][ T3852] device veth1_macvtap left promiscuous mode [ 370.742593][ T3852] device veth0_vlan left promiscuous mode [ 371.542922][T11404] device syzkaller0 entered promiscuous mode [ 371.675656][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 371.695738][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 371.703377][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 371.712204][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 371.720594][T10972] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.727660][T10972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.735688][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 371.744345][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.752876][T10972] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.759958][T10972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.768204][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 371.824493][T11413] device syzkaller0 entered promiscuous mode [ 371.936264][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 372.002986][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 372.091891][T11419] device syzkaller0 entered promiscuous mode [ 372.116352][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 372.140760][T11421] device syzkaller0 entered promiscuous mode [ 372.148899][T11382] device veth0_vlan entered promiscuous mode [ 372.159150][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 372.168752][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 372.177171][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 372.226220][T11382] device veth1_macvtap entered promiscuous mode [ 372.233424][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 372.264920][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 372.273356][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 372.302158][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 372.316991][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 373.384394][ T3852] device bridge_slave_1 left promiscuous mode [ 373.390704][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.398249][ T3852] device bridge_slave_0 left promiscuous mode [ 373.404682][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.412433][ T3852] device veth1_macvtap left promiscuous mode [ 373.418518][ T3852] device veth0_vlan left promiscuous mode [ 373.549880][T11439] device syzkaller0 entered promiscuous mode [ 373.772567][T11448] @: port 1(veth0_to_hsr) entered blocking state [ 373.793954][T11448] @: port 1(veth0_to_hsr) entered disabled state [ 373.814659][T11448] device veth0_to_hsr entered promiscuous mode [ 373.834893][T11449] device wg2 entered promiscuous mode [ 373.878361][T11458] device syzkaller0 entered promiscuous mode [ 374.011310][T11454] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.053920][T11454] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.061690][T11454] device bridge_slave_0 entered promiscuous mode [ 374.114141][T11454] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.138218][T11454] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.158315][T11454] device bridge_slave_1 entered promiscuous mode [ 374.165972][T11471] sock: sock_set_timeout: `syz.2.3697' (pid 11471) tries to set negative timeout [ 374.440324][T11454] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.447528][T11454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 374.454885][T11454] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.461940][T11454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 374.548421][T11481] device syzkaller0 entered promiscuous mode [ 374.586456][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.599724][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.740569][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 374.759316][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 374.814175][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 374.822747][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 374.847853][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.854966][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 374.862954][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 374.871675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 374.886263][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.893523][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 374.902362][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 374.910854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 374.919224][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 374.927653][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 375.169137][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 375.178199][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 375.211227][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 375.219975][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 375.228434][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 375.243976][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 375.350263][T11514] device syzkaller0 entered promiscuous mode [ 375.413293][T11454] device veth0_vlan entered promiscuous mode [ 375.431755][T11519] device syzkaller0 entered promiscuous mode [ 375.447868][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 375.459771][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 375.485632][T11454] device veth1_macvtap entered promiscuous mode [ 375.522493][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 375.532887][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 375.541567][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 375.550444][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 375.559116][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 375.799578][T11529] device pimreg0 entered promiscuous mode [ 376.813149][T11543] device syzkaller0 entered promiscuous mode [ 376.856101][T11551] syz.4.3724[11551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.856235][T11551] syz.4.3724[11551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.929708][T10972] device bridge_slave_1 left promiscuous mode [ 376.951175][T10972] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.962608][T10972] device bridge_slave_0 left promiscuous mode [ 377.006104][T10972] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.042346][T10972] device veth1_macvtap left promiscuous mode [ 377.049207][T10972] device veth0_vlan left promiscuous mode [ 377.640539][T11573] device syzkaller0 entered promiscuous mode [ 377.701649][T11573] syzkaller0: tun_net_xmit 1280 [ 377.707161][T11573] syzkaller0: create flow: hash 2866486700 index 1 [ 377.762292][T11572] syzkaller0: delete flow: hash 2866486700 index 1 [ 377.911711][T11554] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.953451][T11554] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.974911][T11554] device bridge_slave_0 entered promiscuous mode [ 378.027094][T11554] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.065166][T11554] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.074176][T11554] device bridge_slave_1 entered promiscuous mode [ 378.473743][T11554] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.480996][T11554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.488305][T11554] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.495448][T11554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.556169][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.564253][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.573053][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 378.581468][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 378.590957][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 378.601062][ T3852] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.608257][ T3852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.695690][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 378.713205][ T3852] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.720317][ T3852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.758088][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 378.825546][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 378.868666][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 378.910889][T11554] device veth0_vlan entered promiscuous mode [ 378.921761][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 378.939851][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.036170][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.052080][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 379.095198][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 379.113550][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 379.293456][T11554] device veth1_macvtap entered promiscuous mode [ 379.501715][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 379.524693][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 379.534487][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 379.550750][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 379.559567][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 380.524677][ T3852] device bridge_slave_1 left promiscuous mode [ 380.530883][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.564467][ T3852] device bridge_slave_0 left promiscuous mode [ 380.570654][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.633959][ T3852] device veth1_macvtap left promiscuous mode [ 380.640143][ T3852] device veth0_vlan left promiscuous mode [ 381.074867][T11609] device syzkaller0 entered promiscuous mode [ 381.106024][T11609] syzkaller0: tun_net_xmit 1280 [ 381.111031][T11609] syzkaller0: create flow: hash 2866486700 index 1 [ 381.153380][T11607] syzkaller0: delete flow: hash 2866486700 index 1 [ 381.355446][T11625] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.424593][T11625] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.507147][T11625] device bridge_slave_0 entered promiscuous mode [ 381.666821][T11625] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.685078][T11625] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.692456][T11625] device bridge_slave_1 entered promiscuous mode [ 381.980568][T11625] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.987683][T11625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.995007][T11625] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.002085][T11625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.010978][T10972] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.018715][T10972] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.127832][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 382.144314][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.176255][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 382.191880][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 382.200709][T10972] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.207800][T10972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.216388][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 382.225345][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 382.233766][T10972] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.240852][T10972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.286956][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 382.299322][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 382.308231][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 382.317177][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 382.409001][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 382.419168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 382.439678][T11657] device syzkaller0 entered promiscuous mode [ 382.474135][T11625] device veth0_vlan entered promiscuous mode [ 382.503961][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 382.516676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.561401][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.569701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.714495][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 382.723092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 382.734332][T11625] device veth1_macvtap entered promiscuous mode [ 382.800400][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 382.824526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 382.834993][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 382.846550][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 382.857516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 384.234668][ T3852] device bridge_slave_1 left promiscuous mode [ 384.240906][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.248689][ T3852] device bridge_slave_0 left promiscuous mode [ 384.254985][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.262783][ T3852] device veth1_macvtap left promiscuous mode [ 384.269016][ T3852] device veth0_vlan left promiscuous mode [ 384.822394][T11689] device syzkaller0 entered promiscuous mode [ 384.893689][T11686] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.908056][T11686] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.920848][T11686] device bridge_slave_0 entered promiscuous mode [ 385.017683][T11686] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.028664][T11686] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.036798][T11686] device bridge_slave_1 entered promiscuous mode [ 385.777823][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 385.790048][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 385.846883][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 385.904325][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 385.923278][T10972] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.930395][T10972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.955125][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 385.963685][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 385.974550][T10972] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.981698][T10972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 386.035057][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 386.044419][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 386.054258][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 386.109848][T11686] device veth0_vlan entered promiscuous mode [ 386.116610][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 386.134384][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 386.142594][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 386.156883][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 386.178430][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 386.189034][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 386.232850][T11686] device veth1_macvtap entered promiscuous mode [ 386.261271][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 386.274197][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 386.282648][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 386.291430][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 386.301072][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 387.773437][ T3852] device bridge_slave_1 left promiscuous mode [ 387.787600][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.071256][ T3852] device bridge_slave_0 left promiscuous mode [ 388.082931][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.091735][ T3852] device veth1_macvtap left promiscuous mode [ 388.102167][ T3852] device veth0_vlan left promiscuous mode [ 388.651521][T11757] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.664135][T11757] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.704185][T11757] device bridge_slave_0 entered promiscuous mode [ 388.765654][T11757] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.772843][T11757] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.815608][T11757] device bridge_slave_1 entered promiscuous mode [ 389.017956][T11788] device syzkaller0 entered promiscuous mode [ 389.058618][T11757] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.066012][T11757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.073521][T11757] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.080715][T11757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.165837][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 389.179749][ T540] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.189198][ T540] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.210888][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 389.220433][ T540] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.227727][ T540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.261465][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 389.275289][ T540] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.282394][ T540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.300905][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 389.325841][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 389.405931][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 389.415319][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 389.430000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 389.454628][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 389.467575][T11757] device veth0_vlan entered promiscuous mode [ 389.544563][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 389.552500][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 389.596545][T11757] device veth1_macvtap entered promiscuous mode [ 389.962194][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 389.974265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 389.988216][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 390.002966][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 390.018095][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 390.033311][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 390.048642][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 391.064665][ T3852] device bridge_slave_1 left promiscuous mode [ 391.070831][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.078513][ T3852] device bridge_slave_0 left promiscuous mode [ 391.084724][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.092605][ T3852] device veth1_macvtap left promiscuous mode [ 391.099241][ T3852] device veth0_vlan left promiscuous mode [ 391.572930][T11832] device syzkaller0 entered promiscuous mode [ 391.753063][T11844] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.764264][T11844] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.777238][T11844] device bridge_slave_0 entered promiscuous mode [ 391.785605][T11844] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.792994][T11844] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.801057][T11844] device bridge_slave_1 entered promiscuous mode [ 391.833157][T11853] device syzkaller0 entered promiscuous mode [ 391.998176][T11844] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.005393][T11844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.013009][T11844] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.020126][T11844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.042841][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 392.050811][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.064298][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.086843][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 392.095560][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.102715][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.122027][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 392.130629][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.137729][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.162664][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 392.171841][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 392.192611][T11880] device syzkaller0 entered promiscuous mode [ 392.209628][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 392.227247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 392.235585][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 392.242997][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 392.251859][T11844] device veth0_vlan entered promiscuous mode [ 392.293896][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 392.323325][T11844] device veth1_macvtap entered promiscuous mode [ 392.335888][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 392.375660][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 393.504332][ T3852] device bridge_slave_1 left promiscuous mode [ 393.510565][ T3852] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.518157][ T3852] device bridge_slave_0 left promiscuous mode [ 393.524564][ T3852] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.532479][ T3852] device veth1_macvtap left promiscuous mode [ 393.538555][ T3852] device veth0_vlan left promiscuous mode [ 394.201964][T11922] device syzkaller0 entered promiscuous mode [ 394.262638][T11928] device syzkaller0 entered promiscuous mode [ 394.408001][T11926] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.443861][T11926] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.484699][T11926] device bridge_slave_0 entered promiscuous mode [ 394.506581][T11926] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.513921][T11926] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.521522][T11926] device bridge_slave_1 entered promiscuous mode [ 394.678460][T11949] device syzkaller0 entered promiscuous mode [ 395.023469][T11968] device syzkaller0 entered promiscuous mode [ 395.100236][T11971] device syzkaller0 entered promiscuous mode [ 395.216218][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 395.226819][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 395.248233][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 395.268796][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 395.278632][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 395.288664][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 395.340113][ T3852] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.349716][ T3852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.359171][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 395.367818][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 395.376244][ T3852] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.383467][ T3852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.391378][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 395.405796][T11974] device syzkaller0 entered promiscuous mode [ 395.429113][T11983] device syzkaller0 entered promiscuous mode [ 395.448053][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 395.462132][T11926] device veth0_vlan entered promiscuous mode [ 395.476613][T11926] device veth1_macvtap entered promiscuous mode [ 395.549159][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 395.578178][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 395.588303][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 395.596263][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 395.615951][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 395.647437][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 395.693772][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 396.804494][T10972] device bridge_slave_1 left promiscuous mode [ 396.810737][T10972] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.818526][T10972] device bridge_slave_0 left promiscuous mode [ 396.824755][T10972] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.832708][T10972] device veth1_macvtap left promiscuous mode [ 396.838840][T10972] device veth0_vlan left promiscuous mode [ 397.640912][T12010] device syzkaller0 entered promiscuous mode [ 397.754655][T12014] device syzkaller0 entered promiscuous mode [ 398.030088][T12028] device syzkaller0 entered promiscuous mode [ 398.144183][T12031] FAULT_INJECTION: forcing a failure. [ 398.144183][T12031] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 398.214283][T12031] CPU: 0 PID: 12031 Comm: syz.2.3867 Not tainted syzkaller #0 [ 398.221816][T12031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 398.232255][T12031] Call Trace: [ 398.235563][T12031] [ 398.238602][T12031] __dump_stack+0x21/0x24 [ 398.242955][T12031] dump_stack_lvl+0x110/0x170 [ 398.247662][T12031] ? __cfi_dump_stack_lvl+0x8/0x8 [ 398.252760][T12031] ? kasan_set_track+0x60/0x70 [ 398.257558][T12031] ? kasan_save_alloc_info+0x25/0x30 [ 398.262868][T12031] ? __kasan_kmalloc+0x95/0xb0 [ 398.267669][T12031] ? __kmalloc_node_track_caller+0xb1/0x1e0 [ 398.273601][T12031] ? alloc_skb_with_frags+0xa8/0x620 [ 398.279020][T12031] ? sock_alloc_send_pskb+0x87f/0x9a0 [ 398.284520][T12031] ? tun_get_user+0xa63/0x3470 [ 398.289314][T12031] dump_stack+0x15/0x24 [ 398.293594][T12031] should_fail_ex+0x3d4/0x520 [ 398.298306][T12031] should_fail_alloc_page+0x61/0x90 [ 398.303542][T12031] prepare_alloc_pages+0x148/0x600 [ 398.308701][T12031] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 398.313952][T12031] __alloc_pages+0x15b/0x610 [ 398.318658][T12031] ? __cfi___alloc_pages+0x10/0x10 [ 398.323819][T12031] ? __kasan_check_write+0x14/0x20 [ 398.328963][T12031] ? __build_skb_around+0x24f/0x470 [ 398.334216][T12031] ? __alloc_skb+0x2df/0x4b0 [ 398.339021][T12031] alloc_skb_with_frags+0x20c/0x620 [ 398.344286][T12031] sock_alloc_send_pskb+0x87f/0x9a0 [ 398.349596][T12031] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 398.355337][T12031] ? stack_trace_save+0xa6/0xf0 [ 398.360226][T12031] ? iov_iter_advance+0x98/0x1b0 [ 398.365287][T12031] tun_get_user+0xa63/0x3470 [ 398.369909][T12031] ? _parse_integer+0x2a/0x40 [ 398.374770][T12031] ? tun_do_read+0x1cf0/0x1cf0 [ 398.379698][T12031] ? __kasan_check_write+0x14/0x20 [ 398.384923][T12031] ? ref_tracker_alloc+0x31d/0x4a0 [ 398.390154][T12031] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 398.395708][T12031] ? avc_policy_seqno+0x1b/0x70 [ 398.400573][T12031] ? selinux_file_permission+0x2a5/0x510 [ 398.406238][T12031] tun_chr_write_iter+0x1fb/0x300 [ 398.411372][T12031] vfs_write+0x603/0xce0 [ 398.415625][T12031] ? __cfi_vfs_write+0x10/0x10 [ 398.420395][T12031] ? __fget_files+0x2d5/0x330 [ 398.425079][T12031] ? __fdget_pos+0x1f2/0x380 [ 398.429672][T12031] ? ksys_write+0x71/0x250 [ 398.434089][T12031] ksys_write+0x149/0x250 [ 398.438424][T12031] ? __cfi_ksys_write+0x10/0x10 [ 398.443362][T12031] ? debug_smp_processor_id+0x17/0x20 [ 398.448737][T12031] __x64_sys_write+0x7b/0x90 [ 398.453334][T12031] x64_sys_call+0x27b/0x9a0 [ 398.457963][T12031] do_syscall_64+0x4c/0xa0 [ 398.462382][T12031] ? clear_bhb_loop+0x30/0x80 [ 398.467071][T12031] ? clear_bhb_loop+0x30/0x80 [ 398.471751][T12031] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 398.477740][T12031] RIP: 0033:0x7efc0079cdd9 [ 398.482246][T12031] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 398.501856][T12031] RSP: 002b:00007efc0166c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 398.510276][T12031] RAX: ffffffffffffffda RBX: 00007efc00a16090 RCX: 00007efc0079cdd9 [ 398.518260][T12031] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000007 [ 398.526252][T12031] RBP: 00007efc0166c090 R08: 0000000000000000 R09: 0000000000000000 [ 398.534232][T12031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 398.542209][T12031] R13: 00007efc00a16128 R14: 00007efc00a16090 R15: 00007ffe5fc31758 [ 398.550194][T12031] [ 398.569434][T12025] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.587308][T12025] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.594975][T12025] device bridge_slave_0 entered promiscuous mode [ 398.618068][T12025] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.625576][T12025] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.633123][T12025] device bridge_slave_1 entered promiscuous mode [ 398.860175][T12025] device veth0_vlan entered promiscuous mode [ 398.887103][T12048] syz.0.3873[12048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.887212][T12048] syz.0.3873[12048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.887696][T12044] device syzkaller0 entered promiscuous mode [ 398.917167][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 398.926185][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 398.934705][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 398.942475][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 398.950420][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 398.958574][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 398.966950][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 398.975273][ T3852] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.982383][ T3852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.990083][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 398.998506][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 399.007125][ T3852] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.014275][ T3852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.023918][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 399.032820][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 399.041042][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 399.049128][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 399.057192][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 399.068782][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 399.077376][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 399.093125][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 399.281405][T12051] device syzkaller0 entered promiscuous mode [ 399.339794][T12025] device veth1_macvtap entered promiscuous mode [ 399.355792][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 399.368234][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 399.395749][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 399.412338][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 404.573331][T12103] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.611110][T12103] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.619236][T12103] device bridge_slave_0 entered promiscuous mode [ 404.629697][T12103] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.636972][T12103] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.644872][T12103] device bridge_slave_1 entered promiscuous mode [ 404.738771][T12103] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.745997][T12103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.753298][T12103] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.760473][T12103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 404.788197][T12141] bridge0: port 3(gretap0) entered blocking state [ 404.795582][T12141] bridge0: port 3(gretap0) entered disabled state [ 404.802993][T12141] device gretap0 entered promiscuous mode [ 404.824099][T12141] bridge0: port 3(gretap0) entered blocking state [ 404.830787][T12141] bridge0: port 3(gretap0) entered forwarding state [ 404.930856][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.965502][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.994188][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 405.007068][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 405.064234][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 405.073765][ T540] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.080885][ T540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.092386][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 405.102503][ T540] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.109719][ T540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.221381][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 405.311832][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 405.378333][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 405.430260][T12103] device veth0_vlan entered promiscuous mode [ 405.443285][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.458404][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 405.480089][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 405.522585][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 405.572537][T12103] device veth1_macvtap entered promiscuous mode [ 405.615786][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 405.624719][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 405.644358][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 405.653077][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 405.959348][T10972] device bridge_slave_1 left promiscuous mode [ 405.985540][T10972] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.026553][T10972] device bridge_slave_0 left promiscuous mode [ 406.032865][T10972] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.179888][T10972] device veth1_macvtap left promiscuous mode [ 406.243940][T10972] device veth0_vlan left promiscuous mode [ 407.514771][T10972] device bridge_slave_1 left promiscuous mode [ 407.521104][T10972] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.528643][T10972] device bridge_slave_0 left promiscuous mode [ 407.534958][T10972] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.542886][T10972] device veth1_macvtap left promiscuous mode [ 407.549009][T10972] device veth0_vlan left promiscuous mode [ 408.135279][T12201] bridge0: port 3(gretap0) entered disabled state [ 408.141838][T12201] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.149055][T12201] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.161617][T12201] bridge0: port 3(gretap0) entered blocking state [ 408.168238][T12201] bridge0: port 3(gretap0) entered forwarding state [ 408.175153][T12201] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.182283][T12201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.189617][T12201] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.196957][T12201] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.263878][T12201] device bridge0 entered promiscuous mode [ 408.460267][T12202] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.467971][T12202] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.475790][T12202] device bridge_slave_0 entered promiscuous mode [ 408.483060][T12202] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.490207][T12202] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.497738][T12202] device bridge_slave_1 entered promiscuous mode [ 408.649184][T12202] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.656319][T12202] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.663893][T12202] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.671036][T12202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.700111][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 408.739229][T10972] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.746743][T10972] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.788539][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 408.800315][T10972] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.807597][T10972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.835343][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 408.849339][T10972] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.856492][T10972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.891089][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 408.927818][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 408.973036][T12202] device veth0_vlan entered promiscuous mode [ 408.997572][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 409.014342][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 409.022837][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 409.051148][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 409.128392][T12202] device veth1_macvtap entered promiscuous mode [ 409.154673][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 409.166710][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 409.180232][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 409.209947][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 409.242574][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 409.303126][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 409.344568][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 409.353371][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 409.374618][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 409.475252][T12234] -1: renamed from syzkaller0 [ 410.474655][ T540] device bridge_slave_1 left promiscuous mode [ 410.480822][ T540] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.488401][ T540] device bridge_slave_0 left promiscuous mode [ 410.494610][ T540] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.502418][ T540] device veth1_macvtap left promiscuous mode [ 410.508520][ T540] device veth0_vlan left promiscuous mode [ 411.536363][T12245] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 411.587218][T12245] device syzkaller0 entered promiscuous mode [ 411.649266][T12252] device syzkaller0 entered promiscuous mode [ 411.656224][T12245] device syzkaller0 left promiscuous mode [ 411.777625][T12251] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.786299][T12251] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.794146][T12251] device bridge_slave_0 entered promiscuous mode [ 411.815383][T12265] FAULT_INJECTION: forcing a failure. [ 411.815383][T12265] name failslab, interval 1, probability 0, space 0, times 0 [ 411.825081][T12251] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.836373][T12251] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.846612][T12251] device bridge_slave_1 entered promiscuous mode [ 411.894775][T12265] CPU: 1 PID: 12265 Comm: syz.1.3938 Not tainted syzkaller #0 [ 411.902316][T12265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 411.912488][T12265] Call Trace: [ 411.915793][T12265] [ 411.918827][T12265] __dump_stack+0x21/0x24 [ 411.923175][T12265] dump_stack_lvl+0x110/0x170 [ 411.927870][T12265] ? __cfi_dump_stack_lvl+0x8/0x8 [ 411.932912][T12265] ? stack_trace_save+0xa6/0xf0 [ 411.937784][T12265] dump_stack+0x15/0x24 [ 411.941951][T12265] should_fail_ex+0x3d4/0x520 [ 411.946671][T12265] __should_failslab+0xac/0xf0 [ 411.951453][T12265] should_failslab+0x9/0x20 [ 411.955969][T12265] kmem_cache_alloc_node+0x42/0x340 [ 411.961365][T12265] ? dup_task_struct+0x5a/0x7e0 [ 411.966239][T12265] dup_task_struct+0x5a/0x7e0 [ 411.970935][T12265] ? __kasan_check_write+0x14/0x20 [ 411.976062][T12265] copy_process+0x5d6/0x3510 [ 411.980682][T12265] ? __kasan_check_write+0x14/0x20 [ 411.985851][T12265] ? idle_dummy+0x10/0x10 [ 411.990380][T12265] kernel_clone+0x22f/0x820 [ 411.994926][T12265] ? __cfi_kernel_clone+0x10/0x10 [ 411.999987][T12265] ? __kasan_check_write+0x14/0x20 [ 412.005128][T12265] ? mutex_unlock+0x8f/0x230 [ 412.009753][T12265] __x64_sys_clone+0x193/0x200 [ 412.014548][T12265] ? __cfi___x64_sys_clone+0x10/0x10 [ 412.019864][T12265] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 412.026136][T12265] x64_sys_call+0x990/0x9a0 [ 412.030663][T12265] do_syscall_64+0x4c/0xa0 [ 412.035093][T12265] ? clear_bhb_loop+0x30/0x80 [ 412.039794][T12265] ? clear_bhb_loop+0x30/0x80 [ 412.044580][T12265] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 412.050576][T12265] RIP: 0033:0x7f0af139cdd9 [ 412.055114][T12265] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 412.075011][T12265] RSP: 002b:00007f0af21befd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 412.083448][T12265] RAX: ffffffffffffffda RBX: 00007f0af1615fa0 RCX: 00007f0af139cdd9 [ 412.091518][T12265] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001000000 [ 412.099506][T12265] RBP: 00007f0af21bf090 R08: 0000000000000000 R09: 0000000000000000 [ 412.107493][T12265] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 412.115484][T12265] R13: 00007f0af1616038 R14: 00007f0af1615fa0 R15: 00007ffe6f2af5a8 [ 412.123649][T12265] [ 413.361138][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 413.369105][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 413.411184][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 413.430621][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 413.448875][T10972] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.456008][T10972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.523739][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 413.548597][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 413.559277][T10972] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.566411][T10972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.623283][T12293] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 413.652923][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 413.681697][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 413.690272][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 413.700029][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 413.708766][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 413.755585][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 413.765983][T10972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 413.805478][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 413.817196][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 413.829382][T12251] device veth0_vlan entered promiscuous mode [ 413.852359][T12303] device syzkaller0 entered promiscuous mode [ 413.859561][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 413.871828][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 413.930190][T12251] device veth1_macvtap entered promiscuous mode [ 413.960225][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 413.970645][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 413.983521][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 413.997067][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 414.024434][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 414.247685][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 414.256769][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 414.459219][T12318] FAULT_INJECTION: forcing a failure. [ 414.459219][T12318] name failslab, interval 1, probability 0, space 0, times 0 [ 414.472150][T12318] CPU: 1 PID: 12318 Comm: syz.1.3953 Not tainted syzkaller #0 [ 414.479736][T12318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 414.489975][T12318] Call Trace: [ 414.493351][T12318] [ 414.496275][T12318] __dump_stack+0x21/0x24 [ 414.500775][T12318] dump_stack_lvl+0x110/0x170 [ 414.505441][T12318] ? __cfi_dump_stack_lvl+0x8/0x8 [ 414.510481][T12318] dump_stack+0x15/0x24 [ 414.514629][T12318] should_fail_ex+0x3d4/0x520 [ 414.519486][T12318] ? prepare_creds+0x2f/0x640 [ 414.524259][T12318] __should_failslab+0xac/0xf0 [ 414.529055][T12318] should_failslab+0x9/0x20 [ 414.533748][T12318] kmem_cache_alloc+0x3b/0x330 [ 414.538680][T12318] prepare_creds+0x2f/0x640 [ 414.543180][T12318] ? memset_erms+0x9/0x10 [ 414.547815][T12318] copy_creds+0xe4/0x640 [ 414.552076][T12318] copy_process+0x84b/0x3510 [ 414.556839][T12318] ? _raw_spin_unlock+0x4c/0x70 [ 414.561688][T12318] ? perf_event_context_sched_in+0x505/0x600 [ 414.567662][T12318] ? idle_dummy+0x10/0x10 [ 414.572001][T12318] ? __perf_event_task_sched_in+0x1a0/0x1f0 [ 414.577887][T12318] kernel_clone+0x22f/0x820 [ 414.582385][T12318] ? __cfi_kernel_clone+0x10/0x10 [ 414.587411][T12318] ? finish_task_switch+0x209/0x7b0 [ 414.592631][T12318] __x64_sys_clone+0x193/0x200 [ 414.597472][T12318] ? __cfi___x64_sys_clone+0x10/0x10 [ 414.602778][T12318] ? __kasan_check_write+0x14/0x20 [ 414.607901][T12318] ? fpregs_restore_userregs+0x128/0x260 [ 414.613640][T12318] ? switch_fpu_return+0xe/0x10 [ 414.618624][T12318] x64_sys_call+0x990/0x9a0 [ 414.623160][T12318] do_syscall_64+0x4c/0xa0 [ 414.627578][T12318] ? clear_bhb_loop+0x30/0x80 [ 414.632355][T12318] ? clear_bhb_loop+0x30/0x80 [ 414.637027][T12318] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 414.642915][T12318] RIP: 0033:0x7f0af139cdd9 [ 414.647321][T12318] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 414.667095][T12318] RSP: 002b:00007f0af21befd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 414.675643][T12318] RAX: ffffffffffffffda RBX: 00007f0af1615fa0 RCX: 00007f0af139cdd9 [ 414.683698][T12318] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001000000 [ 414.691925][T12318] RBP: 00007f0af21bf090 R08: 0000000000000000 R09: 0000000000000000 [ 414.699984][T12318] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 414.707960][T12318] R13: 00007f0af1616038 R14: 00007f0af1615fa0 R15: 00007ffe6f2af5a8 [ 414.716021][T12318] [ 415.284370][ T452] device bridge_slave_1 left promiscuous mode [ 415.290504][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.297966][ T452] device bridge_slave_0 left promiscuous mode [ 415.304147][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.311782][ T452] device veth1_macvtap left promiscuous mode [ 415.317857][ T452] device veth0_vlan left promiscuous mode [ 416.792718][T12331] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 417.148010][T12346] device syzkaller0 entered promiscuous mode [ 417.451025][T12337] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.463889][T12337] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.471583][T12337] device bridge_slave_0 entered promiscuous mode [ 417.519507][T12337] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.537152][T12337] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.552241][T12337] device bridge_slave_1 entered promiscuous mode [ 417.786075][T12371] FAULT_INJECTION: forcing a failure. [ 417.786075][T12371] name failslab, interval 1, probability 0, space 0, times 0 [ 417.803016][T12371] CPU: 1 PID: 12371 Comm: syz.1.3969 Not tainted syzkaller #0 [ 417.810518][T12371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 417.820662][T12371] Call Trace: [ 417.823959][T12371] [ 417.826904][T12371] __dump_stack+0x21/0x24 [ 417.831248][T12371] dump_stack_lvl+0x110/0x170 [ 417.836112][T12371] ? __cfi_dump_stack_lvl+0x8/0x8 [ 417.841144][T12371] dump_stack+0x15/0x24 [ 417.845308][T12371] should_fail_ex+0x3d4/0x520 [ 417.850768][T12371] __should_failslab+0xac/0xf0 [ 417.855841][T12371] ? security_prepare_creds+0x4e/0x150 [ 417.861334][T12371] should_failslab+0x9/0x20 [ 417.865956][T12371] __kmem_cache_alloc_node+0x3d/0x2c0 [ 417.871345][T12371] ? security_prepare_creds+0x4e/0x150 [ 417.876853][T12371] __kmalloc+0xa1/0x1e0 [ 417.881116][T12371] ? prepare_creds+0x2f/0x640 [ 417.885900][T12371] security_prepare_creds+0x4e/0x150 [ 417.891195][T12371] prepare_creds+0x456/0x640 [ 417.895791][T12371] copy_creds+0xe4/0x640 [ 417.900218][T12371] copy_process+0x84b/0x3510 [ 417.904909][T12371] ? __kasan_check_write+0x14/0x20 [ 417.910206][T12371] ? idle_dummy+0x10/0x10 [ 417.914569][T12371] kernel_clone+0x22f/0x820 [ 417.919382][T12371] ? __cfi_kernel_clone+0x10/0x10 [ 417.924513][T12371] ? __kasan_check_write+0x14/0x20 [ 417.929635][T12371] ? mutex_unlock+0x8f/0x230 [ 417.934248][T12371] __x64_sys_clone+0x193/0x200 [ 417.939208][T12371] ? __cfi___x64_sys_clone+0x10/0x10 [ 417.944739][T12371] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 417.950900][T12371] x64_sys_call+0x990/0x9a0 [ 417.955416][T12371] do_syscall_64+0x4c/0xa0 [ 417.960417][T12371] ? clear_bhb_loop+0x30/0x80 [ 417.965104][T12371] ? clear_bhb_loop+0x30/0x80 [ 417.969862][T12371] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 417.975775][T12371] RIP: 0033:0x7f0af139cdd9 [ 417.980198][T12371] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 417.999903][T12371] RSP: 002b:00007f0af21befd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 418.008341][T12371] RAX: ffffffffffffffda RBX: 00007f0af1615fa0 RCX: 00007f0af139cdd9 [ 418.016432][T12371] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001000000 [ 418.024703][T12371] RBP: 00007f0af21bf090 R08: 0000000000000000 R09: 0000000000000000 [ 418.032719][T12371] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 418.040702][T12371] R13: 00007f0af1616038 R14: 00007f0af1615fa0 R15: 00007ffe6f2af5a8 [ 418.048683][T12371] [ 418.210548][T12377] device syzkaller0 entered promiscuous mode [ 418.402008][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 418.424527][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 418.508089][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 418.517237][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 418.526174][ T452] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.533239][ T452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.541246][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 418.550048][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 418.558435][ T452] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.565486][ T452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.655553][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 418.686292][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 418.704277][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 418.712509][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 418.721304][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 418.729946][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 418.738750][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 418.772578][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 418.783196][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 418.791135][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 418.810518][T12337] device veth0_vlan entered promiscuous mode [ 418.834992][T12388] device syzkaller0 entered promiscuous mode [ 418.901531][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 418.912018][T12337] device veth1_macvtap entered promiscuous mode [ 418.923681][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 418.948618][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 418.965273][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 418.974082][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 419.001599][T12396] ref_ctr_offset mismatch. inode: 0x3e5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 419.794299][ T452] device bridge_slave_1 left promiscuous mode [ 419.800490][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.808245][ T452] device bridge_slave_0 left promiscuous mode [ 419.814597][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.822604][ T452] device veth1_macvtap left promiscuous mode [ 419.828716][ T452] device veth0_vlan left promiscuous mode [ 421.594997][ T6136] device syz_tun left promiscuous mode [ 421.600542][ T6136] GPL: port 1(syz_tun) entered disabled state [ 422.222940][T12421] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.356509][T12421] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.384328][T12421] device bridge_slave_0 entered promiscuous mode [ 422.472585][T12421] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.489849][T12421] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.514343][T12421] device bridge_slave_1 entered promiscuous mode [ 422.745403][ T452] bridge0: port 3(gretap0) entered disabled state [ 422.754762][ T452] device gretap0 left promiscuous mode [ 422.760314][ T452] bridge0: port 3(gretap0) entered disabled state [ 423.222319][ T452] device bridge_slave_1 left promiscuous mode [ 423.233678][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.310172][ T452] device bridge_slave_0 left promiscuous mode [ 423.370163][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.447688][ T452] device veth1_macvtap left promiscuous mode [ 423.477577][ T452] device veth0_vlan left promiscuous mode [ 423.757844][T12434] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.773958][T12434] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.801522][T12434] device bridge_slave_0 entered promiscuous mode [ 423.884541][T12434] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.892849][T12434] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.909142][T12434] device bridge_slave_1 entered promiscuous mode [ 424.054402][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 424.067190][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 424.084848][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 424.093324][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 424.106270][ T540] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.113461][ T540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.130741][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 424.144966][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 424.161807][ T540] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.169015][ T540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.209292][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 424.251104][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 424.264748][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 424.303836][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 424.333997][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 424.356118][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 424.374221][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 424.404286][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 424.423997][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 424.432512][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 424.464245][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 424.476358][T12421] device veth0_vlan entered promiscuous mode [ 424.546290][T12463] device syzkaller0 entered promiscuous mode [ 424.570442][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 424.585407][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 424.609324][T12421] device veth1_macvtap entered promiscuous mode [ 424.630425][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 424.644170][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 424.663996][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 424.678908][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 424.694587][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 424.748169][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 424.774210][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 424.782686][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 424.804443][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 424.824171][ T540] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.831259][ T540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.843996][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 424.864000][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 424.874050][ T540] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.881312][ T540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.904058][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 424.930299][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 424.944170][ T540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 425.034009][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 425.047693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 425.133981][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 425.164125][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 425.189663][T12434] device veth0_vlan entered promiscuous mode [ 425.208725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 425.217474][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 425.281036][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 425.288784][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 425.297969][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 425.307733][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 425.317234][T12434] device veth1_macvtap entered promiscuous mode [ 425.347634][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 425.368666][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 425.394304][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 425.433446][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 425.457182][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=3 req=3504 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 425.479132][ T28] audit: type=1400 audit(1778533114.184:163): avc: denied { write } for pid=250 comm="syz-executor" path="pipe:[14977]" dev="pipefs" ino=14977 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 426.364901][ T452] device bridge_slave_1 left promiscuous mode [ 426.371172][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.378715][ T452] device bridge_slave_0 left promiscuous mode [ 426.384881][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.392742][ T452] device bridge_slave_1 left promiscuous mode [ 426.399125][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.406677][ T452] device bridge_slave_0 left promiscuous mode [ 426.412801][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.421108][ T452] device veth1_macvtap left promiscuous mode [ 426.427209][ T452] device veth0_vlan left promiscuous mode [ 426.433337][ T452] device veth1_macvtap left promiscuous mode [ 426.439448][ T452] device veth0_vlan left promiscuous mode [ 427.374399][ T452] device veth0_to_hsr left promiscuous mode [ 427.380378][ T452] @: port 1(veth0_to_hsr) entered disabled state [ 427.387553][ T452] device bridge_slave_1 left promiscuous mode [ 427.393657][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.402101][ T452] device bridge_slave_0 left promiscuous mode [ 427.408418][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.416383][ T452] device bridge_slave_1 left promiscuous mode [ 427.422610][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.430132][ T452] device bridge_slave_0 left promiscuous mode [ 427.436405][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.444233][ T452] device bridge_slave_1 left promiscuous mode [ 427.450336][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.457827][ T452] device bridge_slave_0 left promiscuous mode [ 427.464074][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.472145][ T452] device veth1_macvtap left promiscuous mode [ 427.478320][ T452] device veth0_vlan left promiscuous mode [ 427.484342][ T452] device veth1_macvtap left promiscuous mode [ 427.490336][ T452] device veth0_vlan left promiscuous mode [ 427.496334][ T452] device veth1_macvtap left promiscuous mode [ 430.335323][ T28] audit: type=1400 audit(1778533119.044:164): avc: denied { read } for pid=12479 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 193) OK Stopping crond: stopped /usr/sbin/crond (pid 186) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 140) [ 430.564603][ T28] audit: type=1400 audit(1778533119.274:165): avc: denied { search } for pid=12491 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 430.678587][ T28] audit: type=1400 audit(1778533119.384:166): avc: denied { write } for pid=141 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 430.703386][ T28] audit: type=1400 audit(1778533119.384:167): avc: denied { remove_name } for pid=141 comm="dhcpcd" name="sock" dev="tmpfs" ino=491 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 430.726843][ T28] audit: type=1400 audit(1778533119.384:168): avc: denied { unlink } for pid=141 comm="dhcpcd" name="sock" dev="tmpfs" ino=491 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 430.749348][ T28] audit: type=1400 audit(1778533119.384:169): avc: denied { unlink } for pid=141 comm="dhcpcd" name="pid" dev="tmpfs" ino=490 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping iptables: [ 430.786038][ T28] audit: type=1400 audit(1778533119.494:170): avc: denied { search } for pid=12505 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 430.808041][ T28] audit: type=1400 audit(1778533119.494:171): avc: denied { write } for pid=12505 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 430.830472][ T28] audit: type=1400 audit(1778533119.494:172): avc: denied { add_name } for pid=12505 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 430.852474][ T28] audit: type=1400 audit(1778533119.494:173): avc: denied { create } for pid=12505 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 Stopping system [ 430.874414][ T28] audit: type=1400 audit(1778533119.494:174): avc: denied { read open } for pid=12505 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=12210 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 message bus: done Stopping klogd: OK Stopping acpid: OK Stopping syslogd: stopped /sbin/syslogd (pid 84) OK umount: devtmpfs busy - remounted read-only [ 432.262936][T12525] EXT4-fs (sda1): re-mounted. Quota mode: none. The system is going down NOW! Sent SIGKILL to all processes Requesting system poweroff [ 434.305292][T12526] kvm: exiting hardware virtualization [ 434.312861][T12526] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 434.319743][T12526] ACPI: PM: Preparing to enter system sleep state S5 [ 434.327130][T12526] reboot: Power down serialport: VM disconnected.