last executing test programs: 25.025689148s ago: executing program 4 (id=4041): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 20.365280655s ago: executing program 4 (id=4041): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) 14.120953082s ago: executing program 4 (id=4041): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) 11.079074837s ago: executing program 0 (id=4614): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00'}, 0x10) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000000)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) 10.813276394s ago: executing program 0 (id=4618): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00000001000058502eef08d2463f8b5b3aab89c35feca8bab84920a86b339fe66afc68785d50", @ANYRES16=0x0, @ANYRES16], 0x50) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f00000005c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000002000000000000000000000018140000", @ANYRES32=r0, @ANYBLOB="00000000000000000000000101000000a9a7d2ced2e5d7e5b7c28a9e7e0b00000000000000bc632a117ca513054e90fa183e9154dacb2b7fc0f8bc900c41a05fcbe9d312cdc7a1e35b16c2384d079e106fc31d28490b46236b3ec54f0596be5b33a7ceb232d1c23e3a3880ae014def2390016fe416"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x84, r0}, 0x38) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000800c10000000000000000000000768b2c00"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000230000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x6, 0x7, 0x9, 0x34908, r2, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x100001, 0x0, 0xb}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r7}, 0x18) 10.033063413s ago: executing program 0 (id=4625): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000000000000000000040000008500000008000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8fbffffb702000008000000b703000005000000850000007b00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r4}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES64=r0, @ANYRESOCT=r2, @ANYRES32=r3, @ANYRESOCT=r0, @ANYRES8=r0, @ANYRESDEC=r0, @ANYBLOB="9e8fd8977325ede67b705c477f2d2d4a4c87e1a211ac74d979e45c5615b87577b6a119939fba454f2f40c7ce8918f7cf6ccde3fcf8619b80df727cd6c323289e2178f8b931b11cdce494fbb59f99b87bb68580a205f3a34fe0c1fa60b47e53877bbc552938b673f8cb32bc16f3a798224212167162446217ff31e7b44c7134b82036f3ec85d4d0e573e058c1684e074942d0c594f58143d7bcf209587e2fc17a9f8ff34d6c2a5faa83e3f57b47967703370d85305762", @ANYRESHEX=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfd4e}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000840)=[0x0, 0x0], &(0x7f0000000880)=[0x0], 0x0, 0xf9, &(0x7f00000008c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c00)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x1ff}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x7, 0x2, &(0x7f0000000200)=@raw=[@map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x8ff5}], &(0x7f0000000280)='GPL\x00', 0xc594, 0x65, &(0x7f0000000380)=""/101, 0x40f00, 0xa, '\x00', 0x0, @fallback=0x11, r7, 0x8, &(0x7f0000000400)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r8, 0xffffffffffffffff, 0x0, &(0x7f0000000c80)=[r1, r0, r5, r9], 0x0, 0x10, 0x4}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r10}, 0x18) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='percpu_create_chunk\x00', r11}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r12}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xf, 0x4, 0x4, 0x10004, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 9.966665499s ago: executing program 1 (id=4626): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac8d8000000000000020e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d10bfe150a7487535f7866907dc6751dfb261a0e3ccae669e173a649c1cfd6587d452d46b7c57d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983c044c03bf3ff03fe3e26e7a23129d6606fd28a7f9105f82317874b33d96b39fa4e045469989d552af6200000003a00000000000000abecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f1623ed38ae89d24e14b40234756ddcebfba2f87925bfacba83109753f543ad027edd68149ee99eebc6f7d6dd4aed4afe1f44ccb19e810879b70a70900000000000000000000d7900a820b6327944e9a217b9800e02a92895614cd50cbf83a1ed25268816b004519c9c5cff097d8000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d6209000000c773713a66b223fa8b148871c8d31d24000025449f106b99893ed20fa7a050fbbef90327e827e513e9606800000000e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e69ee52b59d13182e1f24ed208ada12f7a1525320e71666f472a972d5eb1affb87ba55b2d72078e9f40b4ae7dc3b2aeb0d11cd22c35d32940f19dff00ffffffff080000ff003853e59de7621e348955735264f34b1046a1813668297a7edad187ef106ae7fcbb25090f17d0baadeb8ae190a1fb5a315f8347fb0379659500000000000000000000000000000000000000002fdf0193ec79c90ed210ebc2fbed6d4216770c1b0dec886b388d138c2b69c6aacb714e7264093061c660a5100b7cc165889eb94c8d7c77b6fa06f1a4d8e4a6b6cb37e319c5c22f276b03cae853f42b07ca0b03b1eb32a6b1a81cd511fd0b59d57a11c6a3ebf9731464ad21f07f618efc31023ac60007426162b57e803519954d7c952197b0a508c0e16fda392fa84be38e937d36af1c35138e05a9e8d6dc0272de72c41500000000304402e22af23437126f330f8eb4075daaeae3134ece35cd86d95bd9836bd186c4b6565e967a4e3e86f299b7400994ba136b4eccf3b0f001a266c0d160b3ce1182001d64b52a5ce7f506295d59eea6903b84ffbabf5a5b91c1d6ecce8728a224aec66c610e3becd60a35e848c224f8251947eed20e2b612cb099bfe8924d33ba7f0691fed04a43e9c64b7a1e3165e86cdb9871c678a6bbb14821f441c6c14d1bd78d8ffdfea12c19ea04264335d60b6b7a7da6fb83f33101db32f6ab137d943dd3c1e8db9f3e1263573dc721ae82fe0bc63598751a5092c9f7dbfc39d564834e3703492c2a651643d8ce5c36d97a4812cf73fc8ea0d6"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0xb) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8602, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[], 0x66) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7, 0x0, 0x500000000000000}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$tipc(0x1e, 0x4, 0x0, 0x0) 9.675702598s ago: executing program 4 (id=4041): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 7.747667362s ago: executing program 0 (id=4627): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.swap.current\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xde, &(0x7f0000000440), 0x0, 0x10, &(0x7f0000000480), 0x0, 0x0, 0xdb, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x4) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x4a}, 0x20) socketpair(0x29, 0x80000, 0x2, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071104a00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={0xffffffffffffffff, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x50) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'hsr0\x00', 0x20}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_devices(r3, &(0x7f0000000080)=ANY=[@ANYRES8=r6], 0xa) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x5, &(0x7f0000000bc0)=ANY=[@ANYBLOB="186a6f660f2c72b8ca70000000980c0000000000000600000083125000000000008594e0fff0ffffad59f4bc6ed140f588f234d2022a75202db1eb7ac4c69f891b505732a437df8222e2bdf8e990eb31d69af53d7742a40da398da386013fbbf9b51876899c4aa84d9c5cb363be877b3417b245ce4d09ad8cca8af589b44117146bd4c4f51cc0949e2c598f98ae68799ea8fe889f54a9a9e2265a108fd407f37e5c5ba562d344be72f8ab0cb1e466ce8901ff6d7e56a96fea7a85709ab4ef187696eb12a5a96eb9014aeacc70a7c1bea976b59aafb964fb14a9e2f56d07e726c45c9d30c1fbc"], 0x0, 0x7, 0x0, 0x0, 0x41000, 0x44, '\x00', r2, 0x25, r7, 0x8, &(0x7f0000000340)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x2, 0x5}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000400), &(0x7f00000004c0)=[{0x3, 0x5, 0xe, 0xa}], 0x10, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 7.747073922s ago: executing program 1 (id=4628): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000000500000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, &(0x7f00000001c0), 0x4) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000050000000000000000000000001e00008000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 5.746587823s ago: executing program 3 (id=4640): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f00000001c0)) close(r2) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) (async) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000030000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000030000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) (async) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x10, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r5, @ANYRESHEX=r8, @ANYRESDEC=r7, @ANYBLOB="c872d0c3bf3035d45ea4eab8384886a24e4351fe43135dc3e7504a97e1ff9d0b0678a8072d0158db266515d0f4"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r9}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)=0x1, 0x12) r10 = getpid() syz_open_procfs$namespace(r10, &(0x7f00000000c0)='ns/cgroup\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 5.541460393s ago: executing program 2 (id=4644): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000b1cebe3aac31776d27fdd73c0d657f164dec867a5bf7ab817c4b78f27507988bb8f762b978196e744f7e08a24f56029ef55544ccb30d8e45710f79777687857577c1bc946c7842cd384eca0d865593c0b2477292f915612cd6609b1bf88a3205609c46cd77e6b92555e1f99023d9fcd4b082398a3ce753db26753dc6dcf7db8bb7f5cc75a117d4755c77599a2e29e1969bafe5f28d6eac5030bd2c41d278980f8002d07dd0ba31b5f8a78aafbc70"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8, 0xf2db72b, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xa, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000900000049a200006c0a000000010000", @ANYRES32, @ANYBLOB="7f00"/20, @ANYRES32, @ANYBLOB="01000000000000000500000000000000000000000000000000000000c58b9c6a28e86906426de165144cd4626b704a89c5790f73ae42beb2ad2f"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f00000001c0)='blkio.bfq.io_queued\x00', 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000380), 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x1) 5.311071207s ago: executing program 3 (id=4645): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000069000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f07df33c9f7b986", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 5.264244701s ago: executing program 3 (id=4646): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7bf, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0xfa642159187d87dc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x40000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (fail_nth: 4) 4.751435903s ago: executing program 3 (id=4647): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000010000000800000008"], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000001700)='cpu.weight.nice\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000180)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8, 0x4}, [@func, @map_fd, @generic, @initr0, @exit, @alu]}, &(0x7f0000000000)='GPL\x00', 0x2}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r5}, 0x8) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x71, 0x5, 0x8, 0x8, 0x0, 0x1f, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={0x0, 0x1}, 0xb06, 0x3, 0x8, 0x1, 0x7f, 0x800, 0x5, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x110000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63be}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r0}, &(0x7f00000003c0), &(0x7f0000000400)=r6}, 0x20) 4.751157353s ago: executing program 4 (id=4041): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 2.719923297s ago: executing program 0 (id=4648): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES64=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='sys_enter\x00', r1}, 0x18) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.719391287s ago: executing program 1 (id=4649): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x9, &(0x7f0000001300)=ANY=[@ANYBLOB="1808000000000000000000000000000085100000050000008500000019000000a7000000000000001800000000000000000000000000000095000000000000009500000000000006d327c81ba0eef654674061d04013efd550c38b76f58ee6ea6d372ca97767f9972dfea8fb4eb3e7e568573b563d12fd1017e3672a10c5ccd89c6706201af6dc333679eb98b738c5a2529c56edebb7d3902438c5ab5547d84fbe42162c"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x80) 2.717718317s ago: executing program 2 (id=4650): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000069050000040000000c00008c9b14f643b95591639400bfb40c38f08cd4fcae25cdb726aa06090000106c545649"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x29, &(0x7f0000000100), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYRES16=r0, @ANYRES32=r4, @ANYRESDEC], 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000ee000000080000000800000000000000", @ANYRES32, @ANYRES16=r3, @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r6}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x18) close(r5) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x60028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x952, 0x6}, 0x0, 0xffffffffffffffff, 0x6, 0x9, 0x0, 0x80000, 0x0, 0x0, 0x8}, 0x0, 0xfffffffffffff7ff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000200000000000000000000090400000000000000000000010500000008000000000000000000000300000000020000000100000012000000000000000000000b"], 0x0, 0x5a}, 0x20) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$TUNSETQUEUE(r9, 0x400454d9, &(0x7f00000002c0)={'veth1_virt_wifi\x00', 0x400}) close(r9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000280)='tlb_flush\x00', r1}, 0x18) 2.716686857s ago: executing program 3 (id=4651): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xf, 0x4, 0x4, 0x10004, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) (fail_nth: 21) 2.68560274s ago: executing program 1 (id=4652): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 2.606035978s ago: executing program 0 (id=4653): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000200000000000000", @ANYRES32, @ANYBLOB="0000000000baa4a774b0337800000029bdaa0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="01000000060000000410000010"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b00000018", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000001680), &(0x7f0000002300), 0x8001, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) 2.429750676s ago: executing program 2 (id=4654): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYRES8, @ANYRES32, @ANYRES8, @ANYRES64, @ANYRES16, @ANYRES64, @ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x73, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x7}, 0xa28c, 0xc8, 0x0, 0x6, 0x200, 0x511, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x100, 0x7}, 0x481a, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r6}, &(0x7f0000000040), &(0x7f00000003c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x180) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xf, 0x4, 0x4, 0x10004, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 2.421470456s ago: executing program 1 (id=4655): socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, 0x4004881) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r0, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) 2.354980723s ago: executing program 2 (id=4656): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000069000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f07df33c9f7b986", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.354484073s ago: executing program 2 (id=4657): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000000005436bc3d000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='rxrpc_rtt_tx\x00', r2}, 0x18) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r3}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0x500}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r4, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x25, &(0x7f00000000c0), 0x8) 1.39267817s ago: executing program 1 (id=4658): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000"], 0x50) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f00000005c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x84, r0}, 0x38) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x7) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x6, 0x7, 0x9, 0x34908, r4, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x100001, 0x0, 0xb}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r7 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r6) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r8, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_tracing={0x1a, 0x13, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@generic={0x9, 0x4, 0x4, 0x100, 0x8001}, @alu={0x7, 0x0, 0x2, 0x2, 0x2, 0xfffffffffffffff8, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x80000001, 0x0, 0x0, 0x41000, 0x0, '\x00', r9, 0x18, r2, 0x8, &(0x7f0000000680)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0x0, 0x7, 0x7127}, 0x10, 0x88b3, r3, 0x0, &(0x7f0000000700)=[r0, r2, r7]}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffd4, 0xa, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 1.304541129s ago: executing program 3 (id=4659): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000c00000009"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f00000005c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x84, r0}, 0x38) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x6, 0x7, 0x9, 0x34908, r2, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x100001, 0x0, 0xb}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r4) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r6) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB="feffffff00000000000000000000000000bfe8e247c303022a28730b6a5f7f86960b6ce87a0ccd3dfe350489d68a74d5268479a1f80a49a8a056ccd93cd8ac5fa5b07c16d5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00'}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 971.544472ms ago: executing program 2 (id=4660): socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, 0x4004881) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r0, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) 0s ago: executing program 4 (id=4041): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) kernel console output (not intermixed with test programs): ONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 343.886783][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 344.695911][T11846] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.757856][T11846] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.842645][T11846] device bridge_slave_0 entered promiscuous mode [ 344.926227][T11846] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.951063][T11846] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.962827][T11846] device bridge_slave_1 entered promiscuous mode [ 345.972514][T11875] device syzkaller0 entered promiscuous mode [ 346.028596][ T10] device bridge_slave_1 left promiscuous mode [ 346.034822][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.042556][ T10] device bridge_slave_0 left promiscuous mode [ 346.048826][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.057631][ T10] device veth1_macvtap left promiscuous mode [ 346.063819][ T10] device veth0_vlan left promiscuous mode [ 346.424984][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.467715][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.516662][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 346.527264][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 346.542324][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.549420][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.562912][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 346.571557][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 346.579881][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.586963][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.604227][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 346.612580][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 346.621216][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 346.774433][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 346.783800][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 346.979981][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 346.998933][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 347.041841][T11846] device veth0_vlan entered promiscuous mode [ 347.070737][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 347.095322][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.137346][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.162400][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.239711][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 347.283600][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 347.358800][T11846] device veth1_macvtap entered promiscuous mode [ 347.429493][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 347.437500][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 347.481080][T11922] FAULT_INJECTION: forcing a failure. [ 347.481080][T11922] name failslab, interval 1, probability 0, space 0, times 0 [ 347.496734][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 347.524371][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 347.532469][T11922] CPU: 1 PID: 11922 Comm: syz.1.4089 Tainted: G W syzkaller #0 [ 347.541341][T11922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 347.551417][T11922] Call Trace: [ 347.554714][T11922] [ 347.557661][T11922] __dump_stack+0x21/0x30 [ 347.562009][T11922] dump_stack_lvl+0xee/0x150 [ 347.566616][T11922] ? show_regs_print_info+0x20/0x20 [ 347.571837][T11922] dump_stack+0x15/0x20 [ 347.576007][T11922] should_fail+0x3c1/0x510 [ 347.580435][T11922] __should_failslab+0xa4/0xe0 [ 347.585224][T11922] should_failslab+0x9/0x20 [ 347.589750][T11922] slab_pre_alloc_hook+0x3b/0xe0 [ 347.594705][T11922] kmem_cache_alloc_trace+0x48/0x270 [ 347.600003][T11922] ? htab_map_alloc+0x9a/0x14f0 [ 347.604891][T11922] htab_map_alloc+0x9a/0x14f0 [ 347.609612][T11922] ? security_capable+0x87/0xb0 [ 347.614577][T11922] ? capable+0x8a/0xe0 [ 347.618668][T11922] ? htab_map_alloc_check+0x3d8/0x4c0 [ 347.624061][T11922] map_create+0x455/0x21b0 [ 347.628502][T11922] __sys_bpf+0x2cf/0x730 [ 347.632771][T11922] ? bpf_link_show_fdinfo+0x310/0x310 [ 347.638156][T11922] ? debug_smp_processor_id+0x17/0x20 [ 347.643539][T11922] __x64_sys_bpf+0x7c/0x90 [ 347.647975][T11922] x64_sys_call+0x4b9/0x9a0 [ 347.652483][T11922] do_syscall_64+0x4c/0xa0 [ 347.656901][T11922] ? clear_bhb_loop+0x50/0xa0 [ 347.661573][T11922] ? clear_bhb_loop+0x50/0xa0 [ 347.666241][T11922] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 347.672129][T11922] RIP: 0033:0x7fda0c0456c9 [ 347.676539][T11922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 347.696228][T11922] RSP: 002b:00007fda0aa8c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 347.704638][T11922] RAX: ffffffffffffffda RBX: 00007fda0c29c090 RCX: 00007fda0c0456c9 [ 347.712611][T11922] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 347.720577][T11922] RBP: 00007fda0aa8c090 R08: 0000000000000000 R09: 0000000000000000 [ 347.728543][T11922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 347.736509][T11922] R13: 00007fda0c29c128 R14: 00007fda0c29c090 R15: 00007fff7ae36098 [ 347.744481][T11922] [ 347.769057][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 348.294422][T11936] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.305920][T11936] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.322070][T11936] device bridge_slave_0 entered promiscuous mode [ 349.492082][T11936] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.499803][T11936] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.507582][T11936] device bridge_slave_1 entered promiscuous mode [ 350.247413][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 350.255226][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 350.310948][T11975] device pim6reg1 entered promiscuous mode [ 350.366688][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 350.375316][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 350.385127][ T382] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.392205][ T382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.412181][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 350.420665][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.428911][ T382] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.435965][ T382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 350.528047][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 350.535794][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 350.618757][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 350.627413][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 350.635715][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 350.644097][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 350.652735][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 350.720381][T11936] device veth0_vlan entered promiscuous mode [ 350.757209][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 350.765279][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.773662][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.781355][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 350.985612][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 351.006244][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 351.032405][T11936] device veth1_macvtap entered promiscuous mode [ 351.069474][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 351.077634][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 351.086173][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 351.132432][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 351.182181][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 351.896368][ T10] device bridge_slave_1 left promiscuous mode [ 351.910162][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.919304][ T10] device bridge_slave_0 left promiscuous mode [ 351.925501][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.934477][ T10] device veth1_macvtap left promiscuous mode [ 351.940643][ T10] device veth0_vlan left promiscuous mode [ 352.039315][T12006] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.046705][T12006] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.055061][T12006] device bridge_slave_0 entered promiscuous mode [ 352.190814][T12026] device syzkaller0 entered promiscuous mode [ 352.202731][T12006] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.213583][T12006] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.221215][T12006] device bridge_slave_1 entered promiscuous mode [ 353.013661][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 353.021797][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.238733][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 353.252147][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.261271][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.268348][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.275951][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 353.284717][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.293133][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.300210][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.370847][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 353.379229][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.387623][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.463710][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.472960][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.481537][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 353.490423][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 353.555564][T12006] device veth0_vlan entered promiscuous mode [ 353.561971][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 353.569961][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.577958][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.585390][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 354.365996][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 354.374905][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 354.435787][T12006] device veth1_macvtap entered promiscuous mode [ 354.618630][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 354.627656][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 354.691270][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 354.707357][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 355.008994][ T10] device bridge_slave_1 left promiscuous mode [ 355.015184][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.026083][ T10] device bridge_slave_0 left promiscuous mode [ 355.032446][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.040859][ T10] device veth1_macvtap left promiscuous mode [ 355.047072][ T10] device veth0_vlan left promiscuous mode [ 355.786381][T12080] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.793525][T12080] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.802132][T12080] device bridge_slave_0 entered promiscuous mode [ 355.809845][T12080] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.817164][T12080] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.824727][T12080] device bridge_slave_1 entered promiscuous mode [ 356.414128][T12080] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.421238][T12080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.428579][T12080] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.435644][T12080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.505858][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.516862][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.625376][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.645211][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.675503][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.725968][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.774905][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.781998][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.855929][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.883085][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.891810][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.898912][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.957439][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 356.965903][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.011788][ T10] device bridge_slave_1 left promiscuous mode [ 357.026692][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.049009][ T10] device bridge_slave_0 left promiscuous mode [ 357.055200][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.063629][ T10] device veth1_macvtap left promiscuous mode [ 357.069711][ T10] device veth0_vlan left promiscuous mode [ 357.189048][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 357.197488][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.291141][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 357.306822][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 357.370470][T12080] device veth0_vlan entered promiscuous mode [ 357.378734][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 357.394987][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 357.600245][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 357.616625][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 357.667826][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 357.696913][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 357.741283][T12080] device veth1_macvtap entered promiscuous mode [ 357.797996][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 357.811315][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 357.841461][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 357.950781][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 357.973367][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 358.817028][ T30] audit: type=1400 audit(1763426006.914:156): avc: denied { create } for pid=12138 comm="syz.3.4154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 358.953171][ T10] device bridge_slave_1 left promiscuous mode [ 358.961259][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.989244][ T10] device bridge_slave_0 left promiscuous mode [ 359.017063][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.046335][ T10] device veth1_macvtap left promiscuous mode [ 359.070044][ T10] device veth0_vlan left promiscuous mode [ 359.452656][T12140] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.497412][T12140] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.544092][T12140] device bridge_slave_0 entered promiscuous mode [ 359.625912][T12140] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.663238][T12140] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.715959][T12140] device bridge_slave_1 entered promiscuous mode [ 360.516920][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 360.525059][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.654876][T12188] device veth0_vlan left promiscuous mode [ 360.683607][T12188] device veth0_vlan entered promiscuous mode [ 360.697488][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 360.706118][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.716040][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.723113][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.736815][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 360.752807][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.781413][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.788517][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.801706][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 360.827263][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 360.849820][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 360.864674][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 360.882989][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 360.899830][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 360.951520][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 361.007914][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 361.074333][T12140] device veth0_vlan entered promiscuous mode [ 361.102875][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 361.147260][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.157473][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 361.165048][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.252225][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 361.260786][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 361.352881][T12140] device veth1_macvtap entered promiscuous mode [ 361.460175][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 361.468360][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 361.476876][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 361.485405][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 361.494006][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 362.666458][ T332] device bridge_slave_1 left promiscuous mode [ 362.675321][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.722315][ T332] device bridge_slave_0 left promiscuous mode [ 362.766827][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.816198][ T332] device veth1_macvtap left promiscuous mode [ 362.839715][ T332] device veth0_vlan left promiscuous mode [ 363.295489][T12228] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.307981][T12228] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.320099][T12228] device bridge_slave_0 entered promiscuous mode [ 363.420783][T12228] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.432327][T12228] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.448316][T12228] device bridge_slave_1 entered promiscuous mode [ 363.635162][T12261] device pim6reg1 entered promiscuous mode [ 364.023267][T12228] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.030397][T12228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.037752][T12228] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.044797][T12228] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.159920][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.172295][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.221305][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.270985][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 364.323019][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 364.375521][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.382663][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.456557][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 364.465475][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 364.473977][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.481048][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.526772][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 364.563138][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 364.604249][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 364.646777][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.770101][T12228] device veth0_vlan entered promiscuous mode [ 364.789004][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 364.817089][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 364.857527][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 364.897967][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.927059][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 364.935622][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 365.027960][T12228] device veth1_macvtap entered promiscuous mode [ 365.081270][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 365.099994][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 365.140529][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 365.197924][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 365.209551][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 365.240825][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 365.326802][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 365.406980][T12311] FAULT_INJECTION: forcing a failure. [ 365.406980][T12311] name failslab, interval 1, probability 0, space 0, times 0 [ 365.448654][T12311] CPU: 1 PID: 12311 Comm: syz.0.4209 Tainted: G W syzkaller #0 [ 365.457555][T12311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 365.467629][T12311] Call Trace: [ 365.471094][T12311] [ 365.474034][T12311] __dump_stack+0x21/0x30 [ 365.478382][T12311] dump_stack_lvl+0xee/0x150 [ 365.482987][T12311] ? show_regs_print_info+0x20/0x20 [ 365.488207][T12311] ? __kasan_slab_alloc+0x69/0xf0 [ 365.493347][T12311] dump_stack+0x15/0x20 [ 365.497511][T12311] should_fail+0x3c1/0x510 [ 365.501940][T12311] __should_failslab+0xa4/0xe0 [ 365.506716][T12311] should_failslab+0x9/0x20 [ 365.511232][T12311] slab_pre_alloc_hook+0x3b/0xe0 [ 365.516201][T12311] ? alloc_vmap_area+0x17a/0x1990 [ 365.521244][T12311] kmem_cache_alloc+0x44/0x260 [ 365.526021][T12311] alloc_vmap_area+0x17a/0x1990 [ 365.530887][T12311] ? vm_map_ram+0xa70/0xa70 [ 365.535397][T12311] ? __get_vm_area_node+0x11d/0x350 [ 365.540607][T12311] __get_vm_area_node+0x14e/0x350 [ 365.545643][T12311] __vmalloc_node_range+0xdf/0xaf0 [ 365.550764][T12311] ? htab_map_alloc+0xb29/0x14f0 [ 365.555713][T12311] bpf_map_area_alloc+0xd5/0xe0 [ 365.560581][T12311] ? htab_map_alloc+0xb29/0x14f0 [ 365.565527][T12311] htab_map_alloc+0xb29/0x14f0 [ 365.570309][T12311] map_create+0x455/0x21b0 [ 365.574733][T12311] __sys_bpf+0x2cf/0x730 [ 365.578986][T12311] ? bpf_link_show_fdinfo+0x310/0x310 [ 365.584371][T12311] ? debug_smp_processor_id+0x17/0x20 [ 365.589759][T12311] __x64_sys_bpf+0x7c/0x90 [ 365.594188][T12311] x64_sys_call+0x4b9/0x9a0 [ 365.598709][T12311] do_syscall_64+0x4c/0xa0 [ 365.603156][T12311] ? clear_bhb_loop+0x50/0xa0 [ 365.607860][T12311] ? clear_bhb_loop+0x50/0xa0 [ 365.612550][T12311] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 365.618473][T12311] RIP: 0033:0x7f7d0d2746c9 [ 365.622907][T12311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 365.642531][T12311] RSP: 002b:00007f7d0bcbb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 365.650969][T12311] RAX: ffffffffffffffda RBX: 00007f7d0d4cb090 RCX: 00007f7d0d2746c9 [ 365.658968][T12311] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 365.666950][T12311] RBP: 00007f7d0bcbb090 R08: 0000000000000000 R09: 0000000000000000 [ 365.674934][T12311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 365.682919][T12311] R13: 00007f7d0d4cb128 R14: 00007f7d0d4cb090 R15: 00007ffde88b2e98 [ 365.690918][T12311] [ 366.750173][ T332] device bridge_slave_1 left promiscuous mode [ 366.756371][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.766564][ T332] device bridge_slave_0 left promiscuous mode [ 366.772793][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.781393][ T332] device veth1_macvtap left promiscuous mode [ 366.787517][ T332] device veth0_vlan left promiscuous mode [ 367.092956][T12338] device syzkaller0 entered promiscuous mode [ 367.121622][T12328] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.140005][T12328] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.147669][T12328] device bridge_slave_0 entered promiscuous mode [ 367.180741][T12328] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.188962][T12328] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.197227][T12328] device bridge_slave_1 entered promiscuous mode [ 367.800190][T12362] FAULT_INJECTION: forcing a failure. [ 367.800190][T12362] name failslab, interval 1, probability 0, space 0, times 0 [ 367.819498][T12350] bond_slave_1: mtu less than device minimum [ 367.903521][T12362] CPU: 1 PID: 12362 Comm: syz.1.4223 Tainted: G W syzkaller #0 [ 367.912419][T12362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 367.922489][T12362] Call Trace: [ 367.925782][T12362] [ 367.928725][T12362] __dump_stack+0x21/0x30 [ 367.933077][T12362] dump_stack_lvl+0xee/0x150 [ 367.937772][T12362] ? show_regs_print_info+0x20/0x20 [ 367.942993][T12362] dump_stack+0x15/0x20 [ 367.947159][T12362] should_fail+0x3c1/0x510 [ 367.951575][T12362] __should_failslab+0xa4/0xe0 [ 367.956338][T12362] should_failslab+0x9/0x20 [ 367.960841][T12362] slab_pre_alloc_hook+0x3b/0xe0 [ 367.965951][T12362] ? alloc_vmap_area+0x63a/0x1990 [ 367.971581][T12362] kmem_cache_alloc+0x44/0x260 [ 367.976347][T12362] alloc_vmap_area+0x63a/0x1990 [ 367.981385][T12362] ? vm_map_ram+0xa70/0xa70 [ 367.986071][T12362] ? __get_vm_area_node+0x11d/0x350 [ 367.991438][T12362] __get_vm_area_node+0x14e/0x350 [ 367.996464][T12362] __vmalloc_node_range+0xdf/0xaf0 [ 368.001664][T12362] ? htab_map_alloc+0xb29/0x14f0 [ 368.006775][T12362] bpf_map_area_alloc+0xd5/0xe0 [ 368.011708][T12362] ? htab_map_alloc+0xb29/0x14f0 [ 368.016812][T12362] htab_map_alloc+0xb29/0x14f0 [ 368.021657][T12362] map_create+0x455/0x21b0 [ 368.026270][T12362] __sys_bpf+0x2cf/0x730 [ 368.030595][T12362] ? bpf_link_show_fdinfo+0x310/0x310 [ 368.036052][T12362] ? debug_smp_processor_id+0x17/0x20 [ 368.041431][T12362] __x64_sys_bpf+0x7c/0x90 [ 368.045848][T12362] x64_sys_call+0x4b9/0x9a0 [ 368.050436][T12362] do_syscall_64+0x4c/0xa0 [ 368.054849][T12362] ? clear_bhb_loop+0x50/0xa0 [ 368.060124][T12362] ? clear_bhb_loop+0x50/0xa0 [ 368.064793][T12362] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 368.070858][T12362] RIP: 0033:0x7fda0c0456c9 [ 368.075265][T12362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 368.095040][T12362] RSP: 002b:00007fda0aa8c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 368.103624][T12362] RAX: ffffffffffffffda RBX: 00007fda0c29c090 RCX: 00007fda0c0456c9 [ 368.111592][T12362] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 368.119730][T12362] RBP: 00007fda0aa8c090 R08: 0000000000000000 R09: 0000000000000000 [ 368.127700][T12362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 368.135667][T12362] R13: 00007fda0c29c128 R14: 00007fda0c29c090 R15: 00007fff7ae36098 [ 368.143639][T12362] [ 368.352324][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 368.360434][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.523273][T12384] device syzkaller0 entered promiscuous mode [ 368.576502][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 368.588421][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.597044][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.604131][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.612014][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 368.620561][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.629266][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.636420][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.646269][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 369.101380][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 369.110092][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 369.118670][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 369.126825][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.145477][T12328] device veth0_vlan entered promiscuous mode [ 369.223144][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 369.231492][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 369.240148][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 369.248571][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.286126][T12328] device veth1_macvtap entered promiscuous mode [ 369.359559][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.372255][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 369.380401][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 369.395150][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 369.404139][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 369.504099][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 369.512603][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 369.549587][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 369.575433][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 369.660381][T12409] device wg2 entered promiscuous mode [ 370.559088][ T332] device bridge_slave_1 left promiscuous mode [ 370.567289][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.577102][ T332] device bridge_slave_0 left promiscuous mode [ 370.597094][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.625677][ T332] device veth1_macvtap left promiscuous mode [ 370.635647][ T332] device veth0_vlan left promiscuous mode [ 370.931148][T12433] device syzkaller0 entered promiscuous mode [ 370.942645][T12438] bond_slave_1: mtu less than device minimum [ 371.246053][T12423] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.270479][T12423] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.279024][T12423] device bridge_slave_0 entered promiscuous mode [ 371.320222][T12423] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.360782][T12461] FAULT_INJECTION: forcing a failure. [ 371.360782][T12461] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 371.383487][T12423] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.435317][T12423] device bridge_slave_1 entered promiscuous mode [ 371.487235][T12461] CPU: 1 PID: 12461 Comm: syz.3.4254 Tainted: G W syzkaller #0 [ 371.496127][T12461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 371.506202][T12461] Call Trace: [ 371.509496][T12461] [ 371.512436][T12461] __dump_stack+0x21/0x30 [ 371.516786][T12461] dump_stack_lvl+0xee/0x150 [ 371.521387][T12461] ? show_regs_print_info+0x20/0x20 [ 371.526600][T12461] ? stack_trace_save+0xe0/0xe0 [ 371.531467][T12461] dump_stack+0x15/0x20 [ 371.535635][T12461] should_fail+0x3c1/0x510 [ 371.540066][T12461] should_fail_alloc_page+0x55/0x80 [ 371.545279][T12461] prepare_alloc_pages+0x156/0x600 [ 371.550401][T12461] ? __alloc_pages_bulk+0xab0/0xab0 [ 371.555608][T12461] ? __kasan_slab_alloc+0xcf/0xf0 [ 371.560643][T12461] ? __kasan_slab_alloc+0xbd/0xf0 [ 371.565676][T12461] ? slab_post_alloc_hook+0x4f/0x2b0 [ 371.570976][T12461] ? alloc_vmap_area+0x17a/0x1990 [ 371.576013][T12461] __alloc_pages+0x10a/0x440 [ 371.580615][T12461] ? prep_new_page+0x110/0x110 [ 371.585478][T12461] ? _raw_spin_lock+0x8e/0xe0 [ 371.590165][T12461] ? _raw_spin_trylock_bh+0x130/0x130 [ 371.595556][T12461] __get_free_pages+0x10/0x30 [ 371.600247][T12461] kasan_populate_vmalloc_pte+0x29/0x120 [ 371.605903][T12461] __apply_to_page_range+0x8cd/0xc70 [ 371.611200][T12461] ? kasan_populate_vmalloc+0x70/0x70 [ 371.616594][T12461] ? kasan_populate_vmalloc+0x70/0x70 [ 371.621979][T12461] apply_to_page_range+0x3b/0x50 [ 371.626935][T12461] kasan_populate_vmalloc+0x60/0x70 [ 371.632159][T12461] alloc_vmap_area+0x185c/0x1990 [ 371.637560][T12461] ? vm_map_ram+0xa70/0xa70 [ 371.642172][T12461] ? __get_vm_area_node+0x11d/0x350 [ 371.647562][T12461] __get_vm_area_node+0x14e/0x350 [ 371.652607][T12461] __vmalloc_node_range+0xdf/0xaf0 [ 371.657731][T12461] ? htab_map_alloc+0xb29/0x14f0 [ 371.662708][T12461] bpf_map_area_alloc+0xd5/0xe0 [ 371.667583][T12461] ? htab_map_alloc+0xb29/0x14f0 [ 371.672529][T12461] htab_map_alloc+0xb29/0x14f0 [ 371.677397][T12461] map_create+0x455/0x21b0 [ 371.681821][T12461] __sys_bpf+0x2cf/0x730 [ 371.686070][T12461] ? bpf_link_show_fdinfo+0x310/0x310 [ 371.691452][T12461] ? debug_smp_processor_id+0x17/0x20 [ 371.696840][T12461] __x64_sys_bpf+0x7c/0x90 [ 371.701271][T12461] x64_sys_call+0x4b9/0x9a0 [ 371.705925][T12461] do_syscall_64+0x4c/0xa0 [ 371.710368][T12461] ? clear_bhb_loop+0x50/0xa0 [ 371.715062][T12461] ? clear_bhb_loop+0x50/0xa0 [ 371.719753][T12461] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 371.725666][T12461] RIP: 0033:0x7f250185d6c9 [ 371.730098][T12461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 371.749722][T12461] RSP: 002b:00007f25002a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 371.758157][T12461] RAX: ffffffffffffffda RBX: 00007f2501ab4090 RCX: 00007f250185d6c9 [ 371.766235][T12461] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 371.774313][T12461] RBP: 00007f25002a4090 R08: 0000000000000000 R09: 0000000000000000 [ 371.782300][T12461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 371.790292][T12461] R13: 00007f2501ab4128 R14: 00007f2501ab4090 R15: 00007ffe47d77558 [ 371.798288][T12461] [ 372.348078][T12478] device syzkaller0 entered promiscuous mode [ 372.505247][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 372.519863][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 372.594593][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 372.613389][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 372.653535][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.660646][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.766854][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 372.780988][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 372.808955][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 372.846756][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.853914][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 372.891873][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 372.921148][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 372.977575][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 373.015359][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 373.052085][T12423] device veth0_vlan entered promiscuous mode [ 373.100943][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 373.109324][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.119585][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.128033][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 373.143373][T12423] device veth1_macvtap entered promiscuous mode [ 373.156833][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 373.244192][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 373.274101][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 373.322558][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 373.356157][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 373.390374][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 373.415833][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 374.437275][T12205] device bridge_slave_1 left promiscuous mode [ 374.443405][T12205] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.451015][T12205] device bridge_slave_0 left promiscuous mode [ 374.457193][T12205] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.465082][T12205] device veth1_macvtap left promiscuous mode [ 374.471600][T12205] device veth0_vlan left promiscuous mode [ 374.523198][T12533] FAULT_INJECTION: forcing a failure. [ 374.523198][T12533] name failslab, interval 1, probability 0, space 0, times 0 [ 374.550262][T12533] CPU: 0 PID: 12533 Comm: syz.3.4281 Tainted: G W syzkaller #0 [ 374.559166][T12533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 374.569240][T12533] Call Trace: [ 374.572533][T12533] [ 374.575481][T12533] __dump_stack+0x21/0x30 [ 374.579831][T12533] dump_stack_lvl+0xee/0x150 [ 374.584434][T12533] ? show_regs_print_info+0x20/0x20 [ 374.589629][T12533] ? kasan_set_track+0x5b/0x70 [ 374.594389][T12533] ? kasan_set_free_info+0x23/0x40 [ 374.599510][T12533] ? ____kasan_slab_free+0x125/0x160 [ 374.604791][T12533] ? __kasan_slab_free+0x11/0x20 [ 374.609725][T12533] ? slab_free_freelist_hook+0xc2/0x190 [ 374.615270][T12533] dump_stack+0x15/0x20 [ 374.619424][T12533] should_fail+0x3c1/0x510 [ 374.623837][T12533] __should_failslab+0xa4/0xe0 [ 374.628601][T12533] should_failslab+0x9/0x20 [ 374.633116][T12533] slab_pre_alloc_hook+0x3b/0xe0 [ 374.638185][T12533] __kmalloc+0x6d/0x2c0 [ 374.642360][T12533] ? bpf_test_init+0x100/0x1c0 [ 374.647134][T12533] bpf_test_init+0x100/0x1c0 [ 374.651730][T12533] bpf_prog_test_run_skb+0x193/0x1150 [ 374.657103][T12533] ? __kasan_check_write+0x14/0x20 [ 374.662213][T12533] ? fput_many+0x15a/0x1a0 [ 374.666626][T12533] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 374.672519][T12533] bpf_prog_test_run+0x3d5/0x620 [ 374.677452][T12533] ? bpf_prog_query+0x230/0x230 [ 374.682299][T12533] ? selinux_bpf+0xce/0xf0 [ 374.686712][T12533] ? security_bpf+0x82/0xa0 [ 374.691210][T12533] __sys_bpf+0x52c/0x730 [ 374.695446][T12533] ? bpf_link_show_fdinfo+0x310/0x310 [ 374.700830][T12533] ? debug_smp_processor_id+0x17/0x20 [ 374.706198][T12533] __x64_sys_bpf+0x7c/0x90 [ 374.710611][T12533] x64_sys_call+0x4b9/0x9a0 [ 374.715111][T12533] do_syscall_64+0x4c/0xa0 [ 374.719524][T12533] ? clear_bhb_loop+0x50/0xa0 [ 374.724199][T12533] ? clear_bhb_loop+0x50/0xa0 [ 374.728869][T12533] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 374.734759][T12533] RIP: 0033:0x7f250185d6c9 [ 374.739171][T12533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 374.758903][T12533] RSP: 002b:00007f25002c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 374.767328][T12533] RAX: ffffffffffffffda RBX: 00007f2501ab3fa0 RCX: 00007f250185d6c9 [ 374.775299][T12533] RDX: 0000000000000050 RSI: 0000200000001200 RDI: 000000000000000a [ 374.783270][T12533] RBP: 00007f25002c5090 R08: 0000000000000000 R09: 0000000000000000 [ 374.791238][T12533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 374.799204][T12533] R13: 00007f2501ab4038 R14: 00007f2501ab3fa0 R15: 00007ffe47d77558 [ 374.807179][T12533] [ 374.952300][T12537] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.962586][T12537] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.995392][T12537] device bridge_slave_0 entered promiscuous mode [ 375.040368][T12537] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.047880][T12537] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.113828][T12537] device bridge_slave_1 entered promiscuous mode [ 375.709811][T12590] FAULT_INJECTION: forcing a failure. [ 375.709811][T12590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 375.748766][T12590] CPU: 1 PID: 12590 Comm: syz.1.4301 Tainted: G W syzkaller #0 [ 375.757675][T12590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 375.767750][T12590] Call Trace: [ 375.771041][T12590] [ 375.773978][T12590] __dump_stack+0x21/0x30 [ 375.778327][T12590] dump_stack_lvl+0xee/0x150 [ 375.782932][T12590] ? show_regs_print_info+0x20/0x20 [ 375.788160][T12590] dump_stack+0x15/0x20 [ 375.792349][T12590] should_fail+0x3c1/0x510 [ 375.796782][T12590] should_fail_usercopy+0x1a/0x20 [ 375.801819][T12590] _copy_from_user+0x20/0xd0 [ 375.806426][T12590] bpf_test_init+0x13d/0x1c0 [ 375.811037][T12590] bpf_prog_test_run_skb+0x193/0x1150 [ 375.816428][T12590] ? __kasan_check_write+0x14/0x20 [ 375.821553][T12590] ? fput_many+0x15a/0x1a0 [ 375.825982][T12590] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 375.831891][T12590] bpf_prog_test_run+0x3d5/0x620 [ 375.836846][T12590] ? bpf_prog_query+0x230/0x230 [ 375.841716][T12590] ? selinux_bpf+0xce/0xf0 [ 375.846154][T12590] ? security_bpf+0x82/0xa0 [ 375.850671][T12590] __sys_bpf+0x52c/0x730 [ 375.854934][T12590] ? bpf_link_show_fdinfo+0x310/0x310 [ 375.860319][T12590] ? bpf_trace_run2+0xb5/0x1b0 [ 375.865105][T12590] ? __bpf_trace_sys_enter+0x62/0x70 [ 375.870419][T12590] __x64_sys_bpf+0x7c/0x90 [ 375.874852][T12590] x64_sys_call+0x4b9/0x9a0 [ 375.879375][T12590] do_syscall_64+0x4c/0xa0 [ 375.883806][T12590] ? clear_bhb_loop+0x50/0xa0 [ 375.888497][T12590] ? clear_bhb_loop+0x50/0xa0 [ 375.893262][T12590] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 375.899154][T12590] RIP: 0033:0x7fda0c0456c9 [ 375.903580][T12590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 375.923276][T12590] RSP: 002b:00007fda0aaad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 375.931693][T12590] RAX: ffffffffffffffda RBX: 00007fda0c29bfa0 RCX: 00007fda0c0456c9 [ 375.939662][T12590] RDX: 0000000000000050 RSI: 0000200000001200 RDI: 000000000000000a [ 375.947633][T12590] RBP: 00007fda0aaad090 R08: 0000000000000000 R09: 0000000000000000 [ 375.955608][T12590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 375.963750][T12590] R13: 00007fda0c29c038 R14: 00007fda0c29bfa0 R15: 00007fff7ae36098 [ 375.971733][T12590] [ 376.197998][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 376.226670][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 376.318455][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 376.327519][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 376.366084][ T382] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.373210][ T382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 376.405127][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 376.413970][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 376.422320][ T382] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.429754][ T382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 376.445607][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 376.453822][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 376.462256][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 376.470736][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 376.478885][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 376.620249][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 376.631344][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 376.764215][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 376.772338][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.781851][T12537] device veth0_vlan entered promiscuous mode [ 376.830930][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.839628][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 376.868992][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 376.880552][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 377.043778][T12537] device veth1_macvtap entered promiscuous mode [ 377.242204][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 377.269743][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 377.290170][T12644] FAULT_INJECTION: forcing a failure. [ 377.290170][T12644] name failslab, interval 1, probability 0, space 0, times 0 [ 377.292926][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 377.305042][T12644] CPU: 1 PID: 12644 Comm: syz.1.4319 Tainted: G W syzkaller #0 [ 377.315563][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 377.319826][T12644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 377.319840][T12644] Call Trace: [ 377.319847][T12644] [ 377.319854][T12644] __dump_stack+0x21/0x30 [ 377.328353][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 377.338144][T12644] dump_stack_lvl+0xee/0x150 [ 377.338170][T12644] ? show_regs_print_info+0x20/0x20 [ 377.366723][T12644] dump_stack+0x15/0x20 [ 377.370869][T12644] should_fail+0x3c1/0x510 [ 377.375270][T12644] __should_failslab+0xa4/0xe0 [ 377.380018][T12644] should_failslab+0x9/0x20 [ 377.384512][T12644] slab_pre_alloc_hook+0x3b/0xe0 [ 377.389434][T12644] __kmalloc+0x6d/0x2c0 [ 377.393742][T12644] ? sk_prot_alloc+0xed/0x320 [ 377.398403][T12644] ? check_stack_object+0x81/0x140 [ 377.403498][T12644] sk_prot_alloc+0xed/0x320 [ 377.407982][T12644] sk_alloc+0x38/0x430 [ 377.412029][T12644] bpf_prog_test_run_skb+0x24b/0x1150 [ 377.417393][T12644] ? __kasan_check_write+0x14/0x20 [ 377.422908][T12644] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 377.428804][T12644] bpf_prog_test_run+0x3d5/0x620 [ 377.433735][T12644] ? bpf_prog_query+0x230/0x230 [ 377.438572][T12644] ? selinux_bpf+0xce/0xf0 [ 377.443149][T12644] ? security_bpf+0x82/0xa0 [ 377.447638][T12644] __sys_bpf+0x52c/0x730 [ 377.451862][T12644] ? bpf_link_show_fdinfo+0x310/0x310 [ 377.457302][T12644] ? debug_smp_processor_id+0x17/0x20 [ 377.462757][T12644] __x64_sys_bpf+0x7c/0x90 [ 377.467747][T12644] x64_sys_call+0x4b9/0x9a0 [ 377.472252][T12644] do_syscall_64+0x4c/0xa0 [ 377.476846][T12644] ? clear_bhb_loop+0x50/0xa0 [ 377.481508][T12644] ? clear_bhb_loop+0x50/0xa0 [ 377.486177][T12644] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 377.492056][T12644] RIP: 0033:0x7fda0c0456c9 [ 377.496460][T12644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 377.517112][T12644] RSP: 002b:00007fda0aaad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 377.525594][T12644] RAX: ffffffffffffffda RBX: 00007fda0c29bfa0 RCX: 00007fda0c0456c9 [ 377.533815][T12644] RDX: 0000000000000050 RSI: 0000200000001200 RDI: 000000000000000a [ 377.542993][T12644] RBP: 00007fda0aaad090 R08: 0000000000000000 R09: 0000000000000000 [ 377.551485][T12644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 377.559793][T12644] R13: 00007fda0c29c038 R14: 00007fda0c29bfa0 R15: 00007fff7ae36098 [ 377.567945][T12644] [ 379.302769][T12661] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.310021][T12661] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.317846][T12661] device bridge_slave_0 entered promiscuous mode [ 379.376272][T12661] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.383938][T12661] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.392301][T12661] device bridge_slave_1 entered promiscuous mode [ 379.688071][T12685] FAULT_INJECTION: forcing a failure. [ 379.688071][T12685] name failslab, interval 1, probability 0, space 0, times 0 [ 379.710256][T12685] CPU: 0 PID: 12685 Comm: syz.2.4331 Tainted: G W syzkaller #0 [ 379.719417][T12685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 379.729757][T12685] Call Trace: [ 379.733322][T12685] [ 379.736441][T12685] __dump_stack+0x21/0x30 [ 379.740781][T12685] dump_stack_lvl+0xee/0x150 [ 379.745381][T12685] ? show_regs_print_info+0x20/0x20 [ 379.750763][T12685] dump_stack+0x15/0x20 [ 379.754924][T12685] should_fail+0x3c1/0x510 [ 379.759351][T12685] __should_failslab+0xa4/0xe0 [ 379.764129][T12685] should_failslab+0x9/0x20 [ 379.768809][T12685] slab_pre_alloc_hook+0x3b/0xe0 [ 379.774022][T12685] kmem_cache_alloc_trace+0x48/0x270 [ 379.779832][T12685] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 379.785735][T12685] selinux_sk_alloc_security+0x7e/0x1a0 [ 379.791295][T12685] security_sk_alloc+0x72/0xa0 [ 379.796149][T12685] sk_prot_alloc+0x108/0x320 [ 379.800922][T12685] sk_alloc+0x38/0x430 [ 379.805169][T12685] bpf_prog_test_run_skb+0x24b/0x1150 [ 379.810728][T12685] ? __kasan_check_write+0x14/0x20 [ 379.815953][T12685] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 379.821869][T12685] bpf_prog_test_run+0x3d5/0x620 [ 379.826844][T12685] ? bpf_prog_query+0x230/0x230 [ 379.831711][T12685] ? selinux_bpf+0xce/0xf0 [ 379.836158][T12685] ? security_bpf+0x82/0xa0 [ 379.840756][T12685] __sys_bpf+0x52c/0x730 [ 379.845953][T12685] ? bpf_link_show_fdinfo+0x310/0x310 [ 379.851339][T12685] ? debug_smp_processor_id+0x17/0x20 [ 379.857068][T12685] __x64_sys_bpf+0x7c/0x90 [ 379.861504][T12685] x64_sys_call+0x4b9/0x9a0 [ 379.866016][T12685] do_syscall_64+0x4c/0xa0 [ 379.870451][T12685] ? clear_bhb_loop+0x50/0xa0 [ 379.875135][T12685] ? clear_bhb_loop+0x50/0xa0 [ 379.879827][T12685] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 379.885733][T12685] RIP: 0033:0x7fe4efd306c9 [ 379.890157][T12685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 379.909775][T12685] RSP: 002b:00007fe4ee798038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 379.918217][T12685] RAX: ffffffffffffffda RBX: 00007fe4eff86fa0 RCX: 00007fe4efd306c9 [ 379.926562][T12685] RDX: 0000000000000050 RSI: 0000200000001200 RDI: 000000000000000a [ 379.934815][T12685] RBP: 00007fe4ee798090 R08: 0000000000000000 R09: 0000000000000000 [ 379.942815][T12685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 379.951623][T12685] R13: 00007fe4eff87038 R14: 00007fe4eff86fa0 R15: 00007fffad92f8c8 [ 379.959625][T12685] [ 380.850820][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 380.860945][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 381.017207][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 381.041984][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 381.051087][ T382] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.058262][ T382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.092796][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 381.101329][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 381.110388][ T382] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.117460][ T382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.125290][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 381.134085][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 381.142404][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 381.150628][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 381.193019][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 381.210123][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 381.219205][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 381.229487][T12661] device veth0_vlan entered promiscuous mode [ 381.272543][T12661] device veth1_macvtap entered promiscuous mode [ 381.302366][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 381.347110][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 381.374213][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 381.382694][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 381.391189][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 381.479891][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 381.526998][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 381.635449][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 381.654047][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 381.694592][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 381.703283][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 381.738113][T12205] device bridge_slave_1 left promiscuous mode [ 381.744292][T12205] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.832768][T12205] device bridge_slave_0 left promiscuous mode [ 381.857343][T12205] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.878212][T12205] device veth1_macvtap left promiscuous mode [ 381.884253][T12205] device veth0_vlan left promiscuous mode [ 383.507357][T12728] FAULT_INJECTION: forcing a failure. [ 383.507357][T12728] name failslab, interval 1, probability 0, space 0, times 0 [ 383.527420][T12728] CPU: 0 PID: 12728 Comm: syz.1.4343 Tainted: G W syzkaller #0 [ 383.536314][T12728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 383.546647][T12728] Call Trace: [ 383.549932][T12728] [ 383.552859][T12728] __dump_stack+0x21/0x30 [ 383.557205][T12728] dump_stack_lvl+0xee/0x150 [ 383.561877][T12728] ? show_regs_print_info+0x20/0x20 [ 383.567076][T12728] dump_stack+0x15/0x20 [ 383.571228][T12728] should_fail+0x3c1/0x510 [ 383.575727][T12728] __should_failslab+0xa4/0xe0 [ 383.580833][T12728] should_failslab+0x9/0x20 [ 383.585504][T12728] slab_pre_alloc_hook+0x3b/0xe0 [ 383.590610][T12728] ? __build_skb+0x2d/0x310 [ 383.595774][T12728] kmem_cache_alloc+0x44/0x260 [ 383.600638][T12728] __build_skb+0x2d/0x310 [ 383.605322][T12728] ? __kasan_check_write+0x14/0x20 [ 383.610449][T12728] build_skb+0x24/0x200 [ 383.614605][T12728] bpf_prog_test_run_skb+0x279/0x1150 [ 383.619974][T12728] ? __kasan_check_write+0x14/0x20 [ 383.625430][T12728] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 383.631321][T12728] bpf_prog_test_run+0x3d5/0x620 [ 383.636268][T12728] ? bpf_prog_query+0x230/0x230 [ 383.641127][T12728] ? selinux_bpf+0xce/0xf0 [ 383.645556][T12728] ? security_bpf+0x82/0xa0 [ 383.650074][T12728] __sys_bpf+0x52c/0x730 [ 383.654328][T12728] ? bpf_link_show_fdinfo+0x310/0x310 [ 383.659702][T12728] ? debug_smp_processor_id+0x17/0x20 [ 383.665071][T12728] __x64_sys_bpf+0x7c/0x90 [ 383.669493][T12728] x64_sys_call+0x4b9/0x9a0 [ 383.673991][T12728] do_syscall_64+0x4c/0xa0 [ 383.678403][T12728] ? clear_bhb_loop+0x50/0xa0 [ 383.683078][T12728] ? clear_bhb_loop+0x50/0xa0 [ 383.687755][T12728] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 383.693645][T12728] RIP: 0033:0x7fda0c0456c9 [ 383.698059][T12728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 383.718009][T12728] RSP: 002b:00007fda0aaad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 383.726953][T12728] RAX: ffffffffffffffda RBX: 00007fda0c29bfa0 RCX: 00007fda0c0456c9 [ 383.735008][T12728] RDX: 0000000000000050 RSI: 0000200000001200 RDI: 000000000000000a [ 383.742972][T12728] RBP: 00007fda0aaad090 R08: 0000000000000000 R09: 0000000000000000 [ 383.750939][T12728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 383.759089][T12728] R13: 00007fda0c29c038 R14: 00007fda0c29bfa0 R15: 00007fff7ae36098 [ 383.767327][T12728] [ 383.911529][T12732] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.928965][T12732] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.969467][T12732] device bridge_slave_0 entered promiscuous mode [ 383.997824][T12205] device bridge_slave_1 left promiscuous mode [ 384.004250][T12205] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.050624][T12205] device bridge_slave_0 left promiscuous mode [ 384.064874][T12205] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.117544][T12205] device veth1_macvtap left promiscuous mode [ 384.133618][T12205] device veth0_vlan left promiscuous mode [ 384.340650][T12732] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.354060][T12732] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.383924][T12732] device bridge_slave_1 entered promiscuous mode [ 385.060700][T12772] device sit0 left promiscuous mode [ 385.183479][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 385.209034][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 385.281423][T12772] device sit0 entered promiscuous mode [ 385.434640][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 385.449792][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 385.459082][T12205] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.466160][T12205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.478193][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 385.486825][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 385.494928][T12205] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.501992][T12205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 385.510489][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 385.565314][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 385.578400][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 385.617628][T12787] bond_slave_1: mtu less than device minimum [ 385.623939][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 385.633666][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 385.649014][T12732] device veth0_vlan entered promiscuous mode [ 385.684144][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 385.693079][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 385.703767][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 385.712604][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 385.758027][T12732] device veth1_macvtap entered promiscuous mode [ 385.770435][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 385.780289][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 385.788650][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 385.797467][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 385.844569][T12797] FAULT_INJECTION: forcing a failure. [ 385.844569][T12797] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 385.866686][T12797] CPU: 1 PID: 12797 Comm: syz.0.4364 Tainted: G W syzkaller #0 [ 385.875565][T12797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 385.885634][T12797] Call Trace: [ 385.888931][T12797] [ 385.891870][T12797] __dump_stack+0x21/0x30 [ 385.896217][T12797] dump_stack_lvl+0xee/0x150 [ 385.900818][T12797] ? show_regs_print_info+0x20/0x20 [ 385.906030][T12797] ? unwind_get_return_address+0x4d/0x90 [ 385.911758][T12797] ? stack_trace_save+0xe0/0xe0 [ 385.916616][T12797] dump_stack+0x15/0x20 [ 385.920865][T12797] should_fail+0x3c1/0x510 [ 385.925290][T12797] should_fail_alloc_page+0x55/0x80 [ 385.930583][T12797] prepare_alloc_pages+0x156/0x600 [ 385.935787][T12797] ? __alloc_pages_bulk+0xab0/0xab0 [ 385.941603][T12797] ? __kasan_slab_alloc+0xcf/0xf0 [ 385.946636][T12797] ? __kasan_slab_alloc+0xbd/0xf0 [ 385.951665][T12797] ? slab_post_alloc_hook+0x4f/0x2b0 [ 385.956998][T12797] ? alloc_vmap_area+0x17a/0x1990 [ 385.962117][T12797] __alloc_pages+0x10a/0x440 [ 385.966716][T12797] ? prep_new_page+0x110/0x110 [ 385.971495][T12797] __get_free_pages+0x10/0x30 [ 385.976176][T12797] kasan_populate_vmalloc_pte+0x29/0x120 [ 385.981819][T12797] __apply_to_page_range+0x8cd/0xc70 [ 385.987110][T12797] ? kasan_populate_vmalloc+0x70/0x70 [ 385.992494][T12797] ? kasan_populate_vmalloc+0x70/0x70 [ 385.997876][T12797] apply_to_page_range+0x3b/0x50 [ 386.002823][T12797] kasan_populate_vmalloc+0x60/0x70 [ 386.008030][T12797] alloc_vmap_area+0x185c/0x1990 [ 386.012981][T12797] ? vm_map_ram+0xa70/0xa70 [ 386.017492][T12797] ? kmem_cache_alloc_trace+0x119/0x270 [ 386.023134][T12797] ? __get_vm_area_node+0x11d/0x350 [ 386.028340][T12797] __get_vm_area_node+0x14e/0x350 [ 386.033372][T12797] __vmalloc_node_range+0xdf/0xaf0 [ 386.038489][T12797] ? sock_map_alloc+0x202/0x330 [ 386.043354][T12797] bpf_map_area_alloc+0xd5/0xe0 [ 386.048215][T12797] ? sock_map_alloc+0x202/0x330 [ 386.053073][T12797] sock_map_alloc+0x202/0x330 [ 386.057774][T12797] map_create+0x455/0x21b0 [ 386.062204][T12797] __sys_bpf+0x2cf/0x730 [ 386.066454][T12797] ? bpf_link_show_fdinfo+0x310/0x310 [ 386.071837][T12797] ? debug_smp_processor_id+0x17/0x20 [ 386.077218][T12797] __x64_sys_bpf+0x7c/0x90 [ 386.081645][T12797] x64_sys_call+0x4b9/0x9a0 [ 386.086160][T12797] do_syscall_64+0x4c/0xa0 [ 386.090583][T12797] ? clear_bhb_loop+0x50/0xa0 [ 386.095267][T12797] ? clear_bhb_loop+0x50/0xa0 [ 386.099958][T12797] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 386.105870][T12797] RIP: 0033:0x7f7d0d2746c9 [ 386.110299][T12797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.129931][T12797] RSP: 002b:00007f7d0bcdc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 386.138361][T12797] RAX: ffffffffffffffda RBX: 00007f7d0d4cafa0 RCX: 00007f7d0d2746c9 [ 386.146526][T12797] RDX: 0000000000000048 RSI: 0000200000000100 RDI: 0000000000000000 [ 386.154510][T12797] RBP: 00007f7d0bcdc090 R08: 0000000000000000 R09: 0000000000000000 [ 386.162492][T12797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 386.170474][T12797] R13: 00007f7d0d4cb038 R14: 00007f7d0d4cafa0 R15: 00007ffde88b2e98 [ 386.178457][T12797] [ 386.227451][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 386.235783][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 386.249207][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 386.257577][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 387.275705][T12205] device bridge_slave_1 left promiscuous mode [ 387.281904][T12205] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.289475][T12205] device bridge_slave_0 left promiscuous mode [ 387.295573][T12205] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.303333][T12205] device veth1_macvtap left promiscuous mode [ 387.309398][T12205] device veth0_vlan left promiscuous mode [ 387.983502][T12815] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.990708][T12815] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.998496][T12815] device bridge_slave_0 entered promiscuous mode [ 388.017319][T12815] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.024383][T12815] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.032211][T12815] device bridge_slave_1 entered promiscuous mode [ 388.603184][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 388.619087][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 388.667307][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 388.681052][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 388.690161][ T382] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.697233][ T382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.705027][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 388.713787][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.722285][ T382] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.729344][ T382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.737402][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 388.745802][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.806816][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 388.814615][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 388.822977][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.834581][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 388.843741][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 388.878181][T12815] device veth0_vlan entered promiscuous mode [ 388.901626][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 388.912598][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.953415][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.961220][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.997116][T12815] device veth1_macvtap entered promiscuous mode [ 389.028763][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 389.056754][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 389.101276][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 389.152881][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 389.183711][ T382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 390.797608][T12884] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 390.951298][T12900] FAULT_INJECTION: forcing a failure. [ 390.951298][T12900] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 390.966466][T12900] CPU: 0 PID: 12900 Comm: syz.0.4394 Tainted: G W syzkaller #0 [ 390.975349][T12900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 390.985420][T12900] Call Trace: [ 390.988707][T12900] [ 390.991644][T12900] __dump_stack+0x21/0x30 [ 390.995994][T12900] dump_stack_lvl+0xee/0x150 [ 391.000602][T12900] ? show_regs_print_info+0x20/0x20 [ 391.005814][T12900] ? stack_trace_save+0xe0/0xe0 [ 391.010673][T12900] dump_stack+0x15/0x20 [ 391.014841][T12900] should_fail+0x3c1/0x510 [ 391.019265][T12900] should_fail_alloc_page+0x55/0x80 [ 391.024474][T12900] prepare_alloc_pages+0x156/0x600 [ 391.029592][T12900] ? __alloc_pages_bulk+0xab0/0xab0 [ 391.034799][T12900] ? __kasan_slab_alloc+0xcf/0xf0 [ 391.039835][T12900] ? __kasan_slab_alloc+0xbd/0xf0 [ 391.044868][T12900] ? slab_post_alloc_hook+0x4f/0x2b0 [ 391.050163][T12900] ? alloc_vmap_area+0x17a/0x1990 [ 391.055200][T12900] __alloc_pages+0x10a/0x440 [ 391.059803][T12900] ? prep_new_page+0x110/0x110 [ 391.064679][T12900] ? _raw_spin_lock+0x8e/0xe0 [ 391.069375][T12900] ? _raw_spin_trylock_bh+0x130/0x130 [ 391.074759][T12900] __get_free_pages+0x10/0x30 [ 391.079449][T12900] kasan_populate_vmalloc_pte+0x29/0x120 [ 391.085089][T12900] __apply_to_page_range+0x8cd/0xc70 [ 391.090386][T12900] ? kasan_populate_vmalloc+0x70/0x70 [ 391.095858][T12900] ? kasan_populate_vmalloc+0x70/0x70 [ 391.101242][T12900] apply_to_page_range+0x3b/0x50 [ 391.106198][T12900] kasan_populate_vmalloc+0x60/0x70 [ 391.111406][T12900] alloc_vmap_area+0x185c/0x1990 [ 391.116357][T12900] ? vm_map_ram+0xa70/0xa70 [ 391.120884][T12900] ? kmem_cache_alloc_trace+0x119/0x270 [ 391.126449][T12900] ? __get_vm_area_node+0x11d/0x350 [ 391.131660][T12900] __get_vm_area_node+0x14e/0x350 [ 391.136696][T12900] __vmalloc_node_range+0xdf/0xaf0 [ 391.141819][T12900] ? sock_map_alloc+0x202/0x330 [ 391.146682][T12900] bpf_map_area_alloc+0xd5/0xe0 [ 391.151548][T12900] ? sock_map_alloc+0x202/0x330 [ 391.156492][T12900] sock_map_alloc+0x202/0x330 [ 391.161174][T12900] map_create+0x455/0x21b0 [ 391.165601][T12900] __sys_bpf+0x2cf/0x730 [ 391.169854][T12900] ? bpf_link_show_fdinfo+0x310/0x310 [ 391.175238][T12900] ? debug_smp_processor_id+0x17/0x20 [ 391.180624][T12900] __x64_sys_bpf+0x7c/0x90 [ 391.185048][T12900] x64_sys_call+0x4b9/0x9a0 [ 391.189567][T12900] do_syscall_64+0x4c/0xa0 [ 391.193996][T12900] ? clear_bhb_loop+0x50/0xa0 [ 391.198683][T12900] ? clear_bhb_loop+0x50/0xa0 [ 391.203381][T12900] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 391.209285][T12900] RIP: 0033:0x7f7d0d2746c9 [ 391.213714][T12900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 391.233326][T12900] RSP: 002b:00007f7d0bcdc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 391.241786][T12900] RAX: ffffffffffffffda RBX: 00007f7d0d4cafa0 RCX: 00007f7d0d2746c9 [ 391.249772][T12900] RDX: 0000000000000048 RSI: 0000200000000100 RDI: 0000000000000000 [ 391.257764][T12900] RBP: 00007f7d0bcdc090 R08: 0000000000000000 R09: 0000000000000000 [ 391.265746][T12900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 391.273727][T12900] R13: 00007f7d0d4cb038 R14: 00007f7d0d4cafa0 R15: 00007ffde88b2e98 [ 391.281801][T12900] [ 391.303573][T12205] device bridge_slave_1 left promiscuous mode [ 391.310160][T12205] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.318235][T12205] device bridge_slave_0 left promiscuous mode [ 391.324711][T12205] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.345783][T12205] device veth1_macvtap left promiscuous mode [ 391.359891][T12205] device veth0_vlan left promiscuous mode [ 391.675816][T12926] device syzkaller0 entered promiscuous mode [ 391.694011][T12887] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.701353][T12887] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.709051][T12887] device bridge_slave_0 entered promiscuous mode [ 391.716189][T12887] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.723639][T12887] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.731592][T12887] device bridge_slave_1 entered promiscuous mode [ 392.122978][T12887] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.130129][T12887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.137540][T12887] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.144604][T12887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.320163][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.332339][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.358511][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 392.387867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 392.429001][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 392.460587][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.467703][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 392.510618][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 392.542749][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.549957][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 392.707246][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 392.726700][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 392.765258][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 392.844103][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 392.853306][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 392.898189][T12984] device syzkaller0 entered promiscuous mode [ 392.924839][T12887] device veth0_vlan entered promiscuous mode [ 392.943349][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 392.954339][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 393.041465][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 393.061022][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 393.118445][T12887] device veth1_macvtap entered promiscuous mode [ 393.190890][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 393.220449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 393.254711][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 393.270051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 393.287020][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 395.636888][T13017] device syzkaller0 entered promiscuous mode [ 395.967208][T12205] device bridge_slave_1 left promiscuous mode [ 395.973569][T12205] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.024404][T12205] device bridge_slave_0 left promiscuous mode [ 396.030980][T12205] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.039334][T12205] device veth1_macvtap left promiscuous mode [ 396.045490][T12205] device veth0_vlan left promiscuous mode [ 396.193117][T13026] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.212037][T13026] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.236937][T13026] device bridge_slave_0 entered promiscuous mode [ 396.261964][T13026] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.306020][T13026] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.361859][T13026] device bridge_slave_1 entered promiscuous mode [ 396.564326][T13047] device syzkaller0 entered promiscuous mode [ 396.819394][T13056] ªªªªªª: renamed from vlan0 [ 397.117924][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 397.136982][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 397.183784][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 397.213354][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 397.237738][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.244830][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.283870][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 397.291757][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 397.300521][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 397.309319][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.316418][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 397.331267][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 397.363389][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 397.389642][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 397.419199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 397.479003][T13071] device wg2 entered promiscuous mode [ 397.627143][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 397.639553][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 397.714129][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 397.749811][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 397.817719][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 397.840056][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 397.935580][T13026] device veth0_vlan entered promiscuous mode [ 398.019916][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 398.037053][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 398.290370][T13026] device veth1_macvtap entered promiscuous mode [ 398.414581][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 398.432812][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 398.474211][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 398.530709][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 398.557634][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 400.347375][T12205] device bridge_slave_1 left promiscuous mode [ 400.353590][T12205] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.406632][T12205] device bridge_slave_0 left promiscuous mode [ 400.412818][T12205] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.463910][T12205] device veth1_macvtap left promiscuous mode [ 400.480697][T12205] device veth0_vlan left promiscuous mode [ 400.897905][T13135] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.904990][T13135] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.994450][T13135] device bridge_slave_0 entered promiscuous mode [ 401.074077][T13135] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.108210][T13135] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.154076][T13135] device bridge_slave_1 entered promiscuous mode [ 401.508358][T13165] device syzkaller0 entered promiscuous mode [ 401.714698][T13181] device pim6reg1 entered promiscuous mode [ 401.734046][T13180] bridge0: port 3(gretap0) entered blocking state [ 401.740854][T13180] bridge0: port 3(gretap0) entered disabled state [ 401.754114][T13180] device gretap0 entered promiscuous mode [ 401.923469][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 401.932252][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 401.965245][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 401.984541][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 401.993920][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.001003][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.010938][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 402.020080][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 402.028596][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.035653][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.094839][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 402.134983][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.150654][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.240895][T13211] device syzkaller0 entered promiscuous mode [ 402.263700][T13135] device veth0_vlan entered promiscuous mode [ 402.316587][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 402.353786][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 402.418289][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 402.444255][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 402.616571][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 402.637836][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 402.706144][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 402.725761][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 402.735653][T13135] device veth1_macvtap entered promiscuous mode [ 402.777308][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 402.785467][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 402.794349][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 402.844151][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 402.853977][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 404.517224][T12205] device bridge_slave_1 left promiscuous mode [ 404.523366][T12205] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.531081][T12205] device bridge_slave_0 left promiscuous mode [ 404.537624][T12205] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.545364][T12205] device veth1_macvtap left promiscuous mode [ 404.551779][T12205] device veth0_vlan left promiscuous mode [ 404.674608][T13244] syz.2.4499[13244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 404.674719][T13244] syz.2.4499[13244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.355758][T13254] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.374769][T13254] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.382819][T13254] device bridge_slave_0 entered promiscuous mode [ 405.431240][T13254] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.441490][T13254] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.455969][T13254] device bridge_slave_1 entered promiscuous mode [ 405.821366][T13286] FAULT_INJECTION: forcing a failure. [ 405.821366][T13286] name failslab, interval 1, probability 0, space 0, times 0 [ 405.837220][T13286] CPU: 1 PID: 13286 Comm: syz.1.4513 Tainted: G W syzkaller #0 [ 405.846112][T13286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 405.856344][T13286] Call Trace: [ 405.859619][T13286] [ 405.862636][T13286] __dump_stack+0x21/0x30 [ 405.866978][T13286] dump_stack_lvl+0xee/0x150 [ 405.871585][T13286] ? show_regs_print_info+0x20/0x20 [ 405.876794][T13286] ? kstrtouint_from_user+0x1a0/0x200 [ 405.882175][T13286] dump_stack+0x15/0x20 [ 405.886336][T13286] should_fail+0x3c1/0x510 [ 405.891016][T13286] __should_failslab+0xa4/0xe0 [ 405.895954][T13286] should_failslab+0x9/0x20 [ 405.900457][T13286] slab_pre_alloc_hook+0x3b/0xe0 [ 405.905389][T13286] __kmalloc+0x6d/0x2c0 [ 405.909716][T13286] ? kvmalloc_node+0x206/0x300 [ 405.914478][T13286] kvmalloc_node+0x206/0x300 [ 405.919326][T13286] ? __fget_files+0x2c4/0x320 [ 405.923998][T13286] ? vm_mmap+0xb0/0xb0 [ 405.928406][T13286] vmemdup_user+0x26/0xe0 [ 405.932733][T13286] map_get_next_key+0x213/0x4c0 [ 405.937574][T13286] ? security_bpf+0x82/0xa0 [ 405.942075][T13286] __sys_bpf+0x390/0x730 [ 405.946402][T13286] ? bpf_link_show_fdinfo+0x310/0x310 [ 405.951955][T13286] ? debug_smp_processor_id+0x17/0x20 [ 405.957424][T13286] __x64_sys_bpf+0x7c/0x90 [ 405.961928][T13286] x64_sys_call+0x4b9/0x9a0 [ 405.966432][T13286] do_syscall_64+0x4c/0xa0 [ 405.970845][T13286] ? clear_bhb_loop+0x50/0xa0 [ 405.975778][T13286] ? clear_bhb_loop+0x50/0xa0 [ 405.980626][T13286] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 405.986689][T13286] RIP: 0033:0x7fda0c0456c9 [ 405.991186][T13286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 406.011141][T13286] RSP: 002b:00007fda0aaad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 406.020307][T13286] RAX: ffffffffffffffda RBX: 00007fda0c29bfa0 RCX: 00007fda0c0456c9 [ 406.028359][T13286] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 406.036323][T13286] RBP: 00007fda0aaad090 R08: 0000000000000000 R09: 0000000000000000 [ 406.044981][T13286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 406.053292][T13286] R13: 00007fda0c29c038 R14: 00007fda0c29bfa0 R15: 00007fff7ae36098 [ 406.061636][T13286] [ 406.211524][T13254] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.218703][T13254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.225993][T13254] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.233312][T13254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.243232][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.251598][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.315589][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 406.348536][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 406.396810][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 406.447360][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 406.475129][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.482405][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.490093][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 406.499206][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 406.508436][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.516226][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.587100][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 406.595834][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 406.604171][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 406.613283][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 406.630724][T13254] device veth0_vlan entered promiscuous mode [ 406.675201][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 406.683981][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 406.693058][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 406.701619][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 406.710512][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 406.718268][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 406.892682][T13339] FAULT_INJECTION: forcing a failure. [ 406.892682][T13339] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 406.906445][T13339] CPU: 1 PID: 13339 Comm: syz.1.4531 Tainted: G W syzkaller #0 [ 406.915483][T13339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 406.925702][T13339] Call Trace: [ 406.929316][T13339] [ 406.932321][T13339] __dump_stack+0x21/0x30 [ 406.936809][T13339] dump_stack_lvl+0xee/0x150 [ 406.941561][T13339] ? show_regs_print_info+0x20/0x20 [ 406.946830][T13339] ? __kmalloc+0x13d/0x2c0 [ 406.951494][T13339] ? kvmalloc_node+0x206/0x300 [ 406.956451][T13339] dump_stack+0x15/0x20 [ 406.960785][T13339] should_fail+0x3c1/0x510 [ 406.965194][T13339] should_fail_usercopy+0x1a/0x20 [ 406.970301][T13339] _copy_from_user+0x20/0xd0 [ 406.975062][T13339] vmemdup_user+0x63/0xe0 [ 406.979377][T13339] map_get_next_key+0x213/0x4c0 [ 406.984299][T13339] ? security_bpf+0x82/0xa0 [ 406.989471][T13339] __sys_bpf+0x390/0x730 [ 406.994145][T13339] ? bpf_link_show_fdinfo+0x310/0x310 [ 406.999511][T13339] ? debug_smp_processor_id+0x17/0x20 [ 407.004891][T13339] __x64_sys_bpf+0x7c/0x90 [ 407.009299][T13339] x64_sys_call+0x4b9/0x9a0 [ 407.013881][T13339] do_syscall_64+0x4c/0xa0 [ 407.018286][T13339] ? clear_bhb_loop+0x50/0xa0 [ 407.022946][T13339] ? clear_bhb_loop+0x50/0xa0 [ 407.027609][T13339] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 407.033488][T13339] RIP: 0033:0x7fda0c0456c9 [ 407.037886][T13339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.057734][T13339] RSP: 002b:00007fda0aaad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 407.066133][T13339] RAX: ffffffffffffffda RBX: 00007fda0c29bfa0 RCX: 00007fda0c0456c9 [ 407.074268][T13339] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 407.082241][T13339] RBP: 00007fda0aaad090 R08: 0000000000000000 R09: 0000000000000000 [ 407.090476][T13339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.098788][T13339] R13: 00007fda0c29c038 R14: 00007fda0c29bfa0 R15: 00007fff7ae36098 [ 407.106755][T13339] [ 407.166955][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 407.176719][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 407.245442][T13254] device veth1_macvtap entered promiscuous mode [ 407.255479][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 407.299701][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 407.321450][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 407.441966][T13352] device syzkaller0 entered promiscuous mode [ 407.488894][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 407.497417][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 407.506177][T13346] device wg2 left promiscuous mode [ 407.514511][T13341] device wg2 entered promiscuous mode [ 409.456431][T12205] device bridge_slave_1 left promiscuous mode [ 409.463278][T12205] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.484144][T12205] device bridge_slave_0 left promiscuous mode [ 409.490656][T12205] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.523088][T12205] device veth1_macvtap left promiscuous mode [ 409.530779][T13378] FAULT_INJECTION: forcing a failure. [ 409.530779][T13378] name failslab, interval 1, probability 0, space 0, times 0 [ 409.544300][T12205] device veth0_vlan left promiscuous mode [ 409.550307][T13378] CPU: 1 PID: 13378 Comm: syz.0.4546 Tainted: G W syzkaller #0 [ 409.559172][T13378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 409.569676][T13378] Call Trace: [ 409.572967][T13378] [ 409.576168][T13378] __dump_stack+0x21/0x30 [ 409.580690][T13378] dump_stack_lvl+0xee/0x150 [ 409.585292][T13378] ? show_regs_print_info+0x20/0x20 [ 409.590503][T13378] dump_stack+0x15/0x20 [ 409.594666][T13378] should_fail+0x3c1/0x510 [ 409.599268][T13378] __should_failslab+0xa4/0xe0 [ 409.604138][T13378] should_failslab+0x9/0x20 [ 409.609554][T13378] slab_pre_alloc_hook+0x3b/0xe0 [ 409.614505][T13378] __kmalloc+0x6d/0x2c0 [ 409.618669][T13378] ? kvmalloc_node+0x206/0x300 [ 409.623444][T13378] kvmalloc_node+0x206/0x300 [ 409.628046][T13378] ? check_stack_object+0x81/0x140 [ 409.633168][T13378] ? vm_mmap+0xb0/0xb0 [ 409.637247][T13378] ? __kasan_check_write+0x14/0x20 [ 409.642372][T13378] ? _copy_from_user+0x95/0xd0 [ 409.647152][T13378] map_get_next_key+0x279/0x4c0 [ 409.652013][T13378] __sys_bpf+0x390/0x730 [ 409.656262][T13378] ? bpf_link_show_fdinfo+0x310/0x310 [ 409.661640][T13378] ? debug_smp_processor_id+0x17/0x20 [ 409.667001][T13378] __x64_sys_bpf+0x7c/0x90 [ 409.671408][T13378] x64_sys_call+0x4b9/0x9a0 [ 409.675896][T13378] do_syscall_64+0x4c/0xa0 [ 409.680288][T13378] ? clear_bhb_loop+0x50/0xa0 [ 409.684939][T13378] ? clear_bhb_loop+0x50/0xa0 [ 409.689598][T13378] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 409.695468][T13378] RIP: 0033:0x7f7d0d2746c9 [ 409.699869][T13378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 409.719460][T13378] RSP: 002b:00007f7d0bcdc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 409.727849][T13378] RAX: ffffffffffffffda RBX: 00007f7d0d4cafa0 RCX: 00007f7d0d2746c9 [ 409.735815][T13378] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 409.743778][T13378] RBP: 00007f7d0bcdc090 R08: 0000000000000000 R09: 0000000000000000 [ 409.751862][T13378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 409.759820][T13378] R13: 00007f7d0d4cb038 R14: 00007f7d0d4cafa0 R15: 00007ffde88b2e98 [ 409.767861][T13378] [ 410.309022][T13376] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.341847][T13376] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.362243][T13376] device bridge_slave_0 entered promiscuous mode [ 410.375068][T13376] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.382189][T13376] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.389833][T13376] device bridge_slave_1 entered promiscuous mode [ 410.789946][T13415] device veth0_vlan left promiscuous mode [ 410.800049][T13415] device veth0_vlan entered promiscuous mode [ 410.853598][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 410.867259][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 410.881499][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 411.074795][ T30] audit: type=1400 audit(1763426059.164:157): avc: denied { associate } for pid=13426 comm="syz.2.4561" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 411.135314][T13433] FAULT_INJECTION: forcing a failure. [ 411.135314][T13433] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 411.153804][T13433] CPU: 0 PID: 13433 Comm: syz.1.4563 Tainted: G W syzkaller #0 [ 411.162704][T13433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 411.172771][T13433] Call Trace: [ 411.176058][T13433] [ 411.178999][T13433] __dump_stack+0x21/0x30 [ 411.183348][T13433] dump_stack_lvl+0xee/0x150 [ 411.187943][T13433] ? show_regs_print_info+0x20/0x20 [ 411.193159][T13433] dump_stack+0x15/0x20 [ 411.197326][T13433] should_fail+0x3c1/0x510 [ 411.201761][T13433] should_fail_alloc_page+0x55/0x80 [ 411.206971][T13433] prepare_alloc_pages+0x156/0x600 [ 411.212091][T13433] ? __alloc_pages_bulk+0xab0/0xab0 [ 411.217299][T13433] __alloc_pages+0x10a/0x440 [ 411.221904][T13433] ? prep_new_page+0x110/0x110 [ 411.226685][T13433] kmalloc_order+0x4c/0x160 [ 411.231203][T13433] kmalloc_order_trace+0x18/0xb0 [ 411.236152][T13433] __kmalloc+0x199/0x2c0 [ 411.240405][T13433] trie_get_next_key+0x26e/0x6f0 [ 411.245360][T13433] ? vm_mmap+0xb0/0xb0 [ 411.249441][T13433] ? __kasan_check_write+0x14/0x20 [ 411.254568][T13433] ? _copy_from_user+0x95/0xd0 [ 411.259337][T13433] map_get_next_key+0x2ea/0x4c0 [ 411.264180][T13433] __sys_bpf+0x390/0x730 [ 411.268404][T13433] ? bpf_link_show_fdinfo+0x310/0x310 [ 411.273770][T13433] ? debug_smp_processor_id+0x17/0x20 [ 411.279140][T13433] __x64_sys_bpf+0x7c/0x90 [ 411.283544][T13433] x64_sys_call+0x4b9/0x9a0 [ 411.288045][T13433] do_syscall_64+0x4c/0xa0 [ 411.292456][T13433] ? clear_bhb_loop+0x50/0xa0 [ 411.297120][T13433] ? clear_bhb_loop+0x50/0xa0 [ 411.301772][T13433] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 411.307675][T13433] RIP: 0033:0x7fda0c0456c9 [ 411.312079][T13433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 411.331712][T13433] RSP: 002b:00007fda0aaad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 411.340139][T13433] RAX: ffffffffffffffda RBX: 00007fda0c29bfa0 RCX: 00007fda0c0456c9 [ 411.348087][T13433] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 411.356043][T13433] RBP: 00007fda0aaad090 R08: 0000000000000000 R09: 0000000000000000 [ 411.364005][T13433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 411.371960][T13433] R13: 00007fda0c29c038 R14: 00007fda0c29bfa0 R15: 00007fff7ae36098 [ 411.379921][T13433] [ 411.824775][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 411.834020][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 411.909907][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 411.932841][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 411.976756][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.984192][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.049435][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 412.077728][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 412.110983][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 412.128444][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.135702][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.200411][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 412.210254][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 412.376084][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 412.393525][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 412.605675][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 412.621845][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 412.720880][T13376] device veth0_vlan entered promiscuous mode [ 412.871337][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 412.899156][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 412.976318][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 413.026985][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 413.095171][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 413.119302][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 413.188779][T13376] device veth1_macvtap entered promiscuous mode [ 413.252854][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 413.289628][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 413.298432][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 413.339104][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 413.349148][T13486] FAULT_INJECTION: forcing a failure. [ 413.349148][T13486] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 413.364222][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 413.372304][T13486] CPU: 1 PID: 13486 Comm: syz.0.4578 Tainted: G W syzkaller #0 [ 413.381857][T13486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 413.392526][T13486] Call Trace: [ 413.395894][T13486] [ 413.398832][T13486] __dump_stack+0x21/0x30 [ 413.403350][T13486] dump_stack_lvl+0xee/0x150 [ 413.407937][T13486] ? show_regs_print_info+0x20/0x20 [ 413.413134][T13486] dump_stack+0x15/0x20 [ 413.417285][T13486] should_fail+0x3c1/0x510 [ 413.421783][T13486] should_fail_usercopy+0x1a/0x20 [ 413.426801][T13486] _copy_to_user+0x20/0x90 [ 413.431298][T13486] simple_read_from_buffer+0xe9/0x160 [ 413.436802][T13486] proc_fail_nth_read+0x19a/0x210 [ 413.441823][T13486] ? proc_fault_inject_write+0x2f0/0x2f0 [ 413.447457][T13486] ? security_file_permission+0x83/0xa0 [ 413.453002][T13486] ? proc_fault_inject_write+0x2f0/0x2f0 [ 413.458678][T13486] vfs_read+0x282/0xbe0 [ 413.462839][T13486] ? kernel_read+0x1f0/0x1f0 [ 413.467426][T13486] ? __kasan_check_write+0x14/0x20 [ 413.472535][T13486] ? mutex_lock+0x95/0x1a0 [ 413.476950][T13486] ? wait_for_completion_killable_timeout+0x10/0x10 [ 413.483535][T13486] ? __fget_files+0x2c4/0x320 [ 413.488397][T13486] ? __fdget_pos+0x2d2/0x380 [ 413.492983][T13486] ? ksys_read+0x71/0x240 [ 413.497307][T13486] ksys_read+0x140/0x240 [ 413.501542][T13486] ? vfs_write+0xf70/0xf70 [ 413.505954][T13486] ? debug_smp_processor_id+0x17/0x20 [ 413.511324][T13486] __x64_sys_read+0x7b/0x90 [ 413.515821][T13486] x64_sys_call+0x96d/0x9a0 [ 413.520323][T13486] do_syscall_64+0x4c/0xa0 [ 413.524737][T13486] ? clear_bhb_loop+0x50/0xa0 [ 413.529408][T13486] ? clear_bhb_loop+0x50/0xa0 [ 413.534078][T13486] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 413.539968][T13486] RIP: 0033:0x7f7d0d2730dc [ 413.544383][T13486] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 413.563989][T13486] RSP: 002b:00007f7d0bcdc030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 413.572404][T13486] RAX: ffffffffffffffda RBX: 00007f7d0d4cafa0 RCX: 00007f7d0d2730dc [ 413.580376][T13486] RDX: 000000000000000f RSI: 00007f7d0bcdc0a0 RDI: 0000000000000007 [ 413.588344][T13486] RBP: 00007f7d0bcdc090 R08: 0000000000000000 R09: 0000000000000000 [ 413.596311][T13486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.604275][T13486] R13: 00007f7d0d4cb038 R14: 00007f7d0d4cafa0 R15: 00007ffde88b2e98 [ 413.612247][T13486] [ 413.782099][T13489] device syzkaller0 entered promiscuous mode [ 413.935486][T13499] device syzkaller0 entered promiscuous mode [ 415.656965][T12205] device bridge_slave_1 left promiscuous mode [ 415.663079][T12205] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.671044][T12205] device bridge_slave_0 left promiscuous mode [ 415.677189][T12205] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.685472][T12205] device veth1_macvtap left promiscuous mode [ 415.691509][T12205] device veth0_vlan left promiscuous mode [ 415.888673][T13511] syz.3.4586[13511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.888790][T13511] syz.3.4586[13511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.136002][ T30] audit: type=1400 audit(1763426064.224:158): avc: denied { create } for pid=13515 comm="syz.1.4589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 416.650286][T13543] device syzkaller0 entered promiscuous mode [ 416.797523][T13521] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.805021][T13521] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.812606][T13521] device bridge_slave_0 entered promiscuous mode [ 416.819638][T13521] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.826723][T13521] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.834214][T13521] device bridge_slave_1 entered promiscuous mode [ 416.978052][T13587] device syzkaller0 entered promiscuous mode [ 417.206801][T13604] device syzkaller0 entered promiscuous mode [ 417.244098][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 417.251737][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 417.259606][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 417.268447][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 417.277282][T12205] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.284322][T12205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.293206][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 417.360457][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 417.375301][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 417.402843][T12205] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.409949][T12205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.484115][T13521] device veth0_vlan entered promiscuous mode [ 417.504862][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 417.513454][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 417.521641][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 417.530326][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 417.539839][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 417.549900][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 417.559935][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 417.567914][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.647893][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.655454][T12205] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 418.029746][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 418.055892][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 418.066085][T13521] device veth1_macvtap entered promiscuous mode [ 418.186434][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 418.198515][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 418.208939][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 418.217887][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 419.517172][T12205] device bridge_slave_1 left promiscuous mode [ 419.523288][T12205] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.530766][T12205] device bridge_slave_0 left promiscuous mode [ 419.537011][T12205] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.544743][T12205] device veth1_macvtap left promiscuous mode [ 419.550796][T12205] device veth0_vlan left promiscuous mode [ 420.556907][T13643] device syzkaller0 entered promiscuous mode [ 420.692300][T13652] FAULT_INJECTION: forcing a failure. [ 420.692300][T13652] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 420.724865][T13652] CPU: 1 PID: 13652 Comm: syz.3.4632 Tainted: G W syzkaller #0 [ 420.733761][T13652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 420.744007][T13652] Call Trace: [ 420.747296][T13652] [ 420.750236][T13652] __dump_stack+0x21/0x30 [ 420.754581][T13652] dump_stack_lvl+0xee/0x150 [ 420.759181][T13652] ? show_regs_print_info+0x20/0x20 [ 420.764393][T13652] dump_stack+0x15/0x20 [ 420.768552][T13652] should_fail+0x3c1/0x510 [ 420.772957][T13652] should_fail_usercopy+0x1a/0x20 [ 420.778064][T13652] _copy_from_user+0x20/0xd0 [ 420.782650][T13652] bpf_prog_test_run_flow_dissector+0x296/0x5e0 [ 420.788889][T13652] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 420.794427][T13652] ? proc_fail_nth_write+0x17a/0x1f0 [ 420.799703][T13652] ? __fget_files+0x2c4/0x320 [ 420.804366][T13652] ? fput_many+0x15a/0x1a0 [ 420.808764][T13652] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 420.814298][T13652] bpf_prog_test_run+0x3d5/0x620 [ 420.819223][T13652] ? bpf_prog_query+0x230/0x230 [ 420.824071][T13652] ? selinux_bpf+0xce/0xf0 [ 420.828480][T13652] ? security_bpf+0x82/0xa0 [ 420.832973][T13652] __sys_bpf+0x52c/0x730 [ 420.837210][T13652] ? bpf_link_show_fdinfo+0x310/0x310 [ 420.842770][T13652] ? debug_smp_processor_id+0x17/0x20 [ 420.848137][T13652] __x64_sys_bpf+0x7c/0x90 [ 420.852540][T13652] x64_sys_call+0x4b9/0x9a0 [ 420.857035][T13652] do_syscall_64+0x4c/0xa0 [ 420.861613][T13652] ? clear_bhb_loop+0x50/0xa0 [ 420.866274][T13652] ? clear_bhb_loop+0x50/0xa0 [ 420.870939][T13652] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 420.876839][T13652] RIP: 0033:0x7f250185d6c9 [ 420.881233][T13652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 420.900849][T13652] RSP: 002b:00007f25002c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 420.909263][T13652] RAX: ffffffffffffffda RBX: 00007f2501ab3fa0 RCX: 00007f250185d6c9 [ 420.917239][T13652] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 420.925198][T13652] RBP: 00007f25002c5090 R08: 0000000000000000 R09: 0000000000000000 [ 420.933146][T13652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 420.941099][T13652] R13: 00007f2501ab4038 R14: 00007f2501ab3fa0 R15: 00007ffe47d77558 [ 420.949064][T13652] [ 421.044152][T13646] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.051361][T13646] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.058802][T13646] device bridge_slave_0 entered promiscuous mode [ 421.136971][T13646] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.144206][T13646] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.151616][T13646] device bridge_slave_1 entered promiscuous mode [ 421.627773][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 421.638017][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 421.657007][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 421.665683][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.673979][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.681052][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.688741][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 421.697204][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.705561][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.712624][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.720496][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 421.774642][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.818182][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 421.828645][T13679] FAULT_INJECTION: forcing a failure. [ 421.828645][T13679] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 421.877232][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 421.901194][T13679] CPU: 1 PID: 13679 Comm: syz.3.4639 Tainted: G W syzkaller #0 [ 421.910100][T13679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 421.920169][T13679] Call Trace: [ 421.923457][T13679] [ 421.926396][T13679] __dump_stack+0x21/0x30 [ 421.930743][T13679] dump_stack_lvl+0xee/0x150 [ 421.935350][T13679] ? show_regs_print_info+0x20/0x20 [ 421.940585][T13679] ? stack_trace_save+0xe0/0xe0 [ 421.945447][T13679] dump_stack+0x15/0x20 [ 421.949615][T13679] should_fail+0x3c1/0x510 [ 421.954040][T13679] should_fail_alloc_page+0x55/0x80 [ 421.959253][T13679] prepare_alloc_pages+0x156/0x600 [ 421.964376][T13679] ? __alloc_pages_bulk+0xab0/0xab0 [ 421.969583][T13679] ? __kasan_slab_alloc+0xcf/0xf0 [ 421.974615][T13679] ? __kasan_slab_alloc+0xbd/0xf0 [ 421.979647][T13679] ? slab_post_alloc_hook+0x4f/0x2b0 [ 421.984946][T13679] ? alloc_vmap_area+0x17a/0x1990 [ 421.989978][T13679] __alloc_pages+0x10a/0x440 [ 421.994581][T13679] ? prep_new_page+0x110/0x110 [ 421.999359][T13679] ? _raw_spin_lock+0x8e/0xe0 [ 422.004054][T13679] ? _raw_spin_trylock_bh+0x130/0x130 [ 422.009436][T13679] __get_free_pages+0x10/0x30 [ 422.014134][T13679] kasan_populate_vmalloc_pte+0x29/0x120 [ 422.019864][T13679] __apply_to_page_range+0x8cd/0xc70 [ 422.025263][T13679] ? kasan_populate_vmalloc+0x70/0x70 [ 422.030731][T13679] ? kasan_populate_vmalloc+0x70/0x70 [ 422.036114][T13679] apply_to_page_range+0x3b/0x50 [ 422.041063][T13679] kasan_populate_vmalloc+0x60/0x70 [ 422.046274][T13679] alloc_vmap_area+0x185c/0x1990 [ 422.051229][T13679] ? vm_map_ram+0xa70/0xa70 [ 422.055738][T13679] ? kmem_cache_alloc_trace+0x119/0x270 [ 422.061290][T13679] ? __get_vm_area_node+0x11d/0x350 [ 422.066582][T13679] __get_vm_area_node+0x14e/0x350 [ 422.071615][T13679] __vmalloc_node_range+0xdf/0xaf0 [ 422.076731][T13679] ? sock_map_alloc+0x202/0x330 [ 422.081771][T13679] bpf_map_area_alloc+0xd5/0xe0 [ 422.086808][T13679] ? sock_map_alloc+0x202/0x330 [ 422.091678][T13679] sock_map_alloc+0x202/0x330 [ 422.096714][T13679] map_create+0x455/0x21b0 [ 422.101400][T13679] __sys_bpf+0x2cf/0x730 [ 422.106000][T13679] ? bpf_link_show_fdinfo+0x310/0x310 [ 422.111642][T13679] ? debug_smp_processor_id+0x17/0x20 [ 422.117024][T13679] __x64_sys_bpf+0x7c/0x90 [ 422.121622][T13679] x64_sys_call+0x4b9/0x9a0 [ 422.126328][T13679] do_syscall_64+0x4c/0xa0 [ 422.131105][T13679] ? clear_bhb_loop+0x50/0xa0 [ 422.135962][T13679] ? clear_bhb_loop+0x50/0xa0 [ 422.141076][T13679] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 422.146988][T13679] RIP: 0033:0x7f250185d6c9 [ 422.151429][T13679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.171591][T13679] RSP: 002b:00007f25002c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 422.180549][T13679] RAX: ffffffffffffffda RBX: 00007f2501ab3fa0 RCX: 00007f250185d6c9 [ 422.188962][T13679] RDX: 0000000000000048 RSI: 0000200000000100 RDI: 0000000000000000 [ 422.197124][T13679] RBP: 00007f25002c5090 R08: 0000000000000000 R09: 0000000000000000 [ 422.206143][T13679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 422.214296][T13679] R13: 00007f2501ab4038 R14: 00007f2501ab3fa0 R15: 00007ffe47d77558 [ 422.222454][T13679] [ 422.293902][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 422.320129][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.334962][T13646] device veth0_vlan entered promiscuous mode [ 422.346044][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 422.361477][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.429047][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 422.444661][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 422.456672][T13646] device veth1_macvtap entered promiscuous mode [ 422.500991][T13687] device wg2 left promiscuous mode [ 422.561813][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 422.579842][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 422.611317][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 422.700854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 422.733523][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 422.906393][T13697] FAULT_INJECTION: forcing a failure. [ 422.906393][T13697] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 422.919795][T13697] CPU: 1 PID: 13697 Comm: syz.3.4646 Tainted: G W syzkaller #0 [ 422.928635][T13697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 422.939551][T13697] Call Trace: [ 422.942898][T13697] [ 422.945814][T13697] __dump_stack+0x21/0x30 [ 422.950131][T13697] dump_stack_lvl+0xee/0x150 [ 422.954802][T13697] ? show_regs_print_info+0x20/0x20 [ 422.959992][T13697] dump_stack+0x15/0x20 [ 422.964144][T13697] should_fail+0x3c1/0x510 [ 422.968559][T13697] should_fail_usercopy+0x1a/0x20 [ 422.973570][T13697] strncpy_from_user+0x24/0x2e0 [ 422.978409][T13697] strncpy_from_user_nofault+0x73/0x150 [ 422.983970][T13697] bpf_probe_read_user_str+0x2a/0x70 [ 422.989672][T13697] bpf_prog_bc7c5c6b9645592f+0x35/0x334 [ 422.995286][T13697] bpf_trace_run3+0x14e/0x1e0 [ 422.999945][T13697] ? bpf_trace_run2+0x1b0/0x1b0 [ 423.005398][T13697] ? __this_cpu_preempt_check+0x13/0x20 [ 423.011012][T13697] ? tracing_record_taskinfo_sched_switch+0x80/0x3a0 [ 423.018189][T13697] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 423.024727][T13697] __bpf_trace_sched_switch+0xb/0x10 [ 423.030171][T13697] __traceiter_sched_switch+0x85/0xc0 [ 423.035545][T13697] __schedule+0x1255/0x14c0 [ 423.040480][T13697] ? release_firmware_map_entry+0x190/0x190 [ 423.046365][T13697] ? preempt_schedule+0xa7/0xb0 [ 423.051205][T13697] preempt_schedule_common+0x9b/0xf0 [ 423.056477][T13697] preempt_schedule+0xa7/0xb0 [ 423.061150][T13697] ? schedule_preempt_disabled+0x20/0x20 [ 423.066764][T13697] ? migrate_enable+0x192/0x260 [ 423.071611][T13697] ? migrate_disable+0x180/0x180 [ 423.076522][T13697] preempt_schedule_thunk+0x16/0x18 [ 423.081704][T13697] ? bpf_test_timer_continue+0x397/0x4a0 [ 423.087325][T13697] bpf_test_timer_continue+0x39c/0x4a0 [ 423.092778][T13697] bpf_prog_test_run_flow_dissector+0x44c/0x5e0 [ 423.099005][T13697] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 423.104555][T13697] ? proc_fail_nth_write+0x17a/0x1f0 [ 423.109830][T13697] ? __fget_files+0x2c4/0x320 [ 423.114515][T13697] ? fput_many+0x15a/0x1a0 [ 423.118914][T13697] ? xdp_convert_buff_to_md+0x1e0/0x1e0 [ 423.124616][T13697] bpf_prog_test_run+0x3d5/0x620 [ 423.129713][T13697] ? bpf_prog_query+0x230/0x230 [ 423.134900][T13697] ? selinux_bpf+0xce/0xf0 [ 423.139783][T13697] ? security_bpf+0x82/0xa0 [ 423.144444][T13697] __sys_bpf+0x52c/0x730 [ 423.148667][T13697] ? bpf_link_show_fdinfo+0x310/0x310 [ 423.154111][T13697] ? debug_smp_processor_id+0x17/0x20 [ 423.159634][T13697] __x64_sys_bpf+0x7c/0x90 [ 423.164032][T13697] x64_sys_call+0x4b9/0x9a0 [ 423.168519][T13697] do_syscall_64+0x4c/0xa0 [ 423.172917][T13697] ? clear_bhb_loop+0x50/0xa0 [ 423.177834][T13697] ? clear_bhb_loop+0x50/0xa0 [ 423.182752][T13697] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 423.188632][T13697] RIP: 0033:0x7f250185d6c9 [ 423.193047][T13697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 423.212725][T13697] RSP: 002b:00007f25002c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 423.221218][T13697] RAX: ffffffffffffffda RBX: 00007f2501ab3fa0 RCX: 00007f250185d6c9 [ 423.229434][T13697] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 000000000000000a [ 423.237390][T13697] RBP: 00007f25002c5090 R08: 0000000000000000 R09: 0000000000000000 [ 423.245341][T13697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 423.253468][T13697] R13: 00007f2501ab4038 R14: 00007f2501ab3fa0 R15: 00007ffe47d77558 [ 423.261945][T13697] [ 424.239211][T12205] device bridge_slave_1 left promiscuous mode [ 424.245495][T12205] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.253054][T12205] device bridge_slave_0 left promiscuous mode [ 424.259233][T12205] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.267575][T12205] device veth1_macvtap left promiscuous mode [ 424.274007][T12205] device veth0_vlan left promiscuous mode [ 425.371628][T13709] FAULT_INJECTION: forcing a failure. [ 425.371628][T13709] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 425.409222][T13709] CPU: 1 PID: 13709 Comm: syz.3.4651 Tainted: G W syzkaller #0 [ 425.418122][T13709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 425.428203][T13709] Call Trace: [ 425.431502][T13709] [ 425.434453][T13709] __dump_stack+0x21/0x30 [ 425.438986][T13709] dump_stack_lvl+0xee/0x150 [ 425.443602][T13709] ? show_regs_print_info+0x20/0x20 [ 425.448831][T13709] dump_stack+0x15/0x20 [ 425.453011][T13709] should_fail+0x3c1/0x510 [ 425.457442][T13709] should_fail_alloc_page+0x55/0x80 [ 425.462656][T13709] prepare_alloc_pages+0x156/0x600 [ 425.467780][T13709] ? __alloc_pages_bulk+0xab0/0xab0 [ 425.472992][T13709] ? __alloc_pages_bulk+0x47f/0xab0 [ 425.478200][T13709] __alloc_pages+0x10a/0x440 [ 425.482813][T13709] ? prep_new_page+0x110/0x110 [ 425.487593][T13709] ? __kmalloc+0x13d/0x2c0 [ 425.492023][T13709] ? __vmalloc_node_range+0x375/0xaf0 [ 425.497416][T13709] __vmalloc_node_range+0x505/0xaf0 [ 425.502638][T13709] bpf_map_area_alloc+0xd5/0xe0 [ 425.507504][T13709] ? sock_map_alloc+0x202/0x330 [ 425.512367][T13709] sock_map_alloc+0x202/0x330 [ 425.517053][T13709] map_create+0x455/0x21b0 [ 425.521491][T13709] __sys_bpf+0x2cf/0x730 [ 425.525751][T13709] ? bpf_link_show_fdinfo+0x310/0x310 [ 425.531140][T13709] ? debug_smp_processor_id+0x17/0x20 [ 425.536530][T13709] __x64_sys_bpf+0x7c/0x90 [ 425.540958][T13709] x64_sys_call+0x4b9/0x9a0 [ 425.545486][T13709] do_syscall_64+0x4c/0xa0 [ 425.549917][T13709] ? clear_bhb_loop+0x50/0xa0 [ 425.554605][T13709] ? clear_bhb_loop+0x50/0xa0 [ 425.559292][T13709] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 425.565210][T13709] RIP: 0033:0x7f250185d6c9 [ 425.569643][T13709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 425.589360][T13709] RSP: 002b:00007f25002c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 425.597795][T13709] RAX: ffffffffffffffda RBX: 00007f2501ab3fa0 RCX: 00007f250185d6c9 [ 425.605792][T13709] RDX: 0000000000000048 RSI: 0000200000000100 RDI: 0000000000000000 [ 425.613789][T13709] RBP: 00007f25002c5090 R08: 0000000000000000 R09: 0000000000000000 [ 425.621781][T13709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 425.629865][T13709] R13: 00007f2501ab4038 R14: 00007f2501ab3fa0 R15: 00007ffe47d77558 [ 425.637849][T13709] [ 425.699767][T13717] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.712555][T13717] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.723527][T13717] device bridge_slave_0 entered promiscuous mode [ 425.732135][T13717] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.767774][T13717] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.812422][T13717] device bridge_slave_1 entered promiscuous mode [ 426.315571][T13717] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.322761][T13717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 426.330146][T13717] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.337194][T13717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.577187][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.587949][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.617051][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 426.655037][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 426.695680][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 426.745945][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.753377][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.866719][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 426.996766][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.003864][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.061172][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 427.087034][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 427.142180][T13717] device veth0_vlan entered promiscuous mode [ 427.274981][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 427.289000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 427.312543][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 427.330699][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 427.565847][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 427.576930][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 427.587123][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 427.626106][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 427.755432][T13717] device veth1_macvtap entered promiscuous mode [ 427.774324][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 427.834995][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 427.854327][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 427.918974][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 427.957014][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=4041 state=3 status=67 (errno 9: Bad file descriptor) [ 428.196453][ T30] audit: type=1400 audit(1763426076.284:159): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14938]" dev="pipefs" ino=14938 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 429.013024][ T8] device bridge_slave_1 left promiscuous mode [ 429.019572][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.027124][ T8] device bridge_slave_0 left promiscuous mode [ 429.033258][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.042452][ T8] device veth1_macvtap left promiscuous mode [ 429.048599][ T8] device veth0_vlan left promiscuous mode [ 430.220415][ T8] device gretap0 left promiscuous mode [ 430.225909][ T8] bridge0: port 3(gretap0) entered disabled state [ 430.462420][ T8] device bridge_slave_1 left promiscuous mode [ 430.468583][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.476164][ T8] device bridge_slave_0 left promiscuous mode [ 430.482353][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.490183][ T8] device bridge_slave_1 left promiscuous mode [ 430.496279][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.503759][ T8] device bridge_slave_0 left promiscuous mode [ 430.509887][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.517830][ T8] device bridge_slave_1 left promiscuous mode [ 430.523916][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.531265][ T8] device bridge_slave_0 left promiscuous mode [ 430.537403][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.545868][ T8] device veth1_macvtap left promiscuous mode [ 430.551895][ T8] device veth0_vlan left promiscuous mode [ 430.557952][ T8] device veth1_macvtap left promiscuous mode [ 430.564332][ T8] device veth1_macvtap left promiscuous mode [ 430.570509][ T8] device veth0_vlan left promiscuous mode [ 430.576597][ T8] device veth1_macvtap left promiscuous mode [ 430.582591][ T8] device veth0_vlan left promiscuous mode