last executing test programs: 24.801466495s ago: executing program 2 (id=1130): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x85, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="0000000000000000660000007fffffff180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b26f8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000021aa0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x6f) 21.315988256s ago: executing program 2 (id=1130): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x85, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="0000000000000000660000007fffffff180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b26f8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000021aa0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x6f) 15.92154626s ago: executing program 2 (id=1130): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x85, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="0000000000000000660000007fffffff180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b26f8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000021aa0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x6f) 11.757643174s ago: executing program 2 (id=1130): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x85, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="0000000000000000660000007fffffff180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b26f8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000021aa0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x6f) 8.430367962s ago: executing program 1 (id=1531): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0xb0}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x2a}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) syz_open_procfs$namespace(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r3}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r3, &(0x7f0000000600), &(0x7f0000000080)=""/61}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000580)=@base={0xf, 0x4, 0x4, 0x20002, 0x0, 0x1, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 8.428307432s ago: executing program 0 (id=1542): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7}, [@printk={@lx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r1, &(0x7f0000000100), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000400000008000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r5, 0xc0189436, &(0x7f0000000000)={'bond_slave_0\x00', @random='\\\x00\x00 \x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x83, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000380000003800000007000000050000000000000700000000000000000000000402000000000000000000000a01000000000000000100000d000000000000000003000000000000000061"], 0x0, 0x57}, 0x20) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0x64}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r8}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 7.763657655s ago: executing program 1 (id=1535): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xcb3}, 0x102624, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000e4ef1f00810000007f00000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000040), 0x6, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000f00)='kfree\x00', r4}, 0x18) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r2, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) sendmsg$tipc(r1, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x1a9) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000003c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="0b00000005000000580000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000872daeb4c92168e854374811fdd324fe90f09a1c72896cfd9a59910007c0cc407603c906a826b1ceba3643f3d5d6ee19bc3e186a07d837d2036afae7"], 0x50) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000002c0)=r7, 0x4) openat$cgroup_subtree(r9, &(0x7f0000000240), 0x2, 0x0) 7.490261217s ago: executing program 0 (id=1537): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xcb3}, 0x102624, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000e4ef1f00810000007f00000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000040), 0x6, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000f00)='kfree\x00', r4}, 0x18) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r2, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) sendmsg$tipc(r1, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x1a9) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000003c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="0b00000005000000580000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000872daeb4c92168e854374811fdd324fe90f09a1c72896cfd9a59910007c0cc407603c906a826b1ceba3643f3d5d6ee19bc3e186a07d837d2036afae7"], 0x50) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000002c0)=r7, 0x4) openat$cgroup_subtree(r9, &(0x7f0000000240), 0x2, 0x0) 7.121084277s ago: executing program 4 (id=1538): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xd, 0x4, 0x4, 0x7, 0x0, r0, 0x10000}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x5452, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x100) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xbd}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9107}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_retopts={{0xc0, 0x0, 0x7, {[@rr={0x7, 0x13, 0x87, [@empty, @multicast1, @multicast2, @local]}, @ssrr={0x89, 0x7, 0x45, [@loopback]}, @rr={0x7, 0x13, 0xe5, [@local, @rand_addr=0x64010100, @multicast1, @rand_addr=0x64010102]}, @cipso={0x86, 0x69, 0xffffffffffffffff, [{0x5, 0x10, "0e986c1d6fc97a785ae353f2fb27"}, {0x6, 0xe, "6e2b13f3f7caae8bc2edd7a2"}, {0x6, 0xe, "9e747bdbd9a33edb807c17b9"}, {0x7, 0xd, "753e4da76779621b1819a6"}, {0x0, 0xc, "626466baec46143be8bf"}, {0x2, 0x11, "4e43ff1d7a0248cefdd165a419735f"}, {0x7, 0xd, "de1dfbdd8a6b4c7bbdbc55"}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x13, 0xe8, [@local, @multicast1, @local, @broadcast]}]}}}], 0x120}, 0x44) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r2, &(0x7f0000000080), 0x0}, 0x20) 6.987057308s ago: executing program 4 (id=1550): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa0677"], 0xfdef) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xffc0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xb, &(0x7f0000000500)=ANY=[@ANYRESOCT=r6, @ANYRES8=r6, @ANYRESHEX=0x0, @ANYRESDEC=r0, @ANYBLOB="cc25dc5b7c640952e5af131a63d78ca16afa87985f31dc6ce45766366b22c2044b7d1e60cffcffffffffffffff52f1145017c439f72a908c42ece16e029f9468e0df84e02132755979bdb943085afed3243a6b11d049f43f7c0659d042940edd7f567f9a944f0fd9d14cbfd83a31977492", @ANYRESDEC=r3, @ANYRES16=r5, @ANYRES32=r7], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) r9 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r10 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r10, 0x0, 0x0) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r11, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000004000000002e0255"], 0x0, 0x1c}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, 0xffffffffffffffff, 0x1, r9, 0x7) 6.144555806s ago: executing program 4 (id=1541): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0xb0}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x2a}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) syz_open_procfs$namespace(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r2, &(0x7f0000000600), &(0x7f0000000080)=""/61}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000580)=@base={0xf, 0x4, 0x4, 0x20002, 0x0, 0x1, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 5.740495338s ago: executing program 2 (id=1130): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x85, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="0000000000000000660000007fffffff180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b26f8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000021aa0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x6f) 3.611874479s ago: executing program 0 (id=1543): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7}, [@printk={@lx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r1, &(0x7f0000000100), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000400000008000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r5, 0xc0189436, &(0x7f0000000000)={'bond_slave_0\x00', @random='\\\x00\x00 \x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x83, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000380000003800000007000000050000000000000700000000000000000000000402000000000000000000000a01000000000000000100000d000000000000000003000000000000000061"], 0x0, 0x57}, 0x20) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0x64}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r8}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 3.611313069s ago: executing program 1 (id=1544): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000200000d02000000000000000200000000000000000000000000000000000002"], &(0x7f0000000040)=""/202, 0x42, 0xca, 0x1}, 0x20) (fail_nth: 12) 3.60726419s ago: executing program 4 (id=1546): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x8, 0x5, 0xfff, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={&(0x7f0000000200)="a12fceaa7fff194851e456842e032b5745a3b45923cdc30be7eea9c1ebe4672aaaa04f2078447bd3029c350a57b7c6bdad9ee7d6ba176fd5ba29062d073d123c202c4577f8df9216361cd1caedb0f45543591eb593c6d396fd25d1fcaa01dd2aee8371e2889a9f874ff67489f5423ff658f85d694098c9eaca758f22e1c6722f5e4f5d8d688350c11a1f686aa667b92e31a06b1d720b2cb0b69c074106ed56c76312c3347eb510d352b547bd4128eb524787c3c952", &(0x7f00000002c0)=""/149, &(0x7f0000000040)="c0c534ab2844", &(0x7f0000000080)="ff0fd51d70b1e19b885bb7b07e6d917e99d14807ca8faf09", 0x7, r2, 0x4}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) 3.585521411s ago: executing program 4 (id=1547): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0x1}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x28, 0x0, 0x4, &(0x7f0000000000)={0xffffffffffffffff}) write$cgroup_devices(r0, 0x0, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000004000000040000000600000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000400"/28], 0x50) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = syz_clone(0x301000, &(0x7f0000000b40)="52e490eb23bde48b677bc019869030cd27ec32759016b9739017dbdc0d3276d3a3bc44fe450ac62543fab8cf0918c551cc2187dc16d1373ebfe74c27b83392acbf53533bce599c29c88d93509026ab9c05052d28a434ec63a65350848688d98ce3cbcb59c550eb2084e49d5c94fb2ac8a921ab1d88bf5edaf2cb5196cca3f0c7090488d68260c59a15289ab25124269db1986e57b48911f4883d5c3e85185b294d3c1f2e317cd63c4585d0c359f7b7eb85140fbab4eb133036af0b1eb75835c46167ccd9dbc17808251d410b11c9db6208fd8fd31238e8f707a5595156c518344938821ef191d990c8ce7b9054972a987b23da7b21237acafcbf6eba3deaf48034376984756aea49957c0be1129a8dbb3f8c9344f30c1b8852078eb6042dfaca026308d060cc65bd755e20f1ec198f860850ec35d89fa22c2efbccaece14d901fb8aca3d1a92330b45faaf93af22e06f7306b57bd7bb7428cb51eb767d3bd0b996f1c77b3a489b58e227d2e7145cfc67e6dd457591a13587866ab0e28693c434238ee9e0881fd98ac651b5857d4cf3fd86c7a20dfbaf8d2e84153e3562e9cc61a23ab57868e61c8db7047d64fbf387fc60732c4ac674895e42b444da6b2903467ff2386d73a562220a446d89b41cfece86cf39205f3ab2e78ec46cda2aaa01ef7ab54bb6a5084ffae0cb4cc28708a6ed23b539381503e07fb09d36308c9cb1b0def07099b826127b5bfa4eda52f01835b5903d312612bf9bdee11b236c0685cd2a0711c9bc75bebb6d1f99a1fbfe015da534b0ce7637cb827cf965701287c8c0a994f4551cbed8eb3b99bce4b2e8171f736747c823a2c9296fc32043b33b26335304f1d839bb47dba38c6b7107ad08f8a6c9675791f4bb2b70be03df198b30a0242adb8b7f58c778823e39bafa4ce59056ab6b00b2c05d997112796eb810f9b250d902706797d955bb1766ce5b0e86d167d06259ad5449c2e1078903ecd47f6bc82cccf29ab1940e42df10d9d696f1ad682a10c12cd28055ed5cdb3a2da4e408d20ea5bb8025d4c70f2976bdfe5048b388e80dff40b7fdd7383c0ad2dae231f42942e36bb4ec40250580619027448837c4eeab2484cc56492b6618063387b57a9c816a18f29f1ae4b820ec2ced48698dcbb9db2302a56dc660c671ef6713324b952853a25f50c89351f789ba073d2043e3841015799789d4abaa54facfa6694b57dcebbd320eeb5ea57aa532de40f766c0e748e4e554449ae232436f9f01770b5baf99c724f7b2318990aff0f9a81139f1105fb42b2185f5744eec08ced34de01b20e88693e5cca29421a62990997f6db90555d92cdbbfa5a7a68ee3092bc81dc32e4b9da248ad2ceab3ee9e5fe93c65490da15e94cf391b78f3c1966c9bca153c520b99e0065d46a6a3e1588620a16acf751ca06b0e5359dd4d5ed9a7cbb2ebee3e6176e65d44b4dcb5a105c562de9267568daadf3e4a82d9495bccb92a8b072afd5c1ecae7ee618d98f0cd2331563b49d5a2c952a486a9a924fb17d7ef38e3431670802b519f4d91ad88f8f70d015600cf6168a63fcf793188271656b9edff34531dc83b8c12e4cffa84a6eae7db1edb940e12cff2a9ca40c09e1239630d216ed1b1055aa30fb1ba7cd43f6ea05f1d3f0b7d10fff0792e2aef00c278c168bbcde5667b73030dc18e30339ff0e5f3c04863e80c285c0f3b66b4655965b7cdd371aade8e9574b663311318959112236ee62a86dd925e731deaed920829908a6090249920b65b48bc59b2adbce3522b20c1a853bd593da0cf5920119a697fd3f244d2e6833844640f70431cb9e82e9d19bb50970eca302025bc66b88ed945cea6be3449285b744c8d61ea223163abd8f3323abe89f14a3cdbbd68d21d720739294aee9122ef276c95d21fe2f9681fa2c1cc5116b1372829d88a9b7f63da28022b99e43a1654e665d4f993184f5adef0b2eddf78a29492d53d4be800b82ea06278a045ad00b1ead762eb2ded8b5aa2f1d8db49f5b3aac8696f772b6b3b53a1ebf54692aedd60c884ca26b4a907ff98054b3fdefadf13fcd8b86be32a02455a314a9d34201b1a14bbb4b60be743995c1d8dbbba8fc3e2da0e99967582b797091d7e1e80f2abd44490fdad9ade8cb03bc97b71efd9c5423b51bc0a46ba7b9030324740aa2ee6a325e034f00049a134e8ec8cf89aac125ef8e90bb6ff2726e5b04b604706ee3a56785d0ad8ab04187715ab17b45f92def79590c58023808fcd2dc114453dd39f904e91e27e9fc1593d1472099e668ffd3043804ae331f889c51a0a90ff2dc7fd0e7cdd068e2ca045c5b8bb6982268f1a549f683f1e5460d17ae6e61ab049fe438983f463d53bb523e985dbab4e420f00a538948087e644c47a938634ef4cc920054a16fb1d0023634954f7ecc4a7fb541c3041b5534ecbffc0ed973a9f5da6366b25e1a7b2f08915ea21790ddfab46f00ec4dffb75541d20a7a77e8b5f6cc0ea67f18bc8156ab5f158f7265d8a9b90f19b4e73bbecad5c564e18f69760d76b4cc84ffde0ed3ee5ab6183f17bab29b65643b26146e85559ae5801bc5e37d7284187155b1b1fce94b838091f318bcee38098ca9548f86bb32da901763b3c4e80493a4051e9772de063e1f94e83bc98fa2ddd301eeb0390392ad81107b6db84eac8429553f18d00ebe1b76233c5e1963c922e2fa2996c47ba7a8a945f799ecb4eeb8fa02cca294186c37d52d919546fd3f08dc65eb2cca858272a23ae269adf65ff2812ce679f69e0ace41d54528506fd01492e23a1969d63fd8c4b8091d1febd503a82053a496b9d25deb19f851918ff3bc941632c8fb2a8b8b54c9919538dacf8dbe526ca2962e078c398805ad4541f6ab2d16103f380a5089244ec6df03978f1b91f19996f95b55bef546436755bb77e49a00768c318412a0592ce8fafcb45d16bfe661751cf99f30b768f7719c69b0b1b95aef191a1862cc156883db17d79b8c529c742e2d6f86368727de72a1513c2858bfc5c2f31a9709414408f2deb7f9d53bd640eeb4c326d13c59dff50879749c02ba109f0b526d09102c37bccd0d1920a8b397a457160319036ab14d930aa46801f65adedaad054f13e671f56280e633f1fa9dd518d01963b9c2c4c8d2add9643a85cb19898f3a5c7eeae53804c030c7d2634b1cd36e229b647b502b8601912f0a3c1238fa93d170cc5cb4fcf185b89bebea4396744d6913d91f8e75c638d52316f65aeb06d275b0b4acd70a69e7525b5c9cc7e0316e3ef5d8a31b014ec8d9521fad56ce83a957648868e03931c9223a42a48b9584d2d2c4c7f9fad3af6bc53954afadb6c6ff0419b8a01eee3d9b002fda75ec35b4693de23e8b313d9416e140638e4b4f03e2d467c5f0adebf9662dc12826cea9a15dd0af3868febb8e442c250b4034d6444fb8b6fcf24d4d779c91e5e1b47c0d8856d5fd9b1344e49b051695d9fd331e6f89e09330671e8635979e487d109dddacd0eb24d3fc223b85155eb935d0aac6e8bb8daa7425308d177f21f2b9699eab18379ab07fab48feabcde313b1fc0a1f887b16cbd15c053ce074ba8b21c6deb64166cba6ae5de20bea208e94f1d7071e1c06c01b5ecb792c7c162b564ffd60418911a0b78609c5276a39fbe53d86a621c6614703add1b02afd23cc81826351fd786607427e80ca81b93585c650757d76c0006e378e598f23be7ef9738bc15233e4de7b4d91be4d643034363d35faa5244014e25230f56a44c5232283420d2544aa69a1d9ae095803a7715ac7d19ea3002db3fe39cc2153fb7feb6adc1b6cc551dfe380701fe473d9b7285e5b40d0dd9615eb12fb562eee5cbc269169325e2b508de5c077bb0ed9cfe761cff70832d380f843da2c78dceef0f38efa8a8f86cf5f8a0f9cb9f4542a48f68c1b24bcc9f8a9fd8530baecb758160bb4fe8bc749a051258b941a3692a9984784dcbc818c95b95356a5df9d1053548cc054708f8fbc2fee357a79de23944bda458a55ec1b16f9d0c36e1fa26b31d9f7ab01de5888a3799fe8fcab7efdfd363c8e42c6bda4ac5c8149d6c3af237dbc0761c171a0940bf1c4292447571ccf555c83920079e6bc59165a8f3fea78c8a75b828f92c9fdeae6927f0acaf54bf6b90d9e854230a8cba8fe01ce3a328e4299ccc9ab9d7c5d3437d30088c623c70503573514bf8bb9239c50e3fd39103ed2b164c74828c12d06920f53dd4186975c8273ad7704f77d9d3f43625d867868ead3260532e81dc6ec84dec8e3129577987d451fa3f5cac45d03af42b699bc319191e598620cd928c770f0d372dbce219be32b125ad8890a681fdb162ec4714518df3fe5dd59dd1f6a429a3e7b79cbbf5be879db899a512a4694eb6bdffeaf1ea0abcafc3833cf8ab63f216b73edbaeb69eda7eabeb3da52a82be4a6b4de07843aedaaf719749d9c5aedc35cf08521912f67ec95f6c348b7a2280884448302d0494b6b87e9e1fdda28357ab7021539bfa022e14777cd19602fa157d982b89cb576e3dcda1007a59296340f05443cbb0d1ffbcf429ffc02e9c404384138171fb2fab38250b8a080ddfd086acc219ef76d9302f5aaf48e23765146b6f1a61e46e0dc11a59630b9021cc24798e53bfb9fd06c824470dd0476b0d70a48dd02bf43e9631858affbbf6290263cf73fb2d67e200b48ca33e3b2ddb6ceed6c03cec90abc7e5", 0xd00, &(0x7f00000001c0), &(0x7f0000000280), &(0x7f0000000680)="02c7c301ebdfc9d73d1fca1e1c833937c28a52d7c78e1813f5e8b205586f94c48d31c8e9814f0b16c82b1e9c016190f7097ab91359d44e3a302d88440d8ac52da2bca19943d8e300f54bf03d69954fe04c23342fd7acc0fd1b936d0d3814d37edd82c84e99ae3de9eab509feff28e90aa7685598799b3f34c8802eebb807f45241fe1d766d9e995db481048db028fe02e1ea88aac639da95cf407a8e1d62e04a01abbec9") perf_event_open(0x0, r4, 0xffefff7fffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000080)=ANY=[@ANYBLOB="2b637075a0"], 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[@ANYBLOB="2d63707520a2fbfdbd963e6d6d"], 0x5) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2}, 0x0, 0x3, 0x3, 0x7, 0x51, 0x0, 0x3, 0x0, 0x9, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 2.718488791s ago: executing program 0 (id=1551): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xd, 0x4, 0x4, 0x7, 0x0, r0, 0x10000}, 0x50) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x5452, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x100) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xbd}}, @ip_ttl={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9107}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_retopts={{0xc0, 0x0, 0x7, {[@rr={0x7, 0x13, 0x87, [@empty, @multicast1, @multicast2, @local]}, @ssrr={0x89, 0x7, 0x45, [@loopback]}, @rr={0x7, 0x13, 0xe5, [@local, @rand_addr=0x64010100, @multicast1, @rand_addr=0x64010102]}, @cipso={0x86, 0x69, 0xffffffffffffffff, [{0x5, 0x10, "0e986c1d6fc97a785ae353f2fb27"}, {0x6, 0xe, "6e2b13f3f7caae8bc2edd7a2"}, {0x6, 0xe, "9e747bdbd9a33edb807c17b9"}, {0x7, 0xd, "753e4da76779621b1819a6"}, {0x0, 0xc, "626466baec46143be8bf"}, {0x2, 0x11, "4e43ff1d7a0248cefdd165a419735f"}, {0x7, 0xd, "de1dfbdd8a6b4c7bbdbc55"}]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x13, 0xe8, [@local, @multicast1, @local, @broadcast]}]}}}], 0x120}, 0x44) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r2, &(0x7f0000000080), 0x0}, 0x20) 2.705982212s ago: executing program 1 (id=1552): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7}, [@printk={@lx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r1, &(0x7f0000000100), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000400000008000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r5, 0xc0189436, &(0x7f0000000000)={'bond_slave_0\x00', @random='\\\x00\x00 \x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x83, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000380000003800000007000000050000000000000700000000000000000000000402000000000000000000000a01000000000000000100000d000000000000000003000000000000000061"], 0x0, 0x57}, 0x20) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0x64}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r8}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) 2.700174993s ago: executing program 0 (id=1553): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa0677"], 0xfdef) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xffc0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xb, &(0x7f0000000500)=ANY=[@ANYRESOCT=r4, @ANYRES8=r4, @ANYRESHEX=0x0, @ANYRESDEC=r0, @ANYBLOB="cc25dc5b7c640952e5af131a63d78ca16afa87985f31dc6ce45766366b22c2044b7d1e60cffcffffffffffffff52f1145017c439f72a908c42ece16e029f9468e0df84e02132755979bdb943085afed3243a6b11d049f43f7c0659d042940edd7f567f9a944f0fd9d14cbfd83a31977492", @ANYRESDEC=r3, @ANYRES16, @ANYRES32=r5], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r8, 0x0, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r9, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000004000000002e0255"], 0x0, 0x1c}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, 0xffffffffffffffff, 0x1, r7, 0x7) 2.492129519s ago: executing program 0 (id=1554): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000445e00000000a177fafb6d55f239ad592b18ddaf7a7b37b18d31ed3b7f87119272c73ad30d7d1fdaafd5"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="004b5ff6ff00000070b30fc703b7000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x8000000000000001, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97eb, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="06000069000000000000ffffffffffffffff000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000030000000400"/25], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff000000820c0200", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00a300"/21], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'wlan0\x00', @remote}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.572241873s ago: executing program 1 (id=1557): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xc, 0x1, 0x1, 0x40}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x60000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01f51700000000000000240000002400000002000000000000000000000400000003000000000000000900000000000000000000000d020000000000"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) getpid() bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r0}, 0x38) 1.477419771s ago: executing program 1 (id=1558): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xcb3}, 0x102624, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000e4ef1f00810000007f00000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000040), 0x6, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000f00)='kfree\x00', r4}, 0x18) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r2, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) sendmsg$tipc(r1, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x1a9) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000003c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="0b00000005000000580000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000872daeb4c92168e854374811fdd324fe90f09a1c72896cfd9a59910007c0cc407603c906a826b1ceba3643f3d5d6ee19bc3e186a07d837d2036afae7"], 0x50) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, 0x0, 0x0) openat$cgroup_subtree(r8, &(0x7f0000000240), 0x2, 0x0) 964.141912ms ago: executing program 4 (id=1559): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xcb3}, 0x102624, 0x4}, 0x0, 0xb, 0xffffffffffffffff, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000e4ef1f00810000007f00000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000040), 0x6, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000f00)='kfree\x00', r4}, 0x18) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r2, &(0x7f0000001600), &(0x7f0000001680)=""/227}, 0x20) sendmsg$tipc(r1, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x1a9) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000003c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="0b00000005000000580000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000872daeb4c92168e854374811fdd324fe90f09a1c72896cfd9a59910007c0cc407603c906a826b1ceba3643f3d5d6ee19bc3e186a07d837d2036afae7"], 0x50) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000002c0)=r7, 0x4) openat$cgroup_subtree(r9, &(0x7f0000000240), 0x2, 0x0) 801.682035ms ago: executing program 3 (id=1562): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x6, 0x0, 0x80, 0x57, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0xdf78}, 0x0, 0x0, 0x7f, 0x3, 0x0, 0x0, 0x200}, 0xffffffffffffffff, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x61b23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xdbb}, 0x100200, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) socketpair$unix(0x1, 0x2, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000"], 0x0}, 0x94) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100040, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/uts\x00') (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000001c0)='D', 0x33fe0}], 0x1}, 0x20000040) sendmsg(r6, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg(r6, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) close(r5) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x8cff, 0x0, 0x0, 0xe60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 613.06091ms ago: executing program 3 (id=1563): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r1, &(0x7f0000000280), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) 556.389205ms ago: executing program 3 (id=1564): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffff7a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) close(r2) 259.921399ms ago: executing program 3 (id=1565): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00"/13], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 259.359689ms ago: executing program 3 (id=1566): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) 192.972024ms ago: executing program 3 (id=1567): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000445e00000000a177fafb6d55f239ad592b18ddaf7a7b37b18d31ed3b7f87119272c73ad30d7d1fdaafd5"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="004b5ff6ff00000070b30fc703b7000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x8000000000000001, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97eb, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="06000069000000000000ffffffffffffffff000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000030000000400"/25], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff000000820c0200", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00a300"/21], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'wlan0\x00', @remote}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 0s ago: executing program 2 (id=1130): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x85, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="0000000000000000660000007fffffff180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b26f8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000021aa0000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x6f) kernel console output (not intermixed with test programs): 48][ T3033] device sit0 entered promiscuous mode [ 177.069963][ T3048] FAULT_INJECTION: forcing a failure. [ 177.069963][ T3048] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 177.287798][ T3048] CPU: 0 PID: 3048 Comm: syz.4.892 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 177.297911][ T3048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 177.308473][ T3048] Call Trace: [ 177.312690][ T3048] [ 177.315889][ T3048] __dump_stack+0x21/0x30 [ 177.320318][ T3048] dump_stack_lvl+0xee/0x150 [ 177.324946][ T3048] ? show_regs_print_info+0x20/0x20 [ 177.330348][ T3048] dump_stack+0x15/0x20 [ 177.334503][ T3048] should_fail+0x3c1/0x510 [ 177.339092][ T3048] should_fail_usercopy+0x1a/0x20 [ 177.344293][ T3048] _copy_from_iter+0x21a/0x1050 [ 177.349248][ T3048] ? copy_mc_pipe_to_iter+0x770/0x770 [ 177.354665][ T3048] ? debug_smp_processor_id+0x17/0x20 [ 177.360556][ T3048] ? get_perf_callchain+0x3b1/0x480 [ 177.365779][ T3048] tun_get_user+0x3dc/0x33c0 [ 177.370735][ T3048] ? __bpf_get_stack+0x360/0x4f0 [ 177.375933][ T3048] ? slab_free_freelist_hook+0xc2/0x190 [ 177.381686][ T3048] ? kmem_cache_free+0x100/0x320 [ 177.386729][ T3048] ? tun_do_read+0x1c40/0x1c40 [ 177.391512][ T3048] ? kstrtouint_from_user+0x1a0/0x200 [ 177.397024][ T3048] ? kstrtol_from_user+0x260/0x260 [ 177.402169][ T3048] ? irqentry_exit+0x37/0x40 [ 177.406767][ T3048] ? sysvec_irq_work+0x61/0xc0 [ 177.411533][ T3048] ? asm_sysvec_irq_work+0x1b/0x20 [ 177.416650][ T3048] ? avc_policy_seqno+0x1b/0x70 [ 177.421521][ T3048] ? selinux_file_permission+0x2aa/0x510 [ 177.427168][ T3048] tun_chr_write_iter+0x1eb/0x2e0 [ 177.432203][ T3048] vfs_write+0x802/0xf70 [ 177.436445][ T3048] ? file_end_write+0x1b0/0x1b0 [ 177.441378][ T3048] ? bpf_send_signal_common+0x2b2/0x420 [ 177.447028][ T3048] ? __fget_files+0x2c4/0x320 [ 177.451796][ T3048] ? __fdget_pos+0x1f7/0x380 [ 177.456389][ T3048] ? ksys_write+0x71/0x240 [ 177.460805][ T3048] ksys_write+0x140/0x240 [ 177.465130][ T3048] ? __ia32_sys_read+0x90/0x90 [ 177.469890][ T3048] ? debug_smp_processor_id+0x17/0x20 [ 177.475351][ T3048] __x64_sys_write+0x7b/0x90 [ 177.480030][ T3048] x64_sys_call+0x8ef/0x9a0 [ 177.484534][ T3048] do_syscall_64+0x4c/0xa0 [ 177.488956][ T3048] ? clear_bhb_loop+0x50/0xa0 [ 177.493663][ T3048] ? clear_bhb_loop+0x50/0xa0 [ 177.498451][ T3048] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 177.504440][ T3048] RIP: 0033:0x7f214f340be9 [ 177.508885][ T3048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 177.528611][ T3048] RSP: 002b:00007f214dda9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 177.537050][ T3048] RAX: ffffffffffffffda RBX: 00007f214f567fa0 RCX: 00007f214f340be9 [ 177.545036][ T3048] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000003 [ 177.553098][ T3048] RBP: 00007f214dda9090 R08: 0000000000000000 R09: 0000000000000000 [ 177.561081][ T3048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.569057][ T3048] R13: 00007f214f568038 R14: 00007f214f567fa0 R15: 00007ffcaed74148 [ 177.577131][ T3048] [ 178.358235][ T3093] FAULT_INJECTION: forcing a failure. [ 178.358235][ T3093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 178.391749][ T3093] CPU: 0 PID: 3093 Comm: syz.4.908 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 178.402093][ T3093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 178.412249][ T3093] Call Trace: [ 178.415732][ T3093] [ 178.418835][ T3093] __dump_stack+0x21/0x30 [ 178.423349][ T3093] dump_stack_lvl+0xee/0x150 [ 178.428179][ T3093] ? show_regs_print_info+0x20/0x20 [ 178.433436][ T3093] ? vfs_write+0xc17/0xf70 [ 178.437874][ T3093] dump_stack+0x15/0x20 [ 178.442213][ T3093] should_fail+0x3c1/0x510 [ 178.446643][ T3093] should_fail_usercopy+0x1a/0x20 [ 178.451671][ T3093] _copy_from_user+0x20/0xd0 [ 178.456272][ T3093] __sys_bpf+0x233/0x730 [ 178.460604][ T3093] ? bpf_link_show_fdinfo+0x310/0x310 [ 178.465978][ T3093] ? __bpf_trace_sys_enter+0x62/0x70 [ 178.471266][ T3093] ? __traceiter_sys_enter+0x2a/0x40 [ 178.476559][ T3093] __x64_sys_bpf+0x7c/0x90 [ 178.480979][ T3093] x64_sys_call+0x4b9/0x9a0 [ 178.485491][ T3093] do_syscall_64+0x4c/0xa0 [ 178.489913][ T3093] ? clear_bhb_loop+0x50/0xa0 [ 178.494589][ T3093] ? clear_bhb_loop+0x50/0xa0 [ 178.499267][ T3093] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 178.505164][ T3093] RIP: 0033:0x7f214f340be9 [ 178.509587][ T3093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.529645][ T3093] RSP: 002b:00007f214dda9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 178.538161][ T3093] RAX: ffffffffffffffda RBX: 00007f214f567fa0 RCX: 00007f214f340be9 [ 178.546223][ T3093] RDX: 0000000000000010 RSI: 0000200000000140 RDI: 0000000000000011 [ 178.554289][ T3093] RBP: 00007f214dda9090 R08: 0000000000000000 R09: 0000000000000000 [ 178.562432][ T3093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 178.570405][ T3093] R13: 00007f214f568038 R14: 00007f214f567fa0 R15: 00007ffcaed74148 [ 178.578385][ T3093] [ 179.691690][ T3132] device pim6reg1 entered promiscuous mode [ 181.144958][ T3151] tap0: tun_chr_ioctl cmd 1074025677 [ 181.160632][ T3151] tap0: linktype set to 769 [ 181.430806][ T3161] bond_slave_1: mtu less than device minimum [ 181.633425][ T3178] device pim6reg1 entered promiscuous mode [ 181.695218][ T3181] FAULT_INJECTION: forcing a failure. [ 181.695218][ T3181] name failslab, interval 1, probability 0, space 0, times 0 [ 181.814921][ T3181] CPU: 0 PID: 3181 Comm: syz.4.935 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 181.825160][ T3181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 181.835333][ T3181] Call Trace: [ 181.838882][ T3181] [ 181.841825][ T3181] __dump_stack+0x21/0x30 [ 181.846176][ T3181] dump_stack_lvl+0xee/0x150 [ 181.850770][ T3181] ? show_regs_print_info+0x20/0x20 [ 181.855972][ T3181] dump_stack+0x15/0x20 [ 181.860125][ T3181] should_fail+0x3c1/0x510 [ 181.864547][ T3181] __should_failslab+0xa4/0xe0 [ 181.869321][ T3181] should_failslab+0x9/0x20 [ 181.873918][ T3181] slab_pre_alloc_hook+0x3b/0xe0 [ 181.878852][ T3181] ? __alloc_file+0x28/0x2a0 [ 181.883532][ T3181] kmem_cache_alloc+0x44/0x260 [ 181.888390][ T3181] __alloc_file+0x28/0x2a0 [ 181.893069][ T3181] alloc_empty_file+0x97/0x180 [ 181.897835][ T3181] alloc_file+0x59/0x540 [ 181.902084][ T3181] alloc_file_pseudo+0x17a/0x1f0 [ 181.907023][ T3181] ? alloc_empty_file_noaccount+0x80/0x80 [ 181.912838][ T3181] ? _raw_spin_lock_bh+0x8e/0xe0 [ 181.917778][ T3181] anon_inode_getfile+0xa6/0x180 [ 181.922723][ T3181] bpf_link_prime+0xf0/0x250 [ 181.927402][ T3181] bpf_tracing_prog_attach+0x79f/0xea0 [ 181.932855][ T3181] ? bpf_insn_prepare_dump+0x830/0x830 [ 181.938316][ T3181] ? __fget_files+0x2c4/0x320 [ 181.942978][ T3181] bpf_raw_tracepoint_open+0x667/0x960 [ 181.948417][ T3181] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 181.954377][ T3181] ? vfs_write+0xc17/0xf70 [ 181.958792][ T3181] ? selinux_bpf+0xce/0xf0 [ 181.963206][ T3181] ? security_bpf+0x82/0xa0 [ 181.967870][ T3181] __sys_bpf+0x490/0x730 [ 181.972092][ T3181] ? bpf_link_show_fdinfo+0x310/0x310 [ 181.977457][ T3181] ? debug_smp_processor_id+0x17/0x20 [ 181.982833][ T3181] __x64_sys_bpf+0x7c/0x90 [ 181.987330][ T3181] x64_sys_call+0x4b9/0x9a0 [ 181.991826][ T3181] do_syscall_64+0x4c/0xa0 [ 181.996234][ T3181] ? clear_bhb_loop+0x50/0xa0 [ 182.000915][ T3181] ? clear_bhb_loop+0x50/0xa0 [ 182.005587][ T3181] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 182.011466][ T3181] RIP: 0033:0x7f214f340be9 [ 182.015866][ T3181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 182.035646][ T3181] RSP: 002b:00007f214dda9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 182.044230][ T3181] RAX: ffffffffffffffda RBX: 00007f214f567fa0 RCX: 00007f214f340be9 [ 182.052358][ T3181] RDX: 0000000000000010 RSI: 0000200000000000 RDI: 0000000000000011 [ 182.060318][ T3181] RBP: 00007f214dda9090 R08: 0000000000000000 R09: 0000000000000000 [ 182.068275][ T3181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.076225][ T3181] R13: 00007f214f568038 R14: 00007f214f567fa0 R15: 00007ffcaed74148 [ 182.084273][ T3181] [ 183.376696][ T3195] kfree: port 1(veth1) entered blocking state [ 183.384988][ T3195] kfree: port 1(veth1) entered disabled state [ 183.419424][ T3195] device veth1 entered promiscuous mode [ 185.503049][ T3245] FAULT_INJECTION: forcing a failure. [ 185.503049][ T3245] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 185.525447][ T3245] CPU: 1 PID: 3245 Comm: syz.3.957 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 185.535730][ T3245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 185.545965][ T3245] Call Trace: [ 185.549346][ T3245] [ 185.552274][ T3245] __dump_stack+0x21/0x30 [ 185.556763][ T3245] dump_stack_lvl+0xee/0x150 [ 185.561386][ T3245] ? show_regs_print_info+0x20/0x20 [ 185.566585][ T3245] ? vfs_write+0xc17/0xf70 [ 185.571020][ T3245] dump_stack+0x15/0x20 [ 185.575535][ T3245] should_fail+0x3c1/0x510 [ 185.579963][ T3245] should_fail_usercopy+0x1a/0x20 [ 185.585084][ T3245] _copy_from_user+0x20/0xd0 [ 185.589676][ T3245] __sys_bpf+0x233/0x730 [ 185.593931][ T3245] ? bpf_link_show_fdinfo+0x310/0x310 [ 185.599501][ T3245] ? debug_smp_processor_id+0x17/0x20 [ 185.604884][ T3245] __x64_sys_bpf+0x7c/0x90 [ 185.609303][ T3245] x64_sys_call+0x4b9/0x9a0 [ 185.613891][ T3245] do_syscall_64+0x4c/0xa0 [ 185.618307][ T3245] ? clear_bhb_loop+0x50/0xa0 [ 185.623060][ T3245] ? clear_bhb_loop+0x50/0xa0 [ 185.627745][ T3245] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 185.633903][ T3245] RIP: 0033:0x7f76b50e6be9 [ 185.638410][ T3245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.658470][ T3245] RSP: 002b:00007f76b3b4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 185.667227][ T3245] RAX: ffffffffffffffda RBX: 00007f76b530dfa0 RCX: 00007f76b50e6be9 [ 185.675212][ T3245] RDX: 0000000000000010 RSI: 0000200000000000 RDI: 0000000000000011 [ 185.683395][ T3245] RBP: 00007f76b3b4f090 R08: 0000000000000000 R09: 0000000000000000 [ 185.691627][ T3245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.699690][ T3245] R13: 00007f76b530e038 R14: 00007f76b530dfa0 R15: 00007ffdd324c238 [ 185.707765][ T3245] [ 187.144939][ T3271] device syzkaller0 entered promiscuous mode [ 188.767016][ T30] audit: type=1400 audit(1755634877.116:137): avc: denied { create } for pid=3313 comm="syz.4.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 190.689330][ T30] audit: type=1400 audit(1755634879.036:138): avc: denied { ioctl } for pid=3358 comm="syz.1.996" path="socket:[27277]" dev="sockfs" ino=27277 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 191.826367][ T3393] FAULT_INJECTION: forcing a failure. [ 191.826367][ T3393] name failslab, interval 1, probability 0, space 0, times 0 [ 191.839425][ T3393] CPU: 0 PID: 3393 Comm: syz.4.1007 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 191.849580][ T3393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 191.859651][ T3393] Call Trace: [ 191.862935][ T3393] [ 191.865873][ T3393] __dump_stack+0x21/0x30 [ 191.870268][ T3393] dump_stack_lvl+0xee/0x150 [ 191.874973][ T3393] ? show_regs_print_info+0x20/0x20 [ 191.880202][ T3393] dump_stack+0x15/0x20 [ 191.884412][ T3393] should_fail+0x3c1/0x510 [ 191.888851][ T3393] ? ip_frag_next+0xd7/0xab0 [ 191.893445][ T3393] __should_failslab+0xa4/0xe0 [ 191.898395][ T3393] should_failslab+0x9/0x20 [ 191.903019][ T3393] slab_pre_alloc_hook+0x3b/0xe0 [ 191.908095][ T3393] ? ip_frag_next+0xd7/0xab0 [ 191.912783][ T3393] ? ip_frag_next+0xd7/0xab0 [ 191.917556][ T3393] __kmalloc_track_caller+0x6c/0x2c0 [ 191.922844][ T3393] ? ip_frag_next+0xd7/0xab0 [ 191.927666][ T3393] ? ip_frag_next+0xd7/0xab0 [ 191.932269][ T3393] __alloc_skb+0x21a/0x740 [ 191.936780][ T3393] ip_frag_next+0xd7/0xab0 [ 191.941210][ T3393] ip_do_fragment+0x811/0x1ca0 [ 191.945984][ T3393] ? ip_fragment+0x250/0x250 [ 191.950576][ T3393] ip_fragment+0x152/0x250 [ 191.955102][ T3393] __ip_finish_output+0x236/0x360 [ 191.960131][ T3393] ip_finish_output+0x31/0x240 [ 191.964903][ T3393] ? ip_mc_output+0x5c7/0x7e0 [ 191.969676][ T3393] ip_mc_output+0x3fc/0x7e0 [ 191.974178][ T3393] ? ip_build_and_send_pkt+0xb00/0xb00 [ 191.979642][ T3393] ? ip_mc_finish_output+0x400/0x400 [ 191.984925][ T3393] ? __ip_local_out+0x3d9/0x3e0 [ 191.989948][ T3393] ? kasan_quarantine_put+0x34/0x190 [ 191.995332][ T3393] ? ip_send_check+0xf0/0xf0 [ 192.000023][ T3393] ? __ip_local_out+0x3e0/0x3e0 [ 192.004984][ T3393] ? prandom_u32+0x24d/0x290 [ 192.009576][ T3393] ip_local_out+0x96/0xb0 [ 192.014081][ T3393] iptunnel_xmit+0x4db/0x8f0 [ 192.018799][ T3393] ip_tunnel_xmit+0x1a2b/0x21c0 [ 192.023776][ T3393] ? ip4_dst_hoplimit+0x110/0x110 [ 192.028830][ T3393] ? skb_network_protocol+0x501/0x740 [ 192.034423][ T3393] ? gre_build_header+0x229/0x850 [ 192.039455][ T3393] ipgre_xmit+0x7c0/0xb30 [ 192.043880][ T3393] dev_hard_start_xmit+0x244/0x670 [ 192.048998][ T3393] __dev_queue_xmit+0x17bd/0x2d80 [ 192.054300][ T3393] ? dev_queue_xmit+0x20/0x20 [ 192.058981][ T3393] ? __kasan_check_write+0x14/0x20 [ 192.064308][ T3393] ? skb_release_data+0x1c6/0xa10 [ 192.069428][ T3393] ? __kasan_check_write+0x14/0x20 [ 192.074539][ T3393] ? pskb_expand_head+0xbe6/0x11d0 [ 192.079652][ T3393] dev_queue_xmit+0x17/0x20 [ 192.084155][ T3393] __bpf_redirect+0x68a/0xe60 [ 192.088951][ T3393] bpf_clone_redirect+0x242/0x380 [ 192.093986][ T3393] bpf_prog_973cd02a7a0e8181+0x56/0x174 [ 192.099537][ T3393] ? __kasan_slab_alloc+0xcf/0xf0 [ 192.104583][ T3393] ? __kasan_slab_alloc+0xbd/0xf0 [ 192.109619][ T3393] ? slab_post_alloc_hook+0x4f/0x2b0 [ 192.114908][ T3393] ? kmem_cache_alloc+0xf7/0x260 [ 192.120091][ T3393] ? __build_skb+0x2d/0x310 [ 192.124598][ T3393] ? build_skb+0x24/0x200 [ 192.128926][ T3393] ? bpf_prog_test_run_skb+0x279/0x1150 [ 192.134474][ T3393] ? bpf_prog_test_run+0x3d5/0x620 [ 192.139851][ T3393] ? __sys_bpf+0x52c/0x730 [ 192.144353][ T3393] ? __x64_sys_bpf+0x7c/0x90 [ 192.149311][ T3393] ? x64_sys_call+0x4b9/0x9a0 [ 192.154077][ T3393] ? do_syscall_64+0x4c/0xa0 [ 192.158671][ T3393] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 192.164749][ T3393] ? ktime_get+0x12f/0x160 [ 192.169165][ T3393] bpf_test_run+0x33d/0x8d0 [ 192.173670][ T3393] ? convert___skb_to_skb+0x4f0/0x4f0 [ 192.179044][ T3393] ? eth_get_headlen+0x1f0/0x1f0 [ 192.183986][ T3393] ? convert___skb_to_skb+0x41/0x4f0 [ 192.189276][ T3393] bpf_prog_test_run_skb+0x9ec/0x1150 [ 192.194654][ T3393] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 192.200649][ T3393] bpf_prog_test_run+0x3d5/0x620 [ 192.205678][ T3393] ? bpf_prog_query+0x230/0x230 [ 192.210530][ T3393] ? selinux_bpf+0xce/0xf0 [ 192.215170][ T3393] ? security_bpf+0x82/0xa0 [ 192.219896][ T3393] __sys_bpf+0x52c/0x730 [ 192.224155][ T3393] ? bpf_link_show_fdinfo+0x310/0x310 [ 192.229631][ T3393] ? bpf_trace_run2+0xb5/0x1b0 [ 192.234486][ T3393] ? __bpf_trace_sys_enter+0x62/0x70 [ 192.239770][ T3393] __x64_sys_bpf+0x7c/0x90 [ 192.244372][ T3393] x64_sys_call+0x4b9/0x9a0 [ 192.248880][ T3393] do_syscall_64+0x4c/0xa0 [ 192.253421][ T3393] ? clear_bhb_loop+0x50/0xa0 [ 192.258169][ T3393] ? clear_bhb_loop+0x50/0xa0 [ 192.262856][ T3393] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 192.268751][ T3393] RIP: 0033:0x7f214f340be9 [ 192.273173][ T3393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 192.292950][ T3393] RSP: 002b:00007f214dda9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 192.301458][ T3393] RAX: ffffffffffffffda RBX: 00007f214f567fa0 RCX: 00007f214f340be9 [ 192.309447][ T3393] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 192.317419][ T3393] RBP: 00007f214dda9090 R08: 0000000000000000 R09: 0000000000000000 [ 192.325572][ T3393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 192.333544][ T3393] R13: 00007f214f568038 R14: 00007f214f567fa0 R15: 00007ffcaed74148 [ 192.341543][ T3393] [ 196.058063][ T3504] syz.4.1048[3504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.058129][ T3504] syz.4.1048[3504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.526860][ T30] audit: type=1400 audit(1755634884.876:139): avc: denied { create } for pid=3519 comm="syz.3.1055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 196.563937][ T3521] device veth0_vlan left promiscuous mode [ 196.570714][ T3521] device veth0_vlan entered promiscuous mode [ 196.635333][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 196.649433][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 196.740072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.290077][ T3631] FAULT_INJECTION: forcing a failure. [ 202.290077][ T3631] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 202.321076][ T3631] CPU: 0 PID: 3631 Comm: syz.4.1092 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 202.331271][ T3631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 202.341591][ T3631] Call Trace: [ 202.344865][ T3631] [ 202.347916][ T3631] __dump_stack+0x21/0x30 [ 202.352454][ T3631] dump_stack_lvl+0xee/0x150 [ 202.357047][ T3631] ? show_regs_print_info+0x20/0x20 [ 202.362571][ T3631] dump_stack+0x15/0x20 [ 202.366754][ T3631] should_fail+0x3c1/0x510 [ 202.371255][ T3631] should_fail_alloc_page+0x55/0x80 [ 202.376641][ T3631] prepare_alloc_pages+0x156/0x600 [ 202.381764][ T3631] ? __alloc_pages_bulk+0xab0/0xab0 [ 202.386948][ T3631] ? __alloc_pages_bulk+0x47f/0xab0 [ 202.392238][ T3631] __alloc_pages+0x10a/0x440 [ 202.396808][ T3631] ? prep_new_page+0x110/0x110 [ 202.401547][ T3631] ? __kmalloc+0x13d/0x2c0 [ 202.406233][ T3631] __vmalloc_node_range+0x505/0xaf0 [ 202.411559][ T3631] bpf_map_area_alloc+0xd5/0xe0 [ 202.416403][ T3631] ? bpf_ringbuf_alloc+0x37/0x470 [ 202.421505][ T3631] bpf_ringbuf_alloc+0x37/0x470 [ 202.426610][ T3631] ? kmem_cache_alloc_trace+0x119/0x270 [ 202.432142][ T3631] ? ringbuf_map_alloc+0x1a3/0x320 [ 202.437240][ T3631] ? bpf_map_init_from_attr+0x146/0x350 [ 202.442762][ T3631] ringbuf_map_alloc+0x1f6/0x320 [ 202.447779][ T3631] map_create+0x455/0x21b0 [ 202.452272][ T3631] __sys_bpf+0x2cf/0x730 [ 202.456492][ T3631] ? bpf_link_show_fdinfo+0x310/0x310 [ 202.461924][ T3631] ? debug_smp_processor_id+0x17/0x20 [ 202.467279][ T3631] __x64_sys_bpf+0x7c/0x90 [ 202.471688][ T3631] x64_sys_call+0x4b9/0x9a0 [ 202.476347][ T3631] do_syscall_64+0x4c/0xa0 [ 202.480762][ T3631] ? clear_bhb_loop+0x50/0xa0 [ 202.485876][ T3631] ? clear_bhb_loop+0x50/0xa0 [ 202.490538][ T3631] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 202.496415][ T3631] RIP: 0033:0x7f214f340be9 [ 202.501073][ T3631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 202.520746][ T3631] RSP: 002b:00007f214dda9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 202.529230][ T3631] RAX: ffffffffffffffda RBX: 00007f214f567fa0 RCX: 00007f214f340be9 [ 202.537197][ T3631] RDX: 0000000000000050 RSI: 0000200000001ac0 RDI: 0000000000000000 [ 202.545171][ T3631] RBP: 00007f214dda9090 R08: 0000000000000000 R09: 0000000000000000 [ 202.553125][ T3631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.561279][ T3631] R13: 00007f214f568038 R14: 00007f214f567fa0 R15: 00007ffcaed74148 [ 202.569324][ T3631] [ 204.494092][ T3706] FAULT_INJECTION: forcing a failure. [ 204.494092][ T3706] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 204.507209][ T3706] CPU: 1 PID: 3706 Comm: syz.4.1119 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 204.517463][ T3706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 204.527812][ T3706] Call Trace: [ 204.531091][ T3706] [ 204.534015][ T3706] __dump_stack+0x21/0x30 [ 204.538445][ T3706] dump_stack_lvl+0xee/0x150 [ 204.543024][ T3706] ? show_regs_print_info+0x20/0x20 [ 204.548299][ T3706] ? __kasan_check_write+0x14/0x20 [ 204.553648][ T3706] ? _raw_spin_lock_irq+0x8f/0xe0 [ 204.558758][ T3706] dump_stack+0x15/0x20 [ 204.562910][ T3706] should_fail+0x3c1/0x510 [ 204.567320][ T3706] should_fail_usercopy+0x1a/0x20 [ 204.572437][ T3706] copy_page_from_iter_atomic+0x3fb/0x1350 [ 204.578246][ T3706] ? pipe_zero+0x370/0x370 [ 204.582685][ T3706] generic_perform_write+0x307/0x670 [ 204.588099][ T3706] ? grab_cache_page_write_begin+0xb0/0xb0 [ 204.593935][ T3706] ? file_remove_privs+0x590/0x590 [ 204.599216][ T3706] ? rwsem_write_trylock+0x130/0x300 [ 204.604533][ T3706] ? clear_nonspinnable+0x60/0x60 [ 204.609549][ T3706] ? avc_policy_seqno+0x1b/0x70 [ 204.614407][ T3706] __generic_file_write_iter+0x268/0x480 [ 204.620153][ T3706] generic_file_write_iter+0xa9/0x1d0 [ 204.625625][ T3706] vfs_write+0x802/0xf70 [ 204.629871][ T3706] ? file_end_write+0x1b0/0x1b0 [ 204.634815][ T3706] ? wait_for_completion_killable_timeout+0x10/0x10 [ 204.641411][ T3706] ? __fget_files+0x2c4/0x320 [ 204.646176][ T3706] ? __fdget_pos+0x2d2/0x380 [ 204.650769][ T3706] ? ksys_write+0x71/0x240 [ 204.655187][ T3706] ksys_write+0x140/0x240 [ 204.659507][ T3706] ? __ia32_sys_read+0x90/0x90 [ 204.664350][ T3706] ? __bpf_trace_sys_enter+0x62/0x70 [ 204.669630][ T3706] __x64_sys_write+0x7b/0x90 [ 204.674212][ T3706] x64_sys_call+0x8ef/0x9a0 [ 204.678718][ T3706] do_syscall_64+0x4c/0xa0 [ 204.683137][ T3706] ? clear_bhb_loop+0x50/0xa0 [ 204.687803][ T3706] ? clear_bhb_loop+0x50/0xa0 [ 204.692611][ T3706] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 204.698790][ T3706] RIP: 0033:0x7f214f340be9 [ 204.703210][ T3706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.723072][ T3706] RSP: 002b:00007f214dda9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 204.731534][ T3706] RAX: ffffffffffffffda RBX: 00007f214f567fa0 RCX: 00007f214f340be9 [ 204.739855][ T3706] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000007 [ 204.747831][ T3706] RBP: 00007f214dda9090 R08: 0000000000000000 R09: 0000000000000000 [ 204.756017][ T3706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 204.764091][ T3706] R13: 00007f214f568038 R14: 00007f214f567fa0 R15: 00007ffcaed74148 [ 204.772084][ T3706] [ 205.403232][ T3741] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.418947][ T3741] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.427000][ T3741] device bridge_slave_0 entered promiscuous mode [ 205.434324][ T3741] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.441738][ T3741] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.450904][ T3741] device bridge_slave_1 entered promiscuous mode [ 205.604251][ T30] audit: type=1400 audit(1755634893.946:140): avc: denied { create } for pid=3741 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 205.633442][ T30] audit: type=1400 audit(1755634893.946:141): avc: denied { write } for pid=3741 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 205.665453][ T30] audit: type=1400 audit(1755634893.946:142): avc: denied { read } for pid=3741 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 205.704032][ T3741] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.711136][ T3741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.718437][ T3741] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.725470][ T3741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.986611][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.012054][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.182916][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.210955][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.284403][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.377553][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.511639][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.518747][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.537022][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.583625][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.592152][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.599537][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.607359][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.615869][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.637856][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.651067][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.659736][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 206.669785][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.681969][ T3741] device veth0_vlan entered promiscuous mode [ 206.691181][ T45] device bridge_slave_1 left promiscuous mode [ 206.700810][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.709935][ T45] device bridge_slave_0 left promiscuous mode [ 206.716794][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.725787][ T45] device veth1_macvtap left promiscuous mode [ 206.827292][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.835694][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.843962][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.851761][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.860131][ T3781] device pim6reg1 entered promiscuous mode [ 206.907798][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.916889][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.941699][ T3741] device veth1_macvtap entered promiscuous mode [ 207.057732][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 207.066325][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 207.077668][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 207.086552][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 207.095719][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 207.210605][ T3791] ªªªªªª: renamed from vlan0 [ 207.421026][ T3803] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.485463][ T3803] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.546181][ T3803] device bridge_slave_0 entered promiscuous mode [ 207.638695][ T3803] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.739275][ T3803] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.806949][ T3803] device bridge_slave_1 entered promiscuous mode [ 209.292187][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.304419][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.472787][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.502095][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.513305][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.520625][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.536166][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.551618][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.567226][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.574587][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.582382][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.590749][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.599224][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.608121][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.616532][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.634214][ T45] device bridge_slave_1 left promiscuous mode [ 209.640926][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.648596][ T45] device bridge_slave_0 left promiscuous mode [ 209.655078][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.663349][ T45] device veth1_macvtap left promiscuous mode [ 209.669553][ T45] device veth0_vlan left promiscuous mode [ 209.748651][ T3846] ªªªªªª: renamed from vlan0 [ 209.951213][ T3803] device veth0_vlan entered promiscuous mode [ 209.962102][ T30] audit: type=1400 audit(1755634898.306:143): avc: denied { create } for pid=3854 comm="syz.0.1165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 209.987162][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 210.076096][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 210.166587][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 210.255309][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 210.350033][ T3803] device veth1_macvtap entered promiscuous mode [ 210.497244][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 210.506781][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 210.514503][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 210.573046][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 210.651443][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 210.723017][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 210.780888][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 210.792179][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 210.845598][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 212.769215][ T3872] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.799624][ T3872] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.917027][ T3872] device bridge_slave_0 entered promiscuous mode [ 212.924642][ T45] device bridge_slave_1 left promiscuous mode [ 213.015140][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.226948][ T45] device bridge_slave_0 left promiscuous mode [ 213.417880][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.535257][ T45] device veth1_macvtap left promiscuous mode [ 213.602263][ T45] device veth0_vlan left promiscuous mode [ 213.721701][ T3872] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.728835][ T3872] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.736517][ T3872] device bridge_slave_1 entered promiscuous mode [ 214.421169][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.429239][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.503036][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.529305][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.538629][ T627] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.545876][ T627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.556686][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.655675][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.774990][ T627] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.782582][ T627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.894953][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.933843][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.957198][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.966295][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.974713][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.983464][ T3902] ªªªªªª: renamed from vlan0 [ 215.143367][ T3872] device veth0_vlan entered promiscuous mode [ 215.207104][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 215.215820][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 215.224261][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 215.232761][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.309365][ T3917] device syzkaller0 entered promiscuous mode [ 215.369989][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.378218][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.387441][ T3920] ±ÿ: renamed from team_slave_1 [ 215.501931][ T3872] device veth1_macvtap entered promiscuous mode [ 215.529961][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 215.560983][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 215.615697][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 215.686453][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 215.766199][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 215.850752][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 215.922829][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 216.063639][ T3927] FAULT_INJECTION: forcing a failure. [ 216.063639][ T3927] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 216.084877][ T3927] CPU: 0 PID: 3927 Comm: syz.3.1188 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 216.095289][ T3927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 216.105628][ T3927] Call Trace: [ 216.108907][ T3927] [ 216.111825][ T3927] __dump_stack+0x21/0x30 [ 216.116753][ T3927] dump_stack_lvl+0xee/0x150 [ 216.121335][ T3927] ? show_regs_print_info+0x20/0x20 [ 216.126605][ T3927] ? kstrtouint_from_user+0x1a0/0x200 [ 216.132138][ T3927] dump_stack+0x15/0x20 [ 216.136280][ T3927] should_fail+0x3c1/0x510 [ 216.140766][ T3927] should_fail_usercopy+0x1a/0x20 [ 216.145773][ T3927] strncpy_from_user+0x24/0x2e0 [ 216.150887][ T3927] ? __kasan_check_write+0x14/0x20 [ 216.156395][ T3927] bpf_raw_tracepoint_open+0x352/0x960 [ 216.161861][ T3927] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 216.167609][ T3927] ? vfs_write+0xc17/0xf70 [ 216.172228][ T3927] ? selinux_bpf+0xce/0xf0 [ 216.176731][ T3927] ? security_bpf+0x82/0xa0 [ 216.181854][ T3927] __sys_bpf+0x490/0x730 [ 216.186098][ T3927] ? bpf_link_show_fdinfo+0x310/0x310 [ 216.191466][ T3927] ? debug_smp_processor_id+0x17/0x20 [ 216.196912][ T3927] __x64_sys_bpf+0x7c/0x90 [ 216.201313][ T3927] x64_sys_call+0x4b9/0x9a0 [ 216.205798][ T3927] do_syscall_64+0x4c/0xa0 [ 216.210198][ T3927] ? clear_bhb_loop+0x50/0xa0 [ 216.214946][ T3927] ? clear_bhb_loop+0x50/0xa0 [ 216.220043][ T3927] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 216.225931][ T3927] RIP: 0033:0x7f76b50e6be9 [ 216.230330][ T3927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.249916][ T3927] RSP: 002b:00007f76b3b4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 216.258489][ T3927] RAX: ffffffffffffffda RBX: 00007f76b530dfa0 RCX: 00007f76b50e6be9 [ 216.266532][ T3927] RDX: 0000000000000010 RSI: 0000200000000080 RDI: 0000000000000011 [ 216.274720][ T3927] RBP: 00007f76b3b4f090 R08: 0000000000000000 R09: 0000000000000000 [ 216.282790][ T3927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.291122][ T3927] R13: 00007f76b530e038 R14: 00007f76b530dfa0 R15: 00007ffdd324c238 [ 216.299477][ T3927] [ 216.459293][ T3937] device syzkaller0 entered promiscuous mode [ 216.921831][ T3948] FAULT_INJECTION: forcing a failure. [ 216.921831][ T3948] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 217.014998][ T3941] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.022202][ T3941] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.098511][ T3948] CPU: 0 PID: 3948 Comm: syz.1.1196 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 217.108823][ T3948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 217.119031][ T3948] Call Trace: [ 217.122319][ T3948] [ 217.125346][ T3948] __dump_stack+0x21/0x30 [ 217.129847][ T3948] dump_stack_lvl+0xee/0x150 [ 217.134718][ T3948] ? show_regs_print_info+0x20/0x20 [ 217.140232][ T3948] ? stack_trace_save+0x98/0xe0 [ 217.145091][ T3948] dump_stack+0x15/0x20 [ 217.149263][ T3948] should_fail+0x3c1/0x510 [ 217.153934][ T3948] should_fail_alloc_page+0x55/0x80 [ 217.159210][ T3948] prepare_alloc_pages+0x156/0x600 [ 217.164405][ T3948] ? __alloc_pages_bulk+0xab0/0xab0 [ 217.169697][ T3948] __alloc_pages+0x10a/0x440 [ 217.174283][ T3948] ? prep_new_page+0x110/0x110 [ 217.179044][ T3948] kmalloc_order+0x4c/0x160 [ 217.183540][ T3948] ? alloc_skb_with_frags+0xa8/0x620 [ 217.188815][ T3948] kmalloc_order_trace+0x18/0xb0 [ 217.193761][ T3948] __kmalloc_track_caller+0x198/0x2c0 [ 217.199278][ T3948] ? kmem_cache_alloc+0xf7/0x260 [ 217.204210][ T3948] ? alloc_skb_with_frags+0xa8/0x620 [ 217.209575][ T3948] __alloc_skb+0x21a/0x740 [ 217.214085][ T3948] alloc_skb_with_frags+0xa8/0x620 [ 217.219289][ T3948] sock_alloc_send_pskb+0x853/0x980 [ 217.224492][ T3948] ? is_bpf_text_address+0x177/0x190 [ 217.229872][ T3948] ? __kernel_text_address+0xa0/0x100 [ 217.235332][ T3948] ? sock_kzfree_s+0x60/0x60 [ 217.240110][ T3948] ? stack_trace_save+0x98/0xe0 [ 217.245001][ T3948] tun_get_user+0x4e6/0x33c0 [ 217.249590][ T3948] ? __kasan_poison_slab+0x70/0x70 [ 217.254686][ T3948] ? kmem_cache_free+0x100/0x320 [ 217.259725][ T3948] ? __x64_sys_openat+0x136/0x160 [ 217.264734][ T3948] ? x64_sys_call+0x219/0x9a0 [ 217.269404][ T3948] ? tun_do_read+0x1c40/0x1c40 [ 217.274447][ T3948] ? kstrtouint_from_user+0x1a0/0x200 [ 217.279817][ T3948] ? kstrtol_from_user+0x260/0x260 [ 217.284912][ T3948] ? putname+0x111/0x160 [ 217.289134][ T3948] ? avc_policy_seqno+0x1b/0x70 [ 217.294047][ T3948] ? selinux_file_permission+0x2aa/0x510 [ 217.300134][ T3948] tun_chr_write_iter+0x1eb/0x2e0 [ 217.305302][ T3948] vfs_write+0x802/0xf70 [ 217.309671][ T3948] ? file_end_write+0x1b0/0x1b0 [ 217.314667][ T3948] ? __fget_files+0x2c4/0x320 [ 217.315313][ T3941] device bridge_slave_0 entered promiscuous mode [ 217.319460][ T3948] ? __fdget_pos+0x1f7/0x380 [ 217.330598][ T3948] ? ksys_write+0x71/0x240 [ 217.335031][ T3948] ksys_write+0x140/0x240 [ 217.339354][ T3948] ? __ia32_sys_read+0x90/0x90 [ 217.344292][ T3948] ? debug_smp_processor_id+0x17/0x20 [ 217.349754][ T3948] __x64_sys_write+0x7b/0x90 [ 217.354444][ T3948] x64_sys_call+0x8ef/0x9a0 [ 217.359031][ T3948] do_syscall_64+0x4c/0xa0 [ 217.363473][ T3948] ? clear_bhb_loop+0x50/0xa0 [ 217.368244][ T3948] ? clear_bhb_loop+0x50/0xa0 [ 217.373048][ T3948] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 217.378930][ T3948] RIP: 0033:0x7f594e11bbe9 [ 217.383420][ T3948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.403466][ T3948] RSP: 002b:00007f594cb84038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 217.411952][ T3948] RAX: ffffffffffffffda RBX: 00007f594e342fa0 RCX: 00007f594e11bbe9 [ 217.420206][ T3948] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 217.428275][ T3948] RBP: 00007f594cb84090 R08: 0000000000000000 R09: 0000000000000000 [ 217.436242][ T3948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.444228][ T3948] R13: 00007f594e343038 R14: 00007f594e342fa0 R15: 00007ffe621dfd48 [ 217.452281][ T3948] [ 217.536464][ T3941] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.543551][ T3941] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.553922][ T3941] device bridge_slave_1 entered promiscuous mode [ 218.234301][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.242547][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.305353][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.314393][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.322884][ T627] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.330101][ T627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.338069][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.346825][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.356689][ T627] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.363831][ T627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.495748][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.503581][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.512055][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.722728][ T45] device bridge_slave_1 left promiscuous mode [ 218.730437][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.753459][ T45] device bridge_slave_0 left promiscuous mode [ 218.760026][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.768293][ T45] device veth1_macvtap left promiscuous mode [ 218.774414][ T45] device veth0_vlan left promiscuous mode [ 218.846535][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 218.856241][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.597607][ T3978] device syzkaller0 entered promiscuous mode [ 219.647979][ T3941] device veth0_vlan entered promiscuous mode [ 219.675454][ T3983] ±ÿ: renamed from team_slave_1 [ 219.689794][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.711016][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.720802][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.728996][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.742900][ T3941] device veth1_macvtap entered promiscuous mode [ 219.773786][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.782406][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.791336][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.826565][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.842576][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.852277][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.001972][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.099404][ T3993] FAULT_INJECTION: forcing a failure. [ 220.099404][ T3993] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 220.254977][ T3993] CPU: 0 PID: 3993 Comm: syz.3.1210 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 220.266296][ T3993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 220.277478][ T3993] Call Trace: [ 220.280913][ T3993] [ 220.283929][ T3993] __dump_stack+0x21/0x30 [ 220.288361][ T3993] dump_stack_lvl+0xee/0x150 [ 220.293480][ T3993] ? show_regs_print_info+0x20/0x20 [ 220.299234][ T3993] ? __schedule+0xb76/0x14c0 [ 220.304019][ T3993] dump_stack+0x15/0x20 [ 220.308210][ T3993] should_fail+0x3c1/0x510 [ 220.312833][ T3993] should_fail_usercopy+0x1a/0x20 [ 220.318438][ T3993] _copy_from_user+0x20/0xd0 [ 220.323220][ T3993] vti6_siocdevprivate+0x367/0xd20 [ 220.328425][ T3993] ? preempt_count_add+0x90/0x1b0 [ 220.333547][ T3993] ? __mutex_lock+0x4fa/0x11b0 [ 220.338402][ T3993] ? vti6_tnl_xmit+0x1870/0x1870 [ 220.343355][ T3993] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 220.350314][ T3993] ? full_name_hash+0xbd/0xf0 [ 220.355361][ T3993] dev_ifsioc+0xaf5/0xe70 [ 220.359900][ T3993] ? dev_ioctl+0xd10/0xd10 [ 220.364743][ T3993] ? __mutex_lock_slowpath+0xe/0x10 [ 220.370154][ T3993] ? mutex_lock+0x100/0x1a0 [ 220.374932][ T3993] ? wait_for_completion_killable_timeout+0x10/0x10 [ 220.382095][ T3993] ? dev_get_by_name_rcu+0xc8/0xf0 [ 220.387855][ T3993] dev_ioctl+0x5fd/0xd10 [ 220.392285][ T3993] sock_ioctl+0x64a/0x6b0 [ 220.396914][ T3993] ? sock_poll+0x3d0/0x3d0 [ 220.401797][ T3993] ? security_file_ioctl+0x84/0xa0 [ 220.407200][ T3993] ? sock_poll+0x3d0/0x3d0 [ 220.411623][ T3993] __se_sys_ioctl+0x121/0x1a0 [ 220.416301][ T3993] __x64_sys_ioctl+0x7b/0x90 [ 220.420898][ T3993] x64_sys_call+0x2f/0x9a0 [ 220.425315][ T3993] do_syscall_64+0x4c/0xa0 [ 220.429814][ T3993] ? clear_bhb_loop+0x50/0xa0 [ 220.434862][ T3993] ? clear_bhb_loop+0x50/0xa0 [ 220.439559][ T3993] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 220.445737][ T3993] RIP: 0033:0x7f76b50e6be9 [ 220.450347][ T3993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.470503][ T3993] RSP: 002b:00007f76b3b4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 220.479284][ T3993] RAX: ffffffffffffffda RBX: 00007f76b530dfa0 RCX: 00007f76b50e6be9 [ 220.487624][ T3993] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 220.495869][ T3993] RBP: 00007f76b3b4f090 R08: 0000000000000000 R09: 0000000000000000 [ 220.503939][ T3993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.511914][ T3993] R13: 00007f76b530e038 R14: 00007f76b530dfa0 R15: 00007ffdd324c238 [ 220.520201][ T3993] [ 222.028074][ T4016] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.132760][ T4016] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.229424][ T4016] device bridge_slave_0 entered promiscuous mode [ 222.379742][ T4016] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.438637][ T4016] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.498457][ T4016] device bridge_slave_1 entered promiscuous mode [ 222.652563][ T45] device bridge_slave_1 left promiscuous mode [ 222.658872][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.667614][ T45] device bridge_slave_0 left promiscuous mode [ 222.673841][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.682592][ T45] device veth1_macvtap left promiscuous mode [ 222.700899][ T45] device veth0_vlan left promiscuous mode [ 223.583773][ T4068] FAULT_INJECTION: forcing a failure. [ 223.583773][ T4068] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 223.720259][ T4068] CPU: 0 PID: 4068 Comm: syz.0.1242 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 223.730732][ T4068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 223.740988][ T4068] Call Trace: [ 223.744352][ T4068] [ 223.747279][ T4068] __dump_stack+0x21/0x30 [ 223.751609][ T4068] dump_stack_lvl+0xee/0x150 [ 223.756368][ T4068] ? show_regs_print_info+0x20/0x20 [ 223.761555][ T4068] ? ctx_sched_in+0x259/0x2f0 [ 223.766305][ T4068] dump_stack+0x15/0x20 [ 223.770446][ T4068] should_fail+0x3c1/0x510 [ 223.774945][ T4068] should_fail_alloc_page+0x55/0x80 [ 223.780230][ T4068] prepare_alloc_pages+0x156/0x600 [ 223.785328][ T4068] ? __alloc_pages_bulk+0xab0/0xab0 [ 223.790785][ T4068] ? kasan_check_range+0x7b/0x290 [ 223.795810][ T4068] __alloc_pages+0x10a/0x440 [ 223.800567][ T4068] ? prep_new_page+0x110/0x110 [ 223.805318][ T4068] ? __kasan_check_write+0x14/0x20 [ 223.810429][ T4068] ? release_firmware_map_entry+0x190/0x190 [ 223.816307][ T4068] __get_free_pages+0x10/0x30 [ 223.820973][ T4068] kasan_populate_vmalloc_pte+0x29/0x120 [ 223.826588][ T4068] __apply_to_page_range+0x8b0/0xbf0 [ 223.831884][ T4068] ? kasan_populate_vmalloc+0x70/0x70 [ 223.837242][ T4068] ? kasan_populate_vmalloc+0x70/0x70 [ 223.842596][ T4068] apply_to_page_range+0x3b/0x50 [ 223.847606][ T4068] kasan_populate_vmalloc+0x60/0x70 [ 223.852883][ T4068] alloc_vmap_area+0x185c/0x1990 [ 223.857809][ T4068] ? vm_map_ram+0xa60/0xa60 [ 223.862290][ T4068] ? __get_vm_area_node+0x11d/0x350 [ 223.867485][ T4068] __get_vm_area_node+0x14e/0x350 [ 223.872521][ T4068] __vmalloc_node_range+0xdf/0xaf0 [ 223.877612][ T4068] ? sock_hash_alloc+0x2bc/0x540 [ 223.882543][ T4068] ? irqentry_exit+0x37/0x40 [ 223.887132][ T4068] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 223.893017][ T4068] bpf_map_area_alloc+0xd5/0xe0 [ 223.898149][ T4068] ? sock_hash_alloc+0x2bc/0x540 [ 223.903158][ T4068] sock_hash_alloc+0x2bc/0x540 [ 223.907908][ T4068] map_create+0x455/0x21b0 [ 223.912406][ T4068] __sys_bpf+0x2cf/0x730 [ 223.916642][ T4068] ? bpf_link_show_fdinfo+0x310/0x310 [ 223.922104][ T4068] __x64_sys_bpf+0x7c/0x90 [ 223.926516][ T4068] x64_sys_call+0x4b9/0x9a0 [ 223.931028][ T4068] do_syscall_64+0x4c/0xa0 [ 223.935427][ T4068] ? clear_bhb_loop+0x50/0xa0 [ 223.940179][ T4068] ? clear_bhb_loop+0x50/0xa0 [ 223.944846][ T4068] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 223.950816][ T4068] RIP: 0033:0x7fb54ba81be9 [ 223.955301][ T4068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.975000][ T4068] RSP: 002b:00007fb54a4ea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 223.983420][ T4068] RAX: ffffffffffffffda RBX: 00007fb54bca8fa0 RCX: 00007fb54ba81be9 [ 223.991639][ T4068] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 0000000000000000 [ 223.999610][ T4068] RBP: 00007fb54a4ea090 R08: 0000000000000000 R09: 0000000000000000 [ 224.007566][ T4068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 224.015613][ T4068] R13: 00007fb54bca9038 R14: 00007fb54bca8fa0 R15: 00007ffe51209428 [ 224.023668][ T4068] [ 224.038266][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.064641][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.082336][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.101485][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.115474][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.122578][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.144405][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.161998][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.179028][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.186149][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.210021][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.265462][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.287871][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.305638][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.394901][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.404792][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 224.425146][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.456263][ T4016] device veth0_vlan entered promiscuous mode [ 224.569800][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 224.600010][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.694923][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.784708][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.902349][ T4016] device veth1_macvtap entered promiscuous mode [ 224.995817][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 225.035705][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 225.119688][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 225.228842][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 225.273728][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 225.296893][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 225.305726][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 226.322532][ T4092] device syzkaller0 entered promiscuous mode [ 226.647331][ T4100] FAULT_INJECTION: forcing a failure. [ 226.647331][ T4100] name failslab, interval 1, probability 0, space 0, times 0 [ 226.694949][ T4100] CPU: 1 PID: 4100 Comm: syz.1.1243 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 226.705137][ T4100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 226.715457][ T4100] Call Trace: [ 226.718745][ T4100] [ 226.721678][ T4100] __dump_stack+0x21/0x30 [ 226.726020][ T4100] dump_stack_lvl+0xee/0x150 [ 226.730605][ T4100] ? show_regs_print_info+0x20/0x20 [ 226.735884][ T4100] ? avc_has_perm_noaudit+0x2f4/0x460 [ 226.741267][ T4100] dump_stack+0x15/0x20 [ 226.745542][ T4100] should_fail+0x3c1/0x510 [ 226.749951][ T4100] __should_failslab+0xa4/0xe0 [ 226.755243][ T4100] should_failslab+0x9/0x20 [ 226.759738][ T4100] slab_pre_alloc_hook+0x3b/0xe0 [ 226.764749][ T4100] __kmalloc+0x6d/0x2c0 [ 226.768973][ T4100] ? bpf_map_meta_alloc+0x1cd/0x8c0 [ 226.774159][ T4100] ? __fdget+0x1a1/0x230 [ 226.778398][ T4100] bpf_map_meta_alloc+0x1cd/0x8c0 [ 226.783534][ T4100] htab_of_map_alloc+0x38/0xc0 [ 226.788301][ T4100] map_create+0x455/0x21b0 [ 226.792879][ T4100] __sys_bpf+0x2cf/0x730 [ 226.797159][ T4100] ? bpf_link_show_fdinfo+0x310/0x310 [ 226.802700][ T4100] ? debug_smp_processor_id+0x17/0x20 [ 226.808318][ T4100] __x64_sys_bpf+0x7c/0x90 [ 226.812720][ T4100] x64_sys_call+0x4b9/0x9a0 [ 226.817212][ T4100] do_syscall_64+0x4c/0xa0 [ 226.821707][ T4100] ? clear_bhb_loop+0x50/0xa0 [ 226.826456][ T4100] ? clear_bhb_loop+0x50/0xa0 [ 226.831201][ T4100] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 226.837169][ T4100] RIP: 0033:0x7f594e11bbe9 [ 226.841579][ T4100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.861349][ T4100] RSP: 002b:00007f594cb84038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 226.883822][ T4100] RAX: ffffffffffffffda RBX: 00007f594e342fa0 RCX: 00007f594e11bbe9 [ 226.891786][ T4100] RDX: 0000000000000048 RSI: 00002000000008c0 RDI: 0c00000000000000 [ 226.899739][ T4100] RBP: 00007f594cb84090 R08: 0000000000000000 R09: 0000000000000000 [ 226.907866][ T4100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 226.915820][ T4100] R13: 00007f594e343038 R14: 00007f594e342fa0 R15: 00007ffe621dfd48 [ 226.923813][ T4100] [ 227.385232][ T4096] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.392471][ T4096] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.401395][ T4096] device bridge_slave_0 entered promiscuous mode [ 227.415667][ T4096] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.422720][ T4096] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.430200][ T4096] device bridge_slave_1 entered promiscuous mode [ 228.285440][ T450] device bridge_slave_1 left promiscuous mode [ 228.291612][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.448966][ T450] device bridge_slave_0 left promiscuous mode [ 228.570783][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.805364][ T450] device veth1_macvtap left promiscuous mode [ 228.811415][ T450] device veth0_vlan left promiscuous mode [ 229.315601][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.343764][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.530628][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.626379][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.694936][ T627] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.701997][ T627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.801504][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.810211][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.818608][ T627] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.825815][ T627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.834204][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.939644][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.029060][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.295602][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.325381][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.491995][ T4096] device veth0_vlan entered promiscuous mode [ 230.567813][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.705216][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.865320][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.925325][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.025388][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.078715][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.093218][ T4096] device veth1_macvtap entered promiscuous mode [ 231.167589][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.248909][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.267103][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.365040][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.515241][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.585734][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 231.695061][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 231.789276][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 231.842620][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 233.250666][ T4162] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.258292][ T4162] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.266225][ T4162] device bridge_slave_0 entered promiscuous mode [ 233.275399][ T4162] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.282449][ T4162] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.290441][ T4162] device bridge_slave_1 entered promiscuous mode [ 233.572153][ T450] device bridge_slave_1 left promiscuous mode [ 233.578425][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.636366][ T450] device bridge_slave_0 left promiscuous mode [ 233.707679][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.812081][ T450] device veth1_macvtap left promiscuous mode [ 233.871360][ T450] device veth0_vlan left promiscuous mode [ 234.009597][ T4162] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.016684][ T4162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.024130][ T4162] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.031590][ T4162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.053898][ T627] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.061440][ T627] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.244090][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.252698][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.300579][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.309317][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.317818][ T627] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.324887][ T627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.490450][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.499109][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.511561][ T627] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.518652][ T627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.659016][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.707359][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.833009][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.850689][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.939818][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 235.012326][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 235.374297][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 235.402800][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.537397][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.545340][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.605383][ T4162] device veth0_vlan entered promiscuous mode [ 235.752636][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.762142][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.776141][ T4162] device veth1_macvtap entered promiscuous mode [ 235.796266][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.826995][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.882052][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.891958][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 235.900551][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 237.373994][ T4230] device syzkaller0 entered promiscuous mode [ 237.656527][ T4230] device syzkaller0 left promiscuous mode [ 237.737559][ T450] device bridge_slave_1 left promiscuous mode [ 237.743787][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.754539][ T450] device bridge_slave_0 left promiscuous mode [ 237.761192][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.769774][ T450] device veth1_macvtap left promiscuous mode [ 237.775965][ T450] device veth0_vlan left promiscuous mode [ 237.916109][ T4234] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.934878][ T4234] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.947707][ T4234] device bridge_slave_0 entered promiscuous mode [ 237.955714][ T4234] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.962869][ T4234] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.970906][ T4234] device bridge_slave_1 entered promiscuous mode [ 238.133963][ T4234] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.141177][ T4234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.148505][ T4234] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.155554][ T4234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.204171][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.214306][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.233919][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.283775][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.315929][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.410541][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.524078][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.535652][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.545262][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.586486][ T4234] device veth0_vlan entered promiscuous mode [ 238.649373][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 238.658776][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.725601][ T4234] device veth1_macvtap entered promiscuous mode [ 238.821588][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 238.841897][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.851030][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.862680][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.929569][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.266636][ T450] device bridge_slave_1 left promiscuous mode [ 240.272761][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.280725][ T450] device bridge_slave_0 left promiscuous mode [ 240.287235][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.295707][ T450] device veth1_macvtap left promiscuous mode [ 240.301714][ T450] device veth0_vlan left promiscuous mode [ 240.590550][ T4328] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.597885][ T4328] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.605725][ T4328] device bridge_slave_0 entered promiscuous mode [ 240.612859][ T4328] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.620033][ T4328] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.627602][ T4328] device bridge_slave_1 entered promiscuous mode [ 241.829953][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.855387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.947430][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.965259][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.974126][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.981253][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.998634][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.007211][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.016526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.025461][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.032513][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.060307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.069330][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.077763][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.086429][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.100742][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 242.109370][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 242.156722][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 242.180049][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.231272][ T4328] device veth0_vlan entered promiscuous mode [ 242.327662][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.338929][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.352910][ T4328] device veth1_macvtap entered promiscuous mode [ 242.382562][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 242.396491][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 242.405541][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.496482][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 242.511048][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.530823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.543650][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 244.115961][ T450] device bridge_slave_1 left promiscuous mode [ 244.122218][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.165969][ T450] device bridge_slave_0 left promiscuous mode [ 244.172402][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.180526][ T450] device veth1_macvtap left promiscuous mode [ 244.186631][ T450] device veth0_vlan left promiscuous mode [ 244.297427][ T4404] FAULT_INJECTION: forcing a failure. [ 244.297427][ T4404] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 244.312484][ T4404] CPU: 0 PID: 4404 Comm: syz.0.1329 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 244.322753][ T4404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 244.332817][ T4404] Call Trace: [ 244.336330][ T4404] [ 244.339261][ T4404] __dump_stack+0x21/0x30 [ 244.343588][ T4404] dump_stack_lvl+0xee/0x150 [ 244.348163][ T4404] ? show_regs_print_info+0x20/0x20 [ 244.353557][ T4404] dump_stack+0x15/0x20 [ 244.357732][ T4404] should_fail+0x3c1/0x510 [ 244.362244][ T4404] should_fail_alloc_page+0x55/0x80 [ 244.367542][ T4404] prepare_alloc_pages+0x156/0x600 [ 244.372638][ T4404] ? __alloc_pages_bulk+0xab0/0xab0 [ 244.377826][ T4404] ? slab_post_alloc_hook+0x4f/0x2b0 [ 244.383355][ T4404] ? kmem_cache_alloc+0xf7/0x260 [ 244.388513][ T4404] ? alloc_vmap_area+0x17a/0x1990 [ 244.393632][ T4404] ? __get_vm_area_node+0x14e/0x350 [ 244.398825][ T4404] ? __vmalloc_node_range+0xdf/0xaf0 [ 244.404379][ T4404] ? htab_map_alloc+0xb29/0x14f0 [ 244.409738][ T4404] __alloc_pages+0x10a/0x440 [ 244.414397][ T4404] ? prep_new_page+0x110/0x110 [ 244.419147][ T4404] __get_free_pages+0x10/0x30 [ 244.423816][ T4404] kasan_populate_vmalloc_pte+0x29/0x120 [ 244.429435][ T4404] __apply_to_page_range+0x8b0/0xbf0 [ 244.434701][ T4404] ? kasan_populate_vmalloc+0x70/0x70 [ 244.440058][ T4404] ? kasan_populate_vmalloc+0x70/0x70 [ 244.445410][ T4404] apply_to_page_range+0x3b/0x50 [ 244.450332][ T4404] kasan_populate_vmalloc+0x60/0x70 [ 244.455515][ T4404] alloc_vmap_area+0x185c/0x1990 [ 244.460531][ T4404] ? vm_map_ram+0xa60/0xa60 [ 244.465023][ T4404] ? __get_vm_area_node+0x11d/0x350 [ 244.470304][ T4404] __get_vm_area_node+0x14e/0x350 [ 244.475349][ T4404] __vmalloc_node_range+0xdf/0xaf0 [ 244.480458][ T4404] ? htab_map_alloc+0xb29/0x14f0 [ 244.485393][ T4404] bpf_map_area_alloc+0xd5/0xe0 [ 244.490226][ T4404] ? htab_map_alloc+0xb29/0x14f0 [ 244.495142][ T4404] htab_map_alloc+0xb29/0x14f0 [ 244.499887][ T4404] map_create+0x455/0x21b0 [ 244.504284][ T4404] __sys_bpf+0x2cf/0x730 [ 244.508503][ T4404] ? bpf_link_show_fdinfo+0x310/0x310 [ 244.513947][ T4404] ? debug_smp_processor_id+0x17/0x20 [ 244.519319][ T4404] __x64_sys_bpf+0x7c/0x90 [ 244.523747][ T4404] x64_sys_call+0x4b9/0x9a0 [ 244.528248][ T4404] do_syscall_64+0x4c/0xa0 [ 244.532657][ T4404] ? clear_bhb_loop+0x50/0xa0 [ 244.537367][ T4404] ? clear_bhb_loop+0x50/0xa0 [ 244.542028][ T4404] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 244.547926][ T4404] RIP: 0033:0x7fb54ba81be9 [ 244.552328][ T4404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.571932][ T4404] RSP: 002b:00007fb54a4ea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 244.580336][ T4404] RAX: ffffffffffffffda RBX: 00007fb54bca8fa0 RCX: 00007fb54ba81be9 [ 244.588296][ T4404] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 244.596525][ T4404] RBP: 00007fb54a4ea090 R08: 0000000000000000 R09: 0000000000000000 [ 244.604521][ T4404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.612650][ T4404] R13: 00007fb54bca9038 R14: 00007fb54bca8fa0 R15: 00007ffe51209428 [ 244.620622][ T4404] [ 244.686713][ T4402] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.694191][ T4402] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.701902][ T4402] device bridge_slave_0 entered promiscuous mode [ 244.708925][ T4402] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.716047][ T4402] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.723550][ T4402] device bridge_slave_1 entered promiscuous mode [ 244.777410][ T4402] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.784536][ T4402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.792153][ T4402] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.799207][ T4402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.819029][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.829435][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.838458][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.865971][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.878886][ T30] audit: type=1400 audit(1755634933.226:144): avc: denied { create } for pid=4416 comm="syz.3.1332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 244.908014][ T4425] FAULT_INJECTION: forcing a failure. [ 244.908014][ T4425] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 244.921621][ T4425] CPU: 0 PID: 4425 Comm: syz.3.1333 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 244.931984][ T4425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 244.942045][ T4425] Call Trace: [ 244.945327][ T4425] [ 244.948247][ T4425] __dump_stack+0x21/0x30 [ 244.952571][ T4425] dump_stack_lvl+0xee/0x150 [ 244.957159][ T4425] ? show_regs_print_info+0x20/0x20 [ 244.962344][ T4425] ? _raw_spin_lock+0x8e/0xe0 [ 244.967095][ T4425] ? _raw_spin_trylock_bh+0x130/0x130 [ 244.972460][ T4425] dump_stack+0x15/0x20 [ 244.976629][ T4425] should_fail+0x3c1/0x510 [ 244.981029][ T4425] should_fail_alloc_page+0x55/0x80 [ 244.986242][ T4425] prepare_alloc_pages+0x156/0x600 [ 244.991338][ T4425] ? __alloc_pages_bulk+0xab0/0xab0 [ 244.996608][ T4425] ? fault_around_bytes_set+0xc0/0xc0 [ 245.002061][ T4425] __alloc_pages+0x10a/0x440 [ 245.006646][ T4425] ? prep_new_page+0x110/0x110 [ 245.011407][ T4425] shmem_alloc_and_acct_page+0x42b/0x870 [ 245.017037][ T4425] ? shmem_swapin_page+0x14c0/0x14c0 [ 245.022356][ T4425] ? xas_load+0x2ea/0x300 [ 245.026759][ T4425] ? pagecache_get_page+0xcbd/0xda0 [ 245.031941][ T4425] ? page_cache_prev_miss+0x270/0x270 [ 245.037296][ T4425] shmem_getpage_gfp+0xfe5/0x2310 [ 245.042396][ T4425] shmem_write_begin+0xce/0x1b0 [ 245.047316][ T4425] generic_perform_write+0x2ad/0x670 [ 245.052588][ T4425] ? grab_cache_page_write_begin+0xb0/0xb0 [ 245.058376][ T4425] ? file_remove_privs+0x590/0x590 [ 245.063657][ T4425] ? rwsem_write_trylock+0x130/0x300 [ 245.068923][ T4425] ? clear_nonspinnable+0x60/0x60 [ 245.074031][ T4425] ? avc_policy_seqno+0x1b/0x70 [ 245.078877][ T4425] __generic_file_write_iter+0x268/0x480 [ 245.084513][ T4425] generic_file_write_iter+0xa9/0x1d0 [ 245.089982][ T4425] vfs_write+0x802/0xf70 [ 245.094217][ T4425] ? file_end_write+0x1b0/0x1b0 [ 245.099150][ T4425] ? wait_for_completion_killable_timeout+0x10/0x10 [ 245.105915][ T4425] ? __fget_files+0x2c4/0x320 [ 245.110579][ T4425] ? __fdget_pos+0x2d2/0x380 [ 245.115159][ T4425] ? ksys_write+0x71/0x240 [ 245.119652][ T4425] ksys_write+0x140/0x240 [ 245.123961][ T4425] ? __ia32_sys_read+0x90/0x90 [ 245.128794][ T4425] ? debug_smp_processor_id+0x17/0x20 [ 245.134145][ T4425] __x64_sys_write+0x7b/0x90 [ 245.138716][ T4425] x64_sys_call+0x8ef/0x9a0 [ 245.143319][ T4425] do_syscall_64+0x4c/0xa0 [ 245.147822][ T4425] ? clear_bhb_loop+0x50/0xa0 [ 245.152488][ T4425] ? clear_bhb_loop+0x50/0xa0 [ 245.157243][ T4425] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 245.163122][ T4425] RIP: 0033:0x7f76b50e6be9 [ 245.167525][ T4425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.187558][ T4425] RSP: 002b:00007f76b3b4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 245.196045][ T4425] RAX: ffffffffffffffda RBX: 00007f76b530dfa0 RCX: 00007f76b50e6be9 [ 245.204010][ T4425] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000006 [ 245.212072][ T4425] RBP: 00007f76b3b4f090 R08: 0000000000000000 R09: 0000000000000000 [ 245.220025][ T4425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.228332][ T4425] R13: 00007f76b530e038 R14: 00007f76b530dfa0 R15: 00007ffdd324c238 [ 245.236296][ T4425] [ 245.247307][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.255943][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.262980][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.270976][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.280364][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.288953][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.296137][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.309488][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.325419][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.385208][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.399615][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.409489][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 245.418147][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 245.431038][ T4402] device veth0_vlan entered promiscuous mode [ 245.437817][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 245.447293][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.458158][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.466729][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 245.789815][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 245.830754][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 245.916366][ T4402] device veth1_macvtap entered promiscuous mode [ 245.925215][ T4444] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.932456][ T4444] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.941249][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 245.959642][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 245.984111][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 245.993543][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 246.007197][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 246.018871][ T4438] device bridge_slave_1 left promiscuous mode [ 246.026176][ T4438] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.035366][ T4438] device bridge_slave_0 left promiscuous mode [ 246.041797][ T4438] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.398335][ T4467] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.405995][ T4467] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.413693][ T4467] device bridge_slave_0 entered promiscuous mode [ 247.421206][ T4467] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.437051][ T4467] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.444585][ T4467] device bridge_slave_1 entered promiscuous mode [ 247.520253][ T4467] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.527418][ T4467] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.534973][ T4467] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.542085][ T4467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.578668][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.586579][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.596408][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.624446][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.643095][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.801261][ T450] device bridge_slave_1 left promiscuous mode [ 247.815064][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.905092][ T450] device bridge_slave_0 left promiscuous mode [ 247.962170][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.025053][ T450] device veth1_macvtap left promiscuous mode [ 248.036208][ T450] device veth0_vlan left promiscuous mode [ 248.258880][ T4505] syz.4.1357[4505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.258975][ T4505] syz.4.1357[4505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.310443][ T4508] syz.4.1357[4508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.355421][ T4508] syz.4.1357[4508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.396422][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 248.416923][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.424959][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.432590][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 248.449696][ T4467] device veth0_vlan entered promiscuous mode [ 248.493372][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 248.505818][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 248.522241][ T4467] device veth1_macvtap entered promiscuous mode [ 248.538220][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 248.553155][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 248.581492][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 248.651070][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 248.665537][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 249.706098][ T450] device bridge_slave_1 left promiscuous mode [ 249.712376][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.719955][ T450] device bridge_slave_0 left promiscuous mode [ 249.726334][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.733994][ T450] device veth1_macvtap left promiscuous mode [ 249.740055][ T450] device veth0_vlan left promiscuous mode [ 250.032540][ T4542] device wg2 entered promiscuous mode [ 250.664625][ T4549] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.775046][ T4549] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.900385][ T4549] device bridge_slave_0 entered promiscuous mode [ 250.986246][ T4549] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.993480][ T4549] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.005088][ T4549] device bridge_slave_1 entered promiscuous mode [ 251.417543][ T4549] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.424698][ T4549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.432163][ T4549] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.439259][ T4549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.505285][ T627] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.512852][ T627] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.521055][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.528703][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.548861][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.557348][ T627] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.564384][ T627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.573739][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.582060][ T627] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.589150][ T627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.643064][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.651231][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.667940][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.677190][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.690749][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.701226][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.793209][ T4549] device veth0_vlan entered promiscuous mode [ 251.824561][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 251.850205][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.871016][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.880980][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.895269][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 251.903699][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 251.918308][ T4549] device veth1_macvtap entered promiscuous mode [ 251.936678][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 251.955076][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 251.975977][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 251.990746][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 251.999104][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.145923][ T4549] syz-executor (4549) used greatest stack depth: 19840 bytes left [ 252.865505][ T450] device bridge_slave_1 left promiscuous mode [ 252.871869][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.879560][ T450] device bridge_slave_0 left promiscuous mode [ 252.885791][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.893455][ T450] device veth1_macvtap left promiscuous mode [ 252.899619][ T450] device veth0_vlan left promiscuous mode [ 254.050774][ T4634] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.138731][ T4634] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.252487][ T4634] device bridge_slave_0 entered promiscuous mode [ 254.373728][ T4634] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.478939][ T4634] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.576023][ T4634] device bridge_slave_1 entered promiscuous mode [ 255.002935][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.011084][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.027078][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.035872][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.044099][ T450] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.051166][ T450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.064068][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.073241][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.081764][ T450] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.088824][ T450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.105533][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.113502][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.122225][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 255.138094][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.147269][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.155706][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.163254][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.172279][ T4634] device veth0_vlan entered promiscuous mode [ 255.185400][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 255.195459][ T4634] device veth1_macvtap entered promiscuous mode [ 255.207914][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.222869][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.985404][ T450] device bridge_slave_1 left promiscuous mode [ 255.991556][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.999040][ T450] device bridge_slave_0 left promiscuous mode [ 256.005257][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.012931][ T450] device veth1_macvtap left promiscuous mode [ 256.019059][ T450] device veth0_vlan left promiscuous mode [ 257.153602][ T4685] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.191573][ T4685] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.200333][ T4685] device bridge_slave_0 entered promiscuous mode [ 257.239426][ T4701] device pim6reg1 entered promiscuous mode [ 257.245938][ T4685] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.253295][ T4685] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.260799][ T4685] device bridge_slave_1 entered promiscuous mode [ 257.933777][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.942169][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.965694][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.974271][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.982878][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.990153][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.999367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.008479][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.017301][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.024455][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.032060][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.062072][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 258.070642][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.078851][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 258.087592][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.102837][ T4685] device veth0_vlan entered promiscuous mode [ 258.114462][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 258.123344][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 258.132196][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 258.141017][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.149272][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.157105][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.172263][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 258.186441][ T4685] device veth1_macvtap entered promiscuous mode [ 258.196702][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 258.205216][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 258.222339][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 258.231116][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 258.969653][ T8] device bridge_slave_1 left promiscuous mode [ 258.999717][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.061244][ T8] device bridge_slave_0 left promiscuous mode [ 259.067755][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.076554][ T8] device veth1_macvtap left promiscuous mode [ 259.082583][ T8] device veth0_vlan left promiscuous mode [ 261.110727][ T4748] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.129391][ T4748] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.138240][ T4748] device bridge_slave_0 entered promiscuous mode [ 261.266150][ T4748] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.273618][ T4748] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.538349][ T4748] device bridge_slave_1 entered promiscuous mode [ 263.201101][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 263.218897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.293825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.316620][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.342290][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.349387][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.437695][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.446201][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.454561][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.461662][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.474624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 263.488625][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.547413][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 263.568296][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.606318][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 263.652566][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 263.661425][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 263.691687][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 263.700361][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.708849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.717498][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.736213][ T4748] device veth0_vlan entered promiscuous mode [ 263.749102][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 263.758619][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 263.770280][ T4748] device veth1_macvtap entered promiscuous mode [ 263.781703][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 263.790066][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 263.799013][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 263.819343][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 263.973155][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 265.025503][ T8] device bridge_slave_1 left promiscuous mode [ 265.031666][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.039554][ T8] device bridge_slave_0 left promiscuous mode [ 265.045891][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.053809][ T8] device veth1_macvtap left promiscuous mode [ 265.060042][ T8] device veth0_vlan left promiscuous mode [ 266.332106][ T4817] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.390969][ T4817] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.455404][ T4817] device bridge_slave_0 entered promiscuous mode [ 266.507437][ T4817] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.536389][ T30] audit: type=1400 audit(1755634954.886:145): avc: denied { create } for pid=4842 comm="syz.1.1450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 266.609580][ T4817] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.649778][ T4817] device bridge_slave_1 entered promiscuous mode [ 266.893600][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.905089][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.913466][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.922100][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.931713][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.938796][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.946847][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.997077][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.057351][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.134615][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.141716][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.149730][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.158122][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.229744][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 267.251910][ T4817] device veth0_vlan entered promiscuous mode [ 267.290566][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.306310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.379923][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.471626][ T4817] device veth1_macvtap entered promiscuous mode [ 267.490858][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 267.499778][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 267.508874][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 267.547551][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 267.556073][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 267.566120][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 267.574460][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 268.255427][ T450] device bridge_slave_1 left promiscuous mode [ 268.261566][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.269851][ T450] device bridge_slave_0 left promiscuous mode [ 268.276705][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.284543][ T450] device veth1_macvtap left promiscuous mode [ 268.290777][ T450] device veth0_vlan left promiscuous mode [ 269.420540][ T4885] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.428147][ T4885] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.435702][ T4885] device bridge_slave_0 entered promiscuous mode [ 269.442934][ T4885] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.450014][ T4885] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.457599][ T4885] device bridge_slave_1 entered promiscuous mode [ 269.956478][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.015076][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.186294][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.213514][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.242822][ T450] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.250292][ T450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.336438][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.345363][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.353718][ T450] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.360897][ T450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.386200][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 270.415287][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.423565][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 270.431958][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.440489][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.495741][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 270.504640][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.516631][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 270.525158][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.534156][ T4885] device veth0_vlan entered promiscuous mode [ 270.545939][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.559034][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.574172][ T4885] device veth1_macvtap entered promiscuous mode [ 270.581204][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.595732][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.611059][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.630072][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.652662][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.810014][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.818601][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 270.884094][ T4928] FAULT_INJECTION: forcing a failure. [ 270.884094][ T4928] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 270.899662][ T4928] CPU: 1 PID: 4928 Comm: syz.1.1471 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 270.910133][ T4928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 270.920267][ T4928] Call Trace: [ 270.923616][ T4928] [ 270.926530][ T4928] __dump_stack+0x21/0x30 [ 270.930866][ T4928] dump_stack_lvl+0xee/0x150 [ 270.935454][ T4928] ? show_regs_print_info+0x20/0x20 [ 270.940639][ T4928] dump_stack+0x15/0x20 [ 270.944791][ T4928] should_fail+0x3c1/0x510 [ 270.949221][ T4928] should_fail_usercopy+0x1a/0x20 [ 270.954239][ T4928] strncpy_from_user+0x24/0x2e0 [ 270.959083][ T4928] ? kmem_cache_alloc+0xf7/0x260 [ 270.964190][ T4928] getname_flags+0xf4/0x500 [ 270.968849][ T4928] user_path_at_empty+0x30/0x1c0 [ 270.973869][ T4928] bpf_obj_get_user+0xb6/0x480 [ 270.978715][ T4928] ? bpf_obj_pin_user+0x2c0/0x2c0 [ 270.983828][ T4928] bpf_obj_get+0xd3/0x120 [ 270.988161][ T4928] __sys_bpf+0x447/0x730 [ 270.992444][ T4928] ? bpf_link_show_fdinfo+0x310/0x310 [ 270.998417][ T4928] ? bpf_trace_run2+0xb5/0x1b0 [ 271.003194][ T4928] ? __bpf_trace_sys_enter+0x62/0x70 [ 271.008885][ T4928] __x64_sys_bpf+0x7c/0x90 [ 271.013304][ T4928] x64_sys_call+0x4b9/0x9a0 [ 271.017798][ T4928] do_syscall_64+0x4c/0xa0 [ 271.022217][ T4928] ? clear_bhb_loop+0x50/0xa0 [ 271.026897][ T4928] ? clear_bhb_loop+0x50/0xa0 [ 271.031648][ T4928] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 271.037792][ T4928] RIP: 0033:0x7f594e11bbe9 [ 271.042281][ T4928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 271.062738][ T4928] RSP: 002b:00007f594cb84038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 271.071273][ T4928] RAX: ffffffffffffffda RBX: 00007f594e342fa0 RCX: 00007f594e11bbe9 [ 271.079232][ T4928] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 271.087223][ T4928] RBP: 00007f594cb84090 R08: 0000000000000000 R09: 0000000000000000 [ 271.095182][ T4928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 271.103135][ T4928] R13: 00007f594e343038 R14: 00007f594e342fa0 R15: 00007ffe621dfd48 [ 271.111099][ T4928] [ 271.739947][ T450] device bridge_slave_1 left promiscuous mode [ 271.746126][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.753565][ T450] device bridge_slave_0 left promiscuous mode [ 271.759909][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.767751][ T450] device veth1_macvtap left promiscuous mode [ 271.773830][ T450] device veth0_vlan left promiscuous mode [ 273.335260][ T4946] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.342454][ T4946] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.355625][ T4946] device bridge_slave_0 entered promiscuous mode [ 273.468461][ T4946] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.475898][ T4946] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.484974][ T4946] device bridge_slave_1 entered promiscuous mode [ 274.028835][ T4972] FAULT_INJECTION: forcing a failure. [ 274.028835][ T4972] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 274.042663][ T4972] CPU: 1 PID: 4972 Comm: syz.4.1484 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 274.053090][ T4972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 274.063290][ T4972] Call Trace: [ 274.066730][ T4972] [ 274.069854][ T4972] __dump_stack+0x21/0x30 [ 274.074369][ T4972] dump_stack_lvl+0xee/0x150 [ 274.078955][ T4972] ? show_regs_print_info+0x20/0x20 [ 274.084347][ T4972] ? finish_task_switch+0x16b/0x780 [ 274.089552][ T4972] ? __switch_to_asm+0x3a/0x60 [ 274.094381][ T4972] dump_stack+0x15/0x20 [ 274.098529][ T4972] should_fail+0x3c1/0x510 [ 274.103204][ T4972] should_fail_usercopy+0x1a/0x20 [ 274.108317][ T4972] _copy_from_user+0x20/0xd0 [ 274.112927][ T4972] kstrtouint_from_user+0xbe/0x200 [ 274.118031][ T4972] ? kstrtol_from_user+0x260/0x260 [ 274.123136][ T4972] ? preempt_schedule_irq+0xbb/0x110 [ 274.128527][ T4972] ? _copy_to_user+0x78/0x90 [ 274.133113][ T4972] proc_fail_nth_write+0x85/0x1f0 [ 274.138213][ T4972] ? proc_fail_nth_read+0x210/0x210 [ 274.143405][ T4972] ? security_file_permission+0x79/0xa0 [ 274.148953][ T4972] ? security_file_permission+0x83/0xa0 [ 274.154528][ T4972] ? proc_fail_nth_read+0x210/0x210 [ 274.159907][ T4972] vfs_write+0x3ee/0xf70 [ 274.164254][ T4972] ? file_end_write+0x1b0/0x1b0 [ 274.169225][ T4972] ? __kasan_check_write+0x14/0x20 [ 274.174465][ T4972] ? mutex_lock+0x95/0x1a0 [ 274.178965][ T4972] ? wait_for_completion_killable_timeout+0x10/0x10 [ 274.185626][ T4972] ? __fget_files+0x2c4/0x320 [ 274.190390][ T4972] ? __fdget_pos+0x2d2/0x380 [ 274.194988][ T4972] ? ksys_write+0x71/0x240 [ 274.199389][ T4972] ksys_write+0x140/0x240 [ 274.203704][ T4972] ? __ia32_sys_read+0x90/0x90 [ 274.208453][ T4972] ? __kasan_check_write+0x14/0x20 [ 274.213546][ T4972] ? switch_fpu_return+0x15d/0x2c0 [ 274.218727][ T4972] __x64_sys_write+0x7b/0x90 [ 274.223299][ T4972] x64_sys_call+0x8ef/0x9a0 [ 274.227784][ T4972] do_syscall_64+0x4c/0xa0 [ 274.232183][ T4972] ? clear_bhb_loop+0x50/0xa0 [ 274.236890][ T4972] ? clear_bhb_loop+0x50/0xa0 [ 274.241565][ T4972] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 274.247438][ T4972] RIP: 0033:0x7f214f33f69f [ 274.251840][ T4972] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 274.271545][ T4972] RSP: 002b:00007f214dda9030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 274.280041][ T4972] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f214f33f69f [ 274.288179][ T4972] RDX: 0000000000000001 RSI: 00007f214dda90a0 RDI: 0000000000000009 [ 274.296574][ T4972] RBP: 00007f214dda9090 R08: 0000000000000000 R09: 0000000000000000 [ 274.304642][ T4972] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 274.312606][ T4972] R13: 00007f214f568038 R14: 00007f214f567fa0 R15: 00007ffcaed74148 [ 274.320568][ T4972] [ 274.417639][ T4968] device sit0 left promiscuous mode [ 274.594619][ T4978] device wg2 left promiscuous mode [ 274.777576][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.808441][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.897170][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.913471][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.922211][ T627] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.929294][ T627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.966270][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 274.977475][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.987402][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.995845][ T627] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.003016][ T627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.075147][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 275.083820][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 275.092103][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 275.102059][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 275.225283][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 275.275440][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 275.349492][ T4946] device veth0_vlan entered promiscuous mode [ 275.498568][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 275.525732][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 275.736390][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 275.750128][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 275.867276][ T4946] device veth1_macvtap entered promiscuous mode [ 275.908370][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 275.928736][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 275.937469][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 276.099322][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 276.108437][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.265232][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 276.297593][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 276.556423][ T5023] device wg2 left promiscuous mode [ 277.265700][ T450] device bridge_slave_1 left promiscuous mode [ 277.271850][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.279542][ T450] device bridge_slave_0 left promiscuous mode [ 277.285850][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.293766][ T450] device veth1_macvtap left promiscuous mode [ 277.299878][ T450] device veth0_vlan left promiscuous mode [ 278.683399][ T5050] FAULT_INJECTION: forcing a failure. [ 278.683399][ T5050] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 278.763801][ T5047] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.773461][ T5050] CPU: 1 PID: 5050 Comm: syz.4.1512 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 278.783779][ T5050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 278.793967][ T5050] Call Trace: [ 278.797242][ T5050] [ 278.800194][ T5050] __dump_stack+0x21/0x30 [ 278.804639][ T5050] dump_stack_lvl+0xee/0x150 [ 278.809235][ T5050] ? show_regs_print_info+0x20/0x20 [ 278.814464][ T5050] ? __switch_to_asm+0x3a/0x60 [ 278.819430][ T5050] dump_stack+0x15/0x20 [ 278.823677][ T5050] should_fail+0x3c1/0x510 [ 278.828190][ T5050] should_fail_usercopy+0x1a/0x20 [ 278.833222][ T5050] copy_page_to_iter+0x36b/0x820 [ 278.838160][ T5050] sk_msg_recvmsg+0x239/0xbd0 [ 278.842966][ T5050] unix_bpf_recvmsg+0x3f0/0xb10 [ 278.847829][ T5050] ? unix_stream_bpf_update_proto+0x170/0x170 [ 278.853913][ T5050] ? wait_woken+0x170/0x170 [ 278.858431][ T5050] unix_dgram_recvmsg+0xaa/0xe0 [ 278.863284][ T5050] ? unix_dgram_sendmsg+0x1880/0x1880 [ 278.868740][ T5050] ____sys_recvmsg+0x291/0x580 [ 278.873641][ T5050] ? __sys_recvmsg_sock+0x50/0x50 [ 278.878669][ T5050] ? memset+0x35/0x40 [ 278.882675][ T5050] ? import_iovec+0x7c/0xb0 [ 278.887357][ T5050] ___sys_recvmsg+0x1af/0x4f0 [ 278.892163][ T5050] ? __sys_recvmsg+0x250/0x250 [ 278.896923][ T5050] ? vfs_write+0xc17/0xf70 [ 278.901340][ T5050] ? __fdget+0x1a1/0x230 [ 278.905582][ T5050] __x64_sys_recvmsg+0x1df/0x2a0 [ 278.910527][ T5050] ? ___sys_recvmsg+0x4f0/0x4f0 [ 278.915381][ T5050] ? ksys_write+0x1eb/0x240 [ 278.919889][ T5050] ? __bpf_trace_sys_enter+0x62/0x70 [ 278.925252][ T5050] ? trace_sys_enter+0x3d/0x50 [ 278.930008][ T5050] x64_sys_call+0x705/0x9a0 [ 278.934504][ T5050] do_syscall_64+0x4c/0xa0 [ 278.938919][ T5050] ? clear_bhb_loop+0x50/0xa0 [ 278.943590][ T5050] ? clear_bhb_loop+0x50/0xa0 [ 278.948276][ T5050] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 278.954248][ T5050] RIP: 0033:0x7f214f340be9 [ 278.958654][ T5050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.978466][ T5050] RSP: 002b:00007f214dda9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 278.986865][ T5050] RAX: ffffffffffffffda RBX: 00007f214f567fa0 RCX: 00007f214f340be9 [ 278.995145][ T5050] RDX: 0000000040020000 RSI: 00002000000004c0 RDI: 0000000000000004 [ 279.003114][ T5050] RBP: 00007f214dda9090 R08: 0000000000000000 R09: 0000000000000000 [ 279.011075][ T5050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.019115][ T5050] R13: 00007f214f568038 R14: 00007f214f567fa0 R15: 00007ffcaed74148 [ 279.027166][ T5050] [ 279.090811][ T5047] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.163391][ T5047] device bridge_slave_0 entered promiscuous mode [ 279.245728][ T5047] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.309822][ T5047] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.377793][ T5047] device bridge_slave_1 entered promiscuous mode [ 279.561045][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 279.605189][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 279.625263][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 279.708793][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.835102][ T450] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.842191][ T450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.904934][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.916328][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.925181][ T450] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.932400][ T450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.940478][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 280.028729][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 280.037155][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 280.053751][ T5047] device veth0_vlan entered promiscuous mode [ 280.128497][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 280.140147][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.148716][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 280.156734][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.170763][ T5047] device veth1_macvtap entered promiscuous mode [ 280.266298][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 280.473051][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 280.485011][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 280.493551][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 280.502508][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 280.511561][ T5085] device sit0 left promiscuous mode [ 280.521644][ T5088] device wg2 left promiscuous mode [ 282.163933][ T450] device bridge_slave_1 left promiscuous mode [ 282.175621][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.227530][ T450] device bridge_slave_0 left promiscuous mode [ 282.233701][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.241636][ T450] device veth1_macvtap left promiscuous mode [ 282.247812][ T450] device veth0_vlan left promiscuous mode [ 283.245642][ T5100] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.256512][ T5100] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.389056][ T5100] device bridge_slave_0 entered promiscuous mode [ 283.507645][ T5100] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.619881][ T5100] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.755444][ T5100] device bridge_slave_1 entered promiscuous mode [ 284.367921][ T5129] device sit0 left promiscuous mode [ 284.778052][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.785912][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.796327][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.805209][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.813594][ T450] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.820670][ T450] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.872552][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 284.891879][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.017354][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.103267][ T450] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.110456][ T450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.245079][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.253471][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.261594][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.270431][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.286529][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 285.364423][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.440724][ T5100] device veth0_vlan entered promiscuous mode [ 285.499759][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.550245][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.612618][ T5100] device veth1_macvtap entered promiscuous mode [ 285.972941][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.980672][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.988647][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 285.997618][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 286.006113][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.074987][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.144527][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.227030][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.318076][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 287.143149][ T8] device bridge_slave_1 left promiscuous mode [ 287.149341][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.160422][ T8] device bridge_slave_0 left promiscuous mode [ 287.166824][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.175263][ T8] device veth1_macvtap left promiscuous mode [ 287.181436][ T8] device veth0_vlan left promiscuous mode [ 288.827020][ T5168] FAULT_INJECTION: forcing a failure. [ 288.827020][ T5168] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 288.974992][ T5168] CPU: 1 PID: 5168 Comm: syz.1.1544 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 288.985704][ T5168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 288.995777][ T5168] Call Trace: [ 288.999068][ T5168] [ 289.001988][ T5168] __dump_stack+0x21/0x30 [ 289.006493][ T5168] dump_stack_lvl+0xee/0x150 [ 289.011115][ T5168] ? show_regs_print_info+0x20/0x20 [ 289.016308][ T5168] ? memcpy+0x56/0x70 [ 289.020289][ T5168] dump_stack+0x15/0x20 [ 289.024482][ T5168] should_fail+0x3c1/0x510 [ 289.029171][ T5168] should_fail_usercopy+0x1a/0x20 [ 289.034283][ T5168] _copy_to_user+0x20/0x90 [ 289.038707][ T5168] bpf_verifier_vlog+0x1b4/0x330 [ 289.043814][ T5168] __btf_verifier_log+0xd1/0x120 [ 289.048772][ T5168] ? btf_check_sec_info+0x330/0x330 [ 289.054054][ T5168] ? kvmalloc_node+0x231/0x300 [ 289.058827][ T5168] ? memcpy+0x56/0x70 [ 289.062896][ T5168] btf_parse_hdr+0x468/0x7f0 [ 289.067488][ T5168] ? __kasan_check_write+0x14/0x20 [ 289.072599][ T5168] btf_new_fd+0x42c/0x920 [ 289.076924][ T5168] bpf_btf_load+0x6f/0x90 [ 289.081330][ T5168] __sys_bpf+0x515/0x730 [ 289.085564][ T5168] ? bpf_link_show_fdinfo+0x310/0x310 [ 289.090933][ T5168] ? debug_smp_processor_id+0x17/0x20 [ 289.096662][ T5168] __x64_sys_bpf+0x7c/0x90 [ 289.101069][ T5168] x64_sys_call+0x4b9/0x9a0 [ 289.105754][ T5168] do_syscall_64+0x4c/0xa0 [ 289.110396][ T5168] ? clear_bhb_loop+0x50/0xa0 [ 289.115074][ T5168] ? clear_bhb_loop+0x50/0xa0 [ 289.119751][ T5168] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 289.126071][ T5168] RIP: 0033:0x7f594e11bbe9 [ 289.130516][ T5168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 289.150473][ T5168] RSP: 002b:00007f594cb84038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 289.158899][ T5168] RAX: ffffffffffffffda RBX: 00007f594e342fa0 RCX: 00007f594e11bbe9 [ 289.166993][ T5168] RDX: 0000000000000020 RSI: 00002000000002c0 RDI: 0000000000000012 [ 289.174962][ T5168] RBP: 00007f594cb84090 R08: 0000000000000000 R09: 0000000000000000 [ 289.182931][ T5168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 289.190893][ T5168] R13: 00007f594e343038 R14: 00007f594e342fa0 R15: 00007ffe621dfd48 [ 289.198862][ T5168] [ 289.436682][ T5176] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.443862][ T5176] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.594001][ T5176] device bridge_slave_0 entered promiscuous mode [ 289.668307][ T5176] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.689204][ T5176] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.696891][ T5176] device bridge_slave_1 entered promiscuous mode [ 290.877244][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.886675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.906404][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.924883][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.942648][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.949952][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.972933][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.988076][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 291.008458][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.015601][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.179766][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 291.198263][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 291.225207][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.233354][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 291.241552][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.383543][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 291.392414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 291.455739][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 291.467174][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.605773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 291.613376][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 291.622687][ T5176] device veth0_vlan entered promiscuous mode [ 291.835464][ T5176] device veth1_macvtap entered promiscuous mode [ 291.852784][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 291.868594][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 291.881236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 292.027358][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 292.037917][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 292.046793][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 292.056675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=1130 state=3 status=67 (errno 9: Bad file descriptor) [ 292.464844][ T30] audit: type=1400 audit(1755634980.806:146): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14516]" dev="pipefs" ino=14516 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 294.545515][ T450] device bridge_slave_1 left promiscuous mode [ 294.551727][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.559277][ T450] device bridge_slave_0 left promiscuous mode [ 294.565822][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.574147][ T450] device veth1_macvtap left promiscuous mode [ 294.580302][ T450] device veth0_vlan left promiscuous mode [ 296.185433][ T450] device veth1 left promiscuous mode [ 296.190923][ T450] kfree: port 1(veth1) entered disabled state [ 296.198464][ T450] device bridge_slave_1 left promiscuous mode [ 296.204573][ T450] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.212244][ T450] device bridge_slave_0 left promiscuous mode [ 296.218376][ T450] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.226555][ T450] device veth1_macvtap left promiscuous mode [ 296.232616][ T450] device veth1_macvtap left promiscuous mode [ 296.238781][ T450] device veth1_macvtap left promiscuous mode [ 296.244973][ T450] device veth1_macvtap left promiscuous mode