last executing test programs: 17.221842156s ago: executing program 3 (id=6368): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='notify_on_release\x00', 0x2, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r3 = openat$cgroup_ro(r0, &(0x7f0000000100)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x0, 0x10, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xb, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc4, 0xc4, 0x5, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x2}, @enum64={0xb, 0x5, 0x0, 0x13, 0x0, 0x2, [{0xb, 0x5, 0x1}, {0x4, 0x5, 0xe}, {0x1, 0xfffff38b}, {0x7, 0x400, 0x80000000}, {0xc, 0x3, 0x6}]}, @union={0xc, 0x6, 0x0, 0x5, 0x0, 0x2, [{0xb, 0x1, 0x970}, {0xa, 0x3, 0x3ff}, {0x1, 0x1, 0x4}, {0x8, 0x0, 0x3}, {0x0, 0x1, 0x2}, {0x8, 0x1, 0x200}]}, @var={0xd, 0x0, 0x0, 0xe, 0x5, 0x1}, @restrict={0x1}]}, {0x0, [0x2e, 0x61, 0x0]}}, &(0x7f0000000700)=""/72, 0xe1, 0x48, 0x0, 0x3, 0x10000}, 0x28) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pi6 \x00'}, 0x20) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0x0, 0x94}, 0xc) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x389, 0x0, 0x1, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x16, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x4, 0x0, 0xb, 0x3, 0x4, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x80}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x1b1d5026, 0x94, &(0x7f0000000240)=""/148, 0x67a75fe9232a774a, 0x64, '\x00', r4, 0x0, r5, 0x8, &(0x7f00000007c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0xb, 0x1000, 0x5f}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000a00)=[r0, r1, r6, r7, r8, r9], &(0x7f0000000a40)=[{0x2, 0x5, 0xa, 0x3}, {0x4, 0x5, 0x4, 0x4}, {0x5, 0x4, 0xb, 0xf}, {0x3, 0x5, 0x6, 0x8}, {0x5, 0x5, 0x9, 0xa}, {0x0, 0x3, 0xc, 0x6}, {0x4, 0x2, 0xd, 0x4}, {0x4, 0x1, 0xa, 0xc}, {0x1, 0x3, 0x5, 0x8}, {0x5, 0x5, 0x4, 0xb}]}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r2, 0xffffffffffffffff}, &(0x7f0000000e00), &(0x7f0000000e40)=r10}, 0x20) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ec0)={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x11, 0x19, &(0x7f0000000bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}, [@alu={0x7, 0x0, 0x5, 0xa, 0x1, 0x6, 0x10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @generic={0x80, 0x2, 0x7, 0x800, 0x9}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @printk={@ld}, @ldst={0x1, 0x3, 0x4, 0x1, 0x3, 0xffffffffffffffe8}, @generic={0x10, 0x1, 0x8, 0x0, 0xfffffffe}]}, &(0x7f0000000cc0)='GPL\x00', 0x800, 0x4b, &(0x7f0000000d00)=""/75, 0x41000, 0x28, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000d80)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x2, 0xc, 0xfffff000, 0x5}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f40)=[0x1, r9, r9, r11, r2, 0x1, r12, r6], &(0x7f0000000f80)=[{0x5, 0x1, 0x2f49, 0x4}], 0x10, 0x2}, 0x94) r13 = openat$cgroup_ro(r3, &(0x7f00000011c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0x17, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @exit, @cb_func={0x18, 0x2, 0x4, 0x0, 0x2}]}, &(0x7f0000001140)='GPL\x00', 0x2f, 0x0, &(0x7f0000001180), 0x41000, 0x40, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001200)=[r7, 0x1, r3, r12, r8, r13, r8], &(0x7f0000001240)=[{0x2, 0x3, 0x3}, {0x0, 0x4, 0x6, 0x1}, {0x3, 0x2, 0x2, 0x5}, {0x0, 0x0, 0xb, 0x3}, {0x4, 0x5, 0x3, 0xc}, {0x2, 0x1, 0xb, 0xb}], 0x10, 0x10000}, 0x94) r14 = openat$cgroup(r3, &(0x7f0000001380)='syz0\x00', 0x200002, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f00000013c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r16 = bpf$ITER_CREATE(0x21, &(0x7f0000001400)={r3}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001540)={r7, 0x58, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x5, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000001480)='GPL\x00', 0x98, 0x0, 0x0, 0x40f00, 0x28, '\x00', r17, 0x25, r15, 0x8, &(0x7f0000001580)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000015c0)={0x2, 0xd, 0x15d, 0x9}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001600)=[{0x4, 0x3, 0x8, 0x1}, {0x5, 0x2, 0x4, 0xb}, {0x0, 0x1, 0x4, 0xa}, {0x1, 0x5, 0x9, 0x2}], 0x10, 0x237b}, 0x94) r18 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f0000001700)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x10, &(0x7f0000001780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r18}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x7}, @map_fd={0x18, 0x6, 0x1, 0x0, r13}, @map_fd={0x18, 0xb, 0x1, 0x0, r6}]}, &(0x7f0000001800)='syzkaller\x00', 0x3c3, 0xea, &(0x7f0000001840)=""/234, 0x41100, 0x50, '\x00', r4, 0x25, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001940)={0x5, 0xe, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001b40)={@map=r16, 0x2f, 0x1, 0x7fff, &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001ac0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001e40)={r10, 0xe0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000001bc0)=[0x0, 0x0], &(0x7f0000001c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x81, &(0x7f0000001c40)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001c80), &(0x7f0000001cc0), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000001d00)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=r19, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001f00)={&(0x7f0000001ec0)='ext4_free_blocks\x00', r13, 0x0, 0x2}, 0x18) r20 = syz_clone(0xb0306000, &(0x7f0000001f40)="9873d8387c031e1d2e468b28f26be5cdf8b94681ecbb132953a46dfc324807d71bd530a094e2d92bf1597044d064b192d73609d72efaa9fbf76f456491e129ad01f25d5a1ae379896d84eb9cb21584b0a270b308b855c1317b2264dd760dab836c068ace5009e2343f38a1e14258c24784bec8ad2cae8960198e3a77356ccbe9a34676d2a5c61a69d29ab73b8953d834fb0401847aab75d7", 0x98, &(0x7f0000002000), &(0x7f0000002040), &(0x7f0000002080)="93333cf7a0caf5e29d48a771884e864dbd86") write$cgroup_pid(r3, &(0x7f00000020c0)=r20, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{r5}, &(0x7f0000002100), &(0x7f00000021c0)}, 0x20) 16.830158677s ago: executing program 4 (id=6347): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000040000"], 0x0, 0x80000000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(&(0x7f0000010040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x400}, 0x0, 0xfff0000000000001, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000d"], 0x0, 0x26}, 0x20) socketpair(0x2, 0x3, 0x2, &(0x7f00000100c0)) 13.816696631s ago: executing program 3 (id=6368): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='notify_on_release\x00', 0x2, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r3 = openat$cgroup_ro(r0, &(0x7f0000000100)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x0, 0x10, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xb, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc4, 0xc4, 0x5, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x2}, @enum64={0xb, 0x5, 0x0, 0x13, 0x0, 0x2, [{0xb, 0x5, 0x1}, {0x4, 0x5, 0xe}, {0x1, 0xfffff38b}, {0x7, 0x400, 0x80000000}, {0xc, 0x3, 0x6}]}, @union={0xc, 0x6, 0x0, 0x5, 0x0, 0x2, [{0xb, 0x1, 0x970}, {0xa, 0x3, 0x3ff}, {0x1, 0x1, 0x4}, {0x8, 0x0, 0x3}, {0x0, 0x1, 0x2}, {0x8, 0x1, 0x200}]}, @var={0xd, 0x0, 0x0, 0xe, 0x5, 0x1}, @restrict={0x1}]}, {0x0, [0x2e, 0x61, 0x0]}}, &(0x7f0000000700)=""/72, 0xe1, 0x48, 0x0, 0x3, 0x10000}, 0x28) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pi6 \x00'}, 0x20) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0x0, 0x94}, 0xc) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x389, 0x0, 0x1, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x16, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x4, 0x0, 0xb, 0x3, 0x4, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x80}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x1b1d5026, 0x94, &(0x7f0000000240)=""/148, 0x67a75fe9232a774a, 0x64, '\x00', r4, 0x0, r5, 0x8, &(0x7f00000007c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0xb, 0x1000, 0x5f}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000a00)=[r0, r1, r6, r7, r8, r9], &(0x7f0000000a40)=[{0x2, 0x5, 0xa, 0x3}, {0x4, 0x5, 0x4, 0x4}, {0x5, 0x4, 0xb, 0xf}, {0x3, 0x5, 0x6, 0x8}, {0x5, 0x5, 0x9, 0xa}, {0x0, 0x3, 0xc, 0x6}, {0x4, 0x2, 0xd, 0x4}, {0x4, 0x1, 0xa, 0xc}, {0x1, 0x3, 0x5, 0x8}, {0x5, 0x5, 0x4, 0xb}]}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r2, 0xffffffffffffffff}, &(0x7f0000000e00), &(0x7f0000000e40)=r10}, 0x20) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ec0)={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x11, 0x19, &(0x7f0000000bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}, [@alu={0x7, 0x0, 0x5, 0xa, 0x1, 0x6, 0x10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @generic={0x80, 0x2, 0x7, 0x800, 0x9}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @printk={@ld}, @ldst={0x1, 0x3, 0x4, 0x1, 0x3, 0xffffffffffffffe8}, @generic={0x10, 0x1, 0x8, 0x0, 0xfffffffe}]}, &(0x7f0000000cc0)='GPL\x00', 0x800, 0x4b, &(0x7f0000000d00)=""/75, 0x41000, 0x28, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000d80)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x2, 0xc, 0xfffff000, 0x5}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f40)=[0x1, r9, r9, r11, r2, 0x1, r12, r6], &(0x7f0000000f80)=[{0x5, 0x1, 0x2f49, 0x4}], 0x10, 0x2}, 0x94) r13 = openat$cgroup_ro(r3, &(0x7f00000011c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0x17, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @exit, @cb_func={0x18, 0x2, 0x4, 0x0, 0x2}]}, &(0x7f0000001140)='GPL\x00', 0x2f, 0x0, &(0x7f0000001180), 0x41000, 0x40, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001200)=[r7, 0x1, r3, r12, r8, r13, r8], &(0x7f0000001240)=[{0x2, 0x3, 0x3}, {0x0, 0x4, 0x6, 0x1}, {0x3, 0x2, 0x2, 0x5}, {0x0, 0x0, 0xb, 0x3}, {0x4, 0x5, 0x3, 0xc}, {0x2, 0x1, 0xb, 0xb}], 0x10, 0x10000}, 0x94) r14 = openat$cgroup(r3, &(0x7f0000001380)='syz0\x00', 0x200002, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f00000013c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r16 = bpf$ITER_CREATE(0x21, &(0x7f0000001400)={r3}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001540)={r7, 0x58, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x5, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000001480)='GPL\x00', 0x98, 0x0, 0x0, 0x40f00, 0x28, '\x00', r17, 0x25, r15, 0x8, &(0x7f0000001580)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000015c0)={0x2, 0xd, 0x15d, 0x9}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001600)=[{0x4, 0x3, 0x8, 0x1}, {0x5, 0x2, 0x4, 0xb}, {0x0, 0x1, 0x4, 0xa}, {0x1, 0x5, 0x9, 0x2}], 0x10, 0x237b}, 0x94) r18 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f0000001700)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x10, &(0x7f0000001780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r18}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x7}, @map_fd={0x18, 0x6, 0x1, 0x0, r13}, @map_fd={0x18, 0xb, 0x1, 0x0, r6}]}, &(0x7f0000001800)='syzkaller\x00', 0x3c3, 0xea, &(0x7f0000001840)=""/234, 0x41100, 0x50, '\x00', r4, 0x25, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001940)={0x5, 0xe, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001b40)={@map=r16, 0x2f, 0x1, 0x7fff, &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001ac0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001e40)={r10, 0xe0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000001bc0)=[0x0, 0x0], &(0x7f0000001c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x81, &(0x7f0000001c40)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001c80), &(0x7f0000001cc0), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000001d00)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=r19, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001f00)={&(0x7f0000001ec0)='ext4_free_blocks\x00', r13, 0x0, 0x2}, 0x18) r20 = syz_clone(0xb0306000, &(0x7f0000001f40)="9873d8387c031e1d2e468b28f26be5cdf8b94681ecbb132953a46dfc324807d71bd530a094e2d92bf1597044d064b192d73609d72efaa9fbf76f456491e129ad01f25d5a1ae379896d84eb9cb21584b0a270b308b855c1317b2264dd760dab836c068ace5009e2343f38a1e14258c24784bec8ad2cae8960198e3a77356ccbe9a34676d2a5c61a69d29ab73b8953d834fb0401847aab75d7", 0x98, &(0x7f0000002000), &(0x7f0000002040), &(0x7f0000002080)="93333cf7a0caf5e29d48a771884e864dbd86") write$cgroup_pid(r3, &(0x7f00000020c0)=r20, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{r5}, &(0x7f0000002100), &(0x7f00000021c0)}, 0x20) 12.320094773s ago: executing program 4 (id=6347): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000040000"], 0x0, 0x80000000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(&(0x7f0000010040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x400}, 0x0, 0xfff0000000000001, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000d"], 0x0, 0x26}, 0x20) socketpair(0x2, 0x3, 0x2, &(0x7f00000100c0)) 9.539522758s ago: executing program 3 (id=6368): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='notify_on_release\x00', 0x2, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r3 = openat$cgroup_ro(r0, &(0x7f0000000100)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x0, 0x10, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xb, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc4, 0xc4, 0x5, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x2}, @enum64={0xb, 0x5, 0x0, 0x13, 0x0, 0x2, [{0xb, 0x5, 0x1}, {0x4, 0x5, 0xe}, {0x1, 0xfffff38b}, {0x7, 0x400, 0x80000000}, {0xc, 0x3, 0x6}]}, @union={0xc, 0x6, 0x0, 0x5, 0x0, 0x2, [{0xb, 0x1, 0x970}, {0xa, 0x3, 0x3ff}, {0x1, 0x1, 0x4}, {0x8, 0x0, 0x3}, {0x0, 0x1, 0x2}, {0x8, 0x1, 0x200}]}, @var={0xd, 0x0, 0x0, 0xe, 0x5, 0x1}, @restrict={0x1}]}, {0x0, [0x2e, 0x61, 0x0]}}, &(0x7f0000000700)=""/72, 0xe1, 0x48, 0x0, 0x3, 0x10000}, 0x28) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pi6 \x00'}, 0x20) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0x0, 0x94}, 0xc) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x389, 0x0, 0x1, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x16, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x4, 0x0, 0xb, 0x3, 0x4, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x80}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x1b1d5026, 0x94, &(0x7f0000000240)=""/148, 0x67a75fe9232a774a, 0x64, '\x00', r4, 0x0, r5, 0x8, &(0x7f00000007c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0xb, 0x1000, 0x5f}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000a00)=[r0, r1, r6, r7, r8, r9], &(0x7f0000000a40)=[{0x2, 0x5, 0xa, 0x3}, {0x4, 0x5, 0x4, 0x4}, {0x5, 0x4, 0xb, 0xf}, {0x3, 0x5, 0x6, 0x8}, {0x5, 0x5, 0x9, 0xa}, {0x0, 0x3, 0xc, 0x6}, {0x4, 0x2, 0xd, 0x4}, {0x4, 0x1, 0xa, 0xc}, {0x1, 0x3, 0x5, 0x8}, {0x5, 0x5, 0x4, 0xb}]}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r2, 0xffffffffffffffff}, &(0x7f0000000e00), &(0x7f0000000e40)=r10}, 0x20) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ec0)={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x11, 0x19, &(0x7f0000000bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}, [@alu={0x7, 0x0, 0x5, 0xa, 0x1, 0x6, 0x10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @generic={0x80, 0x2, 0x7, 0x800, 0x9}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @printk={@ld}, @ldst={0x1, 0x3, 0x4, 0x1, 0x3, 0xffffffffffffffe8}, @generic={0x10, 0x1, 0x8, 0x0, 0xfffffffe}]}, &(0x7f0000000cc0)='GPL\x00', 0x800, 0x4b, &(0x7f0000000d00)=""/75, 0x41000, 0x28, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000d80)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x2, 0xc, 0xfffff000, 0x5}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f40)=[0x1, r9, r9, r11, r2, 0x1, r12, r6], &(0x7f0000000f80)=[{0x5, 0x1, 0x2f49, 0x4}], 0x10, 0x2}, 0x94) r13 = openat$cgroup_ro(r3, &(0x7f00000011c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0x17, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @exit, @cb_func={0x18, 0x2, 0x4, 0x0, 0x2}]}, &(0x7f0000001140)='GPL\x00', 0x2f, 0x0, &(0x7f0000001180), 0x41000, 0x40, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001200)=[r7, 0x1, r3, r12, r8, r13, r8], &(0x7f0000001240)=[{0x2, 0x3, 0x3}, {0x0, 0x4, 0x6, 0x1}, {0x3, 0x2, 0x2, 0x5}, {0x0, 0x0, 0xb, 0x3}, {0x4, 0x5, 0x3, 0xc}, {0x2, 0x1, 0xb, 0xb}], 0x10, 0x10000}, 0x94) r14 = openat$cgroup(r3, &(0x7f0000001380)='syz0\x00', 0x200002, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f00000013c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r16 = bpf$ITER_CREATE(0x21, &(0x7f0000001400)={r3}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001540)={r7, 0x58, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x5, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000001480)='GPL\x00', 0x98, 0x0, 0x0, 0x40f00, 0x28, '\x00', r17, 0x25, r15, 0x8, &(0x7f0000001580)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000015c0)={0x2, 0xd, 0x15d, 0x9}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001600)=[{0x4, 0x3, 0x8, 0x1}, {0x5, 0x2, 0x4, 0xb}, {0x0, 0x1, 0x4, 0xa}, {0x1, 0x5, 0x9, 0x2}], 0x10, 0x237b}, 0x94) r18 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f0000001700)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x10, &(0x7f0000001780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r18}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x7}, @map_fd={0x18, 0x6, 0x1, 0x0, r13}, @map_fd={0x18, 0xb, 0x1, 0x0, r6}]}, &(0x7f0000001800)='syzkaller\x00', 0x3c3, 0xea, &(0x7f0000001840)=""/234, 0x41100, 0x50, '\x00', r4, 0x25, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001940)={0x5, 0xe, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001b40)={@map=r16, 0x2f, 0x1, 0x7fff, &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001ac0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001e40)={r10, 0xe0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000001bc0)=[0x0, 0x0], &(0x7f0000001c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x81, &(0x7f0000001c40)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001c80), &(0x7f0000001cc0), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000001d00)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=r19, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001f00)={&(0x7f0000001ec0)='ext4_free_blocks\x00', r13, 0x0, 0x2}, 0x18) r20 = syz_clone(0xb0306000, &(0x7f0000001f40)="9873d8387c031e1d2e468b28f26be5cdf8b94681ecbb132953a46dfc324807d71bd530a094e2d92bf1597044d064b192d73609d72efaa9fbf76f456491e129ad01f25d5a1ae379896d84eb9cb21584b0a270b308b855c1317b2264dd760dab836c068ace5009e2343f38a1e14258c24784bec8ad2cae8960198e3a77356ccbe9a34676d2a5c61a69d29ab73b8953d834fb0401847aab75d7", 0x98, &(0x7f0000002000), &(0x7f0000002040), &(0x7f0000002080)="93333cf7a0caf5e29d48a771884e864dbd86") write$cgroup_pid(r3, &(0x7f00000020c0)=r20, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{r5}, &(0x7f0000002100), &(0x7f00000021c0)}, 0x20) 7.449495347s ago: executing program 4 (id=6347): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000040000"], 0x0, 0x80000000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(&(0x7f0000010040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x400}, 0x0, 0xfff0000000000001, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000d"], 0x0, 0x26}, 0x20) socketpair(0x2, 0x3, 0x2, &(0x7f00000100c0)) 6.879354383s ago: executing program 3 (id=6368): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='notify_on_release\x00', 0x2, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r3 = openat$cgroup_ro(r0, &(0x7f0000000100)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x0, 0x10, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xb, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc4, 0xc4, 0x5, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x2}, @enum64={0xb, 0x5, 0x0, 0x13, 0x0, 0x2, [{0xb, 0x5, 0x1}, {0x4, 0x5, 0xe}, {0x1, 0xfffff38b}, {0x7, 0x400, 0x80000000}, {0xc, 0x3, 0x6}]}, @union={0xc, 0x6, 0x0, 0x5, 0x0, 0x2, [{0xb, 0x1, 0x970}, {0xa, 0x3, 0x3ff}, {0x1, 0x1, 0x4}, {0x8, 0x0, 0x3}, {0x0, 0x1, 0x2}, {0x8, 0x1, 0x200}]}, @var={0xd, 0x0, 0x0, 0xe, 0x5, 0x1}, @restrict={0x1}]}, {0x0, [0x2e, 0x61, 0x0]}}, &(0x7f0000000700)=""/72, 0xe1, 0x48, 0x0, 0x3, 0x10000}, 0x28) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pi6 \x00'}, 0x20) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0x0, 0x94}, 0xc) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x389, 0x0, 0x1, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x16, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x4, 0x0, 0xb, 0x3, 0x4, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x80}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x1b1d5026, 0x94, &(0x7f0000000240)=""/148, 0x67a75fe9232a774a, 0x64, '\x00', r4, 0x0, r5, 0x8, &(0x7f00000007c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0xb, 0x1000, 0x5f}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000a00)=[r0, r1, r6, r7, r8, r9], &(0x7f0000000a40)=[{0x2, 0x5, 0xa, 0x3}, {0x4, 0x5, 0x4, 0x4}, {0x5, 0x4, 0xb, 0xf}, {0x3, 0x5, 0x6, 0x8}, {0x5, 0x5, 0x9, 0xa}, {0x0, 0x3, 0xc, 0x6}, {0x4, 0x2, 0xd, 0x4}, {0x4, 0x1, 0xa, 0xc}, {0x1, 0x3, 0x5, 0x8}, {0x5, 0x5, 0x4, 0xb}]}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r2, 0xffffffffffffffff}, &(0x7f0000000e00), &(0x7f0000000e40)=r10}, 0x20) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ec0)={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x11, 0x19, &(0x7f0000000bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}, [@alu={0x7, 0x0, 0x5, 0xa, 0x1, 0x6, 0x10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @generic={0x80, 0x2, 0x7, 0x800, 0x9}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @printk={@ld}, @ldst={0x1, 0x3, 0x4, 0x1, 0x3, 0xffffffffffffffe8}, @generic={0x10, 0x1, 0x8, 0x0, 0xfffffffe}]}, &(0x7f0000000cc0)='GPL\x00', 0x800, 0x4b, &(0x7f0000000d00)=""/75, 0x41000, 0x28, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000d80)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x2, 0xc, 0xfffff000, 0x5}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f40)=[0x1, r9, r9, r11, r2, 0x1, r12, r6], &(0x7f0000000f80)=[{0x5, 0x1, 0x2f49, 0x4}], 0x10, 0x2}, 0x94) r13 = openat$cgroup_ro(r3, &(0x7f00000011c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0x17, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @exit, @cb_func={0x18, 0x2, 0x4, 0x0, 0x2}]}, &(0x7f0000001140)='GPL\x00', 0x2f, 0x0, &(0x7f0000001180), 0x41000, 0x40, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001200)=[r7, 0x1, r3, r12, r8, r13, r8], &(0x7f0000001240)=[{0x2, 0x3, 0x3}, {0x0, 0x4, 0x6, 0x1}, {0x3, 0x2, 0x2, 0x5}, {0x0, 0x0, 0xb, 0x3}, {0x4, 0x5, 0x3, 0xc}, {0x2, 0x1, 0xb, 0xb}], 0x10, 0x10000}, 0x94) r14 = openat$cgroup(r3, &(0x7f0000001380)='syz0\x00', 0x200002, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f00000013c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r16 = bpf$ITER_CREATE(0x21, &(0x7f0000001400)={r3}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001540)={r7, 0x58, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x5, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000001480)='GPL\x00', 0x98, 0x0, 0x0, 0x40f00, 0x28, '\x00', r17, 0x25, r15, 0x8, &(0x7f0000001580)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000015c0)={0x2, 0xd, 0x15d, 0x9}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001600)=[{0x4, 0x3, 0x8, 0x1}, {0x5, 0x2, 0x4, 0xb}, {0x0, 0x1, 0x4, 0xa}, {0x1, 0x5, 0x9, 0x2}], 0x10, 0x237b}, 0x94) r18 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f0000001700)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x10, &(0x7f0000001780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r18}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x7}, @map_fd={0x18, 0x6, 0x1, 0x0, r13}, @map_fd={0x18, 0xb, 0x1, 0x0, r6}]}, &(0x7f0000001800)='syzkaller\x00', 0x3c3, 0xea, &(0x7f0000001840)=""/234, 0x41100, 0x50, '\x00', r4, 0x25, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001940)={0x5, 0xe, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001b40)={@map=r16, 0x2f, 0x1, 0x7fff, &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001ac0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001e40)={r10, 0xe0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000001bc0)=[0x0, 0x0], &(0x7f0000001c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x81, &(0x7f0000001c40)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001c80), &(0x7f0000001cc0), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000001d00)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=r19, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001f00)={&(0x7f0000001ec0)='ext4_free_blocks\x00', r13, 0x0, 0x2}, 0x18) r20 = syz_clone(0xb0306000, &(0x7f0000001f40)="9873d8387c031e1d2e468b28f26be5cdf8b94681ecbb132953a46dfc324807d71bd530a094e2d92bf1597044d064b192d73609d72efaa9fbf76f456491e129ad01f25d5a1ae379896d84eb9cb21584b0a270b308b855c1317b2264dd760dab836c068ace5009e2343f38a1e14258c24784bec8ad2cae8960198e3a77356ccbe9a34676d2a5c61a69d29ab73b8953d834fb0401847aab75d7", 0x98, &(0x7f0000002000), &(0x7f0000002040), &(0x7f0000002080)="93333cf7a0caf5e29d48a771884e864dbd86") write$cgroup_pid(r3, &(0x7f00000020c0)=r20, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{r5}, &(0x7f0000002100), &(0x7f00000021c0)}, 0x20) 5.766789383s ago: executing program 4 (id=6347): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000040000"], 0x0, 0x80000000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(&(0x7f0000010040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x400}, 0x0, 0xfff0000000000001, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000d"], 0x0, 0x26}, 0x20) socketpair(0x2, 0x3, 0x2, &(0x7f00000100c0)) 5.089168118s ago: executing program 3 (id=6368): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='notify_on_release\x00', 0x2, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r3 = openat$cgroup_ro(r0, &(0x7f0000000100)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x0, 0x10, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xb, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc4, 0xc4, 0x5, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x2}, @enum64={0xb, 0x5, 0x0, 0x13, 0x0, 0x2, [{0xb, 0x5, 0x1}, {0x4, 0x5, 0xe}, {0x1, 0xfffff38b}, {0x7, 0x400, 0x80000000}, {0xc, 0x3, 0x6}]}, @union={0xc, 0x6, 0x0, 0x5, 0x0, 0x2, [{0xb, 0x1, 0x970}, {0xa, 0x3, 0x3ff}, {0x1, 0x1, 0x4}, {0x8, 0x0, 0x3}, {0x0, 0x1, 0x2}, {0x8, 0x1, 0x200}]}, @var={0xd, 0x0, 0x0, 0xe, 0x5, 0x1}, @restrict={0x1}]}, {0x0, [0x2e, 0x61, 0x0]}}, &(0x7f0000000700)=""/72, 0xe1, 0x48, 0x0, 0x3, 0x10000}, 0x28) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pi6 \x00'}, 0x20) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0x0, 0x94}, 0xc) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x389, 0x0, 0x1, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x16, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x4, 0x0, 0xb, 0x3, 0x4, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x80}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x1b1d5026, 0x94, &(0x7f0000000240)=""/148, 0x67a75fe9232a774a, 0x64, '\x00', r4, 0x0, r5, 0x8, &(0x7f00000007c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0xb, 0x1000, 0x5f}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000a00)=[r0, r1, r6, r7, r8, r9], &(0x7f0000000a40)=[{0x2, 0x5, 0xa, 0x3}, {0x4, 0x5, 0x4, 0x4}, {0x5, 0x4, 0xb, 0xf}, {0x3, 0x5, 0x6, 0x8}, {0x5, 0x5, 0x9, 0xa}, {0x0, 0x3, 0xc, 0x6}, {0x4, 0x2, 0xd, 0x4}, {0x4, 0x1, 0xa, 0xc}, {0x1, 0x3, 0x5, 0x8}, {0x5, 0x5, 0x4, 0xb}]}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r2, 0xffffffffffffffff}, &(0x7f0000000e00), &(0x7f0000000e40)=r10}, 0x20) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ec0)={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x11, 0x19, &(0x7f0000000bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}, [@alu={0x7, 0x0, 0x5, 0xa, 0x1, 0x6, 0x10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @generic={0x80, 0x2, 0x7, 0x800, 0x9}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @printk={@ld}, @ldst={0x1, 0x3, 0x4, 0x1, 0x3, 0xffffffffffffffe8}, @generic={0x10, 0x1, 0x8, 0x0, 0xfffffffe}]}, &(0x7f0000000cc0)='GPL\x00', 0x800, 0x4b, &(0x7f0000000d00)=""/75, 0x41000, 0x28, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000d80)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x2, 0xc, 0xfffff000, 0x5}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f40)=[0x1, r9, r9, r11, r2, 0x1, r12, r6], &(0x7f0000000f80)=[{0x5, 0x1, 0x2f49, 0x4}], 0x10, 0x2}, 0x94) r13 = openat$cgroup_ro(r3, &(0x7f00000011c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0x17, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @exit, @cb_func={0x18, 0x2, 0x4, 0x0, 0x2}]}, &(0x7f0000001140)='GPL\x00', 0x2f, 0x0, &(0x7f0000001180), 0x41000, 0x40, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001200)=[r7, 0x1, r3, r12, r8, r13, r8], &(0x7f0000001240)=[{0x2, 0x3, 0x3}, {0x0, 0x4, 0x6, 0x1}, {0x3, 0x2, 0x2, 0x5}, {0x0, 0x0, 0xb, 0x3}, {0x4, 0x5, 0x3, 0xc}, {0x2, 0x1, 0xb, 0xb}], 0x10, 0x10000}, 0x94) r14 = openat$cgroup(r3, &(0x7f0000001380)='syz0\x00', 0x200002, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f00000013c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r16 = bpf$ITER_CREATE(0x21, &(0x7f0000001400)={r3}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001540)={r7, 0x58, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x5, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000001480)='GPL\x00', 0x98, 0x0, 0x0, 0x40f00, 0x28, '\x00', r17, 0x25, r15, 0x8, &(0x7f0000001580)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000015c0)={0x2, 0xd, 0x15d, 0x9}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001600)=[{0x4, 0x3, 0x8, 0x1}, {0x5, 0x2, 0x4, 0xb}, {0x0, 0x1, 0x4, 0xa}, {0x1, 0x5, 0x9, 0x2}], 0x10, 0x237b}, 0x94) r18 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f0000001700)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x10, &(0x7f0000001780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r18}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x7}, @map_fd={0x18, 0x6, 0x1, 0x0, r13}, @map_fd={0x18, 0xb, 0x1, 0x0, r6}]}, &(0x7f0000001800)='syzkaller\x00', 0x3c3, 0xea, &(0x7f0000001840)=""/234, 0x41100, 0x50, '\x00', r4, 0x25, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001940)={0x5, 0xe, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001b40)={@map=r16, 0x2f, 0x1, 0x7fff, &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001ac0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001e40)={r10, 0xe0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000001bc0)=[0x0, 0x0], &(0x7f0000001c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x81, &(0x7f0000001c40)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001c80), &(0x7f0000001cc0), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000001d00)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=r19, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001f00)={&(0x7f0000001ec0)='ext4_free_blocks\x00', r13, 0x0, 0x2}, 0x18) r20 = syz_clone(0xb0306000, &(0x7f0000001f40)="9873d8387c031e1d2e468b28f26be5cdf8b94681ecbb132953a46dfc324807d71bd530a094e2d92bf1597044d064b192d73609d72efaa9fbf76f456491e129ad01f25d5a1ae379896d84eb9cb21584b0a270b308b855c1317b2264dd760dab836c068ace5009e2343f38a1e14258c24784bec8ad2cae8960198e3a77356ccbe9a34676d2a5c61a69d29ab73b8953d834fb0401847aab75d7", 0x98, &(0x7f0000002000), &(0x7f0000002040), &(0x7f0000002080)="93333cf7a0caf5e29d48a771884e864dbd86") write$cgroup_pid(r3, &(0x7f00000020c0)=r20, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{r5}, &(0x7f0000002100), &(0x7f00000021c0)}, 0x20) 4.141047084s ago: executing program 4 (id=6347): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000040000"], 0x0, 0x80000000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(&(0x7f0000010040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x400}, 0x0, 0xfff0000000000001, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000d"], 0x0, 0x26}, 0x20) socketpair(0x2, 0x3, 0x2, &(0x7f00000100c0)) 3.535164804s ago: executing program 1 (id=6438): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0xffffffffffffff38) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3}, &(0x7f0000000100), &(0x7f0000000140)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000d00)='kfree\x00', r5}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000001f40)=""/4089, 0x26, 0xff9, 0x1}, 0x28) perf_event_open(&(0x7f00000001c0)={0x0, 0xffffff2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(r6, 0x400454cc, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) 3.511089786s ago: executing program 0 (id=6440): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1e, 0xc, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x81, 0x0, 0x0, 0x0, 0x69, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001300)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) 3.293978283s ago: executing program 0 (id=6443): perf_event_open(&(0x7f0000000100)={0x1, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYBLOB], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x40}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x5, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.939551802s ago: executing program 1 (id=6445): syz_clone(0x11, 0x0, 0x2000, 0x0, 0x0, 0x0) 2.817403252s ago: executing program 1 (id=6446): bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0xb, &(0x7f00000011c0)=ANY=[@ANYBLOB="f3d3bc15d70f42952ec6070c13bef46718e1c47f76cdbf070357be547eea5c84546c9c0e0d54db01fe9c6f82ae590b1cb87c86a5edece5c0530847c380a2cc8df464ebc254961c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r0}, 0x18) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x100, 0x21, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r1, 0x0, 0x0, 0x0, 0x0}, 0x30) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x10, 0x0, 0xfe, 0x5, 0x0, 0x1ff, 0x20021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x4, @perf_bp={&(0x7f0000001000), 0xa}, 0x0, 0x4, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xbd93}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0xfffffdb9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x2}, 0xa8cf87e1f159bd0c, 0x2, 0x0, 0x8, 0xfffffffffffffffe, 0xffffffff, 0xffff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r3, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff12}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r4}, 0x0, &(0x7f0000000180)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYRESOCT=r2], 0x0, 0xfffffbfd}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair(0x2, 0x3, 0x1, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) socketpair(0x10, 0x0, 0x14, &(0x7f0000000400)) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.481300969s ago: executing program 2 (id=6448): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bf"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) close(0xffffffffffffffff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x47, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000711220000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000001000)}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x15, 0x2, 0x5, &(0x7f0000000080)) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) ioctl$TUNSETSNDBUF(r6, 0x400454d4, &(0x7f00000001c0)=0x8) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000280)={'wg2\x00'}) unlink(&(0x7f00000002c0)='./file0\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x4}, 0x11c028, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0xc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2.312057373s ago: executing program 0 (id=6449): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000"], 0x48) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000001180)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="180000faff0000000000000040000000181100003ce0ea86483905685e781c9be3906afad51b968cab78204f0962271756be44d52b0351b206430b30b2a9df67233bab7ebfe7ea6ef6d89ee21d1c88e0b8a27435ba61c372ccd38b2470f5cf00f2b18df69c08b5ffc2a209bf87e06b35e39ccbf906054a7967f35643efd96eb68b5b51e5b273", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="090000000400000006000000ff"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000080), 0x619, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) 2.117317979s ago: executing program 1 (id=6450): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x17, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bb00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="170000000000000904000000ff0000200008000000545284d43268af5c6aaa9f46f82ac7a6bf9ca8ad9423c15c4b6822cab1ab00000000b3cedd6d3d185ac44a7e21f0fc67821c5da2010468dc7550b2e258747bfbd200c5a75ffb4c72583d6c2c7511c46fadabe58dcad3752573e4c6347d46acd907107bb865d9688063147d8f25360f672350845a7dffe1e2f4fbc8b0", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000, 0x5f}, 0x1e) 2.108790529s ago: executing program 3 (id=6368): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='notify_on_release\x00', 0x2, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4008, r0}, 0x18) r3 = openat$cgroup_ro(r0, &(0x7f0000000100)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x0, 0x10, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xb, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc4, 0xc4, 0x5, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x2}, @enum64={0xb, 0x5, 0x0, 0x13, 0x0, 0x2, [{0xb, 0x5, 0x1}, {0x4, 0x5, 0xe}, {0x1, 0xfffff38b}, {0x7, 0x400, 0x80000000}, {0xc, 0x3, 0x6}]}, @union={0xc, 0x6, 0x0, 0x5, 0x0, 0x2, [{0xb, 0x1, 0x970}, {0xa, 0x3, 0x3ff}, {0x1, 0x1, 0x4}, {0x8, 0x0, 0x3}, {0x0, 0x1, 0x2}, {0x8, 0x1, 0x200}]}, @var={0xd, 0x0, 0x0, 0xe, 0x5, 0x1}, @restrict={0x1}]}, {0x0, [0x2e, 0x61, 0x0]}}, &(0x7f0000000700)=""/72, 0xe1, 0x48, 0x0, 0x3, 0x10000}, 0x28) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pi6 \x00'}, 0x20) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0x0, 0x94}, 0xc) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x389, 0x0, 0x1, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x16, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@alu={0x4, 0x0, 0xb, 0x3, 0x4, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x80}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x1b1d5026, 0x94, &(0x7f0000000240)=""/148, 0x67a75fe9232a774a, 0x64, '\x00', r4, 0x0, r5, 0x8, &(0x7f00000007c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0xb, 0x1000, 0x5f}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000a00)=[r0, r1, r6, r7, r8, r9], &(0x7f0000000a40)=[{0x2, 0x5, 0xa, 0x3}, {0x4, 0x5, 0x4, 0x4}, {0x5, 0x4, 0xb, 0xf}, {0x3, 0x5, 0x6, 0x8}, {0x5, 0x5, 0x9, 0xa}, {0x0, 0x3, 0xc, 0x6}, {0x4, 0x2, 0xd, 0x4}, {0x4, 0x1, 0xa, 0xc}, {0x1, 0x3, 0x5, 0x8}, {0x5, 0x5, 0x4, 0xb}]}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r2, 0xffffffffffffffff}, &(0x7f0000000e00), &(0x7f0000000e40)=r10}, 0x20) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ec0)={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x11, 0x19, &(0x7f0000000bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1000}, [@alu={0x7, 0x0, 0x5, 0xa, 0x1, 0x6, 0x10}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @generic={0x80, 0x2, 0x7, 0x800, 0x9}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @printk={@ld}, @ldst={0x1, 0x3, 0x4, 0x1, 0x3, 0xffffffffffffffe8}, @generic={0x10, 0x1, 0x8, 0x0, 0xfffffffe}]}, &(0x7f0000000cc0)='GPL\x00', 0x800, 0x4b, &(0x7f0000000d00)=""/75, 0x41000, 0x28, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000d80)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x2, 0xc, 0xfffff000, 0x5}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f40)=[0x1, r9, r9, r11, r2, 0x1, r12, r6], &(0x7f0000000f80)=[{0x5, 0x1, 0x2f49, 0x4}], 0x10, 0x2}, 0x94) r13 = openat$cgroup_ro(r3, &(0x7f00000011c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0x17, &(0x7f0000001080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @exit, @cb_func={0x18, 0x2, 0x4, 0x0, 0x2}]}, &(0x7f0000001140)='GPL\x00', 0x2f, 0x0, &(0x7f0000001180), 0x41000, 0x40, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001200)=[r7, 0x1, r3, r12, r8, r13, r8], &(0x7f0000001240)=[{0x2, 0x3, 0x3}, {0x0, 0x4, 0x6, 0x1}, {0x3, 0x2, 0x2, 0x5}, {0x0, 0x0, 0xb, 0x3}, {0x4, 0x5, 0x3, 0xc}, {0x2, 0x1, 0xb, 0xb}], 0x10, 0x10000}, 0x94) r14 = openat$cgroup(r3, &(0x7f0000001380)='syz0\x00', 0x200002, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f00000013c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r16 = bpf$ITER_CREATE(0x21, &(0x7f0000001400)={r3}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001540)={r7, 0x58, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x5, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000001480)='GPL\x00', 0x98, 0x0, 0x0, 0x40f00, 0x28, '\x00', r17, 0x25, r15, 0x8, &(0x7f0000001580)={0x8, 0x1}, 0x8, 0x10, &(0x7f00000015c0)={0x2, 0xd, 0x15d, 0x9}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000001600)=[{0x4, 0x3, 0x8, 0x1}, {0x5, 0x2, 0x4, 0xb}, {0x0, 0x1, 0x4, 0xa}, {0x1, 0x5, 0x9, 0x2}], 0x10, 0x237b}, 0x94) r18 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001740)=@generic={&(0x7f0000001700)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001980)={0x6, 0x10, &(0x7f0000001780)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r18}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x7}, @map_fd={0x18, 0x6, 0x1, 0x0, r13}, @map_fd={0x18, 0xb, 0x1, 0x0, r6}]}, &(0x7f0000001800)='syzkaller\x00', 0x3c3, 0xea, &(0x7f0000001840)=""/234, 0x41100, 0x50, '\x00', r4, 0x25, r15, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001940)={0x5, 0xe, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001b40)={@map=r16, 0x2f, 0x1, 0x7fff, &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001ac0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001b00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001e40)={r10, 0xe0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000001bc0)=[0x0, 0x0], &(0x7f0000001c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x81, &(0x7f0000001c40)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001c80), &(0x7f0000001cc0), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000001d00)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001e80)=r19, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001f00)={&(0x7f0000001ec0)='ext4_free_blocks\x00', r13, 0x0, 0x2}, 0x18) r20 = syz_clone(0xb0306000, &(0x7f0000001f40)="9873d8387c031e1d2e468b28f26be5cdf8b94681ecbb132953a46dfc324807d71bd530a094e2d92bf1597044d064b192d73609d72efaa9fbf76f456491e129ad01f25d5a1ae379896d84eb9cb21584b0a270b308b855c1317b2264dd760dab836c068ace5009e2343f38a1e14258c24784bec8ad2cae8960198e3a77356ccbe9a34676d2a5c61a69d29ab73b8953d834fb0401847aab75d7", 0x98, &(0x7f0000002000), &(0x7f0000002040), &(0x7f0000002080)="93333cf7a0caf5e29d48a771884e864dbd86") write$cgroup_pid(r3, &(0x7f00000020c0)=r20, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{r5}, &(0x7f0000002100), &(0x7f00000021c0)}, 0x20) 1.193465803s ago: executing program 0 (id=6451): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x25, 0x0, 0x0, 0x7}]}) 1.192655473s ago: executing program 1 (id=6452): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="11000000040000000400000009"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f0000000100), &(0x7f0000000000)=""/8, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000fd3f1400e27f000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r6, &(0x7f0000000180), 0x0}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)=@o_path={&(0x7f00000003c0)='./file0\x00', 0x0, 0x10, r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r5}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8000004, 0x0, 0x0, r2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r7}, &(0x7f00000004c0), &(0x7f0000000540)=r5}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x10, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x48}, @exit], &(0x7f0000000280)='GPL\x00'}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x8, 0x5, 0x1}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xa, 0x4, 0xdd, 0xa}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8a10ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r12 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r12, r8, 0x0, 0x2, &(0x7f0000000000)='\x8b\x00'}, 0x30) 1.191925384s ago: executing program 2 (id=6453): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1901], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x200}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000004000ed0000000008100d00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x14, 0x4, 0x4, 0x5}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x8, &(0x7f0000002480)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x38, '\x00', 0x0, @fallback=0x2e}, 0x94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000280), 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x20000000000002c9, &(0x7f00000026c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffc}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000001d03d007700a100000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=@ringbuf={{}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='syzkaller\x00'}, 0x94) 1.163133526s ago: executing program 0 (id=6454): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1e, 0xc, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x81, 0x0, 0x0, 0x0, 0x69, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001300)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) 1.140193097s ago: executing program 2 (id=6455): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x9, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x15, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0xa0}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llx, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000001c0)={'rose0\x00', 0x400}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) (async, rerun: 64) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x12) (async, rerun: 64) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0xa) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0}, 0x18) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r2, r4}, 0xc) (async, rerun: 64) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0xb) 865.40084ms ago: executing program 2 (id=6456): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r3}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0xfd, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x0, 0x1, 0x0, 0x5, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2, &(0x7f0000000780)}, 0x20) 864.94319ms ago: executing program 2 (id=6466): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x11, 0x0, 0x1008, 0x0, 0x0, 0x0) 840.366232ms ago: executing program 1 (id=6457): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000e0dea82d9348c5a2d400"/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x9, &(0x7f0000000380)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000500000085000000ba000000a700000000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20000000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB="1e000000d200000056ee00000700000080000000", @ANYRES32=r2, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="feffffff05000000040000000e000000000000040000000000000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0xfffffffffffffefc) socketpair$tipc(0xa, 0x2, 0x11, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ppp(0xffffffffffffff9c, &(0x7f00000010c0), 0x200, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="0400000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00@\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000001100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x6, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="adaa000000000000711011000000000095000000000000002e59c0c572c200bc360afee9c70381a0f198b3c0df99258f3a1d020000006881b77fddb01f72f6a23b53429302a8b66dfa4a982a16cff57002ca45de4b16eab20b68e3d5e053cd32e6"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000180)=r8, 0x4) sendmsg$inet(r10, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 818.589934ms ago: executing program 4 (id=6347): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000040000"], 0x0, 0x80000000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(&(0x7f0000010040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x400}, 0x0, 0xfff0000000000001, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000d"], 0x0, 0x26}, 0x20) socketpair(0x2, 0x3, 0x2, &(0x7f00000100c0)) 254.85µs ago: executing program 0 (id=6458): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="8d9c9ce5d55fa763da51e0ea1e7f3118000000000000000000000000adc5f632110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x11, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e000000000000000d0000000300000000000000316cfc1ccbf0734a05527caf95d7a16da33323cfb91188550883455f82ef24e29cadb5f8722ddefdc4a91ad32ebe2eaa582f607047c12d2df6396bcc1a58c142277405779f9f2e1d14b558a4316df19cef25f780bba38df318aa83b27b40377aac74eb2107194b7b930ce7cd97cd895d0f87db7e77989f6047cd81c471a3660a6b8cb0098feb0e9c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={r8, 0x0, &(0x7f0000000240)=""/206}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r6}, &(0x7f0000000540), &(0x7f0000000580)=r7}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r6, 0x0}, 0x20) 0s ago: executing program 2 (id=6459): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x5, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000000, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000030000000100000008"], 0x48) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0xe1, &(0x7f0000000500)=""/225, 0x0, 0x29}, 0x94) kernel console output (not intermixed with test programs): veth1_virt_wifi: link becomes ready [ 663.133664][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 663.142299][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 663.150198][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 663.158388][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 663.166607][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 663.174846][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 663.182840][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 663.191142][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 663.199502][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 663.207764][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 663.216103][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 663.223742][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 663.975701][T11379] FAULT_INJECTION: forcing a failure. [ 663.975701][T11379] name failslab, interval 1, probability 0, space 0, times 0 [ 664.081463][T11379] CPU: 0 PID: 11379 Comm: syz.1.3062 Tainted: G W syzkaller #0 [ 664.090439][T11379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 664.100582][T11379] Call Trace: [ 664.103859][T11379] [ 664.106788][T11379] __dump_stack+0x21/0x24 [ 664.111129][T11379] dump_stack_lvl+0xee/0x150 [ 664.115720][T11379] ? __cfi_dump_stack_lvl+0x8/0x8 [ 664.120754][T11379] ? stack_trace_save+0x98/0xe0 [ 664.125773][T11379] dump_stack+0x15/0x24 [ 664.129935][T11379] should_fail_ex+0x3d4/0x520 [ 664.134663][T11379] __should_failslab+0xac/0xf0 [ 664.139432][T11379] should_failslab+0x9/0x20 [ 664.143941][T11379] kmem_cache_alloc_node+0x42/0x340 [ 664.149138][T11379] ? dup_task_struct+0x5a/0x770 [ 664.154082][T11379] dup_task_struct+0x5a/0x770 [ 664.158762][T11379] ? __kasan_check_write+0x14/0x20 [ 664.163872][T11379] ? recalc_sigpending+0x168/0x1c0 [ 664.169014][T11379] copy_process+0x5b8/0x3420 [ 664.173613][T11379] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 664.179355][T11379] ? __kasan_check_write+0x14/0x20 [ 664.184489][T11379] ? idle_dummy+0x10/0x10 [ 664.188839][T11379] kernel_clone+0x23a/0x810 [ 664.193351][T11379] ? __cfi_kernel_clone+0x10/0x10 [ 664.198383][T11379] ? __kasan_check_write+0x14/0x20 [ 664.203503][T11379] ? mutex_unlock+0x89/0x220 [ 664.208183][T11379] __x64_sys_clone+0x168/0x1b0 [ 664.212958][T11379] ? __cfi___x64_sys_clone+0x10/0x10 [ 664.218268][T11379] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 664.224399][T11379] x64_sys_call+0x990/0x9a0 [ 664.228919][T11379] do_syscall_64+0x4c/0xa0 [ 664.233349][T11379] ? clear_bhb_loop+0x30/0x80 [ 664.238033][T11379] ? clear_bhb_loop+0x30/0x80 [ 664.242708][T11379] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 664.248607][T11379] RIP: 0033:0x7f01fe18ebe9 [ 664.253031][T11379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 664.272649][T11379] RSP: 002b:00007f01ff0b7fe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 664.281071][T11379] RAX: ffffffffffffffda RBX: 00007f01fe3b6090 RCX: 00007f01fe18ebe9 [ 664.289125][T11379] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000002045280 [ 664.297082][T11379] RBP: 00007f01ff0b8090 R08: 0000000000000000 R09: 0000000000000000 [ 664.305054][T11379] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 664.313021][T11379] R13: 00007f01fe3b6128 R14: 00007f01fe3b6090 R15: 00007ffeb92cea28 [ 664.320980][T11379] [ 666.031728][T11417] bridge0: port 2(bridge_slave_1) entered disabled state [ 666.165627][T11422] device sit0 entered promiscuous mode [ 666.248722][T11424] device sit0 left promiscuous mode [ 666.323962][T11424] device sit0 entered promiscuous mode [ 667.019353][T11448] device pim6reg1 entered promiscuous mode [ 667.994460][ T28] audit: type=1400 audit(1755744996.916:135): avc: denied { create } for pid=11481 comm="syz.2.3095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 668.423341][ T28] audit: type=1400 audit(1755744997.306:136): avc: denied { create } for pid=11493 comm="syz.2.3100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 670.553157][T11561] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.629780][T11561] device bridge_slave_1 left promiscuous mode [ 670.636473][T11561] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.644654][T11561] device bridge_slave_0 left promiscuous mode [ 670.650901][T11561] bridge0: port 1(bridge_slave_0) entered disabled state [ 671.931995][T11603] device syzkaller0 entered promiscuous mode [ 672.041147][ T28] audit: type=1400 audit(1755745000.936:137): avc: denied { create } for pid=11613 comm="syz.4.3134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 672.156549][T11614] bond_slave_1: mtu less than device minimum [ 672.700824][T11629] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.811459][T11640] device sit0 entered promiscuous mode [ 675.656537][T11661] bridge0: port 1(bridge_slave_0) entered blocking state [ 675.782708][T11661] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.953350][T11661] device bridge_slave_0 entered promiscuous mode [ 676.139204][T11661] bridge0: port 2(bridge_slave_1) entered blocking state [ 676.148002][T11661] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.156041][T11661] device bridge_slave_1 entered promiscuous mode [ 677.547979][T11713] bond_slave_1: mtu less than device minimum [ 677.593729][T11712] device syzkaller0 entered promiscuous mode [ 678.249010][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 678.256616][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 678.266626][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 678.276088][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 678.284515][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.291591][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.309639][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 678.317583][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 678.326637][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 678.346628][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.353743][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.424170][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 678.513269][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 678.605413][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 678.701569][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 678.886312][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 679.004919][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 679.120034][T11661] device veth0_vlan entered promiscuous mode [ 679.223839][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 679.292879][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 679.362518][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 679.370042][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 679.465254][T11661] device veth1_macvtap entered promiscuous mode [ 679.481902][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 679.491943][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 679.520764][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 679.581942][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 679.607194][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 679.671514][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 679.752527][ T335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 682.332250][T11766] device syzkaller0 entered promiscuous mode [ 682.850895][T11785] FAULT_INJECTION: forcing a failure. [ 682.850895][T11785] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 683.078105][T11785] CPU: 0 PID: 11785 Comm: syz.2.3176 Tainted: G W syzkaller #0 [ 683.087091][T11785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 683.097155][T11785] Call Trace: [ 683.100877][T11785] [ 683.103805][T11785] __dump_stack+0x21/0x24 [ 683.108150][T11785] dump_stack_lvl+0xee/0x150 [ 683.112737][T11785] ? __cfi_dump_stack_lvl+0x8/0x8 [ 683.117767][T11785] dump_stack+0x15/0x24 [ 683.122011][T11785] should_fail_ex+0x3d4/0x520 [ 683.126688][T11785] should_fail_alloc_page+0x61/0x90 [ 683.131983][T11785] prepare_alloc_pages+0x148/0x5f0 [ 683.137102][T11785] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 683.142312][T11785] __alloc_pages+0x124/0x450 [ 683.146903][T11785] ? __cfi___alloc_pages+0x10/0x10 [ 683.152018][T11785] ? up_write+0x7b/0x290 [ 683.156264][T11785] ? __anon_vma_prepare+0x3a1/0x420 [ 683.161528][T11785] __folio_alloc+0x12/0x40 [ 683.165991][T11785] handle_mm_fault+0x18ef/0x2640 [ 683.171013][T11785] ? __cfi_handle_mm_fault+0x10/0x10 [ 683.176301][T11785] ? down_read_trylock+0x273/0x640 [ 683.181421][T11785] ? lock_mm_and_find_vma+0x9e/0x320 [ 683.186705][T11785] ? do_user_addr_fault+0x2ee/0x1050 [ 683.191990][T11785] do_user_addr_fault+0x63b/0x1050 [ 683.197125][T11785] exc_page_fault+0x51/0xb0 [ 683.201633][T11785] asm_exc_page_fault+0x27/0x30 [ 683.206482][T11785] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 683.212269][T11785] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 90 90 90 90 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 48 bb f9 ef ff ff ff 7f [ 683.231876][T11785] RSP: 0018:ffffc900009c7e60 EFLAGS: 00050297 [ 683.237943][T11785] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000200000000000 [ 683.245914][T11785] RDX: ffff88810ced6540 RSI: 0000000000000005 RDI: 0000000000000000 [ 683.253882][T11785] RBP: ffffc900009c7ec8 R08: dffffc0000000000 R09: ffffed10264a1385 [ 683.261860][T11785] R10: ffffed10264a1385 R11: 1ffff110264a1384 R12: 000000000000000a [ 683.269832][T11785] R13: 0000200000000000 R14: 0000000000000004 R15: 0000000000000000 [ 683.277833][T11785] ? __sys_socketpair+0xac/0x5b0 [ 683.282882][T11785] __x64_sys_socketpair+0x9b/0xb0 [ 683.287909][T11785] x64_sys_call+0x6e/0x9a0 [ 683.292325][T11785] do_syscall_64+0x4c/0xa0 [ 683.296742][T11785] ? clear_bhb_loop+0x30/0x80 [ 683.301413][T11785] ? clear_bhb_loop+0x30/0x80 [ 683.306100][T11785] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 683.311987][T11785] RIP: 0033:0x7fc550f8ebe9 [ 683.316397][T11785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 683.336002][T11785] RSP: 002b:00007fc551d86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 683.344420][T11785] RAX: ffffffffffffffda RBX: 00007fc5511b5fa0 RCX: 00007fc550f8ebe9 [ 683.352500][T11785] RDX: 0000000000000300 RSI: 000000000000000a RDI: 0000000000000011 [ 683.360474][T11785] RBP: 00007fc551d86090 R08: 0000000000000000 R09: 0000000000000000 [ 683.368440][T11785] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 683.376407][T11785] R13: 00007fc5511b6038 R14: 00007fc5511b5fa0 R15: 00007ffddb5cf6a8 [ 683.384390][T11785] [ 683.816149][T11793] device syzkaller0 entered promiscuous mode [ 685.033143][T11824] device syzkaller0 entered promiscuous mode [ 687.350035][T11879] device syzkaller0 entered promiscuous mode [ 688.174153][T11887] device syzkaller0 entered promiscuous mode [ 688.302400][T11896] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.309485][T11896] FAULT_INJECTION: forcing a failure. [ 688.309485][T11896] name failslab, interval 1, probability 0, space 0, times 0 [ 688.322110][T11896] CPU: 0 PID: 11896 Comm: syz.1.3209 Tainted: G W syzkaller #0 [ 688.331139][T11896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 688.341197][T11896] Call Trace: [ 688.344480][T11896] [ 688.347406][T11896] __dump_stack+0x21/0x24 [ 688.351739][T11896] dump_stack_lvl+0xee/0x150 [ 688.356332][T11896] ? __cfi_dump_stack_lvl+0x8/0x8 [ 688.361359][T11896] ? synchronize_rcu_expedited+0x733/0x810 [ 688.367170][T11896] dump_stack+0x15/0x24 [ 688.371328][T11896] should_fail_ex+0x3d4/0x520 [ 688.376004][T11896] __should_failslab+0xac/0xf0 [ 688.380764][T11896] should_failslab+0x9/0x20 [ 688.385287][T11896] kmem_cache_alloc_node+0x42/0x340 [ 688.390479][T11896] ? __cfi__printk+0x8/0x8 [ 688.394990][T11896] ? __alloc_skb+0xea/0x4b0 [ 688.399553][T11896] __alloc_skb+0xea/0x4b0 [ 688.403894][T11896] ? __cfi_br_handle_frame+0x10/0x10 [ 688.409235][T11896] br_info_notify+0xae/0x170 [ 688.413825][T11896] br_ifinfo_notify+0x2a/0x40 [ 688.418501][T11896] br_stp_disable_port+0xc3/0x1c0 [ 688.423528][T11896] br_stp_disable_bridge+0x82/0x150 [ 688.428726][T11896] ? __cfi_br_dev_stop+0x10/0x10 [ 688.433662][T11896] br_dev_stop+0x2c/0x180 [ 688.437989][T11896] ? __cfi_br_dev_stop+0x10/0x10 [ 688.442920][T11896] __dev_close_many+0x27a/0x350 [ 688.447889][T11896] ? dev_close_many+0x4d0/0x4d0 [ 688.452738][T11896] ? _raw_spin_unlock_bh+0x50/0x60 [ 688.457858][T11896] ? dev_set_rx_mode+0x223/0x2c0 [ 688.462804][T11896] ? __kasan_check_read+0x11/0x20 [ 688.467831][T11896] __dev_change_flags+0x2d1/0x6b0 [ 688.472858][T11896] ? __cfi___dev_change_flags+0x10/0x10 [ 688.478412][T11896] dev_change_flags+0x88/0x1a0 [ 688.483178][T11896] dev_ifsioc+0x159/0xed0 [ 688.487591][T11896] ? dev_ioctl+0xd10/0xd10 [ 688.492002][T11896] ? __mutex_lock_slowpath+0xe/0x10 [ 688.497197][T11896] ? mutex_lock+0xf8/0x1a0 [ 688.501619][T11896] ? __cfi_mutex_lock+0x10/0x10 [ 688.506588][T11896] ? dev_get_by_name_rcu+0xe5/0x130 [ 688.511791][T11896] dev_ioctl+0x556/0xd10 [ 688.516209][T11896] sock_do_ioctl+0x23f/0x310 [ 688.520807][T11896] ? sock_show_fdinfo+0xb0/0xb0 [ 688.525686][T11896] ? selinux_file_ioctl+0x377/0x480 [ 688.530881][T11896] sock_ioctl+0x4d8/0x6e0 [ 688.535206][T11896] ? __cfi_sock_ioctl+0x10/0x10 [ 688.540052][T11896] ? __fget_files+0x2d5/0x330 [ 688.544730][T11896] ? security_file_ioctl+0x95/0xc0 [ 688.549846][T11896] ? __cfi_sock_ioctl+0x10/0x10 [ 688.554691][T11896] __se_sys_ioctl+0x12f/0x1b0 [ 688.559459][T11896] __x64_sys_ioctl+0x7b/0x90 [ 688.564049][T11896] x64_sys_call+0x58b/0x9a0 [ 688.568636][T11896] do_syscall_64+0x4c/0xa0 [ 688.573050][T11896] ? clear_bhb_loop+0x30/0x80 [ 688.577722][T11896] ? clear_bhb_loop+0x30/0x80 [ 688.582394][T11896] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 688.588286][T11896] RIP: 0033:0x7f01fe18ebe9 [ 688.592694][T11896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 688.612300][T11896] RSP: 002b:00007f01ff0d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 688.620804][T11896] RAX: ffffffffffffffda RBX: 00007f01fe3b5fa0 RCX: 00007f01fe18ebe9 [ 688.628856][T11896] RDX: 00002000000001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 688.636822][T11896] RBP: 00007f01ff0d9090 R08: 0000000000000000 R09: 0000000000000000 [ 688.644879][T11896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 688.652860][T11896] R13: 00007f01fe3b6038 R14: 00007f01fe3b5fa0 R15: 00007ffeb92cea28 [ 688.660849][T11896] [ 689.008931][T11908] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.032127][T11978] bridge0: port 2(bridge_slave_1) entered disabled state [ 693.095437][T11987] device sit0 entered promiscuous mode [ 697.692931][ T28] audit: type=1400 audit(1755745026.616:138): avc: denied { create } for pid=12084 comm="syz.4.3265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 698.119629][T12092] device syzkaller0 entered promiscuous mode [ 699.099816][T12126] FAULT_INJECTION: forcing a failure. [ 699.099816][T12126] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 699.394172][T12126] CPU: 1 PID: 12126 Comm: syz.0.3277 Tainted: G W syzkaller #0 [ 699.403143][T12126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 699.413222][T12126] Call Trace: [ 699.416503][T12126] [ 699.419431][T12126] __dump_stack+0x21/0x24 [ 699.423767][T12126] dump_stack_lvl+0xee/0x150 [ 699.428362][T12126] ? __cfi_dump_stack_lvl+0x8/0x8 [ 699.433393][T12126] ? kasan_set_track+0x60/0x70 [ 699.438155][T12126] ? kasan_set_track+0x4b/0x70 [ 699.442921][T12126] ? kasan_save_alloc_info+0x25/0x30 [ 699.448207][T12126] ? slab_post_alloc_hook+0x4f/0x2d0 [ 699.453492][T12126] ? kmem_cache_alloc_lru+0x104/0x280 [ 699.458864][T12126] ? xas_create+0x618/0x16d0 [ 699.463456][T12126] dump_stack+0x15/0x24 [ 699.467622][T12126] should_fail_ex+0x3d4/0x520 [ 699.472399][T12126] should_fail_alloc_page+0x61/0x90 [ 699.477605][T12126] prepare_alloc_pages+0x148/0x5f0 [ 699.482723][T12126] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 699.487927][T12126] __alloc_pages+0x124/0x450 [ 699.492516][T12126] ? __cfi___alloc_pages+0x10/0x10 [ 699.497630][T12126] ? percpu_counter_add_batch+0x13c/0x160 [ 699.503353][T12126] __folio_alloc+0x12/0x40 [ 699.507776][T12126] shmem_alloc_and_acct_folio+0x650/0x870 [ 699.513587][T12126] ? shmem_replace_folio+0x590/0x590 [ 699.519061][T12126] ? xas_load+0x39e/0x3b0 [ 699.523392][T12126] ? __filemap_get_folio+0x93e/0x980 [ 699.528695][T12126] ? __cfi___filemap_get_folio+0x10/0x10 [ 699.534335][T12126] ? do_user_addr_fault+0x9ac/0x1050 [ 699.539627][T12126] shmem_get_folio_gfp+0x119f/0x2230 [ 699.544917][T12126] shmem_write_begin+0xea/0x2c0 [ 699.549764][T12126] generic_perform_write+0x2f6/0x6d0 [ 699.555035][T12126] ? __cfi_generic_perform_write+0x10/0x10 [ 699.560823][T12126] ? __cfi_file_update_time+0x10/0x10 [ 699.566177][T12126] __generic_file_write_iter+0x227/0x580 [ 699.571792][T12126] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 699.577506][T12126] ? __cfi___generic_file_write_iter+0x10/0x10 [ 699.583642][T12126] ? rwsem_write_trylock+0x130/0x300 [ 699.588918][T12126] ? generic_write_checks_count+0x3c6/0x4a0 [ 699.594796][T12126] ? generic_write_checks+0xca/0x100 [ 699.600076][T12126] generic_file_write_iter+0xae/0x310 [ 699.605450][T12126] vfs_write+0x5db/0xca0 [ 699.609689][T12126] ? slab_free_freelist_hook+0xc2/0x190 [ 699.615221][T12126] ? __cfi_vfs_write+0x10/0x10 [ 699.619971][T12126] ? __cfi_mutex_lock+0x10/0x10 [ 699.624804][T12126] ? __fdget_pos+0x2cd/0x380 [ 699.629377][T12126] ? ksys_write+0x71/0x240 [ 699.633776][T12126] ksys_write+0x140/0x240 [ 699.638091][T12126] ? __cfi_ksys_write+0x10/0x10 [ 699.642932][T12126] ? debug_smp_processor_id+0x17/0x20 [ 699.648292][T12126] __x64_sys_write+0x7b/0x90 [ 699.652869][T12126] x64_sys_call+0x27b/0x9a0 [ 699.657355][T12126] do_syscall_64+0x4c/0xa0 [ 699.661756][T12126] ? clear_bhb_loop+0x30/0x80 [ 699.666454][T12126] ? clear_bhb_loop+0x30/0x80 [ 699.671112][T12126] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 699.676991][T12126] RIP: 0033:0x7fd24238ebe9 [ 699.681402][T12126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 699.700991][T12126] RSP: 002b:00007fd240df7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 699.709392][T12126] RAX: ffffffffffffffda RBX: 00007fd2425b6090 RCX: 00007fd24238ebe9 [ 699.717351][T12126] RDX: 0000000000040001 RSI: 0000200000000180 RDI: 0000000000000006 [ 699.725305][T12126] RBP: 00007fd240df7090 R08: 0000000000000000 R09: 0000000000000000 [ 699.733259][T12126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 699.741237][T12126] R13: 00007fd2425b6128 R14: 00007fd2425b6090 R15: 00007ffcb72e1d28 [ 699.749207][T12126] [ 701.125204][T12145] device bridge_slave_1 left promiscuous mode [ 701.135205][T12145] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.181307][T12145] device bridge_slave_0 left promiscuous mode [ 701.196631][T12145] bridge0: port 1(bridge_slave_0) entered disabled state [ 702.396796][T12185] device pim6reg1 entered promiscuous mode [ 704.329619][T12251] FAULT_INJECTION: forcing a failure. [ 704.329619][T12251] name failslab, interval 1, probability 0, space 0, times 0 [ 704.368319][T12251] CPU: 0 PID: 12251 Comm: syz.1.3313 Tainted: G W syzkaller #0 [ 704.377295][T12251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 704.387358][T12251] Call Trace: [ 704.390638][T12251] [ 704.393561][T12251] __dump_stack+0x21/0x24 [ 704.397905][T12251] dump_stack_lvl+0xee/0x150 [ 704.402536][T12251] ? __cfi_dump_stack_lvl+0x8/0x8 [ 704.407582][T12251] dump_stack+0x15/0x24 [ 704.411788][T12251] should_fail_ex+0x3d4/0x520 [ 704.416559][T12251] __should_failslab+0xac/0xf0 [ 704.421329][T12251] ? kvmalloc_node+0x294/0x480 [ 704.426196][T12251] should_failslab+0x9/0x20 [ 704.430714][T12251] __kmem_cache_alloc_node+0x3d/0x2c0 [ 704.436093][T12251] ? kasan_save_alloc_info+0x25/0x30 [ 704.441396][T12251] ? kvmalloc_node+0x294/0x480 [ 704.446168][T12251] __kmalloc_node+0xa1/0x1e0 [ 704.450768][T12251] kvmalloc_node+0x294/0x480 [ 704.455370][T12251] ? __cfi_kvmalloc_node+0x10/0x10 [ 704.460488][T12251] ? __kasan_record_aux_stack+0xb0/0xc0 [ 704.466049][T12251] ? alloc_fdtable+0xb4/0x2b0 [ 704.470771][T12251] ? kmalloc_trace+0x40/0xb0 [ 704.475464][T12251] alloc_fdtable+0x167/0x2b0 [ 704.480079][T12251] dup_fd+0x668/0x8f0 [ 704.484073][T12251] ? __mutex_init+0xcd/0x1a0 [ 704.488685][T12251] copy_files+0x76/0xe0 [ 704.492872][T12251] copy_process+0x11ff/0x3420 [ 704.497568][T12251] ? idle_dummy+0x10/0x10 [ 704.501919][T12251] kernel_clone+0x23a/0x810 [ 704.506430][T12251] ? __cfi_kernel_clone+0x10/0x10 [ 704.511463][T12251] ? __kasan_check_write+0x14/0x20 [ 704.516585][T12251] ? mutex_unlock+0x89/0x220 [ 704.521180][T12251] __x64_sys_clone+0x168/0x1b0 [ 704.525964][T12251] ? __cfi___x64_sys_clone+0x10/0x10 [ 704.531265][T12251] ? __bpf_trace_sys_enter+0x62/0x70 [ 704.536650][T12251] ? trace_sys_enter+0x3d/0x50 [ 704.541426][T12251] x64_sys_call+0x990/0x9a0 [ 704.545941][T12251] do_syscall_64+0x4c/0xa0 [ 704.550364][T12251] ? clear_bhb_loop+0x30/0x80 [ 704.555047][T12251] ? clear_bhb_loop+0x30/0x80 [ 704.559741][T12251] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 704.565643][T12251] RIP: 0033:0x7f01fe18ebe9 [ 704.570064][T12251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 704.589675][T12251] RSP: 002b:00007f01ff0d8fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 704.598274][T12251] RAX: ffffffffffffffda RBX: 00007f01fe3b5fa0 RCX: 00007f01fe18ebe9 [ 704.606303][T12251] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000011 [ 704.614288][T12251] RBP: 00007f01ff0d9090 R08: 0000000000000000 R09: 0000000000000000 [ 704.622274][T12251] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 704.630248][T12251] R13: 00007f01fe3b6038 R14: 00007f01fe3b5fa0 R15: 00007ffeb92cea28 [ 704.638230][T12251] [ 704.670876][T12249] device bridge_slave_1 left promiscuous mode [ 704.684177][T12249] bridge0: port 2(bridge_slave_1) entered disabled state [ 704.728751][T12249] device bridge_slave_0 left promiscuous mode [ 704.737292][T12249] bridge0: port 1(bridge_slave_0) entered disabled state [ 704.758530][T12257] FAULT_INJECTION: forcing a failure. [ 704.758530][T12257] name failslab, interval 1, probability 0, space 0, times 0 [ 704.837976][T12257] CPU: 1 PID: 12257 Comm: syz.3.3316 Tainted: G W syzkaller #0 [ 704.847128][T12257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 704.857190][T12257] Call Trace: [ 704.860469][T12257] [ 704.863396][T12257] __dump_stack+0x21/0x24 [ 704.867779][T12257] dump_stack_lvl+0xee/0x150 [ 704.872374][T12257] ? __cfi_dump_stack_lvl+0x8/0x8 [ 704.877408][T12257] dump_stack+0x15/0x24 [ 704.881569][T12257] should_fail_ex+0x3d4/0x520 [ 704.886257][T12257] __should_failslab+0xac/0xf0 [ 704.891111][T12257] ? bpf_prog_alloc_no_stats+0x9a/0x3f0 [ 704.896746][T12257] should_failslab+0x9/0x20 [ 704.901250][T12257] __kmem_cache_alloc_node+0x3d/0x2c0 [ 704.906711][T12257] ? bpf_prog_alloc_no_stats+0x9a/0x3f0 [ 704.912261][T12257] kmalloc_trace+0x29/0xb0 [ 704.916698][T12257] bpf_prog_alloc_no_stats+0x9a/0x3f0 [ 704.922080][T12257] bpf_prog_alloc+0x22/0x1c0 [ 704.926669][T12257] bpf_prog_load+0x7c6/0x15a0 [ 704.931344][T12257] ? map_freeze+0x390/0x390 [ 704.935845][T12257] ? selinux_bpf+0xc7/0xf0 [ 704.940267][T12257] ? security_bpf+0x93/0xb0 [ 704.944771][T12257] __sys_bpf+0x504/0x780 [ 704.949022][T12257] ? bpf_link_show_fdinfo+0x320/0x320 [ 704.954410][T12257] ? __cfi_ksys_write+0x10/0x10 [ 704.959274][T12257] ? debug_smp_processor_id+0x17/0x20 [ 704.964643][T12257] __x64_sys_bpf+0x7c/0x90 [ 704.969064][T12257] x64_sys_call+0x488/0x9a0 [ 704.973572][T12257] do_syscall_64+0x4c/0xa0 [ 704.977994][T12257] ? clear_bhb_loop+0x30/0x80 [ 704.982670][T12257] ? clear_bhb_loop+0x30/0x80 [ 704.987349][T12257] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 704.993243][T12257] RIP: 0033:0x7f0c4d18ebe9 [ 704.997655][T12257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 705.017260][T12257] RSP: 002b:00007f0c4e03a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 705.025678][T12257] RAX: ffffffffffffffda RBX: 00007f0c4d3b5fa0 RCX: 00007f0c4d18ebe9 [ 705.033652][T12257] RDX: 0000000000000090 RSI: 0000200000000880 RDI: 0000000000000005 [ 705.041631][T12257] RBP: 00007f0c4e03a090 R08: 0000000000000000 R09: 0000000000000000 [ 705.049605][T12257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 705.057573][T12257] R13: 00007f0c4d3b6038 R14: 00007f0c4d3b5fa0 R15: 00007ffda17a4388 [ 705.065555][T12257] [ 705.577448][ T28] audit: type=1400 audit(1755745034.496:139): avc: denied { create } for pid=12269 comm="syz.0.3321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 705.927522][T12301] device sit0 left promiscuous mode [ 706.037141][T12303] device sit0 entered promiscuous mode [ 706.820288][T12319] FAULT_INJECTION: forcing a failure. [ 706.820288][T12319] name failslab, interval 1, probability 0, space 0, times 0 [ 706.852693][T12319] CPU: 0 PID: 12319 Comm: syz.1.3339 Tainted: G W syzkaller #0 [ 706.861673][T12319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 706.871736][T12319] Call Trace: [ 706.875016][T12319] [ 706.877942][T12319] __dump_stack+0x21/0x24 [ 706.882278][T12319] dump_stack_lvl+0xee/0x150 [ 706.886879][T12319] ? __cfi_dump_stack_lvl+0x8/0x8 [ 706.891999][T12319] dump_stack+0x15/0x24 [ 706.896157][T12319] should_fail_ex+0x3d4/0x520 [ 706.900838][T12319] ? skb_clone+0x1f5/0x380 [ 706.905269][T12319] __should_failslab+0xac/0xf0 [ 706.910038][T12319] should_failslab+0x9/0x20 [ 706.914545][T12319] kmem_cache_alloc+0x3b/0x330 [ 706.919319][T12319] ? arch_stack_walk+0xfc/0x150 [ 706.924186][T12319] skb_clone+0x1f5/0x380 [ 706.928448][T12319] bpf_clone_redirect+0xa7/0x3c0 [ 706.933518][T12319] ? __stack_depot_save+0x36/0x480 [ 706.938640][T12319] bpf_prog_208b094576c80b22+0x56/0x5b [ 706.944103][T12319] ? kasan_set_track+0x60/0x70 [ 706.948873][T12319] ? kasan_set_track+0x4b/0x70 [ 706.953644][T12319] ? kasan_save_alloc_info+0x25/0x30 [ 706.958932][T12319] ? __kasan_slab_alloc+0x72/0x80 [ 706.963960][T12319] ? slab_post_alloc_hook+0x4f/0x2d0 [ 706.969253][T12319] ? kmem_cache_alloc+0x16e/0x330 [ 706.974280][T12319] ? build_skb+0x2a/0x220 [ 706.978613][T12319] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 706.984164][T12319] ? bpf_prog_test_run+0x3e3/0x630 [ 706.989278][T12319] ? __sys_bpf+0x56d/0x780 [ 706.993692][T12319] ? __x64_sys_bpf+0x7c/0x90 [ 706.998286][T12319] ? x64_sys_call+0x488/0x9a0 [ 707.002965][T12319] ? do_syscall_64+0x4c/0xa0 [ 707.007558][T12319] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 707.013630][T12319] ? ktime_get+0x141/0x170 [ 707.018137][T12319] bpf_test_run+0x349/0x8d0 [ 707.022662][T12319] ? convert___skb_to_skb+0x5b0/0x5b0 [ 707.028045][T12319] ? __cfi_eth_type_trans+0x10/0x10 [ 707.033332][T12319] ? convert___skb_to_skb+0x40/0x5b0 [ 707.038624][T12319] bpf_prog_test_run_skb+0xaec/0x1290 [ 707.044002][T12319] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 707.049813][T12319] bpf_prog_test_run+0x3e3/0x630 [ 707.054769][T12319] ? slab_free_freelist_hook+0xc2/0x190 [ 707.060322][T12319] ? bpf_prog_query+0x270/0x270 [ 707.065185][T12319] ? selinux_bpf+0xce/0xf0 [ 707.069618][T12319] ? security_bpf+0x93/0xb0 [ 707.074136][T12319] __sys_bpf+0x56d/0x780 [ 707.078384][T12319] ? bpf_link_show_fdinfo+0x320/0x320 [ 707.083762][T12319] ? __cfi_ksys_write+0x10/0x10 [ 707.088626][T12319] ? debug_smp_processor_id+0x17/0x20 [ 707.094008][T12319] __x64_sys_bpf+0x7c/0x90 [ 707.098462][T12319] x64_sys_call+0x488/0x9a0 [ 707.102970][T12319] do_syscall_64+0x4c/0xa0 [ 707.107389][T12319] ? clear_bhb_loop+0x30/0x80 [ 707.112063][T12319] ? clear_bhb_loop+0x30/0x80 [ 707.116741][T12319] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 707.122633][T12319] RIP: 0033:0x7f01fe18ebe9 [ 707.127050][T12319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 707.146660][T12319] RSP: 002b:00007f01ff0d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 707.155080][T12319] RAX: ffffffffffffffda RBX: 00007f01fe3b5fa0 RCX: 00007f01fe18ebe9 [ 707.163057][T12319] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 707.171032][T12319] RBP: 00007f01ff0d9090 R08: 0000000000000000 R09: 0000000000000000 [ 707.179008][T12319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 707.186980][T12319] R13: 00007f01fe3b6038 R14: 00007f01fe3b5fa0 R15: 00007ffeb92cea28 [ 707.194958][T12319] [ 708.125103][T12350] FAULT_INJECTION: forcing a failure. [ 708.125103][T12350] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 708.144721][T12350] CPU: 0 PID: 12350 Comm: syz.0.3346 Tainted: G W syzkaller #0 [ 708.153689][T12350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 708.163749][T12350] Call Trace: [ 708.167026][T12350] [ 708.169954][T12350] __dump_stack+0x21/0x24 [ 708.174295][T12350] dump_stack_lvl+0xee/0x150 [ 708.178894][T12350] ? __cfi_dump_stack_lvl+0x8/0x8 [ 708.183931][T12350] ? should_fail_ex+0x370/0x520 [ 708.188802][T12350] ? kasan_check_range+0xf/0x290 [ 708.193745][T12350] dump_stack+0x15/0x24 [ 708.197902][T12350] should_fail_ex+0x3d4/0x520 [ 708.202675][T12350] should_fail+0xb/0x10 [ 708.206837][T12350] should_fail_usercopy+0x1a/0x20 [ 708.211863][T12350] _copy_to_user+0x1e/0x90 [ 708.216278][T12350] simple_read_from_buffer+0xe9/0x160 [ 708.221750][T12350] proc_fail_nth_read+0x19a/0x210 [ 708.226864][T12350] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 708.232434][T12350] ? security_file_permission+0x94/0xb0 [ 708.237969][T12350] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 708.243505][T12350] vfs_read+0x26e/0x8c0 [ 708.247652][T12350] ? __cfi_vfs_read+0x10/0x10 [ 708.252312][T12350] ? __kasan_check_write+0x14/0x20 [ 708.257413][T12350] ? mutex_lock+0x8d/0x1a0 [ 708.261821][T12350] ? __cfi_mutex_lock+0x10/0x10 [ 708.266660][T12350] ? __fdget_pos+0x2cd/0x380 [ 708.271240][T12350] ? ksys_read+0x71/0x240 [ 708.275563][T12350] ksys_read+0x140/0x240 [ 708.279794][T12350] ? __cfi_ksys_read+0x10/0x10 [ 708.284543][T12350] ? fpregs_restore_userregs+0x128/0x260 [ 708.290166][T12350] __x64_sys_read+0x7b/0x90 [ 708.294659][T12350] x64_sys_call+0x2f/0x9a0 [ 708.299071][T12350] do_syscall_64+0x4c/0xa0 [ 708.303478][T12350] ? clear_bhb_loop+0x30/0x80 [ 708.308143][T12350] ? clear_bhb_loop+0x30/0x80 [ 708.312903][T12350] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 708.318780][T12350] RIP: 0033:0x7fd24238d5fc [ 708.323178][T12350] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 708.342768][T12350] RSP: 002b:00007fd243126030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 708.351171][T12350] RAX: ffffffffffffffda RBX: 00007fd2425b5fa0 RCX: 00007fd24238d5fc [ 708.359129][T12350] RDX: 000000000000000f RSI: 00007fd2431260a0 RDI: 0000000000000000 [ 708.367093][T12350] RBP: 00007fd243126090 R08: 0000000000000000 R09: 0000000000000000 [ 708.375060][T12350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 708.383109][T12350] R13: 00007fd2425b6038 R14: 00007fd2425b5fa0 R15: 00007ffcb72e1d28 [ 708.391082][T12350] [ 709.094759][T12373] device veth0_vlan left promiscuous mode [ 709.100760][T12373] device veth0_vlan entered promiscuous mode [ 709.331239][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 709.339530][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 709.410949][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 710.041396][T12386] device veth1_macvtap left promiscuous mode [ 710.151047][T12390] device wg2 entered promiscuous mode [ 711.270810][T12422] FAULT_INJECTION: forcing a failure. [ 711.270810][T12422] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 711.285722][T12422] CPU: 0 PID: 12422 Comm: syz.4.3368 Tainted: G W syzkaller #0 [ 711.294676][T12422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 711.304822][T12422] Call Trace: [ 711.308110][T12422] [ 711.311046][T12422] __dump_stack+0x21/0x24 [ 711.315386][T12422] dump_stack_lvl+0xee/0x150 [ 711.319977][T12422] ? __cfi_dump_stack_lvl+0x8/0x8 [ 711.325000][T12422] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 711.330806][T12422] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 711.336954][T12422] dump_stack+0x15/0x24 [ 711.341108][T12422] should_fail_ex+0x3d4/0x520 [ 711.345784][T12422] should_fail+0xb/0x10 [ 711.349945][T12422] should_fail_usercopy+0x1a/0x20 [ 711.354965][T12422] _copy_to_user+0x1e/0x90 [ 711.359385][T12422] simple_read_from_buffer+0xe9/0x160 [ 711.364775][T12422] proc_fail_nth_read+0x19a/0x210 [ 711.369811][T12422] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 711.375467][T12422] ? security_file_permission+0x94/0xb0 [ 711.381042][T12422] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 711.386601][T12422] vfs_read+0x26e/0x8c0 [ 711.390847][T12422] ? __cfi_vfs_read+0x10/0x10 [ 711.395528][T12422] ? __kasan_check_write+0x14/0x20 [ 711.400643][T12422] ? mutex_lock+0x8d/0x1a0 [ 711.405075][T12422] ? __cfi_mutex_lock+0x10/0x10 [ 711.409923][T12422] ? __fdget_pos+0x2cd/0x380 [ 711.414514][T12422] ? ksys_read+0x71/0x240 [ 711.418847][T12422] ksys_read+0x140/0x240 [ 711.423091][T12422] ? __cfi_ksys_read+0x10/0x10 [ 711.427857][T12422] __x64_sys_read+0x7b/0x90 [ 711.432360][T12422] x64_sys_call+0x2f/0x9a0 [ 711.436789][T12422] do_syscall_64+0x4c/0xa0 [ 711.441376][T12422] ? clear_bhb_loop+0x30/0x80 [ 711.446067][T12422] ? clear_bhb_loop+0x30/0x80 [ 711.450742][T12422] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 711.456629][T12422] RIP: 0033:0x7fcd6018d5fc [ 711.461041][T12422] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 711.480649][T12422] RSP: 002b:00007fcd60f94030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 711.489066][T12422] RAX: ffffffffffffffda RBX: 00007fcd603b5fa0 RCX: 00007fcd6018d5fc [ 711.497040][T12422] RDX: 000000000000000f RSI: 00007fcd60f940a0 RDI: 0000000000000004 [ 711.505051][T12422] RBP: 00007fcd60f94090 R08: 0000000000000000 R09: 0000000000000000 [ 711.513028][T12422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 711.521007][T12422] R13: 00007fcd603b6038 R14: 00007fcd603b5fa0 R15: 00007ffc347246f8 [ 711.528982][T12422] [ 715.893388][T12520] FAULT_INJECTION: forcing a failure. [ 715.893388][T12520] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 716.391457][T12520] CPU: 0 PID: 12520 Comm: syz.2.3396 Tainted: G W syzkaller #0 [ 716.400439][T12520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 716.410503][T12520] Call Trace: [ 716.413784][T12520] [ 716.416800][T12520] __dump_stack+0x21/0x24 [ 716.421138][T12520] dump_stack_lvl+0xee/0x150 [ 716.425734][T12520] ? __cfi_dump_stack_lvl+0x8/0x8 [ 716.430779][T12520] dump_stack+0x15/0x24 [ 716.434940][T12520] should_fail_ex+0x3d4/0x520 [ 716.439662][T12520] should_fail+0xb/0x10 [ 716.443913][T12520] should_fail_usercopy+0x1a/0x20 [ 716.448946][T12520] _copy_from_user+0x1e/0xc0 [ 716.453543][T12520] __sys_bpf+0x277/0x780 [ 716.457791][T12520] ? bpf_link_show_fdinfo+0x320/0x320 [ 716.463173][T12520] ? __cfi_ksys_write+0x10/0x10 [ 716.468036][T12520] ? debug_smp_processor_id+0x17/0x20 [ 716.473423][T12520] __x64_sys_bpf+0x7c/0x90 [ 716.477859][T12520] x64_sys_call+0x488/0x9a0 [ 716.482363][T12520] do_syscall_64+0x4c/0xa0 [ 716.486786][T12520] ? clear_bhb_loop+0x30/0x80 [ 716.491471][T12520] ? clear_bhb_loop+0x30/0x80 [ 716.496160][T12520] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 716.502051][T12520] RIP: 0033:0x7fc550f8ebe9 [ 716.506549][T12520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 716.526162][T12520] RSP: 002b:00007fc551d65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 716.534600][T12520] RAX: ffffffffffffffda RBX: 00007fc5511b6090 RCX: 00007fc550f8ebe9 [ 716.542590][T12520] RDX: 0000000000000020 RSI: 00002000000007c0 RDI: 0000000000000003 [ 716.550568][T12520] RBP: 00007fc551d65090 R08: 0000000000000000 R09: 0000000000000000 [ 716.558548][T12520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 716.566539][T12520] R13: 00007fc5511b6128 R14: 00007fc5511b6090 R15: 00007ffddb5cf6a8 [ 716.574533][T12520] [ 717.012310][T12549] Â: renamed from pim6reg1 [ 717.731338][T12575] FAULT_INJECTION: forcing a failure. [ 717.731338][T12575] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 717.773450][T12575] CPU: 1 PID: 12575 Comm: syz.4.3414 Tainted: G W syzkaller #0 [ 717.782436][T12575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 717.792499][T12575] Call Trace: [ 717.795778][T12575] [ 717.798701][T12575] __dump_stack+0x21/0x24 [ 717.803036][T12575] dump_stack_lvl+0xee/0x150 [ 717.807630][T12575] ? __cfi_dump_stack_lvl+0x8/0x8 [ 717.812832][T12575] dump_stack+0x15/0x24 [ 717.816987][T12575] should_fail_ex+0x3d4/0x520 [ 717.821663][T12575] should_fail+0xb/0x10 [ 717.825816][T12575] should_fail_usercopy+0x1a/0x20 [ 717.830842][T12575] _copy_from_user+0x1e/0xc0 [ 717.835430][T12575] __sys_bpf+0x277/0x780 [ 717.839682][T12575] ? bpf_link_show_fdinfo+0x320/0x320 [ 717.845052][T12575] ? __cfi_sched_clock_cpu+0x10/0x10 [ 717.850340][T12575] __x64_sys_bpf+0x7c/0x90 [ 717.854758][T12575] x64_sys_call+0x488/0x9a0 [ 717.859264][T12575] do_syscall_64+0x4c/0xa0 [ 717.863687][T12575] ? clear_bhb_loop+0x30/0x80 [ 717.868366][T12575] ? clear_bhb_loop+0x30/0x80 [ 717.873040][T12575] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 717.878930][T12575] RIP: 0033:0x7fcd6018ebe9 [ 717.883521][T12575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 717.903126][T12575] RSP: 002b:00007fcd60f94038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 717.911548][T12575] RAX: ffffffffffffffda RBX: 00007fcd603b5fa0 RCX: 00007fcd6018ebe9 [ 717.919519][T12575] RDX: 0000000000000090 RSI: 0000200000000840 RDI: 0000000000000005 [ 717.927492][T12575] RBP: 00007fcd60f94090 R08: 0000000000000000 R09: 0000000000000000 [ 717.935462][T12575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 717.943433][T12575] R13: 00007fcd603b6038 R14: 00007fcd603b5fa0 R15: 00007ffc347246f8 [ 717.951417][T12575] [ 720.074991][T12617] FAULT_INJECTION: forcing a failure. [ 720.074991][T12617] name failslab, interval 1, probability 0, space 0, times 0 [ 720.088903][T12617] CPU: 0 PID: 12617 Comm: syz.4.3425 Tainted: G W syzkaller #0 [ 720.097865][T12617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 720.107924][T12617] Call Trace: [ 720.111255][T12617] [ 720.114192][T12617] __dump_stack+0x21/0x24 [ 720.118522][T12617] dump_stack_lvl+0xee/0x150 [ 720.123132][T12617] ? __cfi_dump_stack_lvl+0x8/0x8 [ 720.128153][T12617] dump_stack+0x15/0x24 [ 720.132392][T12617] should_fail_ex+0x3d4/0x520 [ 720.137062][T12617] __should_failslab+0xac/0xf0 [ 720.141822][T12617] should_failslab+0x9/0x20 [ 720.146314][T12617] kmem_cache_alloc_node+0x42/0x340 [ 720.151496][T12617] ? __alloc_skb+0xea/0x4b0 [ 720.155986][T12617] __alloc_skb+0xea/0x4b0 [ 720.160313][T12617] alloc_skb_with_frags+0xa8/0x620 [ 720.165412][T12617] sock_alloc_send_pskb+0x853/0x980 [ 720.170599][T12617] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 720.176299][T12617] ? __kasan_check_write+0x14/0x20 [ 720.181406][T12617] ? _raw_spin_lock+0x8e/0xe0 [ 720.186082][T12617] ? __cfi__raw_spin_lock+0x10/0x10 [ 720.191268][T12617] unix_dgram_sendmsg+0x592/0x16d0 [ 720.196473][T12617] ? kernel_text_address+0xa0/0xd0 [ 720.201586][T12617] ? selinux_socket_sendmsg+0x208/0x2e0 [ 720.207176][T12617] ? __cfi_selinux_socket_sendmsg+0x10/0x10 [ 720.213055][T12617] ? __cfi_unix_dgram_sendmsg+0x10/0x10 [ 720.218588][T12617] ? stack_trace_save+0x98/0xe0 [ 720.223425][T12617] unix_seqpacket_sendmsg+0x118/0x1e0 [ 720.228785][T12617] ? __cfi_unix_seqpacket_sendmsg+0x10/0x10 [ 720.234693][T12617] ____sys_sendmsg+0x5a9/0x990 [ 720.239444][T12617] ? __sys_sendmsg_sock+0x40/0x40 [ 720.244460][T12617] ? import_iovec+0x7c/0xb0 [ 720.248953][T12617] ___sys_sendmsg+0x21c/0x290 [ 720.253631][T12617] ? __sys_sendmsg+0x270/0x270 [ 720.258379][T12617] ? __kasan_check_write+0x14/0x20 [ 720.263482][T12617] ? proc_fail_nth_write+0x17a/0x1f0 [ 720.268759][T12617] ? vfs_write+0x9d6/0xca0 [ 720.273169][T12617] ? __fdget+0x19c/0x220 [ 720.277405][T12617] __x64_sys_sendmsg+0x1f0/0x2c0 [ 720.282334][T12617] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 720.287775][T12617] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 720.293865][T12617] x64_sys_call+0x171/0x9a0 [ 720.298355][T12617] do_syscall_64+0x4c/0xa0 [ 720.302768][T12617] ? clear_bhb_loop+0x30/0x80 [ 720.307461][T12617] ? clear_bhb_loop+0x30/0x80 [ 720.312132][T12617] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 720.318012][T12617] RIP: 0033:0x7fcd6018ebe9 [ 720.322420][T12617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 720.342030][T12617] RSP: 002b:00007fcd60f94038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 720.350443][T12617] RAX: ffffffffffffffda RBX: 00007fcd603b5fa0 RCX: 00007fcd6018ebe9 [ 720.358411][T12617] RDX: 0000000000040000 RSI: 0000200000000580 RDI: 0000000000000004 [ 720.366367][T12617] RBP: 00007fcd60f94090 R08: 0000000000000000 R09: 0000000000000000 [ 720.374414][T12617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 720.382369][T12617] R13: 00007fcd603b6038 R14: 00007fcd603b5fa0 R15: 00007ffc347246f8 [ 720.390332][T12617] [ 720.629528][T12626] Â: renamed from pim6reg1 [ 721.414737][T12645] FAULT_INJECTION: forcing a failure. [ 721.414737][T12645] name failslab, interval 1, probability 0, space 0, times 0 [ 721.444476][T12645] CPU: 0 PID: 12645 Comm: syz.3.3437 Tainted: G W syzkaller #0 [ 721.453453][T12645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 721.463510][T12645] Call Trace: [ 721.466785][T12645] [ 721.469719][T12645] __dump_stack+0x21/0x24 [ 721.474062][T12645] dump_stack_lvl+0xee/0x150 [ 721.478656][T12645] ? __cfi_dump_stack_lvl+0x8/0x8 [ 721.483688][T12645] ? stack_trace_save+0x98/0xe0 [ 721.488551][T12645] dump_stack+0x15/0x24 [ 721.492717][T12645] should_fail_ex+0x3d4/0x520 [ 721.497401][T12645] __should_failslab+0xac/0xf0 [ 721.502164][T12645] should_failslab+0x9/0x20 [ 721.506673][T12645] kmem_cache_alloc_node+0x42/0x340 [ 721.511873][T12645] ? dup_task_struct+0x5a/0x770 [ 721.516734][T12645] dup_task_struct+0x5a/0x770 [ 721.521416][T12645] ? __kasan_check_write+0x14/0x20 [ 721.526529][T12645] ? recalc_sigpending+0x168/0x1c0 [ 721.531636][T12645] copy_process+0x5b8/0x3420 [ 721.536226][T12645] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 721.541947][T12645] ? __kasan_check_write+0x14/0x20 [ 721.547074][T12645] ? idle_dummy+0x10/0x10 [ 721.551417][T12645] kernel_clone+0x23a/0x810 [ 721.555927][T12645] ? __cfi_kernel_clone+0x10/0x10 [ 721.560959][T12645] ? __kasan_check_write+0x14/0x20 [ 721.566097][T12645] ? mutex_unlock+0x89/0x220 [ 721.570732][T12645] __x64_sys_clone+0x168/0x1b0 [ 721.575503][T12645] ? __cfi___x64_sys_clone+0x10/0x10 [ 721.580806][T12645] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 721.586880][T12645] x64_sys_call+0x990/0x9a0 [ 721.591417][T12645] do_syscall_64+0x4c/0xa0 [ 721.595837][T12645] ? clear_bhb_loop+0x30/0x80 [ 721.600522][T12645] ? clear_bhb_loop+0x30/0x80 [ 721.605374][T12645] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 721.611272][T12645] RIP: 0033:0x7f0c4d18ebe9 [ 721.615688][T12645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 721.635295][T12645] RSP: 002b:00007f0c4e039fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 721.643717][T12645] RAX: ffffffffffffffda RBX: 00007f0c4d3b5fa0 RCX: 00007f0c4d18ebe9 [ 721.651686][T12645] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000011 [ 721.659703][T12645] RBP: 00007f0c4e03a090 R08: 0000000000000000 R09: 0000000000000000 [ 721.667680][T12645] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 721.675648][T12645] R13: 00007f0c4d3b6038 R14: 00007f0c4d3b5fa0 R15: 00007ffda17a4388 [ 721.683623][T12645] [ 721.783819][T12649] Â: renamed from pim6reg1 [ 722.571696][ T28] audit: type=1400 audit(1755745051.496:140): avc: denied { create } for pid=12658 comm="syz.0.3439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 723.187634][T12666] device syzkaller0 entered promiscuous mode [ 726.216573][T12714] FAULT_INJECTION: forcing a failure. [ 726.216573][T12714] name failslab, interval 1, probability 0, space 0, times 0 [ 726.257950][T12714] CPU: 1 PID: 12714 Comm: syz.2.3453 Tainted: G W syzkaller #0 [ 726.266925][T12714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 726.276982][T12714] Call Trace: [ 726.280253][T12714] [ 726.283174][T12714] __dump_stack+0x21/0x24 [ 726.287507][T12714] dump_stack_lvl+0xee/0x150 [ 726.292096][T12714] ? __cfi_dump_stack_lvl+0x8/0x8 [ 726.297135][T12714] ? __get_vm_area_node+0x12c/0x360 [ 726.302435][T12714] dump_stack+0x15/0x24 [ 726.306601][T12714] should_fail_ex+0x3d4/0x520 [ 726.311275][T12714] __should_failslab+0xac/0xf0 [ 726.316040][T12714] ? __get_vm_area_node+0x12c/0x360 [ 726.321239][T12714] should_failslab+0x9/0x20 [ 726.325741][T12714] __kmem_cache_alloc_node+0x3d/0x2c0 [ 726.331109][T12714] ? __get_vm_area_node+0x12c/0x360 [ 726.336308][T12714] kmalloc_node_trace+0x26/0xb0 [ 726.341165][T12714] __get_vm_area_node+0x12c/0x360 [ 726.346190][T12714] __vmalloc_node_range+0x326/0x13d0 [ 726.351473][T12714] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 726.357017][T12714] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 726.362993][T12714] ? selinux_capset+0xf0/0xf0 [ 726.367670][T12714] ? __cfi___vmalloc_node_range+0x10/0x10 [ 726.373390][T12714] ? __cfi_selinux_capable+0x10/0x10 [ 726.378702][T12714] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 726.384244][T12714] __vmalloc+0x79/0x90 [ 726.388311][T12714] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 726.393851][T12714] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 726.399227][T12714] bpf_prog_alloc+0x22/0x1c0 [ 726.403814][T12714] bpf_prog_load+0x7c6/0x15a0 [ 726.408489][T12714] ? map_freeze+0x390/0x390 [ 726.412992][T12714] ? selinux_bpf+0xc7/0xf0 [ 726.417414][T12714] ? security_bpf+0x93/0xb0 [ 726.421922][T12714] __sys_bpf+0x504/0x780 [ 726.426159][T12714] ? bpf_link_show_fdinfo+0x320/0x320 [ 726.431530][T12714] ? __kasan_check_write+0x14/0x20 [ 726.436646][T12714] ? fpregs_restore_userregs+0x128/0x260 [ 726.442274][T12714] __x64_sys_bpf+0x7c/0x90 [ 726.446691][T12714] x64_sys_call+0x488/0x9a0 [ 726.451195][T12714] do_syscall_64+0x4c/0xa0 [ 726.455608][T12714] ? clear_bhb_loop+0x30/0x80 [ 726.460285][T12714] ? clear_bhb_loop+0x30/0x80 [ 726.464957][T12714] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 726.470850][T12714] RIP: 0033:0x7fc550f8ebe9 [ 726.475265][T12714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 726.494867][T12714] RSP: 002b:00007fc551d86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 726.503285][T12714] RAX: ffffffffffffffda RBX: 00007fc5511b5fa0 RCX: 00007fc550f8ebe9 [ 726.511253][T12714] RDX: 0000000000000090 RSI: 0000200000000840 RDI: 0000000000000005 [ 726.519221][T12714] RBP: 00007fc551d86090 R08: 0000000000000000 R09: 0000000000000000 [ 726.527280][T12714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 726.535248][T12714] R13: 00007fc5511b6038 R14: 00007fc5511b5fa0 R15: 00007ffddb5cf6a8 [ 726.543235][T12714] [ 726.548362][T12714] syz.2.3453: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 726.565516][T12714] CPU: 0 PID: 12714 Comm: syz.2.3453 Tainted: G W syzkaller #0 [ 726.574460][T12714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 726.584509][T12714] Call Trace: [ 726.587777][T12714] [ 726.590691][T12714] __dump_stack+0x21/0x24 [ 726.595017][T12714] dump_stack_lvl+0xee/0x150 [ 726.599614][T12714] ? __cfi_dump_stack_lvl+0x8/0x8 [ 726.604638][T12714] ? pr_cont_kernfs_name+0x133/0x160 [ 726.610013][T12714] dump_stack+0x15/0x24 [ 726.614176][T12714] warn_alloc+0x1b0/0x1d0 [ 726.618501][T12714] ? should_failslab+0x9/0x20 [ 726.623170][T12714] ? __cfi_warn_alloc+0x10/0x10 [ 726.628004][T12714] ? kmalloc_node_trace+0x3d/0xb0 [ 726.633024][T12714] ? __get_vm_area_node+0x353/0x360 [ 726.638229][T12714] __vmalloc_node_range+0x34b/0x13d0 [ 726.643524][T12714] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 726.649236][T12714] ? selinux_capset+0xf0/0xf0 [ 726.653903][T12714] ? __cfi___vmalloc_node_range+0x10/0x10 [ 726.659610][T12714] ? __cfi_selinux_capable+0x10/0x10 [ 726.664932][T12714] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 726.670490][T12714] __vmalloc+0x79/0x90 [ 726.674566][T12714] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 726.680106][T12714] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 726.685463][T12714] bpf_prog_alloc+0x22/0x1c0 [ 726.690123][T12714] bpf_prog_load+0x7c6/0x15a0 [ 726.694787][T12714] ? map_freeze+0x390/0x390 [ 726.699276][T12714] ? selinux_bpf+0xc7/0xf0 [ 726.703679][T12714] ? security_bpf+0x93/0xb0 [ 726.708166][T12714] __sys_bpf+0x504/0x780 [ 726.712388][T12714] ? bpf_link_show_fdinfo+0x320/0x320 [ 726.717745][T12714] ? __kasan_check_write+0x14/0x20 [ 726.722843][T12714] ? fpregs_restore_userregs+0x128/0x260 [ 726.728460][T12714] __x64_sys_bpf+0x7c/0x90 [ 726.732894][T12714] x64_sys_call+0x488/0x9a0 [ 726.737392][T12714] do_syscall_64+0x4c/0xa0 [ 726.741798][T12714] ? clear_bhb_loop+0x30/0x80 [ 726.746495][T12714] ? clear_bhb_loop+0x30/0x80 [ 726.751158][T12714] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 726.757038][T12714] RIP: 0033:0x7fc550f8ebe9 [ 726.761439][T12714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 726.781031][T12714] RSP: 002b:00007fc551d86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 726.789431][T12714] RAX: ffffffffffffffda RBX: 00007fc5511b5fa0 RCX: 00007fc550f8ebe9 [ 726.797387][T12714] RDX: 0000000000000090 RSI: 0000200000000840 RDI: 0000000000000005 [ 726.805344][T12714] RBP: 00007fc551d86090 R08: 0000000000000000 R09: 0000000000000000 [ 726.813299][T12714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 726.821255][T12714] R13: 00007fc5511b6038 R14: 00007fc5511b5fa0 R15: 00007ffddb5cf6a8 [ 726.829215][T12714] [ 727.406875][T12714] Mem-Info: [ 727.410282][T12714] active_anon:10687 inactive_anon:0 isolated_anon:0 [ 727.410282][T12714] active_file:26537 inactive_file:2469 isolated_file:0 [ 727.410282][T12714] unevictable:0 dirty:297 writeback:0 [ 727.410282][T12714] slab_reclaimable:7689 slab_unreclaimable:77203 [ 727.410282][T12714] mapped:29635 shmem:211 pagetables:660 [ 727.410282][T12714] sec_pagetables:0 bounce:0 [ 727.410282][T12714] kernel_misc_reclaimable:0 [ 727.410282][T12714] free:1510854 free_pcp:8755 free_cma:0 [ 728.171380][T12714] Node 0 active_anon:43068kB inactive_anon:0kB active_file:106148kB inactive_file:9876kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:118540kB dirty:1188kB writeback:0kB shmem:848kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5440kB pagetables:2804kB sec_pagetables:0kB all_unreclaimable? no [ 728.707648][T12714] DMA32 free:2968532kB boost:0kB min:31288kB low:39108kB high:46928kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2974212kB mlocked:0kB bounce:0kB free_pcp:5680kB local_pcp:0kB free_cma:0kB [ 728.929623][T12714] lowmem_reserve[]: 0 3932 3932 3932 [ 728.969396][T12714] Normal free:3066568kB boost:0kB min:42436kB low:53044kB high:63652kB reserved_highatomic:0KB active_anon:51000kB inactive_anon:0kB active_file:106148kB inactive_file:9884kB unevictable:0kB writepending:1192kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:29152kB local_pcp:10744kB free_cma:0kB [ 729.193864][T12714] lowmem_reserve[]: 0 0 0 0 [ 729.198481][T12714] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 729.300445][T12743] FAULT_INJECTION: forcing a failure. [ 729.300445][T12743] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 729.341716][T12714] Normal: 1076*4kB (UME) 1081*8kB (UME) 715*16kB (UME) 450*32kB (UME) 267*64kB (UME) 99*128kB (UME) 59*256kB (UM) 28*512kB (UME) 17*1024kB (UME) 5*2048kB (UME) 718*4096kB (UM) = 3066568kB [ 729.531905][T12714] 31239 total pagecache pages [ 729.536635][T12714] 0 pages in swap cache [ 729.597186][T12714] Free swap = 124996kB [ 729.601275][T12743] CPU: 1 PID: 12743 Comm: syz.1.3460 Tainted: G W syzkaller #0 [ 729.601571][T12714] Total swap = 124996kB [ 729.610283][T12743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 729.610299][T12743] Call Trace: [ 729.610305][T12743] [ 729.610313][T12743] __dump_stack+0x21/0x24 [ 729.614814][T12714] 2097051 pages RAM [ 729.624513][T12743] dump_stack_lvl+0xee/0x150 [ 729.624542][T12743] ? __cfi_dump_stack_lvl+0x8/0x8 [ 729.628022][T12714] 0 pages HighMem/MovableOnly [ 729.630725][T12743] ? migrate_enable+0x19c/0x280 [ 729.635175][T12714] 346834 pages reserved [ 729.638807][T12743] dump_stack+0x15/0x24 [ 729.643779][T12714] 0 pages cma reserved [ 729.648379][T12743] should_fail_ex+0x3d4/0x520 [ 729.648407][T12743] should_fail+0xb/0x10 [ 729.648422][T12743] should_fail_usercopy+0x1a/0x20 [ 729.648440][T12743] _copy_to_user+0x1e/0x90 [ 729.648456][T12743] bpf_test_finish+0x1a8/0x6b0 [ 729.648476][T12743] ? convert_skb_to___skb+0x430/0x430 [ 729.648496][T12743] bpf_prog_test_run_skb+0xce1/0x1290 [ 729.648518][T12743] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 729.648536][T12743] bpf_prog_test_run+0x3e3/0x630 [ 729.648553][T12743] ? slab_free_freelist_hook+0xc2/0x190 [ 729.648581][T12743] ? bpf_prog_query+0x270/0x270 [ 729.725177][T12743] ? selinux_bpf+0xce/0xf0 [ 729.729604][T12743] ? security_bpf+0x93/0xb0 [ 729.734104][T12743] __sys_bpf+0x56d/0x780 [ 729.738341][T12743] ? bpf_link_show_fdinfo+0x320/0x320 [ 729.743717][T12743] ? __cfi_ksys_write+0x10/0x10 [ 729.748582][T12743] ? debug_smp_processor_id+0x17/0x20 [ 729.753955][T12743] __x64_sys_bpf+0x7c/0x90 [ 729.758422][T12743] x64_sys_call+0x488/0x9a0 [ 729.762932][T12743] do_syscall_64+0x4c/0xa0 [ 729.767356][T12743] ? clear_bhb_loop+0x30/0x80 [ 729.772029][T12743] ? clear_bhb_loop+0x30/0x80 [ 729.776699][T12743] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 729.782596][T12743] RIP: 0033:0x7f01fe18ebe9 [ 729.787092][T12743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 729.806698][T12743] RSP: 002b:00007f01ff0d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 729.815114][T12743] RAX: ffffffffffffffda RBX: 00007f01fe3b5fa0 RCX: 00007f01fe18ebe9 [ 729.823088][T12743] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 729.831151][T12743] RBP: 00007f01ff0d9090 R08: 0000000000000000 R09: 0000000000000000 [ 729.839118][T12743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 729.847083][T12743] R13: 00007f01fe3b6038 R14: 00007f01fe3b5fa0 R15: 00007ffeb92cea28 [ 729.855061][T12743] [ 729.913318][T12753] FAULT_INJECTION: forcing a failure. [ 729.913318][T12753] name failslab, interval 1, probability 0, space 0, times 0 [ 730.148081][T12753] CPU: 1 PID: 12753 Comm: syz.3.3462 Tainted: G W syzkaller #0 [ 730.157056][T12753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 730.167109][T12753] Call Trace: [ 730.170381][T12753] [ 730.173310][T12753] __dump_stack+0x21/0x24 [ 730.177644][T12753] dump_stack_lvl+0xee/0x150 [ 730.182235][T12753] ? __cfi_dump_stack_lvl+0x8/0x8 [ 730.187255][T12753] ? do_syscall_64+0x4c/0xa0 [ 730.191848][T12753] dump_stack+0x15/0x24 [ 730.196001][T12753] should_fail_ex+0x3d4/0x520 [ 730.200677][T12753] __should_failslab+0xac/0xf0 [ 730.205446][T12753] ? sk_prot_alloc+0xed/0x320 [ 730.210141][T12753] should_failslab+0x9/0x20 [ 730.214678][T12753] __kmem_cache_alloc_node+0x3d/0x2c0 [ 730.220053][T12753] ? sk_prot_alloc+0xed/0x320 [ 730.224997][T12753] __kmalloc+0xa1/0x1e0 [ 730.229165][T12753] sk_prot_alloc+0xed/0x320 [ 730.233680][T12753] sk_alloc+0x3b/0x460 [ 730.237747][T12753] ? __kasan_check_write+0x14/0x20 [ 730.242871][T12753] bpf_prog_test_run_skb+0x37e/0x1290 [ 730.248263][T12753] ? __fget_files+0x2d5/0x330 [ 730.252949][T12753] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 730.258760][T12753] bpf_prog_test_run+0x3e3/0x630 [ 730.263705][T12753] ? slab_free_freelist_hook+0xc2/0x190 [ 730.269257][T12753] ? bpf_prog_query+0x270/0x270 [ 730.274122][T12753] ? selinux_bpf+0xce/0xf0 [ 730.278638][T12753] ? security_bpf+0x93/0xb0 [ 730.283140][T12753] __sys_bpf+0x56d/0x780 [ 730.287384][T12753] ? bpf_link_show_fdinfo+0x320/0x320 [ 730.292757][T12753] ? __cfi_ksys_write+0x10/0x10 [ 730.297618][T12753] ? debug_smp_processor_id+0x17/0x20 [ 730.303088][T12753] __x64_sys_bpf+0x7c/0x90 [ 730.307687][T12753] x64_sys_call+0x488/0x9a0 [ 730.312196][T12753] do_syscall_64+0x4c/0xa0 [ 730.316616][T12753] ? clear_bhb_loop+0x30/0x80 [ 730.321296][T12753] ? clear_bhb_loop+0x30/0x80 [ 730.325971][T12753] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 730.331880][T12753] RIP: 0033:0x7f0c4d18ebe9 [ 730.336291][T12753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 730.355987][T12753] RSP: 002b:00007f0c4e03a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 730.364410][T12753] RAX: ffffffffffffffda RBX: 00007f0c4d3b5fa0 RCX: 00007f0c4d18ebe9 [ 730.372473][T12753] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 730.380459][T12753] RBP: 00007f0c4e03a090 R08: 0000000000000000 R09: 0000000000000000 [ 730.388437][T12753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 730.396410][T12753] R13: 00007f0c4d3b6038 R14: 00007f0c4d3b5fa0 R15: 00007ffda17a4388 [ 730.404400][T12753] [ 730.506066][T12758] device syzkaller0 entered promiscuous mode [ 730.738945][T12772] FAULT_INJECTION: forcing a failure. [ 730.738945][T12772] name failslab, interval 1, probability 0, space 0, times 0 [ 730.850472][T12772] CPU: 0 PID: 12772 Comm: syz.3.3468 Tainted: G W syzkaller #0 [ 730.859450][T12772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 730.869505][T12772] Call Trace: [ 730.872779][T12772] [ 730.875704][T12772] __dump_stack+0x21/0x24 [ 730.880039][T12772] dump_stack_lvl+0xee/0x150 [ 730.884627][T12772] ? __cfi_dump_stack_lvl+0x8/0x8 [ 730.889654][T12772] ? security_file_alloc+0x33/0x130 [ 730.894854][T12772] ? kmem_cache_alloc+0x16e/0x330 [ 730.899882][T12772] ? security_file_alloc+0x33/0x130 [ 730.905080][T12772] dump_stack+0x15/0x24 [ 730.909289][T12772] should_fail_ex+0x3d4/0x520 [ 730.913966][T12772] __should_failslab+0xac/0xf0 [ 730.918736][T12772] ? tracepoint_add_func+0x28d/0x900 [ 730.924122][T12772] should_failslab+0x9/0x20 [ 730.928628][T12772] __kmem_cache_alloc_node+0x3d/0x2c0 [ 730.933997][T12772] ? tracepoint_add_func+0x28d/0x900 [ 730.939270][T12772] __kmalloc+0xa1/0x1e0 [ 730.943411][T12772] ? __kasan_check_write+0x14/0x20 [ 730.948514][T12772] tracepoint_add_func+0x28d/0x900 [ 730.953610][T12772] ? __cfi___bpf_trace_tlb_flush+0x10/0x10 [ 730.959400][T12772] ? __cfi___bpf_trace_tlb_flush+0x10/0x10 [ 730.965190][T12772] tracepoint_probe_register_prio_may_exist+0x5b/0x90 [ 730.971962][T12772] ? __cfi___bpf_trace_tlb_flush+0x10/0x10 [ 730.977758][T12772] bpf_probe_register+0x13f/0x1d0 [ 730.982870][T12772] bpf_raw_tp_link_attach+0x3d1/0x550 [ 730.988226][T12772] ? bpf_insn_prepare_dump+0x840/0x840 [ 730.993673][T12772] ? __kasan_check_write+0x14/0x20 [ 730.998772][T12772] bpf_raw_tracepoint_open+0x258/0x480 [ 731.004214][T12772] ? slab_free_freelist_hook+0xc2/0x190 [ 731.009746][T12772] ? bpf_obj_get_info_by_fd+0x2b10/0x2b10 [ 731.015536][T12772] ? selinux_bpf+0xce/0xf0 [ 731.019941][T12772] ? security_bpf+0x93/0xb0 [ 731.024428][T12772] __sys_bpf+0x4d1/0x780 [ 731.028652][T12772] ? bpf_link_show_fdinfo+0x320/0x320 [ 731.034021][T12772] ? __cfi_ksys_write+0x10/0x10 [ 731.038875][T12772] ? debug_smp_processor_id+0x17/0x20 [ 731.044238][T12772] __x64_sys_bpf+0x7c/0x90 [ 731.048647][T12772] x64_sys_call+0x488/0x9a0 [ 731.053135][T12772] do_syscall_64+0x4c/0xa0 [ 731.057542][T12772] ? clear_bhb_loop+0x30/0x80 [ 731.062203][T12772] ? clear_bhb_loop+0x30/0x80 [ 731.066867][T12772] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 731.072746][T12772] RIP: 0033:0x7f0c4d18ebe9 [ 731.077144][T12772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 731.096736][T12772] RSP: 002b:00007f0c4e019038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 731.105137][T12772] RAX: ffffffffffffffda RBX: 00007f0c4d3b6090 RCX: 00007f0c4d18ebe9 [ 731.113100][T12772] RDX: 0000000000000010 RSI: 0000200000000080 RDI: 0000000000000011 [ 731.121057][T12772] RBP: 00007f0c4e019090 R08: 0000000000000000 R09: 0000000000000000 [ 731.129017][T12772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 731.136974][T12772] R13: 00007f0c4d3b6128 R14: 00007f0c4d3b6090 R15: 00007ffda17a4388 [ 731.144936][T12772] [ 733.011154][ C1] sched: RT throttling activated [ 735.051684][T12787] device sit0 left promiscuous mode [ 735.074779][T12791] device sit0 entered promiscuous mode [ 735.607543][T12808] FAULT_INJECTION: forcing a failure. [ 735.607543][T12808] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 735.620820][T12808] CPU: 1 PID: 12808 Comm: syz.3.3477 Tainted: G W syzkaller #0 [ 735.629770][T12808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 735.639832][T12808] Call Trace: [ 735.643112][T12808] [ 735.646037][T12808] __dump_stack+0x21/0x24 [ 735.650464][T12808] dump_stack_lvl+0xee/0x150 [ 735.655069][T12808] ? __cfi_dump_stack_lvl+0x8/0x8 [ 735.660104][T12808] dump_stack+0x15/0x24 [ 735.664262][T12808] should_fail_ex+0x3d4/0x520 [ 735.668940][T12808] should_fail+0xb/0x10 [ 735.673116][T12808] should_fail_usercopy+0x1a/0x20 [ 735.678130][T12808] _copy_from_user+0x1e/0xc0 [ 735.682704][T12808] bpf_prog_test_run_skb+0x286/0x1290 [ 735.688115][T12808] ? __fget_files+0x2d5/0x330 [ 735.692787][T12808] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 735.698580][T12808] bpf_prog_test_run+0x3e3/0x630 [ 735.703513][T12808] ? slab_free_freelist_hook+0xc2/0x190 [ 735.709050][T12808] ? bpf_prog_query+0x270/0x270 [ 735.713887][T12808] ? selinux_bpf+0xce/0xf0 [ 735.718293][T12808] ? security_bpf+0x93/0xb0 [ 735.722817][T12808] __sys_bpf+0x56d/0x780 [ 735.727045][T12808] ? bpf_link_show_fdinfo+0x320/0x320 [ 735.732838][T12808] ? __cfi_ksys_write+0x10/0x10 [ 735.737689][T12808] ? debug_smp_processor_id+0x17/0x20 [ 735.743073][T12808] __x64_sys_bpf+0x7c/0x90 [ 735.747572][T12808] x64_sys_call+0x488/0x9a0 [ 735.752062][T12808] do_syscall_64+0x4c/0xa0 [ 735.756466][T12808] ? clear_bhb_loop+0x30/0x80 [ 735.761126][T12808] ? clear_bhb_loop+0x30/0x80 [ 735.765791][T12808] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 735.771669][T12808] RIP: 0033:0x7f0c4d18ebe9 [ 735.776069][T12808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 735.795657][T12808] RSP: 002b:00007f0c4e03a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 735.804059][T12808] RAX: ffffffffffffffda RBX: 00007f0c4d3b5fa0 RCX: 00007f0c4d18ebe9 [ 735.812014][T12808] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 735.819999][T12808] RBP: 00007f0c4e03a090 R08: 0000000000000000 R09: 0000000000000000 [ 735.827956][T12808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 735.835913][T12808] R13: 00007f0c4d3b6038 R14: 00007f0c4d3b5fa0 R15: 00007ffda17a4388 [ 735.843876][T12808] [ 736.485099][T12824] FAULT_INJECTION: forcing a failure. [ 736.485099][T12824] name failslab, interval 1, probability 0, space 0, times 0 [ 736.692735][T12824] CPU: 1 PID: 12824 Comm: syz.3.3481 Tainted: G W syzkaller #0 [ 736.701709][T12824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 736.711768][T12824] Call Trace: [ 736.715046][T12824] [ 736.717980][T12824] __dump_stack+0x21/0x24 [ 736.722313][T12824] dump_stack_lvl+0xee/0x150 [ 736.726901][T12824] ? __cfi_dump_stack_lvl+0x8/0x8 [ 736.731928][T12824] dump_stack+0x15/0x24 [ 736.736081][T12824] should_fail_ex+0x3d4/0x520 [ 736.740758][T12824] ? prepare_creds+0x2f/0x640 [ 736.745433][T12824] __should_failslab+0xac/0xf0 [ 736.750199][T12824] should_failslab+0x9/0x20 [ 736.754705][T12824] kmem_cache_alloc+0x3b/0x330 [ 736.759523][T12824] prepare_creds+0x2f/0x640 [ 736.764029][T12824] ? memcpy+0x56/0x70 [ 736.768012][T12824] copy_creds+0xe4/0x640 [ 736.772252][T12824] copy_process+0x828/0x3420 [ 736.776846][T12824] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 736.782567][T12824] ? __kasan_check_write+0x14/0x20 [ 736.787682][T12824] ? idle_dummy+0x10/0x10 [ 736.792191][T12824] kernel_clone+0x23a/0x810 [ 736.796703][T12824] ? __cfi_kernel_clone+0x10/0x10 [ 736.801727][T12824] ? __kasan_check_write+0x14/0x20 [ 736.807014][T12824] ? mutex_unlock+0x89/0x220 [ 736.811604][T12824] __x64_sys_clone+0x168/0x1b0 [ 736.816370][T12824] ? __cfi___x64_sys_clone+0x10/0x10 [ 736.821657][T12824] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 736.827728][T12824] x64_sys_call+0x990/0x9a0 [ 736.832232][T12824] do_syscall_64+0x4c/0xa0 [ 736.836655][T12824] ? clear_bhb_loop+0x30/0x80 [ 736.841331][T12824] ? clear_bhb_loop+0x30/0x80 [ 736.846004][T12824] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 736.851901][T12824] RIP: 0033:0x7f0c4d18ebe9 [ 736.856314][T12824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 736.875924][T12824] RSP: 002b:00007f0c4e018fe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 736.884363][T12824] RAX: ffffffffffffffda RBX: 00007f0c4d3b6090 RCX: 00007f0c4d18ebe9 [ 736.892349][T12824] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000002045280 [ 736.900330][T12824] RBP: 00007f0c4e019090 R08: 0000000000000000 R09: 0000000000000000 [ 736.908325][T12824] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 736.916306][T12824] R13: 00007f0c4d3b6128 R14: 00007f0c4d3b6090 R15: 00007ffda17a4388 [ 736.924390][T12824] [ 738.520664][ T28] audit: type=1400 audit(1755745067.436:141): avc: denied { create } for pid=12854 comm="syz.2.3489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 741.146787][T12891] Â: renamed from pim6reg1 [ 744.911098][T12936] Â: renamed from pim6reg1 [ 752.141318][T13008] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.223207][ T28] audit: type=1400 audit(1755745081.146:142): avc: denied { create } for pid=13007 comm="syz.3.3530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 752.269348][T13008] device bridge_slave_1 left promiscuous mode [ 752.285587][T13008] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.311061][T13008] device bridge_slave_0 left promiscuous mode [ 752.318889][T13008] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.844057][T13133] FAULT_INJECTION: forcing a failure. [ 758.844057][T13133] name failslab, interval 1, probability 0, space 0, times 0 [ 759.001878][T13133] CPU: 0 PID: 13133 Comm: syz.4.3562 Tainted: G W syzkaller #0 [ 759.010851][T13133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 759.020905][T13133] Call Trace: [ 759.024187][T13133] [ 759.027119][T13133] __dump_stack+0x21/0x24 [ 759.031540][T13133] dump_stack_lvl+0xee/0x150 [ 759.036128][T13133] ? __cfi_dump_stack_lvl+0x8/0x8 [ 759.041159][T13133] ? avc_has_perm+0x158/0x240 [ 759.045838][T13133] dump_stack+0x15/0x24 [ 759.050067][T13133] should_fail_ex+0x3d4/0x520 [ 759.054726][T13133] __should_failslab+0xac/0xf0 [ 759.059477][T13133] ? __get_vm_area_node+0x12c/0x360 [ 759.064671][T13133] should_failslab+0x9/0x20 [ 759.069164][T13133] __kmem_cache_alloc_node+0x3d/0x2c0 [ 759.074538][T13133] ? __get_vm_area_node+0x12c/0x360 [ 759.079729][T13133] kmalloc_node_trace+0x26/0xb0 [ 759.084568][T13133] __get_vm_area_node+0x12c/0x360 [ 759.089586][T13133] __vmalloc_node_range+0x326/0x13d0 [ 759.094855][T13133] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 759.100418][T13133] ? arch_stack_walk+0xfc/0x150 [ 759.105256][T13133] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 759.110963][T13133] ? stack_trace_save+0x98/0xe0 [ 759.115804][T13133] ? __cfi___vmalloc_node_range+0x10/0x10 [ 759.121507][T13133] ? __cfi_selinux_capable+0x10/0x10 [ 759.126782][T13133] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 759.132485][T13133] __vmalloc+0x79/0x90 [ 759.136541][T13133] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 759.142067][T13133] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 759.147427][T13133] bpf_prog_alloc+0x22/0x1c0 [ 759.152002][T13133] bpf_prog_load+0x7c6/0x15a0 [ 759.156668][T13133] ? map_freeze+0x390/0x390 [ 759.161155][T13133] ? selinux_bpf+0xc7/0xf0 [ 759.165560][T13133] ? security_bpf+0x93/0xb0 [ 759.170131][T13133] __sys_bpf+0x504/0x780 [ 759.174386][T13133] ? bpf_link_show_fdinfo+0x320/0x320 [ 759.179743][T13133] ? __cfi_ksys_write+0x10/0x10 [ 759.184666][T13133] ? do_user_addr_fault+0x9ac/0x1050 [ 759.189940][T13133] ? __bpf_trace_sys_enter+0x62/0x70 [ 759.195205][T13133] __x64_sys_bpf+0x7c/0x90 [ 759.199644][T13133] x64_sys_call+0x488/0x9a0 [ 759.204216][T13133] do_syscall_64+0x4c/0xa0 [ 759.208617][T13133] ? clear_bhb_loop+0x30/0x80 [ 759.213274][T13133] ? clear_bhb_loop+0x30/0x80 [ 759.217933][T13133] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 759.223805][T13133] RIP: 0033:0x7fcd6018ebe9 [ 759.228204][T13133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 759.248225][T13133] RSP: 002b:00007fcd60f73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 759.256625][T13133] RAX: ffffffffffffffda RBX: 00007fcd603b6090 RCX: 00007fcd6018ebe9 [ 759.264744][T13133] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 759.272695][T13133] RBP: 00007fcd60f73090 R08: 0000000000000000 R09: 0000000000000000 [ 759.280647][T13133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 759.288627][T13133] R13: 00007fcd603b6128 R14: 00007fcd603b6090 R15: 00007ffc347246f8 [ 759.296606][T13133] [ 759.316150][T13138] device sit0 left promiscuous mode [ 759.362828][T13133] syz.4.3562: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 759.548866][T13133] CPU: 0 PID: 13133 Comm: syz.4.3562 Tainted: G W syzkaller #0 [ 759.557836][T13133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 759.567892][T13133] Call Trace: [ 759.571168][T13133] [ 759.574095][T13133] __dump_stack+0x21/0x24 [ 759.578443][T13133] dump_stack_lvl+0xee/0x150 [ 759.583033][T13133] ? __cfi_dump_stack_lvl+0x8/0x8 [ 759.588065][T13133] ? pr_cont_kernfs_name+0x133/0x160 [ 759.593350][T13133] dump_stack+0x15/0x24 [ 759.597509][T13133] warn_alloc+0x1b0/0x1d0 [ 759.601836][T13133] ? should_failslab+0x9/0x20 [ 759.606526][T13133] ? __cfi_warn_alloc+0x10/0x10 [ 759.611380][T13133] ? kmalloc_node_trace+0x3d/0xb0 [ 759.616414][T13133] ? __get_vm_area_node+0x353/0x360 [ 759.621654][T13133] __vmalloc_node_range+0x34b/0x13d0 [ 759.626943][T13133] ? arch_stack_walk+0xfc/0x150 [ 759.631798][T13133] ? __cfi_avc_has_perm_noaudit+0x10/0x10 [ 759.637602][T13133] ? stack_trace_save+0x98/0xe0 [ 759.642460][T13133] ? __cfi___vmalloc_node_range+0x10/0x10 [ 759.648177][T13133] ? __cfi_selinux_capable+0x10/0x10 [ 759.653467][T13133] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 759.659012][T13133] __vmalloc+0x79/0x90 [ 759.663088][T13133] ? bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 759.668634][T13133] bpf_prog_alloc_no_stats+0x3e/0x3f0 [ 759.674003][T13133] bpf_prog_alloc+0x22/0x1c0 [ 759.678680][T13133] bpf_prog_load+0x7c6/0x15a0 [ 759.683363][T13133] ? map_freeze+0x390/0x390 [ 759.687867][T13133] ? selinux_bpf+0xc7/0xf0 [ 759.692283][T13133] ? security_bpf+0x93/0xb0 [ 759.696783][T13133] __sys_bpf+0x504/0x780 [ 759.701023][T13133] ? bpf_link_show_fdinfo+0x320/0x320 [ 759.706392][T13133] ? __cfi_ksys_write+0x10/0x10 [ 759.711280][T13133] ? do_user_addr_fault+0x9ac/0x1050 [ 759.716567][T13133] ? __bpf_trace_sys_enter+0x62/0x70 [ 759.721857][T13133] __x64_sys_bpf+0x7c/0x90 [ 759.726289][T13133] x64_sys_call+0x488/0x9a0 [ 759.730791][T13133] do_syscall_64+0x4c/0xa0 [ 759.735207][T13133] ? clear_bhb_loop+0x30/0x80 [ 759.739979][T13133] ? clear_bhb_loop+0x30/0x80 [ 759.745257][T13133] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 759.751147][T13133] RIP: 0033:0x7fcd6018ebe9 [ 759.755562][T13133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 759.775253][T13133] RSP: 002b:00007fcd60f73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 759.783663][T13133] RAX: ffffffffffffffda RBX: 00007fcd603b6090 RCX: 00007fcd6018ebe9 [ 759.791802][T13133] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 759.799766][T13133] RBP: 00007fcd60f73090 R08: 0000000000000000 R09: 0000000000000000 [ 759.807729][T13133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 759.815779][T13133] R13: 00007fcd603b6128 R14: 00007fcd603b6090 R15: 00007ffc347246f8 [ 759.823833][T13133] [ 759.833090][T13143] device sit0 entered promiscuous mode [ 759.922490][T13133] Mem-Info: [ 759.925632][T13133] active_anon:10474 inactive_anon:0 isolated_anon:0 [ 759.925632][T13133] active_file:26537 inactive_file:2481 isolated_file:0 [ 759.925632][T13133] unevictable:0 dirty:307 writeback:0 [ 759.925632][T13133] slab_reclaimable:7724 slab_unreclaimable:73111 [ 759.925632][T13133] mapped:30642 shmem:163 pagetables:625 [ 759.925632][T13133] sec_pagetables:0 bounce:0 [ 759.925632][T13133] kernel_misc_reclaimable:0 [ 759.925632][T13133] free:1515232 free_pcp:8826 free_cma:0 [ 760.951359][T13133] Node 0 active_anon:48552kB inactive_anon:0kB active_file:106148kB inactive_file:9932kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:124048kB dirty:1224kB writeback:0kB shmem:6960kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5312kB pagetables:2612kB sec_pagetables:0kB all_unreclaimable? no [ 761.044110][T13133] DMA32 free:2968532kB boost:0kB min:31288kB low:39108kB high:46928kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2974212kB mlocked:0kB bounce:0kB free_pcp:5680kB local_pcp:5680kB free_cma:0kB [ 761.331204][T13133] lowmem_reserve[]: 0 3932 3932 3932 [ 761.336692][T13133] Normal free:3097712kB boost:0kB min:42436kB low:53044kB high:63652kB reserved_highatomic:0KB active_anon:55552kB inactive_anon:0kB active_file:106148kB inactive_file:9932kB unevictable:0kB writepending:1224kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:9336kB local_pcp:5592kB free_cma:0kB [ 761.601182][T13133] lowmem_reserve[]: 0 0 0 0 [ 761.605751][T13133] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2968532kB [ 761.692758][T13133] Normal: 491*4kB (U) 539*8kB (UE) 474*16kB (UM) 1108*32kB (UME) 328*64kB (UME) 88*128kB (UM) 61*256kB (UME) 24*512kB (UM) 23*1024kB (UME) 4*2048kB (UME) 721*4096kB (UM) = 3094436kB [ 761.941221][T13133] 33965 total pagecache pages [ 761.951475][T13133] 0 pages in swap cache [ 761.955645][T13133] Free swap = 124996kB [ 762.031215][T13133] Total swap = 124996kB [ 762.035484][T13133] 2097051 pages RAM [ 762.039289][T13133] 0 pages HighMem/MovableOnly [ 762.091263][T13133] 346834 pages reserved [ 762.095446][T13133] 0 pages cma reserved [ 766.447524][T13265] FAULT_INJECTION: forcing a failure. [ 766.447524][T13265] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 766.471234][T13265] CPU: 1 PID: 13265 Comm: syz.4.3596 Tainted: G W syzkaller #0 [ 766.480204][T13265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 766.490264][T13265] Call Trace: [ 766.493559][T13265] [ 766.496486][T13265] __dump_stack+0x21/0x24 [ 766.500825][T13265] dump_stack_lvl+0xee/0x150 [ 766.505419][T13265] ? __cfi_dump_stack_lvl+0x8/0x8 [ 766.510445][T13265] dump_stack+0x15/0x24 [ 766.514591][T13265] should_fail_ex+0x3d4/0x520 [ 766.519253][T13265] should_fail+0xb/0x10 [ 766.523476][T13265] should_fail_usercopy+0x1a/0x20 [ 766.528504][T13265] _copy_from_user+0x1e/0xc0 [ 766.533166][T13265] __sys_bpf+0x277/0x780 [ 766.537397][T13265] ? bpf_link_show_fdinfo+0x320/0x320 [ 766.542751][T13265] ? __cfi_sched_clock_cpu+0x10/0x10 [ 766.548027][T13265] __x64_sys_bpf+0x7c/0x90 [ 766.552433][T13265] x64_sys_call+0x488/0x9a0 [ 766.556920][T13265] do_syscall_64+0x4c/0xa0 [ 766.561326][T13265] ? clear_bhb_loop+0x30/0x80 [ 766.565988][T13265] ? clear_bhb_loop+0x30/0x80 [ 766.570648][T13265] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 766.576525][T13265] RIP: 0033:0x7fcd6018ebe9 [ 766.580926][T13265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 766.600549][T13265] RSP: 002b:00007fcd60f94038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 766.608958][T13265] RAX: ffffffffffffffda RBX: 00007fcd603b5fa0 RCX: 00007fcd6018ebe9 [ 766.616924][T13265] RDX: 0000000000000038 RSI: 00002000000003c0 RDI: 0000000000000018 [ 766.624880][T13265] RBP: 00007fcd60f94090 R08: 0000000000000000 R09: 0000000000000000 [ 766.632837][T13265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 766.640795][T13265] R13: 00007fcd603b6038 R14: 00007fcd603b5fa0 R15: 00007ffc347246f8 [ 766.648764][T13265] [ 772.740587][T13378] device wg2 entered promiscuous mode [ 775.033533][T13453] bond_slave_1: mtu less than device minimum [ 779.036476][T13534] bond_slave_1: mtu less than device minimum [ 779.200317][T13539] device pim6reg1 entered promiscuous mode [ 787.323884][T13706] device syzkaller0 entered promiscuous mode [ 787.665128][T13709] ´: renamed from team_slave_1 [ 792.821807][T13786] device sit0 left promiscuous mode [ 794.261037][T13799] device wg2 entered promiscuous mode [ 800.813690][T13920] device pim6reg1 entered promiscuous mode [ 801.947740][T13945] device sit0 entered promiscuous mode [ 803.380274][T13972] FAULT_INJECTION: forcing a failure. [ 803.380274][T13972] name failslab, interval 1, probability 0, space 0, times 0 [ 803.635516][T13972] CPU: 1 PID: 13972 Comm: syz.1.3795 Tainted: G W syzkaller #0 [ 803.644490][T13972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 803.654555][T13972] Call Trace: [ 803.657834][T13972] [ 803.660760][T13972] __dump_stack+0x21/0x24 [ 803.665102][T13972] dump_stack_lvl+0xee/0x150 [ 803.669702][T13972] ? __cfi_dump_stack_lvl+0x8/0x8 [ 803.674734][T13972] dump_stack+0x15/0x24 [ 803.678909][T13972] should_fail_ex+0x3d4/0x520 [ 803.683609][T13972] ? sk_prot_alloc+0x5f/0x320 [ 803.688297][T13972] __should_failslab+0xac/0xf0 [ 803.693066][T13972] should_failslab+0x9/0x20 [ 803.697570][T13972] kmem_cache_alloc+0x3b/0x330 [ 803.702333][T13972] sk_prot_alloc+0x5f/0x320 [ 803.707016][T13972] sk_alloc+0x3b/0x460 [ 803.711086][T13972] ? __kasan_slab_alloc+0x72/0x80 [ 803.716108][T13972] tipc_sk_create+0xe6/0x1e60 [ 803.720917][T13972] ? security_inode_alloc+0x33/0x120 [ 803.726264][T13972] ? __kasan_check_write+0x14/0x20 [ 803.731393][T13972] ? _raw_spin_lock+0x8e/0xe0 [ 803.736087][T13972] ? __cfi__raw_spin_lock+0x10/0x10 [ 803.741297][T13972] ? security_inode_alloc+0xd1/0x120 [ 803.746592][T13972] ? inode_init_always+0x714/0x960 [ 803.751720][T13972] __sock_create+0x39e/0x7c0 [ 803.756314][T13972] __sys_socketpair+0x218/0x5b0 [ 803.761172][T13972] __x64_sys_socketpair+0x9b/0xb0 [ 803.766202][T13972] x64_sys_call+0x6e/0x9a0 [ 803.770624][T13972] do_syscall_64+0x4c/0xa0 [ 803.775035][T13972] ? clear_bhb_loop+0x30/0x80 [ 803.779694][T13972] ? clear_bhb_loop+0x30/0x80 [ 803.784355][T13972] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 803.790239][T13972] RIP: 0033:0x7f01fe18ebe9 [ 803.794651][T13972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 803.814325][T13972] RSP: 002b:00007f01ff0d9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 803.822723][T13972] RAX: ffffffffffffffda RBX: 00007f01fe3b5fa0 RCX: 00007f01fe18ebe9 [ 803.830680][T13972] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 803.838634][T13972] RBP: 00007f01ff0d9090 R08: 0000000000000000 R09: 0000000000000000 [ 803.846591][T13972] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 803.854564][T13972] R13: 00007f01fe3b6038 R14: 00007f01fe3b5fa0 R15: 00007ffeb92cea28 [ 803.862529][T13972] [ 803.968538][T13980] bond_slave_1: mtu greater than device maximum [ 806.481960][ T28] audit: type=1400 audit(1755745135.406:143): avc: denied { create } for pid=14012 comm="syz.2.3806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 806.755438][ T28] audit: type=1400 audit(1755745135.426:144): avc: denied { create } for pid=14012 comm="syz.2.3806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 808.421496][T14049] device sit0 left promiscuous mode [ 808.612403][T14050] device sit0 entered promiscuous mode [ 812.491242][T14123] device sit0 left promiscuous mode [ 813.003443][T14124] device sit0 entered promiscuous mode [ 814.926328][T14161] FAULT_INJECTION: forcing a failure. [ 814.926328][T14161] name failslab, interval 1, probability 0, space 0, times 0 [ 815.077311][T14161] CPU: 0 PID: 14161 Comm: syz.2.3848 Tainted: G W syzkaller #0 [ 815.086286][T14161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 815.096339][T14161] Call Trace: [ 815.099610][T14161] [ 815.102539][T14161] __dump_stack+0x21/0x24 [ 815.106876][T14161] dump_stack_lvl+0xee/0x150 [ 815.111464][T14161] ? __cfi_dump_stack_lvl+0x8/0x8 [ 815.116488][T14161] dump_stack+0x15/0x24 [ 815.120646][T14161] should_fail_ex+0x3d4/0x520 [ 815.125353][T14161] __should_failslab+0xac/0xf0 [ 815.130113][T14161] ? sidtab_sid2str_get+0x120/0x2c0 [ 815.135391][T14161] should_failslab+0x9/0x20 [ 815.139903][T14161] __kmem_cache_alloc_node+0x3d/0x2c0 [ 815.145272][T14161] ? sidtab_sid2str_get+0x120/0x2c0 [ 815.150467][T14161] __kmalloc_node_track_caller+0xa0/0x1e0 [ 815.156191][T14161] kmemdup+0x2b/0x60 [ 815.160099][T14161] sidtab_sid2str_get+0x120/0x2c0 [ 815.165121][T14161] security_sid_to_context_core+0x2ac/0x480 [ 815.171026][T14161] security_sid_to_context_force+0x36/0x40 [ 815.176839][T14161] selinux_inode_init_security+0x662/0x950 [ 815.182657][T14161] ? __cfi_selinux_inode_init_security+0x10/0x10 [ 815.188982][T14161] ? debug_smp_processor_id+0x17/0x20 [ 815.194343][T14161] ? get_cached_acl+0x274/0x2c0 [ 815.199284][T14161] security_inode_init_security+0x173/0x3a0 [ 815.205166][T14161] ? __cfi_shmem_initxattrs+0x10/0x10 [ 815.210530][T14161] ? __cfi_security_inode_init_security+0x10/0x10 [ 815.216938][T14161] ? __kasan_check_write+0x14/0x20 [ 815.222044][T14161] ? set_cached_acl+0xdd/0x180 [ 815.226881][T14161] ? simple_acl_create+0x191/0x1c0 [ 815.231987][T14161] shmem_mknod+0xbb/0x1d0 [ 815.236395][T14161] shmem_create+0x2c/0x40 [ 815.240718][T14161] ? __cfi_shmem_create+0x10/0x10 [ 815.245728][T14161] path_openat+0x11e3/0x2f50 [ 815.250311][T14161] ? do_filp_open+0x3c0/0x3c0 [ 815.254988][T14161] do_filp_open+0x1c1/0x3c0 [ 815.259502][T14161] ? __cfi_do_filp_open+0x10/0x10 [ 815.264534][T14161] ? alloc_fd+0x4e6/0x590 [ 815.268893][T14161] do_sys_openat2+0x185/0x7e0 [ 815.273564][T14161] ? __kasan_check_write+0x14/0x20 [ 815.278667][T14161] ? do_sys_open+0xe0/0xe0 [ 815.283072][T14161] ? ksys_write+0x1eb/0x240 [ 815.287662][T14161] ? __cfi_ksys_write+0x10/0x10 [ 815.292521][T14161] __x64_sys_openat+0x136/0x160 [ 815.297381][T14161] x64_sys_call+0x783/0x9a0 [ 815.301875][T14161] do_syscall_64+0x4c/0xa0 [ 815.306287][T14161] ? clear_bhb_loop+0x30/0x80 [ 815.310964][T14161] ? clear_bhb_loop+0x30/0x80 [ 815.315647][T14161] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 815.321542][T14161] RIP: 0033:0x7fc550f8ebe9 [ 815.325950][T14161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 815.345541][T14161] RSP: 002b:00007fc551d65038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 815.353955][T14161] RAX: ffffffffffffffda RBX: 00007fc5511b6090 RCX: 00007fc550f8ebe9 [ 815.361920][T14161] RDX: 00000000000026e1 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 815.369910][T14161] RBP: 00007fc551d65090 R08: 0000000000000000 R09: 0000000000000000 [ 815.377954][T14161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 815.385911][T14161] R13: 00007fc5511b6128 R14: 00007fc5511b6090 R15: 00007ffddb5cf6a8 [ 815.393876][T14161] [ 821.297694][ T28] audit: type=1400 audit(1755745150.216:145): avc: denied { create } for pid=14224 comm="syz.4.3864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 854.698096][T14685] syzkaller0: refused to change device tx_queue_len [ 855.567034][T14778] syz.1.4032[14778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 855.567108][T14778] syz.1.4032[14778] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.002126][T14848] syz.1.4068[14848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 964.846402][T16096] syz.3.4411[16096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.015019][T16096] syz.3.4411[16096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1251.726022][ T28] audit: type=1400 audit(1755745580.636:146): avc: denied { read } for pid=20621 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1252.141305][ T28] audit: type=1400 audit(1755745580.636:147): avc: denied { open } for pid=20621 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1252.701474][T20621] bridge0: port 1(bridge_slave_0) entered blocking state [ 1252.792300][T20621] bridge0: port 1(bridge_slave_0) entered disabled state [ 1252.802842][T20621] device bridge_slave_0 entered promiscuous mode [ 1253.578568][T20621] bridge0: port 2(bridge_slave_1) entered blocking state [ 1253.620498][T20621] bridge0: port 2(bridge_slave_1) entered disabled state [ 1253.710178][T20621] device bridge_slave_1 entered promiscuous mode [ 1254.488486][ T10] device veth1_macvtap left promiscuous mode [ 1256.044917][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1256.052553][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1256.070539][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1256.106591][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1256.115189][ T399] bridge0: port 1(bridge_slave_0) entered blocking state [ 1256.122256][ T399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1256.130001][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1256.139054][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1256.147752][ T399] bridge0: port 2(bridge_slave_1) entered blocking state [ 1256.154807][ T399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1256.163319][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1256.171386][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1256.293192][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1256.455564][T20621] device veth0_vlan entered promiscuous mode [ 1256.556966][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1256.597282][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1256.668895][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1256.677491][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1256.687818][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1256.695577][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1256.781051][T11573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1256.832729][T11573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1256.882229][T20621] device veth1_macvtap entered promiscuous mode [ 1257.063808][T11573] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1257.125829][T11573] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1257.272994][T11573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1257.385156][T11573] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1257.442857][T11573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1280.992819][T20958] bridge0: port 1(bridge_slave_0) entered blocking state [ 1281.057600][T20958] bridge0: port 1(bridge_slave_0) entered disabled state [ 1281.065200][T20958] device bridge_slave_0 entered promiscuous mode [ 1281.382310][T20958] bridge0: port 2(bridge_slave_1) entered blocking state [ 1281.402191][T20958] bridge0: port 2(bridge_slave_1) entered disabled state [ 1281.410128][T20958] device bridge_slave_1 entered promiscuous mode [ 1282.838422][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1282.856165][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1283.018380][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1283.043231][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1283.069129][ T399] bridge0: port 1(bridge_slave_0) entered blocking state [ 1283.076256][ T399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1283.262935][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1283.287512][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1283.309767][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1283.318365][ T399] bridge0: port 2(bridge_slave_1) entered blocking state [ 1283.325431][ T399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1283.333523][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1283.342134][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1283.350238][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1283.358616][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1283.419019][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1283.488223][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1283.801994][T20958] device veth0_vlan entered promiscuous mode [ 1283.825239][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1283.833716][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1283.842072][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1283.849643][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1284.039674][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1284.098609][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1284.157719][T20958] device veth1_macvtap entered promiscuous mode [ 1284.450751][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1284.479771][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1284.511471][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1284.561350][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1284.621103][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1353.121403][T21784] bridge0: port 1(bridge_slave_0) entered blocking state [ 1353.128473][T21784] bridge0: port 1(bridge_slave_0) entered disabled state [ 1353.141642][T21784] device bridge_slave_0 entered promiscuous mode [ 1353.246754][T21784] bridge0: port 2(bridge_slave_1) entered blocking state [ 1353.254219][T21784] bridge0: port 2(bridge_slave_1) entered disabled state [ 1353.261953][T21784] device bridge_slave_1 entered promiscuous mode [ 1353.402562][ T4625] device veth1_macvtap left promiscuous mode [ 1353.838181][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1353.845772][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1353.971738][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1354.027604][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1354.041114][ T399] bridge0: port 1(bridge_slave_0) entered blocking state [ 1354.048195][ T399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1354.056741][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1354.065190][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1354.073688][ T399] bridge0: port 2(bridge_slave_1) entered blocking state [ 1354.080711][ T399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1354.088490][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1354.096823][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1354.222358][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1354.255874][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1354.301855][T21784] device veth0_vlan entered promiscuous mode [ 1354.311588][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1354.435182][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1354.449431][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1354.465866][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1354.490233][T21784] device veth1_macvtap entered promiscuous mode [ 1354.630381][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1354.681386][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1377.823887][T22046] device veth1_macvtap left promiscuous mode [ 1378.062529][T22046] device veth1_macvtap entered promiscuous mode [ 1378.105526][T22046] device macsec0 entered promiscuous mode [ 1378.173633][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1380.164783][T22102] device sit0 left promiscuous mode [ 1380.315683][T22103] device sit0 entered promiscuous mode [ 1383.886844][T22153] device syzkaller0 entered promiscuous mode [ 1386.622442][T22184] Â: renamed from pim6reg1 [ 1389.348427][T22209] Â: renamed from pim6reg1 [ 1389.778126][T22222] device wg2 entered promiscuous mode [ 1390.514771][T22236] device wg2 entered promiscuous mode [ 1392.592282][T22262] device veth0_vlan left promiscuous mode [ 1392.690130][T22262] device veth0_vlan entered promiscuous mode [ 1392.880226][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1392.910396][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1392.972829][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1395.641776][T22285] device pim6reg1 entered promiscuous mode [ 1395.878370][T22301] device pim6reg1 entered promiscuous mode [ 1396.354048][T22308] Â: renamed from pim6reg1 [ 1396.944582][T22318] device wg2 left promiscuous mode [ 1397.409831][T22326] device pim6reg1 entered promiscuous mode [ 1399.427407][ T28] audit: type=1400 audit(1755745728.346:148): avc: denied { create } for pid=22365 comm="syz.2.6143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1400.069803][T22375] device sit0 entered promiscuous mode [ 1400.909818][T22391] device sit0 entered promiscuous mode [ 1401.072993][T22394] device sit0 left promiscuous mode [ 1401.180048][T22395] device sit0 entered promiscuous mode [ 1403.946650][T22419] FAULT_INJECTION: forcing a failure. [ 1403.946650][T22419] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1404.201445][T22421] device sit0 entered promiscuous mode [ 1404.271139][T22419] CPU: 1 PID: 22419 Comm: syz.3.6155 Tainted: G W syzkaller #0 [ 1404.280205][T22419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1404.290269][T22419] Call Trace: [ 1404.293553][T22419] [ 1404.296483][T22419] __dump_stack+0x21/0x24 [ 1404.300822][T22419] dump_stack_lvl+0xee/0x150 [ 1404.305422][T22419] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1404.310449][T22419] dump_stack+0x15/0x24 [ 1404.314601][T22419] should_fail_ex+0x3d4/0x520 [ 1404.319284][T22419] should_fail+0xb/0x10 [ 1404.323438][T22419] should_fail_usercopy+0x1a/0x20 [ 1404.328552][T22419] _copy_from_user+0x1e/0xc0 [ 1404.333145][T22419] sock_do_ioctl+0x186/0x310 [ 1404.337741][T22419] ? sock_show_fdinfo+0xb0/0xb0 [ 1404.342596][T22419] ? selinux_file_ioctl+0x377/0x480 [ 1404.347795][T22419] sock_ioctl+0x4d8/0x6e0 [ 1404.352124][T22419] ? __cfi_sock_ioctl+0x10/0x10 [ 1404.356980][T22419] ? __fget_files+0x2d5/0x330 [ 1404.361663][T22419] ? security_file_ioctl+0x95/0xc0 [ 1404.366772][T22419] ? __cfi_sock_ioctl+0x10/0x10 [ 1404.371621][T22419] __se_sys_ioctl+0x12f/0x1b0 [ 1404.376302][T22419] __x64_sys_ioctl+0x7b/0x90 [ 1404.380890][T22419] x64_sys_call+0x58b/0x9a0 [ 1404.385387][T22419] do_syscall_64+0x4c/0xa0 [ 1404.389800][T22419] ? clear_bhb_loop+0x30/0x80 [ 1404.394471][T22419] ? clear_bhb_loop+0x30/0x80 [ 1404.399148][T22419] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1404.405040][T22419] RIP: 0033:0x7ff27838ebe9 [ 1404.409447][T22419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1404.429047][T22419] RSP: 002b:00007ff2792bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1404.437466][T22419] RAX: ffffffffffffffda RBX: 00007ff2785b5fa0 RCX: 00007ff27838ebe9 [ 1404.445434][T22419] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000008 [ 1404.453406][T22419] RBP: 00007ff2792bf090 R08: 0000000000000000 R09: 0000000000000000 [ 1404.461370][T22419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1404.469334][T22419] R13: 00007ff2785b6038 R14: 00007ff2785b5fa0 R15: 00007fff2cb109f8 [ 1404.477310][T22419] [ 1405.502525][T22455] FAULT_INJECTION: forcing a failure. [ 1405.502525][T22455] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1405.644031][T22455] CPU: 1 PID: 22455 Comm: syz.3.6167 Tainted: G W syzkaller #0 [ 1405.653005][T22455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1405.663068][T22455] Call Trace: [ 1405.666346][T22455] [ 1405.669271][T22455] __dump_stack+0x21/0x24 [ 1405.673600][T22455] dump_stack_lvl+0xee/0x150 [ 1405.678189][T22455] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1405.683213][T22455] dump_stack+0x15/0x24 [ 1405.687370][T22455] should_fail_ex+0x3d4/0x520 [ 1405.692048][T22455] should_fail+0xb/0x10 [ 1405.696207][T22455] should_fail_usercopy+0x1a/0x20 [ 1405.701229][T22455] _copy_from_user+0x1e/0xc0 [ 1405.705816][T22455] __sys_bpf+0x277/0x780 [ 1405.710059][T22455] ? bpf_link_show_fdinfo+0x320/0x320 [ 1405.715432][T22455] ? __cfi_ksys_write+0x10/0x10 [ 1405.720285][T22455] ? debug_smp_processor_id+0x17/0x20 [ 1405.725656][T22455] __x64_sys_bpf+0x7c/0x90 [ 1405.730077][T22455] x64_sys_call+0x488/0x9a0 [ 1405.734576][T22455] do_syscall_64+0x4c/0xa0 [ 1405.738991][T22455] ? clear_bhb_loop+0x30/0x80 [ 1405.743662][T22455] ? clear_bhb_loop+0x30/0x80 [ 1405.748336][T22455] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1405.754229][T22455] RIP: 0033:0x7ff27838ebe9 [ 1405.758643][T22455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1405.778257][T22455] RSP: 002b:00007ff2792bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1405.786769][T22455] RAX: ffffffffffffffda RBX: 00007ff2785b5fa0 RCX: 00007ff27838ebe9 [ 1405.794748][T22455] RDX: 0000000000000094 RSI: 0000200000002ac0 RDI: 0000000000000005 [ 1405.802721][T22455] RBP: 00007ff2792bf090 R08: 0000000000000000 R09: 0000000000000000 [ 1405.810694][T22455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1405.818660][T22455] R13: 00007ff2785b6038 R14: 00007ff2785b5fa0 R15: 00007fff2cb109f8 [ 1405.826641][T22455] [ 1406.799033][T22472] bridge0: port 2(bridge_slave_1) entered disabled state [ 1407.323202][T22488] FAULT_INJECTION: forcing a failure. [ 1407.323202][T22488] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.335915][T22488] CPU: 0 PID: 22488 Comm: syz.3.6177 Tainted: G W syzkaller #0 [ 1407.344857][T22488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1407.355001][T22488] Call Trace: [ 1407.358281][T22488] [ 1407.361225][T22488] __dump_stack+0x21/0x24 [ 1407.365561][T22488] dump_stack_lvl+0xee/0x150 [ 1407.370155][T22488] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1407.375186][T22488] ? __cfi___perf_event_task_sched_in+0x10/0x10 [ 1407.381432][T22488] ? __cfi___switch_to+0x10/0x10 [ 1407.386381][T22488] dump_stack+0x15/0x24 [ 1407.390545][T22488] should_fail_ex+0x3d4/0x520 [ 1407.395227][T22488] __should_failslab+0xac/0xf0 [ 1407.399992][T22488] ? ref_tracker_alloc+0x139/0x430 [ 1407.405111][T22488] should_failslab+0x9/0x20 [ 1407.409644][T22488] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1407.415027][T22488] ? ref_tracker_alloc+0x139/0x430 [ 1407.420143][T22488] kmalloc_trace+0x29/0xb0 [ 1407.424567][T22488] ref_tracker_alloc+0x139/0x430 [ 1407.429512][T22488] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 1407.434994][T22488] ? __kasan_check_read+0x11/0x20 [ 1407.440052][T22488] ? linkwatch_urgent_event+0x3ac/0x430 [ 1407.445606][T22488] linkwatch_fire_event+0x1d2/0x240 [ 1407.450820][T22488] netif_carrier_off+0x9c/0xc0 [ 1407.455594][T22488] __tun_detach+0xc1c/0x1460 [ 1407.460334][T22488] tun_chr_close+0x92/0x140 [ 1407.464845][T22488] ? __cfi_tun_chr_close+0x10/0x10 [ 1407.469994][T22488] __fput+0x1fc/0x8f0 [ 1407.473994][T22488] ____fput+0x15/0x20 [ 1407.477979][T22488] task_work_run+0x1db/0x240 [ 1407.482572][T22488] ? __cfi_task_work_run+0x10/0x10 [ 1407.487692][T22488] ? filp_close+0x111/0x160 [ 1407.492203][T22488] exit_to_user_mode_loop+0x9b/0xb0 [ 1407.497401][T22488] exit_to_user_mode_prepare+0x5a/0xa0 [ 1407.502857][T22488] syscall_exit_to_user_mode+0x1a/0x30 [ 1407.508330][T22488] do_syscall_64+0x58/0xa0 [ 1407.512753][T22488] ? clear_bhb_loop+0x30/0x80 [ 1407.517431][T22488] ? clear_bhb_loop+0x30/0x80 [ 1407.522103][T22488] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1407.528100][T22488] RIP: 0033:0x7ff27838ebe9 [ 1407.532513][T22488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1407.552138][T22488] RSP: 002b:00007ff2792bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1407.560726][T22488] RAX: 0000000000000000 RBX: 00007ff2785b5fa0 RCX: 00007ff27838ebe9 [ 1407.568694][T22488] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1407.576651][T22488] RBP: 00007ff2792bf090 R08: 0000000000000000 R09: 0000000000000000 [ 1407.584609][T22488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1407.592580][T22488] R13: 00007ff2785b6038 R14: 00007ff2785b5fa0 R15: 00007fff2cb109f8 [ 1407.600551][T22488] [ 1407.603556][T22488] memory allocation failure, unreliable refcount tracker. [ 1407.977043][T22503] FAULT_INJECTION: forcing a failure. [ 1407.977043][T22503] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.996655][T22503] CPU: 1 PID: 22503 Comm: syz.0.6182 Tainted: G W syzkaller #0 [ 1408.005633][T22503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1408.015694][T22503] Call Trace: [ 1408.018967][T22503] [ 1408.021891][T22503] __dump_stack+0x21/0x24 [ 1408.026232][T22503] dump_stack_lvl+0xee/0x150 [ 1408.030838][T22503] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1408.035871][T22503] dump_stack+0x15/0x24 [ 1408.040030][T22503] should_fail_ex+0x3d4/0x520 [ 1408.044723][T22503] __should_failslab+0xac/0xf0 [ 1408.049485][T22503] ? kernfs_fop_write_iter+0x156/0x410 [ 1408.054948][T22503] should_failslab+0x9/0x20 [ 1408.059456][T22503] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1408.064831][T22503] ? kernfs_fop_write_iter+0x156/0x410 [ 1408.070293][T22503] __kmalloc+0xa1/0x1e0 [ 1408.074449][T22503] kernfs_fop_write_iter+0x156/0x410 [ 1408.079757][T22503] vfs_write+0x5db/0xca0 [ 1408.084000][T22503] ? slab_free_freelist_hook+0xc2/0x190 [ 1408.089539][T22503] ? __cfi_vfs_write+0x10/0x10 [ 1408.094290][T22503] ? __cfi_mutex_lock+0x10/0x10 [ 1408.099135][T22503] ? __fdget_pos+0x2cd/0x380 [ 1408.103720][T22503] ? ksys_write+0x71/0x240 [ 1408.108125][T22503] ksys_write+0x140/0x240 [ 1408.112442][T22503] ? __cfi_ksys_write+0x10/0x10 [ 1408.117282][T22503] ? __bpf_trace_sys_enter+0x62/0x70 [ 1408.122557][T22503] __x64_sys_write+0x7b/0x90 [ 1408.127134][T22503] x64_sys_call+0x27b/0x9a0 [ 1408.131621][T22503] do_syscall_64+0x4c/0xa0 [ 1408.136050][T22503] ? clear_bhb_loop+0x30/0x80 [ 1408.140708][T22503] ? clear_bhb_loop+0x30/0x80 [ 1408.145368][T22503] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1408.151248][T22503] RIP: 0033:0x7fd24238ebe9 [ 1408.155651][T22503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1408.175262][T22503] RSP: 002b:00007fd243126038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1408.183664][T22503] RAX: ffffffffffffffda RBX: 00007fd2425b5fa0 RCX: 00007fd24238ebe9 [ 1408.191623][T22503] RDX: 0000000000000009 RSI: 00002000000002c0 RDI: 0000000000000008 [ 1408.199672][T22503] RBP: 00007fd243126090 R08: 0000000000000000 R09: 0000000000000000 [ 1408.207646][T22503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1408.215612][T22503] R13: 00007fd2425b6038 R14: 00007fd2425b5fa0 R15: 00007ffcb72e1d28 [ 1408.223574][T22503] [ 1408.849956][T22527] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1408.877040][T22534] FAULT_INJECTION: forcing a failure. [ 1408.877040][T22534] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1408.891679][T22534] CPU: 0 PID: 22534 Comm: syz.3.6192 Tainted: G W syzkaller #0 [ 1408.900644][T22534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1408.910714][T22534] Call Trace: [ 1408.913992][T22534] [ 1408.917270][T22534] __dump_stack+0x21/0x24 [ 1408.921607][T22534] dump_stack_lvl+0xee/0x150 [ 1408.926203][T22534] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1408.928917][T22527] device syzkaller0 entered promiscuous mode [ 1408.931236][T22534] ? __rcu_read_unlock+0xa0/0xa0 [ 1408.931264][T22534] dump_stack+0x15/0x24 [ 1408.931286][T22534] should_fail_ex+0x3d4/0x520 [ 1408.931307][T22534] should_fail+0xb/0x10 [ 1408.931325][T22534] should_fail_usercopy+0x1a/0x20 [ 1408.931344][T22534] strncpy_from_user+0x24/0x2d0 [ 1408.965010][T22534] bpf_prog_load+0x1bb/0x15a0 [ 1408.969713][T22534] ? map_freeze+0x390/0x390 [ 1408.974317][T22534] ? selinux_bpf+0xc7/0xf0 [ 1408.978743][T22534] ? security_bpf+0x93/0xb0 [ 1408.983254][T22534] __sys_bpf+0x504/0x780 [ 1408.987502][T22534] ? bpf_link_show_fdinfo+0x320/0x320 [ 1408.992875][T22534] ? __kasan_check_write+0x14/0x20 [ 1408.998009][T22534] ? fpregs_restore_userregs+0x128/0x260 [ 1409.003645][T22534] __x64_sys_bpf+0x7c/0x90 [ 1409.008083][T22534] x64_sys_call+0x488/0x9a0 [ 1409.012600][T22534] do_syscall_64+0x4c/0xa0 [ 1409.017025][T22534] ? clear_bhb_loop+0x30/0x80 [ 1409.021706][T22534] ? clear_bhb_loop+0x30/0x80 [ 1409.026387][T22534] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1409.032280][T22534] RIP: 0033:0x7ff27838ebe9 [ 1409.036709][T22534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1409.056322][T22534] RSP: 002b:00007ff2792bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1409.064748][T22534] RAX: ffffffffffffffda RBX: 00007ff2785b5fa0 RCX: 00007ff27838ebe9 [ 1409.072729][T22534] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 1409.080706][T22534] RBP: 00007ff2792bf090 R08: 0000000000000000 R09: 0000000000000000 [ 1409.088711][T22534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1409.096776][T22534] R13: 00007ff2785b6038 R14: 00007ff2785b5fa0 R15: 00007fff2cb109f8 [ 1409.104761][T22534] [ 1410.224588][T22552] bridge0: port 1(bridge_slave_0) entered disabled state [ 1411.682926][T22574] FAULT_INJECTION: forcing a failure. [ 1411.682926][T22574] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.766023][T22574] CPU: 0 PID: 22574 Comm: syz.3.6204 Tainted: G W syzkaller #0 [ 1411.774992][T22574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1411.785055][T22574] Call Trace: [ 1411.788335][T22574] [ 1411.791260][T22574] __dump_stack+0x21/0x24 [ 1411.795594][T22574] dump_stack_lvl+0xee/0x150 [ 1411.800187][T22574] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1411.805237][T22574] dump_stack+0x15/0x24 [ 1411.809399][T22574] should_fail_ex+0x3d4/0x520 [ 1411.814078][T22574] __should_failslab+0xac/0xf0 [ 1411.818860][T22574] ? sk_prot_alloc+0xed/0x320 [ 1411.823543][T22574] should_failslab+0x9/0x20 [ 1411.828057][T22574] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1411.833427][T22574] ? sk_prot_alloc+0xed/0x320 [ 1411.838091][T22574] __kmalloc+0xa1/0x1e0 [ 1411.842242][T22574] sk_prot_alloc+0xed/0x320 [ 1411.846754][T22574] sk_alloc+0x3b/0x460 [ 1411.850822][T22574] packet_create+0x109/0x850 [ 1411.855492][T22574] __sock_create+0x39e/0x7c0 [ 1411.860083][T22574] __sys_socketpair+0x1a1/0x5b0 [ 1411.865020][T22574] __x64_sys_socketpair+0x9b/0xb0 [ 1411.870043][T22574] x64_sys_call+0x6e/0x9a0 [ 1411.874446][T22574] do_syscall_64+0x4c/0xa0 [ 1411.878856][T22574] ? clear_bhb_loop+0x30/0x80 [ 1411.883519][T22574] ? clear_bhb_loop+0x30/0x80 [ 1411.888268][T22574] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1411.894229][T22574] RIP: 0033:0x7ff27838ebe9 [ 1411.898627][T22574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1411.918309][T22574] RSP: 002b:00007ff2792bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1411.926736][T22574] RAX: ffffffffffffffda RBX: 00007ff2785b5fa0 RCX: 00007ff27838ebe9 [ 1411.934703][T22574] RDX: 0000000000000300 RSI: 000000000000000a RDI: 0000000000000011 [ 1411.942658][T22574] RBP: 00007ff2792bf090 R08: 0000000000000000 R09: 0000000000000000 [ 1411.950616][T22574] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1411.958578][T22574] R13: 00007ff2785b6038 R14: 00007ff2785b5fa0 R15: 00007fff2cb109f8 [ 1411.966630][T22574] [ 1414.816185][T22637] device syzkaller0 entered promiscuous mode [ 1415.808198][T22661] FAULT_INJECTION: forcing a failure. [ 1415.808198][T22661] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1415.931062][T22661] CPU: 0 PID: 22661 Comm: syz.2.6229 Tainted: G W syzkaller #0 [ 1415.940043][T22661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1415.950103][T22661] Call Trace: [ 1415.953393][T22661] [ 1415.956322][T22661] __dump_stack+0x21/0x24 [ 1415.960743][T22661] dump_stack_lvl+0xee/0x150 [ 1415.965344][T22661] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1415.970376][T22661] ? finish_task_switch+0x16b/0x7b0 [ 1415.975588][T22661] dump_stack+0x15/0x24 [ 1415.979748][T22661] should_fail_ex+0x3d4/0x520 [ 1415.984431][T22661] should_fail+0xb/0x10 [ 1415.988584][T22661] should_fail_usercopy+0x1a/0x20 [ 1415.993620][T22661] strncpy_from_user+0x24/0x2d0 [ 1415.998486][T22661] bpf_prog_load+0x1bb/0x15a0 [ 1416.003177][T22661] ? __kasan_check_read+0x11/0x20 [ 1416.008207][T22661] ? preempt_schedule_irq+0xbb/0x110 [ 1416.013499][T22661] ? __cfi_preempt_schedule_irq+0x10/0x10 [ 1416.019230][T22661] ? map_freeze+0x390/0x390 [ 1416.023735][T22661] ? __sys_bpf+0x2ed/0x780 [ 1416.028149][T22661] __sys_bpf+0x504/0x780 [ 1416.032395][T22661] ? bpf_link_show_fdinfo+0x320/0x320 [ 1416.037824][T22661] ? irqentry_exit+0x37/0x40 [ 1416.042459][T22661] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 1416.048270][T22661] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1416.054426][T22661] __x64_sys_bpf+0x7c/0x90 [ 1416.058851][T22661] x64_sys_call+0x488/0x9a0 [ 1416.063357][T22661] do_syscall_64+0x4c/0xa0 [ 1416.067781][T22661] ? clear_bhb_loop+0x30/0x80 [ 1416.072454][T22661] ? clear_bhb_loop+0x30/0x80 [ 1416.077132][T22661] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1416.083030][T22661] RIP: 0033:0x7f98cbd8ebe9 [ 1416.087448][T22661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1416.107055][T22661] RSP: 002b:00007f98ccb31038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1416.115477][T22661] RAX: ffffffffffffffda RBX: 00007f98cbfb5fa0 RCX: 00007f98cbd8ebe9 [ 1416.123621][T22661] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 1416.131596][T22661] RBP: 00007f98ccb31090 R08: 0000000000000000 R09: 0000000000000000 [ 1416.139570][T22661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1416.147548][T22661] R13: 00007f98cbfb6038 R14: 00007f98cbfb5fa0 R15: 00007ffc9d05c918 [ 1416.155533][T22661] [ 1417.447036][ T28] audit: type=1400 audit(1755745746.366:149): avc: denied { ioctl } for pid=22708 comm="syz.3.6243" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1418.197149][T22740] FAULT_INJECTION: forcing a failure. [ 1418.197149][T22740] name failslab, interval 1, probability 0, space 0, times 0 [ 1418.209948][T22740] CPU: 1 PID: 22740 Comm: syz.1.6253 Tainted: G W syzkaller #0 [ 1418.218906][T22740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1418.228959][T22740] Call Trace: [ 1418.232233][T22740] [ 1418.235146][T22740] __dump_stack+0x21/0x24 [ 1418.239483][T22740] dump_stack_lvl+0xee/0x150 [ 1418.244072][T22740] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1418.249104][T22740] dump_stack+0x15/0x24 [ 1418.253262][T22740] should_fail_ex+0x3d4/0x520 [ 1418.257929][T22740] ? copy_signal+0x54/0x630 [ 1418.262421][T22740] __should_failslab+0xac/0xf0 [ 1418.267174][T22740] should_failslab+0x9/0x20 [ 1418.271666][T22740] kmem_cache_alloc+0x3b/0x330 [ 1418.276416][T22740] copy_signal+0x54/0x630 [ 1418.280733][T22740] ? copy_process+0x1262/0x3420 [ 1418.285576][T22740] copy_process+0x1283/0x3420 [ 1418.290256][T22740] ? idle_dummy+0x10/0x10 [ 1418.294600][T22740] kernel_clone+0x23a/0x810 [ 1418.299092][T22740] ? __cfi_kernel_clone+0x10/0x10 [ 1418.304103][T22740] ? __kasan_check_write+0x14/0x20 [ 1418.309200][T22740] ? mutex_unlock+0x89/0x220 [ 1418.313772][T22740] __x64_sys_clone+0x168/0x1b0 [ 1418.318524][T22740] ? __cfi___x64_sys_clone+0x10/0x10 [ 1418.323830][T22740] ? __bpf_trace_sys_enter+0x62/0x70 [ 1418.329097][T22740] ? trace_sys_enter+0x3d/0x50 [ 1418.333842][T22740] x64_sys_call+0x990/0x9a0 [ 1418.338330][T22740] do_syscall_64+0x4c/0xa0 [ 1418.342733][T22740] ? clear_bhb_loop+0x30/0x80 [ 1418.347393][T22740] ? clear_bhb_loop+0x30/0x80 [ 1418.352051][T22740] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1418.357925][T22740] RIP: 0033:0x7f01fe18ebe9 [ 1418.362327][T22740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1418.381917][T22740] RSP: 002b:00007f01ff0d8fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1418.390314][T22740] RAX: ffffffffffffffda RBX: 00007f01fe3b5fa0 RCX: 00007f01fe18ebe9 [ 1418.398275][T22740] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000011 [ 1418.406227][T22740] RBP: 00007f01ff0d9090 R08: 0000000000000000 R09: 0000000000000000 [ 1418.414199][T22740] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1418.422152][T22740] R13: 00007f01fe3b6038 R14: 00007f01fe3b5fa0 R15: 00007ffeb92cea28 [ 1418.430124][T22740] [ 1419.275329][ T28] audit: type=1400 audit(1755745748.196:150): avc: denied { create } for pid=22748 comm="syz.3.6256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1421.441369][T22808] device sit0 left promiscuous mode [ 1421.598754][T22812] device sit0 entered promiscuous mode [ 1422.827814][T22831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1422.886644][T22831] bridge0: port 1(bridge_slave_0) entered disabled state [ 1422.951848][T22831] device bridge_slave_0 entered promiscuous mode [ 1423.023641][T22831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1423.109866][T22831] bridge0: port 2(bridge_slave_1) entered disabled state [ 1423.144657][T22831] device bridge_slave_1 entered promiscuous mode [ 1423.449174][ T399] device bridge_slave_1 left promiscuous mode [ 1423.530934][ T399] bridge0: port 2(bridge_slave_1) entered disabled state [ 1423.651034][ T399] device bridge_slave_0 left promiscuous mode [ 1423.657229][ T399] bridge0: port 1(bridge_slave_0) entered disabled state [ 1423.827252][ T399] device veth1_macvtap left promiscuous mode [ 1423.866719][ T399] device veth0_vlan left promiscuous mode [ 1424.587118][T11573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1424.675320][T11573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1424.763196][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1424.771818][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1424.780103][T22381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1424.787166][T22381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1424.808607][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1424.817110][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1424.825553][T22381] bridge0: port 2(bridge_slave_1) entered blocking state [ 1424.832607][T22381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1424.860400][T22831] device veth0_vlan entered promiscuous mode [ 1424.873382][T22831] device veth1_macvtap entered promiscuous mode [ 1424.890440][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1424.898812][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1424.906724][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1424.915043][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1424.925825][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1424.934658][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1424.942976][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1424.952154][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1424.960640][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1424.968822][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1424.977414][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1424.985916][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1424.994609][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1425.006086][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1425.014786][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1425.022474][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1425.053872][T22890] device veth1_macvtap left promiscuous mode [ 1425.618421][T22902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1425.625566][T22902] bridge0: port 1(bridge_slave_0) entered disabled state [ 1425.633398][T22902] device bridge_slave_0 entered promiscuous mode [ 1425.640677][T22902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1425.648581][T22902] bridge0: port 2(bridge_slave_1) entered disabled state [ 1425.673657][T22902] device bridge_slave_1 entered promiscuous mode [ 1425.937108][T22902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1425.944196][T22902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1425.951508][T22902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1425.958528][T22902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1426.155287][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1426.188292][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1426.246173][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1426.345055][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1426.446515][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 1426.453637][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1426.658975][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1426.717355][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 1426.724461][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1426.902615][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1426.965264][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1427.041771][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1427.193113][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1427.324590][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1427.404776][T22902] device veth0_vlan entered promiscuous mode [ 1427.440519][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1427.458689][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1427.575511][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1427.583170][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1427.677649][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1427.773807][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1427.834584][T22902] device veth1_macvtap entered promiscuous mode [ 1427.902494][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1427.931525][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1427.974372][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1428.028868][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1428.130048][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1428.334353][ T399] device veth1_macvtap left promiscuous mode [ 1428.838176][T22978] device pim6reg1 entered promiscuous mode [ 1429.391342][T23001] FAULT_INJECTION: forcing a failure. [ 1429.391342][T23001] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.480923][T23001] CPU: 1 PID: 23001 Comm: syz.0.6324 Tainted: G W syzkaller #0 [ 1429.489890][T23001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1429.499944][T23001] Call Trace: [ 1429.503223][T23001] [ 1429.506152][T23001] __dump_stack+0x21/0x24 [ 1429.510486][T23001] dump_stack_lvl+0xee/0x150 [ 1429.515081][T23001] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1429.520106][T23001] dump_stack+0x15/0x24 [ 1429.524346][T23001] should_fail_ex+0x3d4/0x520 [ 1429.529024][T23001] __should_failslab+0xac/0xf0 [ 1429.533787][T23001] ? kvmalloc_node+0x294/0x480 [ 1429.538560][T23001] should_failslab+0x9/0x20 [ 1429.543070][T23001] __kmem_cache_alloc_node+0x3d/0x2c0 [ 1429.548454][T23001] ? kasan_save_alloc_info+0x25/0x30 [ 1429.553738][T23001] ? kvmalloc_node+0x294/0x480 [ 1429.558510][T23001] __kmalloc_node+0xa1/0x1e0 [ 1429.563111][T23001] kvmalloc_node+0x294/0x480 [ 1429.567704][T23001] ? __cfi_kvmalloc_node+0x10/0x10 [ 1429.572817][T23001] ? __kasan_record_aux_stack+0xb0/0xc0 [ 1429.578381][T23001] ? alloc_fdtable+0xb4/0x2b0 [ 1429.583061][T23001] ? kmalloc_trace+0x40/0xb0 [ 1429.587663][T23001] alloc_fdtable+0x167/0x2b0 [ 1429.592265][T23001] dup_fd+0x668/0x8f0 [ 1429.596265][T23001] ? __mutex_init+0xcd/0x1a0 [ 1429.600870][T23001] copy_files+0x76/0xe0 [ 1429.605044][T23001] copy_process+0x11ff/0x3420 [ 1429.609729][T23001] ? idle_dummy+0x10/0x10 [ 1429.614067][T23001] kernel_clone+0x23a/0x810 [ 1429.618573][T23001] ? __cfi_kernel_clone+0x10/0x10 [ 1429.623600][T23001] ? __kasan_check_write+0x14/0x20 [ 1429.628719][T23001] ? mutex_unlock+0x89/0x220 [ 1429.633327][T23001] __x64_sys_clone+0x168/0x1b0 [ 1429.638096][T23001] ? __cfi___x64_sys_clone+0x10/0x10 [ 1429.643387][T23001] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 1429.649465][T23001] x64_sys_call+0x990/0x9a0 [ 1429.653973][T23001] do_syscall_64+0x4c/0xa0 [ 1429.658407][T23001] ? clear_bhb_loop+0x30/0x80 [ 1429.663091][T23001] ? clear_bhb_loop+0x30/0x80 [ 1429.667768][T23001] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1429.673656][T23001] RIP: 0033:0x7fc48df8ebe9 [ 1429.678074][T23001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1429.697679][T23001] RSP: 002b:00007fc48edecfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1429.706120][T23001] RAX: ffffffffffffffda RBX: 00007fc48e1b5fa0 RCX: 00007fc48df8ebe9 [ 1429.714096][T23001] RDX: 00002000000001c0 RSI: 0000000000000000 RDI: 0000000040100000 [ 1429.722069][T23001] RBP: 00007fc48eded090 R08: 0000000000000000 R09: 0000000000000000 [ 1429.730037][T23001] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1429.738002][T23001] R13: 00007fc48e1b6038 R14: 00007fc48e1b5fa0 R15: 00007ffcf1350178 [ 1429.745980][T23001] [ 1431.839472][T23049] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 1431.856702][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 1431.857674][T23057] bond_slave_1: mtu less than device minimum [ 1433.210249][T23080] bridge0: port 1(bridge_slave_0) entered blocking state [ 1433.250175][T23080] bridge0: port 1(bridge_slave_0) entered disabled state [ 1433.257970][T23080] device bridge_slave_0 entered promiscuous mode [ 1433.282531][T23080] bridge0: port 2(bridge_slave_1) entered blocking state [ 1433.300881][T23080] bridge0: port 2(bridge_slave_1) entered disabled state [ 1433.308532][T23080] device bridge_slave_1 entered promiscuous mode [ 1433.866032][T11573] device bridge_slave_1 left promiscuous mode [ 1433.881397][T11573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1433.949235][T11573] device bridge_slave_0 left promiscuous mode [ 1434.008651][T11573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1434.086937][T11573] device veth0_vlan left promiscuous mode [ 1434.536186][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1434.544545][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1434.554701][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1434.563313][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1434.571694][T22381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1434.578720][T22381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1434.629858][T23127] device veth1_macvtap left promiscuous mode [ 1434.655067][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1434.671343][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1434.715193][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1434.748521][T22381] bridge0: port 2(bridge_slave_1) entered blocking state [ 1434.755609][T22381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1434.871420][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1434.958915][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1435.010698][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1435.057355][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1435.128588][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1435.149803][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1435.186691][T23080] device veth0_vlan entered promiscuous mode [ 1435.211715][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1435.225518][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1435.253547][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1435.277558][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1435.308922][T23080] device veth1_macvtap entered promiscuous mode [ 1435.342751][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1435.355370][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1435.428722][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1435.451808][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1435.476520][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1435.501512][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1435.571328][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 1435.587447][T23142] device pim6reg1 entered promiscuous mode [ 1435.830249][T23140] bridge0: port 1(bridge_slave_0) entered blocking state [ 1435.856871][T23140] bridge0: port 1(bridge_slave_0) entered disabled state [ 1435.864657][T23140] device bridge_slave_0 entered promiscuous mode [ 1435.895191][T23140] bridge0: port 2(bridge_slave_1) entered blocking state [ 1435.902458][T23140] bridge0: port 2(bridge_slave_1) entered disabled state [ 1435.909967][T23140] device bridge_slave_1 entered promiscuous mode [ 1436.032012][T23170] device syzkaller0 entered promiscuous mode [ 1436.116831][T23154] bridge0: port 1(bridge_slave_0) entered blocking state [ 1436.125254][T23154] bridge0: port 1(bridge_slave_0) entered disabled state [ 1436.142486][T23154] device bridge_slave_0 entered promiscuous mode [ 1436.180245][T23154] bridge0: port 2(bridge_slave_1) entered blocking state [ 1436.187528][T23154] bridge0: port 2(bridge_slave_1) entered disabled state [ 1436.195066][T23154] device bridge_slave_1 entered promiscuous mode [ 1436.515050][T23140] bridge0: port 2(bridge_slave_1) entered blocking state [ 1436.522119][T23140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1436.529383][T23140] bridge0: port 1(bridge_slave_0) entered blocking state [ 1436.536427][T23140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1436.616648][T22381] bridge0: port 1(bridge_slave_0) entered disabled state [ 1436.628827][T22381] bridge0: port 2(bridge_slave_1) entered disabled state [ 1436.845072][T11573] device bridge_slave_1 left promiscuous mode [ 1436.851795][T11573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1436.923238][T11573] device bridge_slave_0 left promiscuous mode [ 1437.061020][T11573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1437.269186][T11573] device veth1_macvtap left promiscuous mode [ 1437.674264][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1437.713681][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1437.818933][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1437.829199][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1437.838093][ T399] bridge0: port 1(bridge_slave_0) entered blocking state [ 1437.845153][ T399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1437.853277][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1437.861776][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1437.879352][ T399] bridge0: port 2(bridge_slave_1) entered blocking state [ 1437.886442][ T399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1438.051898][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1438.060203][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1438.068532][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1438.083026][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1438.130037][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1438.138894][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1438.155617][T23140] device veth0_vlan entered promiscuous mode [ 1438.169841][T23140] device veth1_macvtap entered promiscuous mode [ 1438.199558][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1438.209456][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1438.230643][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1438.302002][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1438.411186][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1438.433815][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1438.442429][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1438.451191][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1438.471505][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1438.479958][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1438.493759][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1438.642737][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1438.652589][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1438.660106][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1438.669252][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1438.741336][ T399] bridge0: port 1(bridge_slave_0) entered blocking state [ 1438.748395][ T399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1438.759408][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1438.778038][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1438.790723][ T399] bridge0: port 2(bridge_slave_1) entered blocking state [ 1438.797809][ T399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1438.883988][T23238] Â: renamed from pim6reg1 [ 1438.909646][T23244] device wg2 entered promiscuous mode [ 1438.922153][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1438.936101][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1438.956060][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1439.016230][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1439.098446][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1439.188741][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1439.267619][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1439.333171][T23154] device veth0_vlan entered promiscuous mode [ 1439.420618][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1439.453349][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1439.521176][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1439.528678][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1439.558805][T23154] device veth1_macvtap entered promiscuous mode [ 1439.572777][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1439.591575][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1439.599811][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1439.642723][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1439.652047][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1439.670685][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1439.751566][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1440.052398][T23250] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.059472][T23250] bridge0: port 1(bridge_slave_0) entered disabled state [ 1440.301681][T23250] device bridge_slave_0 entered promiscuous mode [ 1440.382747][T23250] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.389796][T23250] bridge0: port 2(bridge_slave_1) entered disabled state [ 1440.587678][T23250] device bridge_slave_1 entered promiscuous mode [ 1441.034930][T11573] device bridge_slave_1 left promiscuous mode [ 1441.063870][T11573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1441.092930][T11573] device bridge_slave_0 left promiscuous mode [ 1441.099080][T11573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1441.127609][T11573] device veth1_macvtap left promiscuous mode [ 1441.133768][T11573] device veth0_vlan left promiscuous mode [ 1441.854872][T23278] bridge0: port 1(bridge_slave_0) entered blocking state [ 1441.909403][T23278] bridge0: port 1(bridge_slave_0) entered disabled state [ 1441.983420][T23278] device bridge_slave_0 entered promiscuous mode [ 1442.043239][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1442.051856][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1442.115838][T23278] bridge0: port 2(bridge_slave_1) entered blocking state [ 1442.133734][T23278] bridge0: port 2(bridge_slave_1) entered disabled state [ 1442.154075][T23278] device bridge_slave_1 entered promiscuous mode [ 1442.232261][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1442.241264][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1442.249467][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 1442.256610][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1442.265114][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1442.273563][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1442.282040][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 1442.289076][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1442.303304][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1442.311642][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1442.352282][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1442.360375][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1442.368860][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1442.379868][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1442.388670][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1442.398780][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1442.406953][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1442.416214][T23250] device veth0_vlan entered promiscuous mode [ 1442.444946][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1442.461234][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1442.494124][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1442.533260][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1442.592587][T23250] device veth1_macvtap entered promiscuous mode [ 1442.656139][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1442.665202][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1442.681441][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1442.744003][T23312] device sit0 entered promiscuous mode [ 1442.757578][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1442.769597][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1443.269576][T11573] device bridge_slave_1 left promiscuous mode [ 1443.286182][T11573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1443.420270][T11573] device bridge_slave_0 left promiscuous mode [ 1443.462009][T11573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1443.533357][T11573] device bridge_slave_1 left promiscuous mode [ 1443.613504][T11573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1443.667556][T11573] device bridge_slave_0 left promiscuous mode [ 1443.679681][T11573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1443.745873][T11573] device veth1_macvtap left promiscuous mode [ 1443.754839][T11573] device veth0_vlan left promiscuous mode [ 1443.762836][T11573] device veth1_macvtap left promiscuous mode [ 1443.768952][T11573] device veth0_vlan left promiscuous mode [ 1443.934555][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1443.942052][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1443.954457][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1443.963049][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1443.971788][ T399] bridge0: port 1(bridge_slave_0) entered blocking state [ 1443.978861][ T399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1443.986350][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1443.994850][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1444.003251][ T399] bridge0: port 2(bridge_slave_1) entered blocking state [ 1444.010374][ T399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1444.031747][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1444.072506][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1444.087133][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1444.101884][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1444.111216][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1444.182493][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1444.191666][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1444.236186][T23278] device veth0_vlan entered promiscuous mode [ 1444.257931][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1444.271363][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1444.279509][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1444.287278][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1444.323191][T23326] bridge0: port 1(bridge_slave_0) entered blocking state [ 1444.330243][T23326] bridge0: port 1(bridge_slave_0) entered disabled state [ 1444.372186][T23326] device bridge_slave_0 entered promiscuous mode [ 1444.380528][T23326] bridge0: port 2(bridge_slave_1) entered blocking state [ 1444.397843][T23326] bridge0: port 2(bridge_slave_1) entered disabled state [ 1444.463013][T23326] device bridge_slave_1 entered promiscuous mode [ 1444.499044][T23278] device veth1_macvtap entered promiscuous mode [ 1444.602439][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1444.631488][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1444.640029][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1444.745065][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1444.759343][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1444.768512][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1444.782317][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1445.166155][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1445.174099][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1445.191480][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1445.200151][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1445.214385][T22381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1445.221458][T22381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1445.229704][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1445.238140][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1445.246810][T22381] bridge0: port 2(bridge_slave_1) entered blocking state [ 1445.253893][T22381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1445.261295][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1445.269298][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1445.277394][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1445.294051][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1445.302383][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1445.315505][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1445.323873][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1445.334977][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1445.343168][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1445.351210][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1445.358901][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1445.373941][T23326] device veth0_vlan entered promiscuous mode [ 1445.383765][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1445.392026][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1445.401188][T23326] device veth1_macvtap entered promiscuous mode [ 1445.409682][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1445.417340][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1445.425609][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1445.439835][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1445.448220][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1445.751626][T23378] bridge0: port 1(bridge_slave_0) entered blocking state [ 1445.758773][T23378] bridge0: port 1(bridge_slave_0) entered disabled state [ 1445.766625][T23378] device bridge_slave_0 entered promiscuous mode [ 1445.782036][T23378] bridge0: port 2(bridge_slave_1) entered blocking state [ 1445.789125][T23378] bridge0: port 2(bridge_slave_1) entered disabled state [ 1445.796613][T23378] device bridge_slave_1 entered promiscuous mode [ 1445.858215][T23378] bridge0: port 2(bridge_slave_1) entered blocking state [ 1445.865306][T23378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1445.872612][T23378] bridge0: port 1(bridge_slave_0) entered blocking state [ 1445.879652][T23378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1445.903765][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1445.911714][T22381] bridge0: port 1(bridge_slave_0) entered disabled state [ 1445.919016][T22381] bridge0: port 2(bridge_slave_1) entered disabled state [ 1445.937150][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1445.945529][T22381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1445.952583][T22381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1445.960017][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1445.968915][T22381] bridge0: port 2(bridge_slave_1) entered blocking state [ 1445.976057][T22381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1445.986171][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1445.994875][T11573] device bridge_slave_1 left promiscuous mode [ 1446.001130][T11573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1446.008482][T11573] device bridge_slave_0 left promiscuous mode [ 1446.014919][T11573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1446.022893][T11573] device bridge_slave_1 left promiscuous mode [ 1446.029002][T11573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1446.036627][T11573] device bridge_slave_0 left promiscuous mode [ 1446.042819][T11573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1446.050735][T11573] device veth1_macvtap left promiscuous mode [ 1446.056820][T11573] device veth0_vlan left promiscuous mode [ 1446.062846][T11573] device veth1_macvtap left promiscuous mode [ 1446.068883][T11573] device veth0_vlan left promiscuous mode [ 1446.349396][T23378] device veth0_vlan entered promiscuous mode [ 1446.359232][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1446.368200][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1446.376269][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1446.383957][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1446.391736][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1446.425895][T23378] device veth1_macvtap entered promiscuous mode [ 1446.471986][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1446.482605][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1446.491986][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1446.499772][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1446.508501][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1446.516965][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1446.525592][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1446.792053][T23408] device veth1_macvtap left promiscuous mode [ 1446.873659][T23397] bridge0: port 1(bridge_slave_0) entered blocking state [ 1446.880755][T23397] bridge0: port 1(bridge_slave_0) entered disabled state [ 1446.888272][T23397] device bridge_slave_0 entered promiscuous mode [ 1446.896983][T23397] bridge0: port 2(bridge_slave_1) entered blocking state [ 1446.906280][T23397] bridge0: port 2(bridge_slave_1) entered disabled state [ 1446.914153][T23397] device bridge_slave_1 entered promiscuous mode [ 1447.010810][T23397] bridge0: port 2(bridge_slave_1) entered blocking state [ 1447.017883][T23397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1447.025169][T23397] bridge0: port 1(bridge_slave_0) entered blocking state [ 1447.032212][T23397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1447.060283][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1447.067978][T22381] bridge0: port 1(bridge_slave_0) entered disabled state [ 1447.075487][T22381] bridge0: port 2(bridge_slave_1) entered disabled state [ 1447.084886][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1447.093226][T22381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1447.100255][T22381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1447.108802][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1447.117216][T22381] bridge0: port 2(bridge_slave_1) entered blocking state [ 1447.124267][T22381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1447.135737][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1447.145155][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1447.158296][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1447.169365][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1447.177626][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1447.185347][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1447.193604][T23397] device veth0_vlan entered promiscuous mode [ 1447.203828][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1447.212933][T23397] device veth1_macvtap entered promiscuous mode [ 1447.222583][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1447.232714][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1447.353401][T23431] FAULT_INJECTION: forcing a failure. [ 1447.353401][T23431] name failslab, interval 1, probability 0, space 0, times 0 [ 1447.366205][T23431] CPU: 0 PID: 23431 Comm: syz.0.6442 Tainted: G W syzkaller #0 [ 1447.375149][T23431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1447.385198][T23431] Call Trace: [ 1447.388466][T23431] [ 1447.391382][T23431] __dump_stack+0x21/0x24 [ 1447.395712][T23431] dump_stack_lvl+0xee/0x150 [ 1447.400296][T23431] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1447.405311][T23431] dump_stack+0x15/0x24 [ 1447.409456][T23431] should_fail_ex+0x3d4/0x520 [ 1447.414124][T23431] ? skb_clone+0x1f5/0x380 [ 1447.418532][T23431] __should_failslab+0xac/0xf0 [ 1447.423286][T23431] should_failslab+0x9/0x20 [ 1447.427779][T23431] kmem_cache_alloc+0x3b/0x330 [ 1447.432534][T23431] ? arch_stack_walk+0xfc/0x150 [ 1447.437379][T23431] skb_clone+0x1f5/0x380 [ 1447.441618][T23431] bpf_clone_redirect+0xa7/0x3c0 [ 1447.446549][T23431] ? __stack_depot_save+0x36/0x480 [ 1447.451650][T23431] bpf_prog_208b094576c80b22+0x56/0x5b [ 1447.457096][T23431] ? kasan_set_track+0x60/0x70 [ 1447.461847][T23431] ? kasan_set_track+0x4b/0x70 [ 1447.466599][T23431] ? kasan_save_alloc_info+0x25/0x30 [ 1447.471881][T23431] ? __kasan_slab_alloc+0x72/0x80 [ 1447.476896][T23431] ? slab_post_alloc_hook+0x4f/0x2d0 [ 1447.482168][T23431] ? kmem_cache_alloc+0x16e/0x330 [ 1447.487184][T23431] ? build_skb+0x2a/0x220 [ 1447.491507][T23431] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 1447.497041][T23431] ? bpf_prog_test_run+0x3e3/0x630 [ 1447.502142][T23431] ? __sys_bpf+0x56d/0x780 [ 1447.506542][T23431] ? __x64_sys_bpf+0x7c/0x90 [ 1447.511121][T23431] ? x64_sys_call+0x488/0x9a0 [ 1447.515786][T23431] ? do_syscall_64+0x4c/0xa0 [ 1447.520367][T23431] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1447.526429][T23431] ? ktime_get+0x141/0x170 [ 1447.530832][T23431] bpf_test_run+0x349/0x8d0 [ 1447.535332][T23431] ? convert___skb_to_skb+0x5b0/0x5b0 [ 1447.540692][T23431] ? __cfi_eth_type_trans+0x10/0x10 [ 1447.545879][T23431] ? convert___skb_to_skb+0x40/0x5b0 [ 1447.551161][T23431] bpf_prog_test_run_skb+0xaec/0x1290 [ 1447.556542][T23431] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 1447.562357][T23431] bpf_prog_test_run+0x3e3/0x630 [ 1447.567287][T23431] ? slab_free_freelist_hook+0xc2/0x190 [ 1447.572823][T23431] ? bpf_prog_query+0x270/0x270 [ 1447.577661][T23431] ? selinux_bpf+0xce/0xf0 [ 1447.582068][T23431] ? security_bpf+0x93/0xb0 [ 1447.586579][T23431] __sys_bpf+0x56d/0x780 [ 1447.590817][T23431] ? bpf_link_show_fdinfo+0x320/0x320 [ 1447.596177][T23431] ? __cfi_ksys_write+0x10/0x10 [ 1447.601026][T23431] ? debug_smp_processor_id+0x17/0x20 [ 1447.606385][T23431] __x64_sys_bpf+0x7c/0x90 [ 1447.610793][T23431] x64_sys_call+0x488/0x9a0 [ 1447.615284][T23431] do_syscall_64+0x4c/0xa0 [ 1447.619690][T23431] ? clear_bhb_loop+0x30/0x80 [ 1447.624525][T23431] ? clear_bhb_loop+0x30/0x80 [ 1447.629187][T23431] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1447.635066][T23431] RIP: 0033:0x7fc48df8ebe9 [ 1447.639467][T23431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1447.659243][T23431] RSP: 002b:00007fc48eded038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1447.667648][T23431] RAX: ffffffffffffffda RBX: 00007fc48e1b5fa0 RCX: 00007fc48df8ebe9 [ 1447.675609][T23431] RDX: 000000000000001e RSI: 0000200000000080 RDI: 000000000000000a [ 1447.683743][T23431] RBP: 00007fc48eded090 R08: 0000000000000000 R09: 0000000000000000 [ 1447.691704][T23431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1447.699662][T23431] R13: 00007fc48e1b6038 R14: 00007fc48e1b5fa0 R15: 00007ffcf1350178 [ 1447.707977][T23431] [ 1447.877525][T23438] bridge0: port 1(bridge_slave_0) entered blocking state [ 1447.884623][T23438] bridge0: port 1(bridge_slave_0) entered disabled state [ 1447.892171][T23438] device bridge_slave_0 entered promiscuous mode [ 1447.901359][T23438] bridge0: port 2(bridge_slave_1) entered blocking state [ 1447.908374][T23438] bridge0: port 2(bridge_slave_1) entered disabled state [ 1447.915889][T23438] device bridge_slave_1 entered promiscuous mode [ 1447.965925][T23438] bridge0: port 2(bridge_slave_1) entered blocking state [ 1447.972977][T23438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1447.980196][T23438] bridge0: port 1(bridge_slave_0) entered blocking state [ 1447.987222][T23438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1448.004658][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1448.012279][T22381] bridge0: port 1(bridge_slave_0) entered disabled state [ 1448.019528][T22381] bridge0: port 2(bridge_slave_1) entered disabled state [ 1448.029330][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1448.037559][T22381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1448.044627][T22381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1448.054327][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1448.062587][T22381] bridge0: port 2(bridge_slave_1) entered blocking state [ 1448.069595][T22381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1448.084991][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1448.094360][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1448.107880][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1448.118770][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1448.126943][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1448.134578][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1448.146890][T23438] device veth0_vlan entered promiscuous mode [ 1448.157185][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1448.166308][T23438] device veth1_macvtap entered promiscuous mode [ 1448.175493][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1448.189965][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1448.302102][T11573] device bridge_slave_1 left promiscuous mode [ 1448.308264][T11573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1448.315651][T23451] FAULT_INJECTION: forcing a failure. [ 1448.315651][T23451] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1448.330438][T11573] device bridge_slave_0 left promiscuous mode [ 1448.337458][T11573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1448.345779][T23451] CPU: 1 PID: 23451 Comm: syz.1.6435 Tainted: G W syzkaller #0 [ 1448.354728][T23451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1448.364797][T23451] Call Trace: [ 1448.368076][T23451] [ 1448.371001][T23451] __dump_stack+0x21/0x24 [ 1448.375341][T23451] dump_stack_lvl+0xee/0x150 [ 1448.379946][T23451] ? __cfi_dump_stack_lvl+0x8/0x8 [ 1448.384985][T23451] ? memcpy+0x56/0x70 [ 1448.388983][T23451] dump_stack+0x15/0x24 [ 1448.393142][T23451] should_fail_ex+0x3d4/0x520 [ 1448.397823][T23451] should_fail+0xb/0x10 [ 1448.401978][T23451] should_fail_usercopy+0x1a/0x20 [ 1448.407083][T23451] strncpy_from_user+0x24/0x2d0 [ 1448.411921][T23451] bpf_prog_load+0x1bb/0x15a0 [ 1448.416588][T23451] ? map_freeze+0x390/0x390 [ 1448.421076][T23451] ? selinux_bpf+0xc7/0xf0 [ 1448.425481][T23451] ? security_bpf+0x93/0xb0 [ 1448.429969][T23451] __sys_bpf+0x504/0x780 [ 1448.434192][T23451] ? bpf_link_show_fdinfo+0x320/0x320 [ 1448.439549][T23451] ? __cfi_ksys_write+0x10/0x10 [ 1448.444491][T23451] ? do_user_addr_fault+0x9ac/0x1050 [ 1448.449925][T23451] ? debug_smp_processor_id+0x17/0x20 [ 1448.455299][T23451] __x64_sys_bpf+0x7c/0x90 [ 1448.459735][T23451] x64_sys_call+0x488/0x9a0 [ 1448.464229][T23451] do_syscall_64+0x4c/0xa0 [ 1448.468644][T23451] ? clear_bhb_loop+0x30/0x80 [ 1448.473305][T23451] ? clear_bhb_loop+0x30/0x80 [ 1448.478054][T23451] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1448.483936][T23451] RIP: 0033:0x7f1de9f8ebe9 [ 1448.488337][T23451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1448.507925][T23451] RSP: 002b:00007f1deadce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1448.516326][T23451] RAX: ffffffffffffffda RBX: 00007f1dea1b5fa0 RCX: 00007f1de9f8ebe9 [ 1448.524308][T23451] RDX: 0000000000000094 RSI: 0000200000000140 RDI: 0000000000000005 [ 1448.532268][T23451] RBP: 00007f1deadce090 R08: 0000000000000000 R09: 0000000000000000 [ 1448.540224][T23451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1448.548185][T23451] R13: 00007f1dea1b6038 R14: 00007f1dea1b5fa0 R15: 00007ffd68b500b8 [ 1448.556145][T23451] [ 1448.560672][T11573] device bridge_slave_1 left promiscuous mode [ 1448.567107][T11573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1448.592895][T11573] device bridge_slave_0 left promiscuous mode [ 1448.599059][T11573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1448.607947][T11573] device veth1_macvtap left promiscuous mode [ 1448.614221][T11573] device veth0_vlan left promiscuous mode [ 1448.620331][T11573] device veth1_macvtap left promiscuous mode [ 1448.626626][T11573] device veth0_vlan left promiscuous mode [ 1448.815959][T23455] bridge0: port 1(bridge_slave_0) entered blocking state [ 1448.823110][T23455] bridge0: port 1(bridge_slave_0) entered disabled state [ 1448.830560][T23455] device bridge_slave_0 entered promiscuous mode [ 1448.838419][T23455] bridge0: port 2(bridge_slave_1) entered blocking state [ 1448.845814][T23455] bridge0: port 2(bridge_slave_1) entered disabled state [ 1448.853140][T23455] device bridge_slave_1 entered promiscuous mode [ 1448.894017][T23455] bridge0: port 2(bridge_slave_1) entered blocking state [ 1448.901094][T23455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1448.908364][T23455] bridge0: port 1(bridge_slave_0) entered blocking state [ 1448.915436][T23455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1449.055283][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1449.085070][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1449.125241][ T4625] bridge0: port 2(bridge_slave_1) entered disabled state [ 1449.251568][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1449.259999][ T4625] bridge0: port 2(bridge_slave_1) entered blocking state [ 1449.267057][ T4625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1449.275065][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1449.361962][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1449.474097][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1449.503751][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1449.546760][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1449.595908][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1449.615865][T23455] device veth0_vlan entered promiscuous mode [ 1449.714732][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1449.751575][T23455] device veth1_macvtap entered promiscuous mode [ 1449.810506][T23477] bridge0: port 1(bridge_slave_0) entered blocking state [ 1449.831140][T23477] bridge0: port 1(bridge_slave_0) entered disabled state [ 1449.838658][T23477] device bridge_slave_0 entered promiscuous mode [ 1449.845700][T23477] bridge0: port 2(bridge_slave_1) entered blocking state [ 1449.852808][T23477] bridge0: port 2(bridge_slave_1) entered disabled state [ 1449.860277][T23477] device bridge_slave_1 entered promiscuous mode [ 1449.870953][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1449.879290][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1449.913578][ T28] audit: type=1400 audit(1755745778.836:151): avc: denied { create } for pid=23494 comm="syz.1.6446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1449.988644][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1450.038211][ T4625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1450.795812][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1450.811523][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1450.840322][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1450.851153][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1450.871135][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 1450.878191][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1450.885834][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1450.894266][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1450.908587][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 1450.915658][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1450.931001][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1450.945534][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1450.971389][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1450.983436][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1450.998286][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1451.012816][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1451.026182][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1451.039550][T23477] device veth0_vlan entered promiscuous mode [ 1451.051747][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1451.059476][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1451.074816][T23477] device veth1_macvtap entered promiscuous mode [ 1451.095242][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1451.106574][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1451.119343][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1451.135164][T11573] device bridge_slave_1 left promiscuous mode [ 1451.141805][T11573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1451.155900][T11573] device bridge_slave_0 left promiscuous mode [ 1451.165624][T11573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1451.178882][T11573] device bridge_slave_1 left promiscuous mode [ 1451.189808][T11573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1451.201442][T11573] device bridge_slave_0 left promiscuous mode [ 1451.207609][T11573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1451.226109][T11573] device veth1_macvtap left promiscuous mode [ 1451.232245][T11573] device veth0_vlan left promiscuous mode [ 1451.238323][T11573] device veth1_macvtap left promiscuous mode [ 1451.270941][T11573] device veth0_vlan left promiscuous mode [ 1451.475603][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1451.486030][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1451.494596][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1451.502937][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1451.540106][T23540] bond_slave_1: mtu less than device minimum [ 1451.584814][T23537] bridge0: port 1(bridge_slave_0) entered blocking state [ 1451.592028][T23537] bridge0: port 1(bridge_slave_0) entered disabled state [ 1451.603751][T23537] device bridge_slave_0 entered promiscuous mode [ 1451.612461][T23537] bridge0: port 2(bridge_slave_1) entered blocking state [ 1451.619505][T23537] bridge0: port 2(bridge_slave_1) entered disabled state [ 1451.641327][T23537] device bridge_slave_1 entered promiscuous mode [ 1451.965892][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1451.981188][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1452.010964][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1452.019638][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1452.041470][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 1452.048545][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1452.080331][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1452.088796][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1452.105731][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 1452.113006][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1452.136533][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1452.152268][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1452.169025][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1452.185843][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1452.212312][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1452.228793][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1452.238850][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1452.249061][T23537] device veth0_vlan entered promiscuous mode [ 1452.300357][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1452.309759][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1452.319191][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1452.326935][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1452.398256][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1452.406523][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1452.430317][T23537] device veth1_macvtap entered promiscuous mode [ 1452.474286][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready