last executing test programs: 24.176637487s ago: executing program 3 (id=1178): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000040)='./file0\x00', 0x1, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x80220, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x411, 0x1, 0xb, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000faffffff0000000000000000850000002c00000085000000080000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r1, 0x0, 0x45, 0x31, &(0x7f0000000280)="fe413428b972794c6119d502c3c762494951515aa90546db2d4bd311ae31e389c9acd1e75446ed04831ccd63e13295518baeb8a055d2a53bcafbb451cd638ba44003678ae6", &(0x7f0000000340)=""/49, 0xfffffffb, 0x0, 0x3a, 0x7d, &(0x7f0000000380)="2fada1685e2e8e2d500144fc6652631499066b16e0c84c9d1cdf9a5e0adb37a8461eeeca038d7bca8ee719e4df345d22df6588ba52d9dd0c3784", &(0x7f0000000440)="659e304cea76a1f8a1ca810c1205a7aeed5ba3eacd0594304e7ca29fb3afdb65df3b8568131c81ff205045bd6d15928bcf3013799c0c5757e64c622fb67e61a595cfb3b645d02e767d85ec7345a0563c1ba186112d5f46ad352a569f92a8eae3d10c4684c23f1d985a359baef0bb78e3dc51604858e9e160c50252aa6d", 0x0, 0x0, 0x4}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x891e, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x13\xec\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@typedef={0x8}]}, {0x0, [0x0, 0x30, 0x0, 0x2e, 0x61, 0x5f, 0x2e]}}, &(0x7f00000007c0)=""/73, 0x2d, 0x49, 0x1, 0x5, 0x10000}, 0x28) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf1e, 0x0, 0x0, 0x0, 0x3ff}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}}]}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0xbd, &(0x7f0000000700)=""/189, 0x41000, 0x8, '\x00', 0x0, 0x1c, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb280, r1, 0x6, &(0x7f0000000840)=[r6, r3], &(0x7f0000000880)=[{0x2, 0x1, 0x6, 0x7}, {0x2, 0x2, 0x5}, {0x1, 0x4, 0x8, 0x7}, {0x4, 0x4, 0x2, 0x9}, {0x1, 0x5, 0x7, 0x1}, {0x4, 0x2, 0x3, 0xb}], 0x10, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001200)={r1, 0xe0, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000c40)=[0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x38, &(0x7f0000001000)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001040), &(0x7f0000001080), 0x8, 0x5f, 0x8, 0x8, &(0x7f00000010c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r1, 0xe0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f00000012c0)=[0x0], &(0x7f0000001300)=[0x0, 0x0, 0x0], 0x0, 0x70, &(0x7f0000001340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001380), &(0x7f00000013c0), 0x8, 0x9c, 0x8, 0x8, &(0x7f0000001400)}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001740)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@ptr={0xb, 0x0, 0x0, 0x2, 0x4}, @var={0x3, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x30, 0x30, 0x0, 0x5f, 0x2e]}}, &(0x7f0000001700)=""/55, 0x3b, 0x37, 0x0, 0xffff, 0x10000, @value=r6}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001600)=@bpf_lsm={0x1d, 0xe, &(0x7f00000009c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @exit, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0x9, 0x1, 0x0, r6}, @map_fd={0x18, 0x4, 0x1, 0x0, r6}, @generic={0x3, 0x4, 0x0, 0x23, 0x6}], &(0x7f0000000300)='GPL\x00', 0x4, 0xe1, &(0x7f0000000b00)=""/225, 0x41000, 0x72, '\x00', r7, 0x1b, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001240)={0x3, 0x2, 0x4, 0x3}, 0x10, r8, 0x0, 0x1, &(0x7f0000001580)=[r6, r6, r6], &(0x7f00000015c0)=[{0x0, 0x5, 0xd, 0x9}], 0x10, 0x7}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x8e, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x3, 0x1ff, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 18.528347725s ago: executing program 3 (id=1178): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000040)='./file0\x00', 0x1, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x80220, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x411, 0x1, 0xb, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000faffffff0000000000000000850000002c00000085000000080000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r1, 0x0, 0x45, 0x31, &(0x7f0000000280)="fe413428b972794c6119d502c3c762494951515aa90546db2d4bd311ae31e389c9acd1e75446ed04831ccd63e13295518baeb8a055d2a53bcafbb451cd638ba44003678ae6", &(0x7f0000000340)=""/49, 0xfffffffb, 0x0, 0x3a, 0x7d, &(0x7f0000000380)="2fada1685e2e8e2d500144fc6652631499066b16e0c84c9d1cdf9a5e0adb37a8461eeeca038d7bca8ee719e4df345d22df6588ba52d9dd0c3784", &(0x7f0000000440)="659e304cea76a1f8a1ca810c1205a7aeed5ba3eacd0594304e7ca29fb3afdb65df3b8568131c81ff205045bd6d15928bcf3013799c0c5757e64c622fb67e61a595cfb3b645d02e767d85ec7345a0563c1ba186112d5f46ad352a569f92a8eae3d10c4684c23f1d985a359baef0bb78e3dc51604858e9e160c50252aa6d", 0x0, 0x0, 0x4}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x891e, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x13\xec\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@typedef={0x8}]}, {0x0, [0x0, 0x30, 0x0, 0x2e, 0x61, 0x5f, 0x2e]}}, &(0x7f00000007c0)=""/73, 0x2d, 0x49, 0x1, 0x5, 0x10000}, 0x28) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf1e, 0x0, 0x0, 0x0, 0x3ff}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}}]}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0xbd, &(0x7f0000000700)=""/189, 0x41000, 0x8, '\x00', 0x0, 0x1c, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb280, r1, 0x6, &(0x7f0000000840)=[r6, r3], &(0x7f0000000880)=[{0x2, 0x1, 0x6, 0x7}, {0x2, 0x2, 0x5}, {0x1, 0x4, 0x8, 0x7}, {0x4, 0x4, 0x2, 0x9}, {0x1, 0x5, 0x7, 0x1}, {0x4, 0x2, 0x3, 0xb}], 0x10, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001200)={r1, 0xe0, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000c40)=[0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x38, &(0x7f0000001000)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001040), &(0x7f0000001080), 0x8, 0x5f, 0x8, 0x8, &(0x7f00000010c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r1, 0xe0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f00000012c0)=[0x0], &(0x7f0000001300)=[0x0, 0x0, 0x0], 0x0, 0x70, &(0x7f0000001340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001380), &(0x7f00000013c0), 0x8, 0x9c, 0x8, 0x8, &(0x7f0000001400)}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001740)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@ptr={0xb, 0x0, 0x0, 0x2, 0x4}, @var={0x3, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x30, 0x30, 0x0, 0x5f, 0x2e]}}, &(0x7f0000001700)=""/55, 0x3b, 0x37, 0x0, 0xffff, 0x10000, @value=r6}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001600)=@bpf_lsm={0x1d, 0xe, &(0x7f00000009c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @exit, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0x9, 0x1, 0x0, r6}, @map_fd={0x18, 0x4, 0x1, 0x0, r6}, @generic={0x3, 0x4, 0x0, 0x23, 0x6}], &(0x7f0000000300)='GPL\x00', 0x4, 0xe1, &(0x7f0000000b00)=""/225, 0x41000, 0x72, '\x00', r7, 0x1b, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001240)={0x3, 0x2, 0x4, 0x3}, 0x10, r8, 0x0, 0x1, &(0x7f0000001580)=[r6, r6, r6], &(0x7f00000015c0)=[{0x0, 0x5, 0xd, 0x9}], 0x10, 0x7}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x8e, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x3, 0x1ff, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 13.985749523s ago: executing program 3 (id=1178): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000040)='./file0\x00', 0x1, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x80220, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x411, 0x1, 0xb, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000faffffff0000000000000000850000002c00000085000000080000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r1, 0x0, 0x45, 0x31, &(0x7f0000000280)="fe413428b972794c6119d502c3c762494951515aa90546db2d4bd311ae31e389c9acd1e75446ed04831ccd63e13295518baeb8a055d2a53bcafbb451cd638ba44003678ae6", &(0x7f0000000340)=""/49, 0xfffffffb, 0x0, 0x3a, 0x7d, &(0x7f0000000380)="2fada1685e2e8e2d500144fc6652631499066b16e0c84c9d1cdf9a5e0adb37a8461eeeca038d7bca8ee719e4df345d22df6588ba52d9dd0c3784", &(0x7f0000000440)="659e304cea76a1f8a1ca810c1205a7aeed5ba3eacd0594304e7ca29fb3afdb65df3b8568131c81ff205045bd6d15928bcf3013799c0c5757e64c622fb67e61a595cfb3b645d02e767d85ec7345a0563c1ba186112d5f46ad352a569f92a8eae3d10c4684c23f1d985a359baef0bb78e3dc51604858e9e160c50252aa6d", 0x0, 0x0, 0x4}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x891e, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x13\xec\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@typedef={0x8}]}, {0x0, [0x0, 0x30, 0x0, 0x2e, 0x61, 0x5f, 0x2e]}}, &(0x7f00000007c0)=""/73, 0x2d, 0x49, 0x1, 0x5, 0x10000}, 0x28) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf1e, 0x0, 0x0, 0x0, 0x3ff}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}}]}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0xbd, &(0x7f0000000700)=""/189, 0x41000, 0x8, '\x00', 0x0, 0x1c, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb280, r1, 0x6, &(0x7f0000000840)=[r6, r3], &(0x7f0000000880)=[{0x2, 0x1, 0x6, 0x7}, {0x2, 0x2, 0x5}, {0x1, 0x4, 0x8, 0x7}, {0x4, 0x4, 0x2, 0x9}, {0x1, 0x5, 0x7, 0x1}, {0x4, 0x2, 0x3, 0xb}], 0x10, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001200)={r1, 0xe0, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000c40)=[0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x38, &(0x7f0000001000)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001040), &(0x7f0000001080), 0x8, 0x5f, 0x8, 0x8, &(0x7f00000010c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r1, 0xe0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f00000012c0)=[0x0], &(0x7f0000001300)=[0x0, 0x0, 0x0], 0x0, 0x70, &(0x7f0000001340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001380), &(0x7f00000013c0), 0x8, 0x9c, 0x8, 0x8, &(0x7f0000001400)}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001740)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@ptr={0xb, 0x0, 0x0, 0x2, 0x4}, @var={0x3, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x30, 0x30, 0x0, 0x5f, 0x2e]}}, &(0x7f0000001700)=""/55, 0x3b, 0x37, 0x0, 0xffff, 0x10000, @value=r6}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001600)=@bpf_lsm={0x1d, 0xe, &(0x7f00000009c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @exit, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0x9, 0x1, 0x0, r6}, @map_fd={0x18, 0x4, 0x1, 0x0, r6}, @generic={0x3, 0x4, 0x0, 0x23, 0x6}], &(0x7f0000000300)='GPL\x00', 0x4, 0xe1, &(0x7f0000000b00)=""/225, 0x41000, 0x72, '\x00', r7, 0x1b, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001240)={0x3, 0x2, 0x4, 0x3}, 0x10, r8, 0x0, 0x1, &(0x7f0000001580)=[r6, r6, r6], &(0x7f00000015c0)=[{0x0, 0x5, 0xd, 0x9}], 0x10, 0x7}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x8e, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x3, 0x1ff, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 9.867530111s ago: executing program 3 (id=1178): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000040)='./file0\x00', 0x1, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x80220, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x411, 0x1, 0xb, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000faffffff0000000000000000850000002c00000085000000080000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r1, 0x0, 0x45, 0x31, &(0x7f0000000280)="fe413428b972794c6119d502c3c762494951515aa90546db2d4bd311ae31e389c9acd1e75446ed04831ccd63e13295518baeb8a055d2a53bcafbb451cd638ba44003678ae6", &(0x7f0000000340)=""/49, 0xfffffffb, 0x0, 0x3a, 0x7d, &(0x7f0000000380)="2fada1685e2e8e2d500144fc6652631499066b16e0c84c9d1cdf9a5e0adb37a8461eeeca038d7bca8ee719e4df345d22df6588ba52d9dd0c3784", &(0x7f0000000440)="659e304cea76a1f8a1ca810c1205a7aeed5ba3eacd0594304e7ca29fb3afdb65df3b8568131c81ff205045bd6d15928bcf3013799c0c5757e64c622fb67e61a595cfb3b645d02e767d85ec7345a0563c1ba186112d5f46ad352a569f92a8eae3d10c4684c23f1d985a359baef0bb78e3dc51604858e9e160c50252aa6d", 0x0, 0x0, 0x4}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x891e, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x13\xec\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@typedef={0x8}]}, {0x0, [0x0, 0x30, 0x0, 0x2e, 0x61, 0x5f, 0x2e]}}, &(0x7f00000007c0)=""/73, 0x2d, 0x49, 0x1, 0x5, 0x10000}, 0x28) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf1e, 0x0, 0x0, 0x0, 0x3ff}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}}]}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0xbd, &(0x7f0000000700)=""/189, 0x41000, 0x8, '\x00', 0x0, 0x1c, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb280, r1, 0x6, &(0x7f0000000840)=[r6, r3], &(0x7f0000000880)=[{0x2, 0x1, 0x6, 0x7}, {0x2, 0x2, 0x5}, {0x1, 0x4, 0x8, 0x7}, {0x4, 0x4, 0x2, 0x9}, {0x1, 0x5, 0x7, 0x1}, {0x4, 0x2, 0x3, 0xb}], 0x10, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001200)={r1, 0xe0, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000c40)=[0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x38, &(0x7f0000001000)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001040), &(0x7f0000001080), 0x8, 0x5f, 0x8, 0x8, &(0x7f00000010c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r1, 0xe0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f00000012c0)=[0x0], &(0x7f0000001300)=[0x0, 0x0, 0x0], 0x0, 0x70, &(0x7f0000001340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001380), &(0x7f00000013c0), 0x8, 0x9c, 0x8, 0x8, &(0x7f0000001400)}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001740)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@ptr={0xb, 0x0, 0x0, 0x2, 0x4}, @var={0x3, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x30, 0x30, 0x0, 0x5f, 0x2e]}}, &(0x7f0000001700)=""/55, 0x3b, 0x37, 0x0, 0xffff, 0x10000, @value=r6}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001600)=@bpf_lsm={0x1d, 0xe, &(0x7f00000009c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @exit, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0x9, 0x1, 0x0, r6}, @map_fd={0x18, 0x4, 0x1, 0x0, r6}, @generic={0x3, 0x4, 0x0, 0x23, 0x6}], &(0x7f0000000300)='GPL\x00', 0x4, 0xe1, &(0x7f0000000b00)=""/225, 0x41000, 0x72, '\x00', r7, 0x1b, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001240)={0x3, 0x2, 0x4, 0x3}, 0x10, r8, 0x0, 0x1, &(0x7f0000001580)=[r6, r6, r6], &(0x7f00000015c0)=[{0x0, 0x5, 0xd, 0x9}], 0x10, 0x7}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x8e, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x3, 0x1ff, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 5.376187118s ago: executing program 3 (id=1178): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000040)='./file0\x00', 0x1, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x80220, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x411, 0x1, 0xb, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000faffffff0000000000000000850000002c00000085000000080000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r1, 0x0, 0x45, 0x31, &(0x7f0000000280)="fe413428b972794c6119d502c3c762494951515aa90546db2d4bd311ae31e389c9acd1e75446ed04831ccd63e13295518baeb8a055d2a53bcafbb451cd638ba44003678ae6", &(0x7f0000000340)=""/49, 0xfffffffb, 0x0, 0x3a, 0x7d, &(0x7f0000000380)="2fada1685e2e8e2d500144fc6652631499066b16e0c84c9d1cdf9a5e0adb37a8461eeeca038d7bca8ee719e4df345d22df6588ba52d9dd0c3784", &(0x7f0000000440)="659e304cea76a1f8a1ca810c1205a7aeed5ba3eacd0594304e7ca29fb3afdb65df3b8568131c81ff205045bd6d15928bcf3013799c0c5757e64c622fb67e61a595cfb3b645d02e767d85ec7345a0563c1ba186112d5f46ad352a569f92a8eae3d10c4684c23f1d985a359baef0bb78e3dc51604858e9e160c50252aa6d", 0x0, 0x0, 0x4}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x891e, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x13\xec\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@typedef={0x8}]}, {0x0, [0x0, 0x30, 0x0, 0x2e, 0x61, 0x5f, 0x2e]}}, &(0x7f00000007c0)=""/73, 0x2d, 0x49, 0x1, 0x5, 0x10000}, 0x28) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf1e, 0x0, 0x0, 0x0, 0x3ff}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}}]}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0xbd, &(0x7f0000000700)=""/189, 0x41000, 0x8, '\x00', 0x0, 0x1c, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb280, r1, 0x6, &(0x7f0000000840)=[r6, r3], &(0x7f0000000880)=[{0x2, 0x1, 0x6, 0x7}, {0x2, 0x2, 0x5}, {0x1, 0x4, 0x8, 0x7}, {0x4, 0x4, 0x2, 0x9}, {0x1, 0x5, 0x7, 0x1}, {0x4, 0x2, 0x3, 0xb}], 0x10, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001200)={r1, 0xe0, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000c40)=[0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x38, &(0x7f0000001000)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001040), &(0x7f0000001080), 0x8, 0x5f, 0x8, 0x8, &(0x7f00000010c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r1, 0xe0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f00000012c0)=[0x0], &(0x7f0000001300)=[0x0, 0x0, 0x0], 0x0, 0x70, &(0x7f0000001340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001380), &(0x7f00000013c0), 0x8, 0x9c, 0x8, 0x8, &(0x7f0000001400)}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001740)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@ptr={0xb, 0x0, 0x0, 0x2, 0x4}, @var={0x3, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x30, 0x30, 0x0, 0x5f, 0x2e]}}, &(0x7f0000001700)=""/55, 0x3b, 0x37, 0x0, 0xffff, 0x10000, @value=r6}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001600)=@bpf_lsm={0x1d, 0xe, &(0x7f00000009c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @exit, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0x9, 0x1, 0x0, r6}, @map_fd={0x18, 0x4, 0x1, 0x0, r6}, @generic={0x3, 0x4, 0x0, 0x23, 0x6}], &(0x7f0000000300)='GPL\x00', 0x4, 0xe1, &(0x7f0000000b00)=""/225, 0x41000, 0x72, '\x00', r7, 0x1b, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001240)={0x3, 0x2, 0x4, 0x3}, 0x10, r8, 0x0, 0x1, &(0x7f0000001580)=[r6, r6, r6], &(0x7f00000015c0)=[{0x0, 0x5, 0xd, 0x9}], 0x10, 0x7}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x8e, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x3, 0x1ff, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 2.919067355s ago: executing program 0 (id=1985): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9eb, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x9, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$MAP_CREATE(0x600000000000000, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000008000000000fb0000400000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0200000031305b49d47cc09d07ac5552ab6df6d8a857d624bb204ff7b04a81b1", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400)={r2}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x8, 0x1c, &(0x7f0000000a40)=ANY=[@ANYBLOB="18080000d0ffffff000000000000000018110000", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="0000000000000000b7010000080000004608f0ff76000000bf9800000000000079080000000000008500000005000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002500)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x5, &(0x7f0000000580)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r3}, @alu={0x4, 0x1, 0x4, 0x8, 0x5, 0xfffffffffffffff4, 0x10}, @alu={0x4, 0x1, 0xb, 0x6, 0x5, 0x50, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x9, 0x7e, 0xe, 0x20, 0xffffffffffffffff, 0xffffffff}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x18) r6 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0xa00, 0xc8, 0x4, 0x0, 0xfffffffffffffe01, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r8, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.723675968s ago: executing program 0 (id=1989): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.413077414s ago: executing program 0 (id=1991): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000300)=ANY=[@ANYRESDEC=0x0, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x8a8227cff0ceb2ed, 0x1, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000040)=0x1, 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000073000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_free_batched\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0a00000004000000040000001200000002000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000b1a8993c59d8011f60fe368bed86e217a79ad9cb722c34cb7c33288b39c26a93f76657fe8ccfb17a1840038c68ed69f9e06005c6af8db2d88bd18830ae769e16158fdaa171648e05da83f6851f6f040dfaeeca1502db591c08c082660305a80ecd10451ff34b", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x200000000000018b, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa, &(0x7f0000000480)=[{}, {}, {}, {}], 0xfffffffffffffe7b, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xe, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000780)={0x40, 0x0}, 0x8) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r13, @ANYRES16=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x848c}, 0x94) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0xffffffffffffffff, 0x6, 0x8}, 0xc) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="1b0000000000000000000200080000000000efffb0a3caaaa835e4a4a15d611c037554f6aa53cca02f64a991b3ca0fb54352cd5fb1a9851bf9813482502fed1bb416dd33f5e82fbfa07412c8e661fcaf57b301d43a582a9bd5e7633d4f5ba02fdd06b108ab8ce4520a48197d96111b1b3b0ad94dc3959e23cf9ee2a1995deb191b9f323fecd3139137ea9868e67b61d412cae679b2266f61d5b6775147a48d7094d32d18b0364da5bd82388b99d99ea0e0505abafdfe9011d7", @ANYRES32, @ANYBLOB="25ffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000010000000600"/28], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r14, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r15, &(0x7f0000000540)=ANY=[@ANYBLOB="8fedcb7907009875f37538e48847"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x16, 0x29, &(0x7f0000000d00)=ANY=[@ANYBLOB="e2", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000001866000007000000000000001b0000001841000002000000000000000000000018390000020000000000000000000000da470001f0ffffffcb9201001000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7020000000000008500000086000000185700000f000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000"], &(0x7f0000000080)='GPL\x00', 0x80000002, 0x83, &(0x7f0000000340)=""/131, 0x41000, 0x6e, '\x00', r10, @fallback=0x27, r11, 0x8, &(0x7f0000000700)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0xa, 0x7, 0x832}, 0x10, r12, r0, 0x0, &(0x7f0000000880)}, 0x94) ioctl$SIOCSIFHWADDR(r1, 0xc0189436, &(0x7f0000000300)={'bridge0\x00', @random}) 1.775215466s ago: executing program 2 (id=2001): perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x20) 1.674110658s ago: executing program 2 (id=2006): perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x4ac2, 0x0) ioctl$TUNGETVNETLE(r3, 0x800454dd, &(0x7f00000004c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r4}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x20) 1.381137264s ago: executing program 0 (id=2008): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x50) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x5, [@enum64={0xd, 0x3, 0x0, 0x13, 0x1, 0x9, [{0x4, 0x2, 0xf}, {0xd, 0x612, 0x8076}, {0x5, 0x8000}]}, @typedef={0x8, 0x0, 0x0, 0x8, 0x4}, @enum64={0xe, 0x1, 0x0, 0x13, 0x1, 0x0, [{0x7, 0x4575, 0xa}]}, @const={0x6, 0x0, 0x0, 0xa, 0x3}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x8}}]}, {0x0, [0x30, 0x5f, 0x0]}}, &(0x7f00000001c0)=""/243, 0x95, 0xf3, 0x0, 0xff}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1b, 0x3, 0x1e1, 0x4, 0x38104, r0, 0x31, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x0, 0x5, 0x0, @value=r1}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0x1, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x9, 0x10001, 0x6, 0x40000, r0, 0x0, '\x00', r3, r1, 0x4, 0x2, 0x2, 0xf}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r1, 0x20, &(0x7f0000000580)={&(0x7f0000000440)=""/161, 0xa1, 0x0, &(0x7f0000000500)=""/74, 0x4a}}, 0x10) socketpair$unix(0x1, 0xf81806c86240b9d9, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x12, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x9}, [@alu={0x7, 0x0, 0x3d18347eb878ec1e, 0x1, 0x9, 0x80, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xd}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0xa5}, @ldst={0x1, 0x3, 0xaf3459157ff754a3, 0x1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0x4, 0xb, 0x2, 0x80, 0x1}, @jmp={0x5, 0x0, 0x2, 0x5, 0x9, 0xc, 0x1}]}, &(0x7f0000000700)='syzkaller\x00', 0x800, 0x11, &(0x7f0000000740)=""/17, 0x40f00, 0x8, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x2, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[r4, r2, r0, r0, r2, r4, r2], &(0x7f0000000800)=[{0x2, 0x4, 0x7, 0xb}, {0x2, 0x3, 0x3, 0x8}, {0x1, 0x2, 0x1, 0xa}], 0x10, 0x5c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{r2, 0xffffffffffffffff}, &(0x7f0000000900), &(0x7f0000000940)=r6}, 0x20) sendmsg$inet(r5, &(0x7f0000000f00)={&(0x7f00000009c0)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000a00)="5169520711cfaa5dd9116bebd2f573a840562bf34dbfb1b8adb2a376c3c02c35d9787f36eb2febe61334424ed762cd9f371fa3362f4ec40c34e59e2185e1f11def79ff5d1a59a161d92b83414db651d2ee14d75d0918e89308f3d64308f0e0efc082ca53929945ad6abfd8", 0x6b}, {&(0x7f0000000a80)="b327d13dafc6d9a4975bab112ef50260b930906ef573cf0e3919df609e5227a5158229a4ca2796a8acaea8e3c3700f059b1130602b6da4217e641161e807c90303d54c89b0abba2958a0c26d198d47c6615ce8f090c30f1a7805f60c1453a8712cb33d60ec5f12de23b6e43d7ce7cd5dbcbefe417ed7f8f37c6b78e3abc4ca4e01c6e0c5822b2f985f92b85e572433d5b7ebbf70e25174cfc7326a02e85a030d60f883ae2eda29495ee6ae18a84a5b03e5be2e3f19ba2fd972b0b80123a5590a3d4608672bd0ce9c3f76d1f5f3228ced6670bc320f529bde684a7ae1c1ddbd1341a3518720098108351e8731e2", 0xed}, {&(0x7f0000000b80)="66b440ca6786bc778416e5821325ce3c15bdeb92256d650662d6448cb932b961758cf0908641aafc3d46527c5125e1e181f6c1a50d72dd56f8a2f343347787c3e7baf4ae458e4d0b1cbd5771892f7611ae1066c3e49351c63c56a7140de43567b6edfa9bea286ce1a05be0b3a780308bca68333a041d6b2d89a46e46ca51221f06386d89552b9c206d8b46b68214e16685d2f669c91f8dedd80a0ac3312948ec4be64eea2440771e5a7f902a0066311578f196a55c6ab3d9474687b481dcf4a0f88f4197de43b50cc3388ac2ec63aee0e55e762646", 0xd5}, {&(0x7f0000000c80)="10fe78da93aabfcbd017a85f48f2b0d1fabef056be917b7d3a5f178191cc959313c16c63fab4201b7f920ca38e32d82b660e30f31cb5440e7ea60b6cbdb4466d3031c888f9d7e5fa71ef366ac9119d51ec750b86da90958700acac93c7b6906f09722cf09ed606d2ff7070c10227cb7fb8d1ce7685822ed996d5cecb0b4ea6369f24b02eb4922056016e93301776", 0x8e}, {&(0x7f0000000d40)="a71680bc5fd1e88f872ba962c3cc043c4b6d0fa9a9e1e9bc5bd628add32ba44669040c99f2f638a12fdd38b0ebd348ce166e092691197c78b53321d76e410c52ea6bf3cbfb2d4bc19870fe95df6ad0bf1cedaab8472d927260e226696b842bdf3d529b08294e215435ef2ef6f122d9c3a87506aa", 0x74}, {&(0x7f0000000dc0)="9fe4a0f4fd3f8be8fa88e2249f5ef8c092b0dd2b8b788a1063b31d487bf2673369f9d0fad2059b5dc57ec354bdfec1801402413b7eb87c37111427d83d77b829cdace62426ed8eb81ee833ec2d52e122407a57623b98adddc7be6afea8677efcf8bddfbce66294f8ba83", 0x6a}], 0x6, &(0x7f0000000ec0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}], 0x30}, 0x804) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000f40)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0x400454d0, 0x13) ioctl$TUNSETOFFLOAD(r8, 0x400454d0, 0x9) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000fc0)={0x2, &(0x7f0000000f80)=[{0x823, 0x4, 0x7, 0xffff}, {0x4747, 0x5, 0x7, 0x8d4}]}) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', r3, 0xffffffffffffffff, 0x1, 0x3, 0x5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r9, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)=r6}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001240)={@cgroup=r8, 0x26, 0x1, 0x5, &(0x7f0000001140)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001180)=[0x0, 0x0], &(0x7f00000011c0)=[0x0, 0x0, 0x0], &(0x7f0000001200)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001600)={r6, 0xe0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, &(0x7f0000001300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001380)=[0x0], 0x0, 0xe4, &(0x7f00000013c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000001440), &(0x7f0000001480), 0x8, 0x57, 0x8, 0x8, &(0x7f00000014c0)}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001280)={@fallback=r8, r6, 0x6, 0x30, 0x0, @void, @void, @void, @value=r12, r11}, 0x20) socketpair(0x23, 0x800, 0x5, &(0x7f0000001640)) r15 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001680)='blkio.bfq.io_serviced\x00', 0x0, 0x0) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x17, 0x11, &(0x7f00000016c0)=@raw=[@cb_func={0x18, 0x3, 0x4, 0x0, 0x2}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x3}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @jmp={0x5, 0x0, 0x9, 0x7, 0x4, 0x10}, @map_val={0x18, 0x0, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0xc18}, @map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x80000000}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000001780)='GPL\x00', 0x7, 0x47, &(0x7f00000017c0)=""/71, 0x40f00, 0x44, '\x00', r13, @cgroup_sysctl, r15, 0x8, &(0x7f0000001840)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000001880)={0x5, 0xa, 0xc, 0x2}, 0x10, r14, r15, 0x2, &(0x7f00000018c0)=[r8, r7, r4, r9, r0, r10, r8], &(0x7f0000001900)=[{0x5, 0x1, 0xc, 0xc}, {0x0, 0x4, 0x5, 0x3}], 0x10, 0xfe0}, 0x94) ioctl$TUNSETFILTEREBPF(r15, 0x800454e1, &(0x7f0000001a00)=r16) r17 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001b80)={&(0x7f0000001a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb0, 0xb0, 0x7, [@typedef={0x3, 0x0, 0x0, 0x8, 0x3}, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x6}, {0x4, 0x2}, {0xe, 0x5}, {0x10, 0x3}, {0x8, 0x1}, {0xf, 0x2}, {0xd, 0x4}, {0x8, 0x1}]}, @enum64={0x8, 0x5, 0x0, 0x13, 0x1, 0x0, [{0x3, 0x4, 0x10001}, {0x1, 0x4, 0x15}, {0x3, 0xf, 0x9}, {0x7, 0x7ff, 0x4}, {0x3, 0x1, 0xa}]}, @decl_tag={0x2, 0x0, 0x0, 0x11, 0x4, 0x2}]}, {0x0, [0x61, 0x61, 0x30, 0x2e, 0x30]}}, &(0x7f0000001b40)=""/3, 0xcf, 0x3, 0x1, 0x2, 0x10000, @value=r15}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001bc0)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x40, '\x00', r3, r17, 0x5, 0x0, 0x2}, 0x50) r18 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001fc0)={&(0x7f0000001e40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x5, [@volatile={0xd, 0x0, 0x0, 0x9, 0x5}, @ptr={0x8, 0x0, 0x0, 0x2, 0x3}, @union={0x3, 0x1, 0x0, 0x5, 0x1, 0x401, [{0xd, 0x4, 0x101}]}, @fwd={0x9}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3, 0x4}}, @const={0x10, 0x0, 0x0, 0xa, 0x2}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x30, 0x61, 0x61]}}, &(0x7f0000001f00)=""/170, 0x89, 0xaa, 0x1, 0xfffffffe, 0x10000, @value=r15}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000020c0)={0x11, 0x14, &(0x7f0000001c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffff7d, 0x0, 0x0, 0x0, 0xa9e}, [@ldst={0x1, 0x0, 0x1, 0x7, 0xa, 0x50}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}, @ldst={0x0, 0x2, 0x1, 0xa, 0x4, 0xfffffffffffffff4, 0x8}]}, &(0x7f0000001d00)='GPL\x00', 0x67, 0xd0, &(0x7f0000001d40)=""/208, 0x41100, 0x50, '\x00', 0x0, 0x0, r18, 0x8, &(0x7f0000002000)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000002040)={0x2, 0xc, 0x10f4, 0x3e}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002080)=[r10], 0x0, 0x10, 0x3}, 0x94) r19 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002180)={0x1b, 0x0, 0x0, 0x2, 0x0, r10, 0xb0, '\x00', r13, r2, 0x1, 0x2, 0x4}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002500)={r6, 0xe0, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002200)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, &(0x7f0000002240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000022c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x15, &(0x7f0000002300)=[{}, {}], 0x10, 0x10, &(0x7f0000002340), &(0x7f0000002380), 0x8, 0xe9, 0x8, 0x8, &(0x7f00000023c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@bloom_filter={0x1e, 0x7c, 0x7, 0x80, 0x40000, r19, 0x6, '\x00', r20, r18, 0x3, 0x0, 0x2, 0xa}, 0x50) 1.380474974s ago: executing program 0 (id=2009): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) 1.343496735s ago: executing program 1 (id=2011): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x4b0c00, 0x0) close(r0) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) close(0xffffffffffffffff) (async) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES8=r0, @ANYBLOB="0000000000000000000000110000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYRES64=0xffffffffffffffff], 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x8, 0x0, 0x4, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x2) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000400), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b000000008000"/28, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="000000000000020000000000000000007b8af8ff00000000bfa200000000000407020000f8ffffffb70300000800000000000000f6000017850000004300000095", @ANYRES64=r1], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01005ffc00004fb6d7b0a78c4c2637380598846800b6cb"], 0x0, 0xfc5f}, 0x28) 1.335899395s ago: executing program 0 (id=2012): write$cgroup_devices(0xffffffffffffffff, 0x0, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x4, &(0x7f0000000300)=ANY=[], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x4}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x122, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xf, 0xf2, 0x1, 0x7ff, 0x38024, r1, 0x4, '\x00', 0x0, r1, 0x0, 0x4, 0x0, 0x0, @value=r1, @void, @value=r1}, 0x50) close(r3) syz_open_procfs$namespace(r2, &(0x7f0000000000)='ns/user\x00') close(r1) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110c23003f) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) 864.940194ms ago: executing program 1 (id=2013): perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x20) 820.310965ms ago: executing program 1 (id=2015): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) 757.642976ms ago: executing program 2 (id=2017): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000539d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d86dd", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000280)=0x6) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 756.703366ms ago: executing program 4 (id=2018): perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x20) 722.778566ms ago: executing program 1 (id=2019): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="10000000040000000800000008"], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000500)={r1, 0x0, 0x0, 0x4}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x400000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000600)='qgroup_num_dirty_extents\x00', 0xffffffffffffffff, 0x0, 0xe72}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x11, 0xa, 0x5, &(0x7f00000001c0)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) close(r4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x61, 0x1, 0x0, 0x0, 0x0, 0x3, 0x30400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4}, 0x0, 0x0, 0x1, 0x6, 0x0, 0x8, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) 630.238588ms ago: executing program 4 (id=2020): perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="12000000040000000800000002"], 0x50) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x40004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x20) 596.396599ms ago: executing program 4 (id=2021): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x13}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x10) 575.596259ms ago: executing program 4 (id=2022): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x13}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x10) (fail_nth: 1) 368.878653ms ago: executing program 1 (id=2023): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x13}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x7, &(0x7f0000000840)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_freezer_state(r5, &(0x7f0000000080), 0x2, 0x0) write$cgroup_freezer_state(r6, &(0x7f00000000c0)='THAWED\x00', 0x7) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) 348.573264ms ago: executing program 4 (id=2024): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x1, 0x8000, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)=@o_path={0x0, 0x0, 0x4018}, 0x18) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xe62}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x10, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x8}, 0x50) write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xb3}}, &(0x7f0000000480)='GPL\x00'}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r7) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000bf0000000000000095000000000000005ecefab8f2e85c6c1ca711fc206bb8ad6ec561750379585e5a076d839240d29ce1f378ab3d790ec8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bd04000000000000009c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5f683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891184604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee8a1d4046930548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e101d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe151acc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394b9ba1a836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429ba63903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589eec11969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6d6fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f25005798ca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e279595ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9958fad67ccaba76408da35c9f1534c8bd48bbdf9594e8b4ce73f01dd1f9033c8aea8734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb3b379e221a5318849b6b0679b5d65ab855fc9f1d10022cc20603480ffb1e3392fad690ce56aaa717e56fd55aec3d9d6671f55d7bc33830a4095497586e8d15c2a32d3176d45b783cb27112a69c14134488b6dd302c3e92a7e659351b610ed5ba022f92d4bf26b0a5c10a3c8eb0fabdf0017995ea0c06b41fe6dda769729328d6ee80ab3b4aeeeee7926575d526431184b2034b5cdacc8eaab03cf45af6ec451f65705d8a4375d559e4c3ad80e942d237616d8f2fdd5afe4fdf21478228d9f6299bf67cf1e62fc11c285e18fb65eeb657bc7375401bb175f6d2625195ce8647945dbdfb7eacc06a24832d155059b0f0c36b9433eff190f4c4c160f0484d4d39f5f92e8bd49ad3df23b961fe7bf9e506c5098ca79deb7906257e4ce9035f3a6b29453ee41640ade8b5916f38d19ab6f2fd51a9fd9a2559411967460952acf5c549e5466ee2d8563397a5f028486220fae69611d9bc0f1a68d31ad1a4e387de687ab1537bd46703e4e5ae0f096f731916628bf743a49ea7b7d22c04d738ca439343aaab682d45dc91187e9ff08005358e1f3d864f36ee590fb0da9c958f15f9105c41add43a7c28874e58c31a7acb0467e0bd97f2ccd78615b5144267772381e7498bb98d9e8a3f98b505e5c9645e19d011dd86a1dc134fa4b21ff8ec2d054ae7e0044b4700cd54ce392c2ee515e86070f2df561c15f331a1babfa60504410fa56a848ba1f501c8eb0bd6856451d150cfaf95d6dc889be27e8915bb3670fc76bcbeb390f3cefb5429c84907a92c6eab2b15758194ece4b1461f622510bcff5c0f8354637856f94d71a0841180e78a3a837ae7847c479f5c9c54859cb85393f190042a5dc31197f2c463be8affe29869d71df330b3466fc79b3488b4a2a3e2aae9af6421cd0902347103f2384bf08e5230b37297b668be11b4428b9a8e8c259afa6c73dd87fcc165b2fea66a180bf048530a5849f849d37aca6874cb1d50defdb90b3da04a575db38825db87f6bb0013a5dabcc0e9783aaac0cbb5d6fc437f1e77bf69cae31a213ca2b90ece8cc70fa320c9ffd05618e7a6e6cf8ada6b3e62557174b6"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) 225.798096ms ago: executing program 2 (id=2025): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x30844, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00010400001d00000000000081"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc9, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f00000004c0), 0x8, 0xa2, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) sendmsg$sock(r2, &(0x7f0000001840)={&(0x7f0000000680)=@can={0x1d, r4}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000700)="8f7f65a8abbc8ecee1dccbf9b39b54f0179cd37b3bff44815555f18e9ac5451300d6d5b67e05d3651032f13fb456b1d88e8a746042de9ad4efec9fdc4f93dbae795f11e6d98236d367bbeccb49a86640927805b13ea6d2353a5ff7df6e6e0daab0afcb1c007f770027f62fae857aaaf229adc59e0fdc05d4b934b0d4c8015a0a1a5b14a378a85cbb3aea0e1ec1cc043702b6d911eb086f0c7d087404eaf8dcb681c355a1803e95a83dae4ed981fc515c87e11f1aaf25b6921a34570c8743471c501b628cd116acf2943c433455c8b8004c0d02a317ef800638dbb3283abe999873d5baa9df9c847c69f01a7f419b53e46e630abbf6117be9bd", 0xf9}, {&(0x7f0000000800)="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", 0x1000}], 0x2}, 0x4000060) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000001880)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085000000ad00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) 94.594578ms ago: executing program 2 (id=2026): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x13}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r0, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x2c, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x618f32fe}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0xd, 0x4, 0x0, 0xfffffffffffffffa}, @alu={0x7, 0x1, 0xc, 0xb, 0x4, 0x100, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x75}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffff9}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x3, 0x8e, &(0x7f0000000340)=""/142, 0x41100, 0x0, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x2, 0xd, 0xd4, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0, 0xffffffffffffffff, r0, r1, r0, r0], 0x0, 0x10, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r2}, 0x10) 92.140258ms ago: executing program 1 (id=2027): perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1200000004000000080000000280"], 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, 0x0, 0x0}, 0x20) (fail_nth: 3) 1.52003ms ago: executing program 2 (id=2028): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000a50000002a00000095"], &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000072000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xcb, 0xfe, 0x0, 0x0, 0x0, 0x2, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x7, 0x12) socketpair(0x10, 0x4, 0x5, &(0x7f0000000040)) socketpair(0x6, 0x0, 0x200, &(0x7f00000009c0)) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x5, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000900)=ANY=[@ANYRES32=r4, @ANYRES32=r8, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x4000086) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) 713.17µs ago: executing program 3 (id=1178): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)=@o_path={&(0x7f0000000040)='./file0\x00', 0x1, 0x4000, r0}, 0x18) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x200, 0x80220, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x411, 0x1, 0xb, 0x0, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000faffffff0000000000000000850000002c00000085000000080000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r1, 0x0, 0x45, 0x31, &(0x7f0000000280)="fe413428b972794c6119d502c3c762494951515aa90546db2d4bd311ae31e389c9acd1e75446ed04831ccd63e13295518baeb8a055d2a53bcafbb451cd638ba44003678ae6", &(0x7f0000000340)=""/49, 0xfffffffb, 0x0, 0x3a, 0x7d, &(0x7f0000000380)="2fada1685e2e8e2d500144fc6652631499066b16e0c84c9d1cdf9a5e0adb37a8461eeeca038d7bca8ee719e4df345d22df6588ba52d9dd0c3784", &(0x7f0000000440)="659e304cea76a1f8a1ca810c1205a7aeed5ba3eacd0594304e7ca29fb3afdb65df3b8568131c81ff205045bd6d15928bcf3013799c0c5757e64c622fb67e61a595cfb3b645d02e767d85ec7345a0563c1ba186112d5f46ad352a569f92a8eae3d10c4684c23f1d985a359baef0bb78e3dc51604858e9e160c50252aa6d", 0x0, 0x0, 0x4}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x891e, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x13\xec\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@typedef={0x8}]}, {0x0, [0x0, 0x30, 0x0, 0x2e, 0x61, 0x5f, 0x2e]}}, &(0x7f00000007c0)=""/73, 0x2d, 0x49, 0x1, 0x5, 0x10000}, 0x28) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf1e, 0x0, 0x0, 0x0, 0x3ff}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}}]}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0xbd, &(0x7f0000000700)=""/189, 0x41000, 0x8, '\x00', 0x0, 0x1c, r5, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb280, r1, 0x6, &(0x7f0000000840)=[r6, r3], &(0x7f0000000880)=[{0x2, 0x1, 0x6, 0x7}, {0x2, 0x2, 0x5}, {0x1, 0x4, 0x8, 0x7}, {0x4, 0x4, 0x2, 0x9}, {0x1, 0x5, 0x7, 0x1}, {0x4, 0x2, 0x3, 0xb}], 0x10, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001200)={r1, 0xe0, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000c40)=[0x0, 0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x38, &(0x7f0000001000)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001040), &(0x7f0000001080), 0x8, 0x5f, 0x8, 0x8, &(0x7f00000010c0)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r1, 0xe0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f00000012c0)=[0x0], &(0x7f0000001300)=[0x0, 0x0, 0x0], 0x0, 0x70, &(0x7f0000001340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001380), &(0x7f00000013c0), 0x8, 0x9c, 0x8, 0x8, &(0x7f0000001400)}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001740)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@ptr={0xb, 0x0, 0x0, 0x2, 0x4}, @var={0x3, 0x0, 0x0, 0xe, 0x4, 0x1}]}, {0x0, [0x30, 0x30, 0x0, 0x5f, 0x2e]}}, &(0x7f0000001700)=""/55, 0x3b, 0x37, 0x0, 0xffff, 0x10000, @value=r6}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001600)=@bpf_lsm={0x1d, 0xe, &(0x7f00000009c0)=@raw=[@btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @exit, @map_val={0x18, 0x9, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0x9, 0x1, 0x0, r6}, @map_fd={0x18, 0x4, 0x1, 0x0, r6}, @generic={0x3, 0x4, 0x0, 0x23, 0x6}], &(0x7f0000000300)='GPL\x00', 0x4, 0xe1, &(0x7f0000000b00)=""/225, 0x41000, 0x72, '\x00', r7, 0x1b, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001240)={0x3, 0x2, 0x4, 0x3}, 0x10, r8, 0x0, 0x1, &(0x7f0000001580)=[r6, r6, r6], &(0x7f00000015c0)=[{0x0, 0x5, 0xd, 0x9}], 0x10, 0x7}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x8e, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x10a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x3, 0x1ff, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 0s ago: executing program 4 (id=2029): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) kernel console output (not intermixed with test programs): CHANGE): bridge_slave_0: link becomes ready [ 213.368234][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.375455][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.383741][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.392466][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.401243][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.408470][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.440874][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.457961][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.480913][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.499151][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.511606][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.526518][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 213.535087][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.194161][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 217.284477][ T30] audit: type=1400 audit(1757550668.010:156): avc: denied { create } for pid=4264 comm="syz.4.1214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 217.333319][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.377968][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.476194][ T4166] device veth0_vlan entered promiscuous mode [ 217.494482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.502227][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.570786][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.589373][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.688084][ T4166] device veth1_macvtap entered promiscuous mode [ 217.761677][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 217.769459][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.848400][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.984141][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.010564][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.321125][ T1265] device bridge_slave_1 left promiscuous mode [ 218.327343][ T1265] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.362719][ T1265] device bridge_slave_0 left promiscuous mode [ 218.369006][ T1265] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.400643][ T1265] device veth1_macvtap left promiscuous mode [ 220.659602][ T4305] device vlan0 entered promiscuous mode [ 220.953501][ T4319] device macsec0 left promiscuous mode [ 221.035798][ T4319] device veth1_macvtap entered promiscuous mode [ 221.043097][ T4319] device macsec0 entered promiscuous mode [ 221.070734][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.133180][ T4301] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.145573][ T4301] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.153872][ T4301] device bridge_slave_0 entered promiscuous mode [ 221.161581][ T4301] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.169638][ T4301] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.177191][ T4301] device bridge_slave_1 entered promiscuous mode [ 221.353392][ T4301] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.360479][ T4301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.367773][ T4301] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.374854][ T4301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.445948][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.454606][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.761472][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.880239][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.898810][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.948192][ T4363] FAULT_INJECTION: forcing a failure. [ 223.948192][ T4363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 223.961825][ T4363] CPU: 0 PID: 4363 Comm: syz.0.1241 Not tainted syzkaller #0 [ 223.969365][ T4363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 223.979447][ T4363] Call Trace: [ 223.982841][ T4363] [ 223.986087][ T4363] __dump_stack+0x21/0x30 [ 223.990441][ T4363] dump_stack_lvl+0xee/0x150 [ 223.995132][ T4363] ? show_regs_print_info+0x20/0x20 [ 224.000360][ T4363] dump_stack+0x15/0x20 [ 224.004534][ T4363] should_fail+0x3c1/0x510 [ 224.009061][ T4363] should_fail_usercopy+0x1a/0x20 [ 224.014113][ T4363] _copy_from_user+0x20/0xd0 [ 224.018735][ T4363] bpf_test_init+0x13d/0x1c0 [ 224.023359][ T4363] bpf_prog_test_run_xdp+0x1ae/0x910 [ 224.028664][ T4363] ? dev_put+0x80/0x80 [ 224.032757][ T4363] ? __fget_files+0x2c4/0x320 [ 224.037509][ T4363] ? fput_many+0x15a/0x1a0 [ 224.041954][ T4363] ? dev_put+0x80/0x80 [ 224.046055][ T4363] bpf_prog_test_run+0x3d5/0x620 [ 224.051009][ T4363] ? bpf_prog_query+0x230/0x230 [ 224.055921][ T4363] ? selinux_bpf+0xce/0xf0 [ 224.060358][ T4363] ? security_bpf+0x82/0xa0 [ 224.064886][ T4363] __sys_bpf+0x52c/0x730 [ 224.069156][ T4363] ? bpf_link_show_fdinfo+0x310/0x310 [ 224.074584][ T4363] ? debug_smp_processor_id+0x17/0x20 [ 224.079985][ T4363] __x64_sys_bpf+0x7c/0x90 [ 224.084420][ T4363] x64_sys_call+0x4b9/0x9a0 [ 224.088948][ T4363] do_syscall_64+0x4c/0xa0 [ 224.093387][ T4363] ? clear_bhb_loop+0x50/0xa0 [ 224.098170][ T4363] ? clear_bhb_loop+0x50/0xa0 [ 224.102874][ T4363] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 224.108804][ T4363] RIP: 0033:0x7fb1b0a2aba9 [ 224.113233][ T4363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 224.132854][ T4363] RSP: 002b:00007fb1af472038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 224.141376][ T4363] RAX: ffffffffffffffda RBX: 00007fb1b0c72090 RCX: 00007fb1b0a2aba9 [ 224.149361][ T4363] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 224.157352][ T4363] RBP: 00007fb1af472090 R08: 0000000000000000 R09: 0000000000000000 [ 224.165350][ T4363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 224.173481][ T4363] R13: 00007fb1b0c72128 R14: 00007fb1b0c72090 R15: 00007fffc6794808 [ 224.181677][ T4363] [ 224.190367][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.197569][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.205391][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.214052][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.222501][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.229655][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.237171][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.245662][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.253882][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.262185][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.278860][ T4301] device veth0_vlan entered promiscuous mode [ 224.343061][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 224.358410][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.372122][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 224.380415][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.390701][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.398410][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.524889][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 224.537595][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.552251][ T4301] device veth1_macvtap entered promiscuous mode [ 224.640120][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 224.647875][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 224.707722][ T4351] syz.4.1240 (4351) used greatest stack depth: 21008 bytes left [ 224.720732][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.738373][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 224.766874][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 224.862644][ T1265] device bridge_slave_1 left promiscuous mode [ 224.868975][ T1265] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.961321][ T1265] device bridge_slave_0 left promiscuous mode [ 224.967845][ T1265] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.044410][ T1265] device veth1_macvtap left promiscuous mode [ 225.050593][ T1265] device veth0_vlan left promiscuous mode [ 225.328157][ T4413] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.335490][ T4413] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.361632][ T4413] device bridge_slave_0 entered promiscuous mode [ 225.369289][ T4413] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.400532][ T4413] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.408214][ T4413] device bridge_slave_1 entered promiscuous mode [ 227.740204][ T4424] FAULT_INJECTION: forcing a failure. [ 227.740204][ T4424] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 227.779866][ T4438] device sit0 left promiscuous mode [ 227.785333][ T4424] CPU: 1 PID: 4424 Comm: syz.0.1254 Not tainted syzkaller #0 [ 227.792732][ T4424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 227.803002][ T4424] Call Trace: [ 227.806317][ T4424] [ 227.809267][ T4424] __dump_stack+0x21/0x30 [ 227.813622][ T4424] dump_stack_lvl+0xee/0x150 [ 227.818237][ T4424] ? show_regs_print_info+0x20/0x20 [ 227.823571][ T4424] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 227.829072][ T4424] dump_stack+0x15/0x20 [ 227.833263][ T4424] should_fail+0x3c1/0x510 [ 227.837823][ T4424] should_fail_usercopy+0x1a/0x20 [ 227.842861][ T4424] _copy_to_user+0x20/0x90 [ 227.847286][ T4424] bpf_test_finish+0x1ae/0x3b0 [ 227.852054][ T4424] ? convert_skb_to___skb+0x360/0x360 [ 227.857531][ T4424] ? xdp_convert_buff_to_md+0x15c/0x1e0 [ 227.863095][ T4424] bpf_prog_test_run_xdp+0x62d/0x910 [ 227.868486][ T4424] ? dev_put+0x80/0x80 [ 227.872614][ T4424] ? __fget_files+0x2c4/0x320 [ 227.877296][ T4424] ? fput_many+0x15a/0x1a0 [ 227.881729][ T4424] ? dev_put+0x80/0x80 [ 227.885800][ T4424] bpf_prog_test_run+0x3d5/0x620 [ 227.890946][ T4424] ? bpf_prog_query+0x230/0x230 [ 227.895800][ T4424] ? selinux_bpf+0xce/0xf0 [ 227.900216][ T4424] ? security_bpf+0x82/0xa0 [ 227.904718][ T4424] __sys_bpf+0x52c/0x730 [ 227.908981][ T4424] ? bpf_link_show_fdinfo+0x310/0x310 [ 227.914377][ T4424] ? sched_clock_cpu+0x18/0x3c0 [ 227.919392][ T4424] __x64_sys_bpf+0x7c/0x90 [ 227.923839][ T4424] x64_sys_call+0x4b9/0x9a0 [ 227.928367][ T4424] do_syscall_64+0x4c/0xa0 [ 227.932808][ T4424] ? clear_bhb_loop+0x50/0xa0 [ 227.937511][ T4424] ? clear_bhb_loop+0x50/0xa0 [ 227.942214][ T4424] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 227.948132][ T4424] RIP: 0033:0x7fb1b0a2aba9 [ 227.952571][ T4424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 227.972204][ T4424] RSP: 002b:00007fb1af493038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 227.980051][ T4441] device sit0 entered promiscuous mode [ 227.980636][ T4424] RAX: ffffffffffffffda RBX: 00007fb1b0c71fa0 RCX: 00007fb1b0a2aba9 [ 227.980656][ T4424] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 227.980671][ T4424] RBP: 00007fb1af493090 R08: 0000000000000000 R09: 0000000000000000 [ 227.980685][ T4424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 227.980698][ T4424] R13: 00007fb1b0c72038 R14: 00007fb1b0c71fa0 R15: 00007fffc6794808 [ 227.980721][ T4424] [ 228.549213][ T4471] bond_slave_1: mtu less than device minimum [ 228.622153][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.630733][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.656654][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.665325][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.683358][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.690472][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.698523][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.707820][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.716506][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.723584][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.841963][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.860985][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.881132][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.917102][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.934121][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.252084][ T4481] FAULT_INJECTION: forcing a failure. [ 231.252084][ T4481] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 231.269200][ T4481] CPU: 0 PID: 4481 Comm: syz.2.1272 Not tainted syzkaller #0 [ 231.276618][ T4481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 231.286691][ T4481] Call Trace: [ 231.289990][ T4481] [ 231.292945][ T4481] __dump_stack+0x21/0x30 [ 231.297312][ T4481] dump_stack_lvl+0xee/0x150 [ 231.301934][ T4481] ? show_regs_print_info+0x20/0x20 [ 231.307159][ T4481] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 231.312626][ T4481] dump_stack+0x15/0x20 [ 231.316794][ T4481] should_fail+0x3c1/0x510 [ 231.321215][ T4481] should_fail_usercopy+0x1a/0x20 [ 231.326267][ T4481] _copy_to_user+0x20/0x90 [ 231.330709][ T4481] bpf_test_finish+0x1dd/0x3b0 [ 231.335501][ T4481] ? convert_skb_to___skb+0x360/0x360 [ 231.340889][ T4481] ? xdp_convert_buff_to_md+0x15c/0x1e0 [ 231.346448][ T4481] bpf_prog_test_run_xdp+0x62d/0x910 [ 231.351751][ T4481] ? dev_put+0x80/0x80 [ 231.355918][ T4481] ? __fget_files+0x2c4/0x320 [ 231.360613][ T4481] ? fput_many+0x15a/0x1a0 [ 231.365038][ T4481] ? dev_put+0x80/0x80 [ 231.369116][ T4481] bpf_prog_test_run+0x3d5/0x620 [ 231.374061][ T4481] ? bpf_prog_query+0x230/0x230 [ 231.378919][ T4481] ? selinux_bpf+0xce/0xf0 [ 231.383350][ T4481] ? security_bpf+0x82/0xa0 [ 231.387871][ T4481] __sys_bpf+0x52c/0x730 [ 231.392139][ T4481] ? bpf_link_show_fdinfo+0x310/0x310 [ 231.397626][ T4481] ? __sys_bpf+0xd/0x730 [ 231.401878][ T4481] __x64_sys_bpf+0x7c/0x90 [ 231.406312][ T4481] x64_sys_call+0x4b9/0x9a0 [ 231.410828][ T4481] do_syscall_64+0x4c/0xa0 [ 231.415253][ T4481] ? clear_bhb_loop+0x50/0xa0 [ 231.419936][ T4481] ? clear_bhb_loop+0x50/0xa0 [ 231.424620][ T4481] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 231.430518][ T4481] RIP: 0033:0x7f48447dbba9 [ 231.434937][ T4481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 231.454727][ T4481] RSP: 002b:00007f4843244038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 231.463161][ T4481] RAX: ffffffffffffffda RBX: 00007f4844a22fa0 RCX: 00007f48447dbba9 [ 231.471220][ T4481] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 231.479216][ T4481] RBP: 00007f4843244090 R08: 0000000000000000 R09: 0000000000000000 [ 231.487295][ T4481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 231.495272][ T4481] R13: 00007f4844a23038 R14: 00007f4844a22fa0 R15: 00007ffd4a7c5818 [ 231.503259][ T4481] [ 231.520421][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.528824][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.619499][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.630683][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.638880][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.646748][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.655963][ T4413] device veth0_vlan entered promiscuous mode [ 231.720568][ T4492] device syzkaller0 entered promiscuous mode [ 231.861151][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.896823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.951910][ T4413] device veth1_macvtap entered promiscuous mode [ 232.162379][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.217261][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.249255][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.277906][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.492815][ T1265] device bridge_slave_1 left promiscuous mode [ 232.499505][ T1265] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.520757][ T1265] device bridge_slave_0 left promiscuous mode [ 232.533512][ T1265] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.556078][ T1265] device veth1_macvtap left promiscuous mode [ 232.576009][ T1265] device veth0_vlan left promiscuous mode [ 233.460104][ T4534] FAULT_INJECTION: forcing a failure. [ 233.460104][ T4534] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 233.473906][ T4534] CPU: 1 PID: 4534 Comm: syz.0.1287 Not tainted syzkaller #0 [ 233.481318][ T4534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 233.491395][ T4534] Call Trace: [ 233.494696][ T4534] [ 233.497646][ T4534] __dump_stack+0x21/0x30 [ 233.502020][ T4534] dump_stack_lvl+0xee/0x150 [ 233.506638][ T4534] ? show_regs_print_info+0x20/0x20 [ 233.511947][ T4534] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 233.517777][ T4534] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 233.523972][ T4534] dump_stack+0x15/0x20 [ 233.528145][ T4534] should_fail+0x3c1/0x510 [ 233.532599][ T4534] should_fail_usercopy+0x1a/0x20 [ 233.537644][ T4534] _copy_to_user+0x20/0x90 [ 233.542090][ T4534] bpf_test_finish+0x20c/0x3b0 [ 233.546879][ T4534] ? convert_skb_to___skb+0x360/0x360 [ 233.552276][ T4534] ? bpf_prog_change_xdp+0x12/0x30 [ 233.557529][ T4534] ? xdp_convert_buff_to_md+0x15c/0x1e0 [ 233.563094][ T4534] bpf_prog_test_run_xdp+0x62d/0x910 [ 233.568407][ T4534] ? dev_put+0x80/0x80 [ 233.572496][ T4534] ? __fget_files+0x2c4/0x320 [ 233.577299][ T4534] ? fput_many+0x15a/0x1a0 [ 233.581737][ T4534] ? dev_put+0x80/0x80 [ 233.585831][ T4534] bpf_prog_test_run+0x3d5/0x620 [ 233.590810][ T4534] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 233.597009][ T4534] ? bpf_prog_query+0x230/0x230 [ 233.601883][ T4534] ? __sys_bpf+0x51f/0x730 [ 233.606328][ T4534] __sys_bpf+0x52c/0x730 [ 233.610593][ T4534] ? bpf_link_show_fdinfo+0x310/0x310 [ 233.616048][ T4534] __x64_sys_bpf+0x7c/0x90 [ 233.620569][ T4534] x64_sys_call+0x4b9/0x9a0 [ 233.625186][ T4534] do_syscall_64+0x4c/0xa0 [ 233.629625][ T4534] ? clear_bhb_loop+0x50/0xa0 [ 233.634330][ T4534] ? clear_bhb_loop+0x50/0xa0 [ 233.639039][ T4534] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 233.645044][ T4534] RIP: 0033:0x7fb1b0a2aba9 [ 233.649570][ T4534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 233.669323][ T4534] RSP: 002b:00007fb1af493038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 233.677754][ T4534] RAX: ffffffffffffffda RBX: 00007fb1b0c71fa0 RCX: 00007fb1b0a2aba9 [ 233.685737][ T4534] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 233.693719][ T4534] RBP: 00007fb1af493090 R08: 0000000000000000 R09: 0000000000000000 [ 233.701692][ T4534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 233.709789][ T4534] R13: 00007fb1b0c72038 R14: 00007fb1b0c71fa0 R15: 00007fffc6794808 [ 233.717772][ T4534] [ 233.988212][ T4549] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.032169][ T4549] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.093753][ T4549] device bridge_slave_0 entered promiscuous mode [ 234.170175][ T4549] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.177581][ T4549] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.473089][ T4549] device bridge_slave_1 entered promiscuous mode [ 236.671391][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.679269][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.796572][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.805168][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.813590][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.820747][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.828213][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 236.836973][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.845216][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.852435][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.859819][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 236.869050][ T1265] device bridge_slave_1 left promiscuous mode [ 236.875427][ T1265] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.883399][ T1265] device bridge_slave_0 left promiscuous mode [ 236.889581][ T1265] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.897598][ T1265] device veth1_macvtap left promiscuous mode [ 236.903664][ T1265] device veth0_vlan left promiscuous mode [ 237.172562][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.200387][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.299860][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.358941][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.444368][ T4549] device veth0_vlan entered promiscuous mode [ 237.510356][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 237.518886][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.590485][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 237.650462][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.159446][ T4594] FAULT_INJECTION: forcing a failure. [ 238.159446][ T4594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 238.175501][ T4594] CPU: 0 PID: 4594 Comm: syz.0.1303 Not tainted syzkaller #0 [ 238.182927][ T4594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 238.193281][ T4594] Call Trace: [ 238.196595][ T4594] [ 238.199688][ T4594] __dump_stack+0x21/0x30 [ 238.204028][ T4594] dump_stack_lvl+0xee/0x150 [ 238.208613][ T4594] ? show_regs_print_info+0x20/0x20 [ 238.213820][ T4594] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 238.219752][ T4594] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 238.226181][ T4594] dump_stack+0x15/0x20 [ 238.230347][ T4594] should_fail+0x3c1/0x510 [ 238.234870][ T4594] should_fail_usercopy+0x1a/0x20 [ 238.239890][ T4594] _copy_to_user+0x20/0x90 [ 238.244312][ T4594] simple_read_from_buffer+0xe9/0x160 [ 238.249881][ T4594] proc_fail_nth_read+0x19a/0x210 [ 238.254916][ T4594] ? proc_fault_inject_write+0x2f0/0x2f0 [ 238.260557][ T4594] ? security_file_permission+0x83/0xa0 [ 238.266109][ T4594] ? proc_fault_inject_write+0x2f0/0x2f0 [ 238.271765][ T4594] vfs_read+0x282/0xbe0 [ 238.275938][ T4594] ? kernel_read+0x1f0/0x1f0 [ 238.280526][ T4594] ? irqentry_exit+0x37/0x40 [ 238.285126][ T4594] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 238.290932][ T4594] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 238.297088][ T4594] ksys_read+0x140/0x240 [ 238.301473][ T4594] ? vfs_write+0xf70/0xf70 [ 238.306000][ T4594] ? sched_clock_cpu+0x18/0x3c0 [ 238.310861][ T4594] __x64_sys_read+0x7b/0x90 [ 238.315364][ T4594] x64_sys_call+0x96d/0x9a0 [ 238.319868][ T4594] do_syscall_64+0x4c/0xa0 [ 238.324399][ T4594] ? clear_bhb_loop+0x50/0xa0 [ 238.329075][ T4594] ? clear_bhb_loop+0x50/0xa0 [ 238.333754][ T4594] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 238.339648][ T4594] RIP: 0033:0x7fb1b0a295bc [ 238.344092][ T4594] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 238.363696][ T4594] RSP: 002b:00007fb1af493030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 238.372110][ T4594] RAX: ffffffffffffffda RBX: 00007fb1b0c71fa0 RCX: 00007fb1b0a295bc [ 238.380084][ T4594] RDX: 000000000000000f RSI: 00007fb1af4930a0 RDI: 000000000000000c [ 238.388167][ T4594] RBP: 00007fb1af493090 R08: 0000000000000000 R09: 0000000000000000 [ 238.396153][ T4594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.404127][ T4594] R13: 00007fb1b0c72038 R14: 00007fb1b0c71fa0 R15: 00007fffc6794808 [ 238.412113][ T4594] [ 238.473674][ T4549] device veth1_macvtap entered promiscuous mode [ 238.480821][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.488545][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.498724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 238.506973][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.515731][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 238.546422][ T4596] device team_slave_1 entered promiscuous mode [ 238.628265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.651248][ T30] audit: type=1400 audit(1757550689.370:157): avc: denied { create } for pid=4595 comm="syz.0.1304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 238.703607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.716938][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.725473][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.734126][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.743537][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 239.702000][ T1265] device bridge_slave_1 left promiscuous mode [ 239.708185][ T1265] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.819903][ T1265] device bridge_slave_0 left promiscuous mode [ 239.854960][ T1265] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.876837][ T1265] device veth1_macvtap left promiscuous mode [ 239.902029][ T1265] device veth0_vlan left promiscuous mode [ 240.242928][ T4616] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.288022][ T4616] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.310663][ T4616] device bridge_slave_0 entered promiscuous mode [ 240.317992][ T4616] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.325166][ T4616] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.333357][ T4616] device bridge_slave_1 entered promiscuous mode [ 240.390951][ T4616] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.398023][ T4616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.405358][ T4616] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.412421][ T4616] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.451044][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.471181][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.490371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.499665][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.508453][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.530323][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.579527][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.587988][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.611081][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.618782][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.679719][ T4616] device veth0_vlan entered promiscuous mode [ 240.746942][ T4616] device veth1_macvtap entered promiscuous mode [ 240.802786][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.817159][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.825462][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.841758][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.850214][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.864315][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.873229][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.910427][ T4657] device pim6reg1 entered promiscuous mode [ 241.780534][ T4682] device wg2 left promiscuous mode [ 241.878772][ T45] device bridge_slave_1 left promiscuous mode [ 241.893325][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.903436][ T45] device bridge_slave_0 left promiscuous mode [ 241.909879][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.918703][ T45] device veth1_macvtap left promiscuous mode [ 241.924840][ T45] device veth0_vlan left promiscuous mode [ 242.381398][ T4721] device syzkaller0 left promiscuous mode [ 242.583131][ T4700] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.590456][ T4700] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.597981][ T4700] device bridge_slave_0 entered promiscuous mode [ 242.605442][ T4700] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.612683][ T4700] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.627612][ T4700] device bridge_slave_1 entered promiscuous mode [ 243.451822][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.475764][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.558857][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.595035][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.616509][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.623715][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.201295][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.211821][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.225919][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.240955][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.248019][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.257597][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.273899][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.282005][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.302914][ T4762] device syzkaller0 entered promiscuous mode [ 245.413763][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 245.422424][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 245.436118][ T4700] device veth0_vlan entered promiscuous mode [ 245.451653][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 245.459905][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.477213][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.501929][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 245.586505][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 245.616049][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 245.673060][ T4700] device veth1_macvtap entered promiscuous mode [ 245.833674][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 245.856660][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 245.865069][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 245.947354][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 245.965536][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 246.277406][ T4799] device pim6reg1 entered promiscuous mode [ 247.260404][ T4818] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.279233][ T4818] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.294879][ T4818] device bridge_slave_0 entered promiscuous mode [ 247.303839][ T4818] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.312275][ T4818] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.320580][ T4818] device bridge_slave_1 entered promiscuous mode [ 247.565056][ T4834] device syzkaller0 entered promiscuous mode [ 247.714337][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.722342][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.789022][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.800397][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.827055][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.834176][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.846428][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.855138][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.864153][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.871249][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.952597][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.960462][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.968611][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.042781][ T4851] device syzkaller0 entered promiscuous mode [ 250.126527][ T4818] device veth0_vlan entered promiscuous mode [ 250.133320][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.141957][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.149697][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.157394][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.228834][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 250.237342][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.316587][ T4818] device veth1_macvtap entered promiscuous mode [ 250.383158][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 250.393231][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 250.416938][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.448341][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 250.507333][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 250.618486][ T8] device bridge_slave_1 left promiscuous mode [ 250.632016][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.673379][ T8] device bridge_slave_0 left promiscuous mode [ 250.707297][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.761633][ T8] device veth1_macvtap left promiscuous mode [ 250.767790][ T8] device veth0_vlan left promiscuous mode [ 251.545755][ T4902] device sit0 left promiscuous mode [ 251.623205][ T4906] bond_slave_1: mtu less than device minimum [ 252.400887][ T8] device bridge_slave_1 left promiscuous mode [ 252.407061][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.440839][ T8] device bridge_slave_0 left promiscuous mode [ 252.447081][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.470127][ T8] device veth1_macvtap left promiscuous mode [ 252.482055][ T8] device veth0_vlan left promiscuous mode [ 253.994845][ T4921] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.023231][ T4921] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.036240][ T4921] device bridge_slave_0 entered promiscuous mode [ 254.078029][ T4958] device syzkaller0 entered promiscuous mode [ 254.103409][ T4921] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.112480][ T4921] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.120339][ T4921] device bridge_slave_1 entered promiscuous mode [ 254.222426][ T4963] device veth1_macvtap left promiscuous mode [ 254.954571][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.962304][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.006530][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.019660][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.034611][ T1265] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.041717][ T1265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.058317][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.072834][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.083160][ T1265] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.090546][ T1265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.103410][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.307238][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 255.318423][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.635237][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 255.643595][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 255.778571][ T5045] syz.2.1433[5045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.778650][ T5045] syz.2.1433[5045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.929885][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.951321][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 256.014088][ T4921] device veth0_vlan entered promiscuous mode [ 256.028031][ T4921] device veth1_macvtap entered promiscuous mode [ 256.050885][ T5047] device wg2 entered promiscuous mode [ 256.058956][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 256.067493][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.075963][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 256.084950][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.093657][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 256.101829][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.109300][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.195393][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 256.230462][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 256.297350][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 256.310841][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 256.322825][ T5057] device veth1_macvtap left promiscuous mode [ 258.032620][ T8] device bridge_slave_1 left promiscuous mode [ 258.038819][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.075352][ T8] device bridge_slave_0 left promiscuous mode [ 258.151594][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.211010][ T8] device veth1_macvtap left promiscuous mode [ 258.249856][ T8] device veth0_vlan left promiscuous mode [ 258.661121][ T5108] device sit0 left promiscuous mode [ 259.023785][ T5093] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.030979][ T5093] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.038664][ T5093] device bridge_slave_0 entered promiscuous mode [ 259.133353][ T5093] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.157400][ T5093] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.190602][ T5093] device bridge_slave_1 entered promiscuous mode [ 260.054007][ T5169] device sit0 entered promiscuous mode [ 260.147289][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.160440][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.335181][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.343679][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.352024][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.359102][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.366779][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.376659][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.384937][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.391984][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.399370][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.210715][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 262.242449][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.290457][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 262.335185][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.428156][ T5093] device veth0_vlan entered promiscuous mode [ 262.506702][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 262.530997][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 262.542026][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 262.549970][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.559008][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.567105][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.625215][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 262.672587][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 262.785265][ T5093] device veth1_macvtap entered promiscuous mode [ 262.836209][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 262.910625][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.970272][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 263.174270][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 263.200986][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 264.482454][ T30] audit: type=1400 audit(1757550715.210:158): avc: denied { create } for pid=5224 comm="syz.1.1494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 264.531850][ T30] audit: type=1400 audit(1757550715.210:159): avc: denied { create } for pid=5224 comm="syz.1.1494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 264.787433][ T5241] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.819264][ T5241] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.876732][ T5241] device bridge_slave_0 entered promiscuous mode [ 264.966278][ T5241] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.004534][ T5241] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.054010][ T5241] device bridge_slave_1 entered promiscuous mode [ 268.045216][ T8] device bridge_slave_1 left promiscuous mode [ 268.052141][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.072042][ T8] device bridge_slave_0 left promiscuous mode [ 268.078254][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.088240][ T8] device veth1_macvtap left promiscuous mode [ 268.094401][ T8] device veth0_vlan left promiscuous mode [ 268.344087][ T5299] device sit0 left promiscuous mode [ 268.422072][ T5299] device sit0 entered promiscuous mode [ 269.013954][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.060436][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.201282][ T5241] device veth0_vlan entered promiscuous mode [ 269.260351][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.289349][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.348915][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.356038][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.364135][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.372662][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.383205][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.390530][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.398645][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 269.409592][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.422377][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 269.430640][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.438844][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 269.447326][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 269.455829][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 269.463838][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 269.488795][ T5241] device veth1_macvtap entered promiscuous mode [ 270.390538][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.408913][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.430412][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.438069][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.446699][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.455192][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.553456][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.606049][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.754004][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.786257][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.147464][ T5359] device veth0_vlan left promiscuous mode [ 271.171776][ T5359] device veth0_vlan entered promiscuous mode [ 271.202883][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.232880][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.240827][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.251520][ T8] device bridge_slave_1 left promiscuous mode [ 274.324830][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.359771][ T8] device bridge_slave_0 left promiscuous mode [ 274.366137][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.374932][ T8] device veth1_macvtap left promiscuous mode [ 274.381141][ T8] device veth0_vlan left promiscuous mode [ 274.666531][ T5382] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.690926][ T5382] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.698543][ T5382] device bridge_slave_0 entered promiscuous mode [ 274.812776][ T5382] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.819955][ T5382] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.880609][ T5382] device bridge_slave_1 entered promiscuous mode [ 275.739535][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.759214][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.858092][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 275.907097][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.030284][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.037398][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.111609][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.180023][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.188839][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.195939][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.227819][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.250365][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.313293][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 277.326308][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 277.389626][ T5382] device veth0_vlan entered promiscuous mode [ 277.407987][ T5382] device veth1_macvtap entered promiscuous mode [ 277.448722][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 277.470502][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.500658][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 277.522497][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 277.531261][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 277.539094][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 277.547905][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 277.556610][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 277.565111][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 277.573711][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.581379][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.161243][ T372] device bridge_slave_1 left promiscuous mode [ 279.167440][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.199496][ T372] device bridge_slave_0 left promiscuous mode [ 279.208610][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.219066][ T372] device veth1_macvtap left promiscuous mode [ 279.236199][ T372] device veth0_vlan left promiscuous mode [ 279.432421][ T5521] device syzkaller0 entered promiscuous mode [ 279.733040][ T5506] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.746064][ T5506] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.780602][ T5506] device bridge_slave_0 entered promiscuous mode [ 279.823889][ T5506] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.833730][ T5506] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.845789][ T5506] device bridge_slave_1 entered promiscuous mode [ 280.699544][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.718424][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.880986][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.892609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.925244][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.932444][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.941028][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 280.949663][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.960743][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.967928][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.062976][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 281.189711][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 281.198191][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.206520][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 281.215180][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.223539][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 281.232182][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.349763][ T5506] device veth0_vlan entered promiscuous mode [ 281.356912][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 281.368836][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.378318][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.385911][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.528106][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 281.536490][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.606988][ T5506] device veth1_macvtap entered promiscuous mode [ 281.741516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.750246][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.828421][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.836919][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 283.181101][ T372] device bridge_slave_1 left promiscuous mode [ 283.187244][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.194897][ T372] device bridge_slave_0 left promiscuous mode [ 283.201383][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.209357][ T372] device veth1_macvtap left promiscuous mode [ 283.215528][ T372] device veth0_vlan left promiscuous mode [ 283.624729][ T5646] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.651778][ T5646] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.699955][ T5646] device bridge_slave_0 entered promiscuous mode [ 283.783141][ T5646] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.791309][ T5646] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.798849][ T5646] device bridge_slave_1 entered promiscuous mode [ 284.442609][ T5691] syz.0.1647[5691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.442708][ T5691] syz.0.1647[5691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.486528][ T5646] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.504943][ T5646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.583968][ T1265] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.621900][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.668376][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.696328][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.737141][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.777543][ T1265] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.784675][ T1265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.839709][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 284.853489][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.863500][ T1265] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.870604][ T1265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.996866][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.030265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.049286][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.065410][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.261770][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 285.280398][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.347773][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.370658][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.443283][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.501022][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.570501][ T5646] device veth0_vlan entered promiscuous mode [ 285.869022][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 285.878783][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.920764][ T5646] device veth1_macvtap entered promiscuous mode [ 286.013876][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.034432][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.061627][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.118103][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.574653][ T5790] device syzkaller0 entered promiscuous mode [ 287.571129][ T372] device bridge_slave_1 left promiscuous mode [ 287.577456][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.590582][ T372] device bridge_slave_0 left promiscuous mode [ 287.596770][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.611133][ T372] device veth1_macvtap left promiscuous mode [ 287.617180][ T372] device veth0_vlan left promiscuous mode [ 287.805645][ T5805] device syzkaller0 left promiscuous mode [ 287.826537][ T30] audit: type=1400 audit(1757550738.550:160): avc: denied { create } for pid=5804 comm="syz.4.1679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 287.896384][ T30] audit: type=1400 audit(1757550738.620:161): avc: denied { create } for pid=5813 comm="syz.1.1680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 288.011378][ T5824] ip6_vti0: mtu less than device minimum [ 288.428237][ T5818] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.451199][ T5818] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.466561][ T5818] device bridge_slave_0 entered promiscuous mode [ 288.566262][ T5818] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.590052][ T5818] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.597741][ T5818] device bridge_slave_1 entered promiscuous mode [ 288.773275][ T5818] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.780415][ T5818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.787843][ T5818] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.794907][ T5818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.997690][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.016518][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.100719][ T5859] device pim6reg1 entered promiscuous mode [ 289.114882][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 289.123779][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.131835][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.140556][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.149390][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.156500][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.164519][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 289.206171][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.218312][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.225412][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.236371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 289.252558][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 289.288665][ T5859] device syzkaller0 entered promiscuous mode [ 289.298091][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 289.311007][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 289.356948][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 289.365564][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 289.546347][ T5864] device syzkaller0 entered promiscuous mode [ 289.595070][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 289.610760][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 289.639315][ T5818] device veth0_vlan entered promiscuous mode [ 289.645877][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 289.657061][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 289.708912][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 289.718139][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 289.728735][ T5818] device veth1_macvtap entered promiscuous mode [ 289.741496][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 289.749362][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 289.761834][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 289.829062][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 289.837590][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 291.361148][ T372] device bridge_slave_1 left promiscuous mode [ 291.367478][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.375169][ T372] device bridge_slave_0 left promiscuous mode [ 291.381509][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.389607][ T372] device veth1_macvtap left promiscuous mode [ 291.395794][ T372] device veth0_vlan left promiscuous mode [ 291.852264][ T5919] ------------[ cut here ]------------ [ 291.858797][ T5919] trace type BPF program uses run-time allocation [ 291.902192][ T5919] WARNING: CPU: 0 PID: 5919 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 291.916786][ T5919] Modules linked in: [ 291.945125][ T5919] CPU: 0 PID: 5919 Comm: syz.0.1712 Not tainted syzkaller #0 [ 292.000488][ T5919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 292.060363][ T5919] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 292.070434][ T5919] Code: ee ff 48 c7 c6 20 ea 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 c6 4c ee ff c6 05 a3 92 6b 05 01 48 c7 c7 80 e6 47 85 e8 83 2d 25 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 292.140188][ T5919] RSP: 0018:ffffc90000b57428 EFLAGS: 00010246 [ 292.150451][ T5919] RAX: 21403c487ddf3e00 RBX: 0000000000000001 RCX: 0000000000080000 [ 292.158915][ T5917] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.180030][ T5917] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.180272][ T5919] RDX: ffffc900013ab000 RSI: 0000000000002b5d RDI: 0000000000002b5e [ 292.187657][ T5917] device bridge_slave_0 entered promiscuous mode [ 292.195869][ T5919] RBP: ffffc90000b57470 R08: dffffc0000000000 R09: ffffed103ee065e8 [ 292.210323][ T5919] R10: ffffed103ee065e8 R11: 1ffff1103ee065e7 R12: ffff8881194f4000 [ 292.218905][ T5919] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888112454800 [ 292.228692][ T5919] FS: 00007fb1af4936c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 292.238268][ T5919] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 292.245524][ T5919] CR2: 000000110c2dbc49 CR3: 0000000110368000 CR4: 00000000003506b0 [ 292.246643][ T5917] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.254270][ T5919] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 292.269940][ T5919] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 292.282507][ T5919] Call Trace: [ 292.282696][ T5917] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.286505][ T5917] device bridge_slave_1 entered promiscuous mode [ 292.301028][ T5919] [ 292.304690][ T5919] resolve_pseudo_ldimm64+0x685/0x11d0 [ 292.311531][ T5919] ? check_attach_btf_id+0xde0/0xde0 [ 292.317644][ T5919] ? bpf_check+0x3079/0xf280 [ 292.340364][ T5919] bpf_check+0x2c25/0xf280 [ 292.345877][ T5919] ? 0xffffffffa002665c [ 292.351721][ T5919] ? is_bpf_text_address+0x177/0x190 [ 292.357496][ T5919] ? bpf_get_btf_vmlinux+0x60/0x60 [ 292.363697][ T5919] ? unwind_get_return_address+0x4d/0x90 [ 292.369737][ T5919] ? stack_trace_save+0xe0/0xe0 [ 292.375981][ T5919] ? arch_stack_walk+0xee/0x140 [ 292.381584][ T5919] ? stack_trace_save+0x98/0xe0 [ 292.399329][ T5919] ? __stack_depot_save+0x34/0x480 [ 292.405097][ T5919] ? __kasan_slab_alloc+0x69/0xf0 [ 292.411274][ T5919] ? _find_next_bit+0x1fa/0x200 [ 292.416585][ T5919] ? __kasan_kmalloc+0xec/0x110 [ 292.426883][ T5919] ? __kasan_kmalloc+0xda/0x110 [ 292.433606][ T5919] ? kmem_cache_alloc_trace+0x119/0x270 [ 292.442954][ T5919] ? selinux_bpf_prog_alloc+0x51/0x140 [ 292.451138][ T5919] ? security_bpf_prog_alloc+0x62/0x90 [ 292.457121][ T5919] ? bpf_prog_load+0x97c/0x1550 [ 292.463081][ T5919] ? __sys_bpf+0x4c3/0x730 [ 292.468124][ T5919] ? __x64_sys_bpf+0x7c/0x90 [ 292.473607][ T5919] ? x64_sys_call+0x4b9/0x9a0 [ 292.480125][ T5919] ? do_syscall_64+0x4c/0xa0 [ 292.485107][ T5919] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 292.492404][ T5919] ? check_stack_object+0x81/0x140 [ 292.498696][ T5919] ? memset+0x35/0x40 [ 292.503627][ T5919] ? bpf_obj_name_cpy+0x193/0x1e0 [ 292.509629][ T5919] bpf_prog_load+0x1042/0x1550 [ 292.516249][ T5919] ? map_freeze+0x360/0x360 [ 292.522036][ T5919] ? selinux_bpf+0xc7/0xf0 [ 292.526708][ T5919] ? security_bpf+0x82/0xa0 [ 292.533073][ T5919] __sys_bpf+0x4c3/0x730 [ 292.537835][ T5919] ? bpf_link_show_fdinfo+0x310/0x310 [ 292.544357][ T5919] ? __kasan_check_write+0x14/0x20 [ 292.549964][ T5919] ? switch_fpu_return+0x15d/0x2c0 [ 292.555934][ T5919] __x64_sys_bpf+0x7c/0x90 [ 292.560609][ T5919] x64_sys_call+0x4b9/0x9a0 [ 292.565167][ T5919] do_syscall_64+0x4c/0xa0 [ 292.569699][ T5919] ? clear_bhb_loop+0x50/0xa0 [ 292.574502][ T5919] ? clear_bhb_loop+0x50/0xa0 [ 292.579322][ T5919] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 292.585357][ T5919] RIP: 0033:0x7fb1b0a2aba9 [ 292.589870][ T5919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 292.609672][ T5919] RSP: 002b:00007fb1af493038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 292.618232][ T5919] RAX: ffffffffffffffda RBX: 00007fb1b0c71fa0 RCX: 00007fb1b0a2aba9 [ 292.626340][ T5919] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 292.635232][ T5919] RBP: 00007fb1b0aade19 R08: 0000000000000000 R09: 0000000000000000 [ 292.644522][ T5919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 292.656934][ T5919] R13: 00007fb1b0c72038 R14: 00007fb1b0c71fa0 R15: 00007fffc6794808 [ 292.665044][ T5919] [ 292.671934][ T5919] ---[ end trace 75b493454674d5d5 ]--- [ 292.954292][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.978326][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.021119][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.050748][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.070210][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.077303][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.100829][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.109408][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.118551][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.125738][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.171248][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.183820][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.193636][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.222145][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.241470][ T5917] device veth0_vlan entered promiscuous mode [ 293.250378][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 293.265179][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.291160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.311896][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.327734][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 293.344918][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 293.375480][ T5917] device veth1_macvtap entered promiscuous mode [ 293.424780][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 293.437171][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.455535][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.498539][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 293.558305][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 295.323397][ T6014] device syzkaller0 entered promiscuous mode [ 295.426333][ T6017] device pim6reg1 entered promiscuous mode [ 295.521921][ T6023] device sit0 entered promiscuous mode [ 295.639304][ T372] device bridge_slave_1 left promiscuous mode [ 295.650105][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.659090][ T372] device bridge_slave_0 left promiscuous mode [ 295.676298][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.684808][ T372] device veth1_macvtap left promiscuous mode [ 295.690995][ T372] device veth0_vlan left promiscuous mode [ 295.909501][ T6046] FAULT_INJECTION: forcing a failure. [ 295.909501][ T6046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 295.923377][ T6046] CPU: 1 PID: 6046 Comm: syz.0.1753 Tainted: G W syzkaller #0 [ 295.932198][ T6046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 295.942271][ T6046] Call Trace: [ 295.945554][ T6046] [ 295.948508][ T6046] __dump_stack+0x21/0x30 [ 295.952867][ T6046] dump_stack_lvl+0xee/0x150 [ 295.957456][ T6046] ? show_regs_print_info+0x20/0x20 [ 295.962654][ T6046] ? vfs_write+0xc17/0xf70 [ 295.967157][ T6046] dump_stack+0x15/0x20 [ 295.971406][ T6046] should_fail+0x3c1/0x510 [ 295.975833][ T6046] should_fail_usercopy+0x1a/0x20 [ 295.980875][ T6046] _copy_from_user+0x20/0xd0 [ 295.985469][ T6046] __sys_bpf+0x233/0x730 [ 295.989710][ T6046] ? bpf_link_show_fdinfo+0x310/0x310 [ 295.995091][ T6046] ? debug_smp_processor_id+0x17/0x20 [ 296.000496][ T6046] __x64_sys_bpf+0x7c/0x90 [ 296.004917][ T6046] x64_sys_call+0x4b9/0x9a0 [ 296.009418][ T6046] do_syscall_64+0x4c/0xa0 [ 296.013835][ T6046] ? clear_bhb_loop+0x50/0xa0 [ 296.018540][ T6046] ? clear_bhb_loop+0x50/0xa0 [ 296.023216][ T6046] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 296.029109][ T6046] RIP: 0033:0x7fb1b0a2aba9 [ 296.033541][ T6046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 296.053161][ T6046] RSP: 002b:00007fb1af493038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 296.061575][ T6046] RAX: ffffffffffffffda RBX: 00007fb1b0c71fa0 RCX: 00007fb1b0a2aba9 [ 296.069570][ T6046] RDX: 0000000000000010 RSI: 0000200000000140 RDI: 0000000000000011 [ 296.077572][ T6046] RBP: 00007fb1af493090 R08: 0000000000000000 R09: 0000000000000000 [ 296.085637][ T6046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 296.093610][ T6046] R13: 00007fb1b0c72038 R14: 00007fb1b0c71fa0 R15: 00007fffc6794808 [ 296.101613][ T6046] [ 296.105769][ T6022] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.114116][ T6022] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.134188][ T6022] device bridge_slave_0 entered promiscuous mode [ 296.153440][ T6022] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.168159][ T6022] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.181788][ T6022] device bridge_slave_1 entered promiscuous mode [ 297.081650][ T6096] FAULT_INJECTION: forcing a failure. [ 297.081650][ T6096] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 297.138234][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 297.151309][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 297.186412][ T6096] CPU: 0 PID: 6096 Comm: syz.1.1770 Tainted: G W syzkaller #0 [ 297.195242][ T6096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 297.205320][ T6096] Call Trace: [ 297.208629][ T6096] [ 297.211578][ T6096] __dump_stack+0x21/0x30 [ 297.215927][ T6096] dump_stack_lvl+0xee/0x150 [ 297.220517][ T6096] ? show_regs_print_info+0x20/0x20 [ 297.225729][ T6096] ? kstrtouint_from_user+0x1a0/0x200 [ 297.231101][ T6096] dump_stack+0x15/0x20 [ 297.235705][ T6096] should_fail+0x3c1/0x510 [ 297.240130][ T6096] should_fail_usercopy+0x1a/0x20 [ 297.245186][ T6096] strncpy_from_user+0x24/0x2e0 [ 297.250250][ T6096] ? __kasan_check_write+0x14/0x20 [ 297.255524][ T6096] bpf_raw_tracepoint_open+0x352/0x960 [ 297.261187][ T6096] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 297.266920][ T6096] ? vfs_write+0xc17/0xf70 [ 297.271531][ T6096] ? selinux_bpf+0xce/0xf0 [ 297.275950][ T6096] ? security_bpf+0x82/0xa0 [ 297.280472][ T6096] __sys_bpf+0x490/0x730 [ 297.284728][ T6096] ? bpf_link_show_fdinfo+0x310/0x310 [ 297.290125][ T6096] ? debug_smp_processor_id+0x17/0x20 [ 297.295531][ T6096] __x64_sys_bpf+0x7c/0x90 [ 297.299954][ T6096] x64_sys_call+0x4b9/0x9a0 [ 297.304493][ T6096] do_syscall_64+0x4c/0xa0 [ 297.309089][ T6096] ? clear_bhb_loop+0x50/0xa0 [ 297.314126][ T6096] ? clear_bhb_loop+0x50/0xa0 [ 297.318817][ T6096] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 297.324805][ T6096] RIP: 0033:0x7fa6d68f7ba9 [ 297.329229][ T6096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.348838][ T6096] RSP: 002b:00007fa6d5360038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 297.357260][ T6096] RAX: ffffffffffffffda RBX: 00007fa6d6b3efa0 RCX: 00007fa6d68f7ba9 [ 297.365239][ T6096] RDX: 0000000000000010 RSI: 0000200000000140 RDI: 0000000000000011 [ 297.373212][ T6096] RBP: 00007fa6d5360090 R08: 0000000000000000 R09: 0000000000000000 [ 297.381187][ T6096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 297.389162][ T6096] R13: 00007fa6d6b3f038 R14: 00007fa6d6b3efa0 R15: 00007ffe6978aa28 [ 297.397247][ T6096] [ 297.441742][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.456742][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.490301][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.497950][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.759504][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 298.767968][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.776419][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.783512][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.792660][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 298.805736][ T6117] bridge0: port 3(veth0_macvtap) entered blocking state [ 298.820094][ T6117] bridge0: port 3(veth0_macvtap) entered disabled state [ 298.827553][ T6117] device veth0_macvtap entered promiscuous mode [ 298.834750][ T6117] bridge0: port 3(veth0_macvtap) entered blocking state [ 298.841743][ T6117] bridge0: port 3(veth0_macvtap) entered forwarding state [ 298.869029][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 298.891132][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 299.044567][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 299.054844][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.184139][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 299.196308][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 299.237506][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 299.270503][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.302414][ T6022] device veth0_vlan entered promiscuous mode [ 299.339428][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 299.347444][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.370863][ T6143] FAULT_INJECTION: forcing a failure. [ 299.370863][ T6143] name failslab, interval 1, probability 0, space 0, times 0 [ 299.390585][ T6143] CPU: 1 PID: 6143 Comm: syz.4.1787 Tainted: G W syzkaller #0 [ 299.399373][ T6143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 299.409425][ T6143] Call Trace: [ 299.412729][ T6143] [ 299.415656][ T6143] __dump_stack+0x21/0x30 [ 299.419985][ T6143] dump_stack_lvl+0xee/0x150 [ 299.424584][ T6143] ? show_regs_print_info+0x20/0x20 [ 299.429781][ T6143] dump_stack+0x15/0x20 [ 299.433925][ T6143] should_fail+0x3c1/0x510 [ 299.438333][ T6143] __should_failslab+0xa4/0xe0 [ 299.443101][ T6143] should_failslab+0x9/0x20 [ 299.447619][ T6143] slab_pre_alloc_hook+0x3b/0xe0 [ 299.452566][ T6143] kmem_cache_alloc_trace+0x48/0x270 [ 299.457862][ T6143] ? bpf_raw_tracepoint_open+0x3c4/0x960 [ 299.463502][ T6143] bpf_raw_tracepoint_open+0x3c4/0x960 [ 299.468966][ T6143] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 299.474690][ T6143] ? vfs_write+0xc17/0xf70 [ 299.479126][ T6143] ? selinux_bpf+0xce/0xf0 [ 299.483647][ T6143] ? security_bpf+0x82/0xa0 [ 299.488155][ T6143] __sys_bpf+0x490/0x730 [ 299.492483][ T6143] ? bpf_link_show_fdinfo+0x310/0x310 [ 299.497896][ T6143] ? debug_smp_processor_id+0x17/0x20 [ 299.503273][ T6143] __x64_sys_bpf+0x7c/0x90 [ 299.507688][ T6143] x64_sys_call+0x4b9/0x9a0 [ 299.512195][ T6143] do_syscall_64+0x4c/0xa0 [ 299.516613][ T6143] ? clear_bhb_loop+0x50/0xa0 [ 299.521290][ T6143] ? clear_bhb_loop+0x50/0xa0 [ 299.525965][ T6143] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 299.531857][ T6143] RIP: 0033:0x7f13e576eba9 [ 299.536283][ T6143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 299.555888][ T6143] RSP: 002b:00007f13e41d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 299.564301][ T6143] RAX: ffffffffffffffda RBX: 00007f13e59b5fa0 RCX: 00007f13e576eba9 [ 299.572269][ T6143] RDX: 0000000000000010 RSI: 0000200000000140 RDI: 0000000000000011 [ 299.580238][ T6143] RBP: 00007f13e41d7090 R08: 0000000000000000 R09: 0000000000000000 [ 299.588207][ T6143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 299.596177][ T6143] R13: 00007f13e59b6038 R14: 00007f13e59b5fa0 R15: 00007ffeb89edcb8 [ 299.604156][ T6143] [ 299.796097][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 299.808829][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 299.835968][ T6022] device veth1_macvtap entered promiscuous mode [ 300.000943][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 300.009533][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 300.090346][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 300.098992][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 302.151918][ T6185] FAULT_INJECTION: forcing a failure. [ 302.151918][ T6185] name failslab, interval 1, probability 0, space 0, times 0 [ 302.190034][ T6185] CPU: 0 PID: 6185 Comm: syz.4.1802 Tainted: G W syzkaller #0 [ 302.198960][ T6185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 302.209041][ T6185] Call Trace: [ 302.212338][ T6185] [ 302.215292][ T6185] __dump_stack+0x21/0x30 [ 302.219678][ T6185] dump_stack_lvl+0xee/0x150 [ 302.224441][ T6185] ? show_regs_print_info+0x20/0x20 [ 302.229661][ T6185] ? stack_trace_save+0x98/0xe0 [ 302.234615][ T6185] dump_stack+0x15/0x20 [ 302.238793][ T6185] should_fail+0x3c1/0x510 [ 302.243258][ T6185] __should_failslab+0xa4/0xe0 [ 302.248046][ T6185] should_failslab+0x9/0x20 [ 302.252655][ T6185] slab_pre_alloc_hook+0x3b/0xe0 [ 302.257640][ T6185] ? __d_alloc+0x2d/0x6a0 [ 302.262075][ T6185] kmem_cache_alloc+0x44/0x260 [ 302.266858][ T6185] __d_alloc+0x2d/0x6a0 [ 302.271029][ T6185] d_alloc_pseudo+0x1d/0x70 [ 302.275547][ T6185] alloc_file_pseudo+0xc8/0x1f0 [ 302.280417][ T6185] ? alloc_empty_file_noaccount+0x80/0x80 [ 302.286167][ T6185] ? __kasan_check_write+0x14/0x20 [ 302.291306][ T6185] ? _raw_spin_lock_bh+0x8e/0xe0 [ 302.296282][ T6185] anon_inode_getfile+0xa6/0x180 [ 302.301257][ T6185] bpf_link_prime+0xf0/0x250 [ 302.305877][ T6185] bpf_raw_tracepoint_open+0x4d4/0x960 [ 302.311448][ T6185] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 302.317196][ T6185] ? vfs_write+0xc17/0xf70 [ 302.321639][ T6185] ? selinux_bpf+0xce/0xf0 [ 302.326084][ T6185] ? security_bpf+0x82/0xa0 [ 302.330608][ T6185] __sys_bpf+0x490/0x730 [ 302.334869][ T6185] ? bpf_link_show_fdinfo+0x310/0x310 [ 302.340264][ T6185] ? debug_smp_processor_id+0x17/0x20 [ 302.345658][ T6185] __x64_sys_bpf+0x7c/0x90 [ 302.350086][ T6185] x64_sys_call+0x4b9/0x9a0 [ 302.354612][ T6185] do_syscall_64+0x4c/0xa0 [ 302.359050][ T6185] ? clear_bhb_loop+0x50/0xa0 [ 302.363865][ T6185] ? clear_bhb_loop+0x50/0xa0 [ 302.368578][ T6185] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 302.374496][ T6185] RIP: 0033:0x7f13e576eba9 [ 302.378930][ T6185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 302.398564][ T6185] RSP: 002b:00007f13e41d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 302.407000][ T6185] RAX: ffffffffffffffda RBX: 00007f13e59b5fa0 RCX: 00007f13e576eba9 [ 302.414993][ T6185] RDX: 0000000000000010 RSI: 0000200000000140 RDI: 0000000000000011 [ 302.422978][ T6185] RBP: 00007f13e41d7090 R08: 0000000000000000 R09: 0000000000000000 [ 302.430986][ T6185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 302.438968][ T6185] R13: 00007f13e59b6038 R14: 00007f13e59b5fa0 R15: 00007ffeb89edcb8 [ 302.447068][ T6185] [ 302.460954][ T8] device bridge_slave_1 left promiscuous mode [ 302.480181][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.502913][ T8] device bridge_slave_0 left promiscuous mode [ 302.509170][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.528443][ T8] device veth1_macvtap left promiscuous mode [ 302.538210][ T8] device veth0_vlan left promiscuous mode [ 302.941848][ T6228] FAULT_INJECTION: forcing a failure. [ 302.941848][ T6228] name failslab, interval 1, probability 0, space 0, times 0 [ 302.990081][ T6228] CPU: 0 PID: 6228 Comm: syz.4.1819 Tainted: G W syzkaller #0 [ 302.999038][ T6228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 303.009214][ T6228] Call Trace: [ 303.012502][ T6228] [ 303.015528][ T6228] __dump_stack+0x21/0x30 [ 303.019985][ T6228] dump_stack_lvl+0xee/0x150 [ 303.024589][ T6228] ? show_regs_print_info+0x20/0x20 [ 303.029801][ T6228] dump_stack+0x15/0x20 [ 303.034051][ T6228] should_fail+0x3c1/0x510 [ 303.038477][ T6228] __should_failslab+0xa4/0xe0 [ 303.043246][ T6228] should_failslab+0x9/0x20 [ 303.047842][ T6228] slab_pre_alloc_hook+0x3b/0xe0 [ 303.052787][ T6228] ? __alloc_file+0x28/0x2a0 [ 303.057427][ T6228] kmem_cache_alloc+0x44/0x260 [ 303.062301][ T6228] __alloc_file+0x28/0x2a0 [ 303.066809][ T6228] alloc_empty_file+0x97/0x180 [ 303.071748][ T6228] alloc_file+0x59/0x540 [ 303.075997][ T6228] alloc_file_pseudo+0x17a/0x1f0 [ 303.080945][ T6228] ? alloc_empty_file_noaccount+0x80/0x80 [ 303.086674][ T6228] ? _raw_spin_lock_bh+0x8e/0xe0 [ 303.091623][ T6228] anon_inode_getfile+0xa6/0x180 [ 303.096664][ T6228] bpf_link_prime+0xf0/0x250 [ 303.101256][ T6228] bpf_raw_tracepoint_open+0x4d4/0x960 [ 303.106807][ T6228] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 303.112612][ T6228] ? vfs_write+0xc17/0xf70 [ 303.117122][ T6228] ? selinux_bpf+0xce/0xf0 [ 303.121635][ T6228] ? security_bpf+0x82/0xa0 [ 303.126149][ T6228] __sys_bpf+0x490/0x730 [ 303.130510][ T6228] ? bpf_link_show_fdinfo+0x310/0x310 [ 303.135934][ T6228] ? debug_smp_processor_id+0x17/0x20 [ 303.141427][ T6228] __x64_sys_bpf+0x7c/0x90 [ 303.145865][ T6228] x64_sys_call+0x4b9/0x9a0 [ 303.150382][ T6228] do_syscall_64+0x4c/0xa0 [ 303.154810][ T6228] ? clear_bhb_loop+0x50/0xa0 [ 303.159496][ T6228] ? clear_bhb_loop+0x50/0xa0 [ 303.164182][ T6228] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 303.170081][ T6228] RIP: 0033:0x7f13e576eba9 [ 303.174503][ T6228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 303.194198][ T6228] RSP: 002b:00007f13e41d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 303.202718][ T6228] RAX: ffffffffffffffda RBX: 00007f13e59b5fa0 RCX: 00007f13e576eba9 [ 303.211131][ T6228] RDX: 0000000000000010 RSI: 0000200000000140 RDI: 0000000000000011 [ 303.219200][ T6228] RBP: 00007f13e41d7090 R08: 0000000000000000 R09: 0000000000000000 [ 303.227280][ T6228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 303.235254][ T6228] R13: 00007f13e59b6038 R14: 00007f13e59b5fa0 R15: 00007ffeb89edcb8 [ 303.243323][ T6228] [ 303.389750][ T6248] device wg2 left promiscuous mode [ 303.396369][ T6202] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.404053][ T6202] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.419581][ T6202] device bridge_slave_0 entered promiscuous mode [ 303.480406][ T6202] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.487490][ T6202] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.501063][ T6202] device bridge_slave_1 entered promiscuous mode [ 303.509259][ T6257] device syzkaller0 entered promiscuous mode [ 303.557150][ T6261] FAULT_INJECTION: forcing a failure. [ 303.557150][ T6261] name failslab, interval 1, probability 0, space 0, times 0 [ 303.570319][ T6261] CPU: 0 PID: 6261 Comm: syz.0.1831 Tainted: G W syzkaller #0 [ 303.579209][ T6261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 303.589290][ T6261] Call Trace: [ 303.592583][ T6261] [ 303.595521][ T6261] __dump_stack+0x21/0x30 [ 303.599937][ T6261] dump_stack_lvl+0xee/0x150 [ 303.604544][ T6261] ? show_regs_print_info+0x20/0x20 [ 303.609847][ T6261] dump_stack+0x15/0x20 [ 303.614370][ T6261] should_fail+0x3c1/0x510 [ 303.618809][ T6261] __should_failslab+0xa4/0xe0 [ 303.623594][ T6261] should_failslab+0x9/0x20 [ 303.628114][ T6261] slab_pre_alloc_hook+0x3b/0xe0 [ 303.633079][ T6261] ? security_file_alloc+0x33/0x120 [ 303.638387][ T6261] kmem_cache_alloc+0x44/0x260 [ 303.643288][ T6261] security_file_alloc+0x33/0x120 [ 303.648338][ T6261] __alloc_file+0xb5/0x2a0 [ 303.652879][ T6261] alloc_empty_file+0x97/0x180 [ 303.657657][ T6261] alloc_file+0x59/0x540 [ 303.662062][ T6261] alloc_file_pseudo+0x17a/0x1f0 [ 303.667015][ T6261] ? alloc_empty_file_noaccount+0x80/0x80 [ 303.672907][ T6261] ? _raw_spin_lock_bh+0x8e/0xe0 [ 303.677902][ T6261] anon_inode_getfile+0xa6/0x180 [ 303.682866][ T6261] bpf_link_prime+0xf0/0x250 [ 303.687495][ T6261] bpf_raw_tracepoint_open+0x4d4/0x960 [ 303.692973][ T6261] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 303.698709][ T6261] ? vfs_write+0xc17/0xf70 [ 303.703150][ T6261] ? selinux_bpf+0xce/0xf0 [ 303.707686][ T6261] ? security_bpf+0x82/0xa0 [ 303.712208][ T6261] __sys_bpf+0x490/0x730 [ 303.716578][ T6261] ? bpf_link_show_fdinfo+0x310/0x310 [ 303.721968][ T6261] ? debug_smp_processor_id+0x17/0x20 [ 303.727363][ T6261] __x64_sys_bpf+0x7c/0x90 [ 303.731794][ T6261] x64_sys_call+0x4b9/0x9a0 [ 303.736399][ T6261] do_syscall_64+0x4c/0xa0 [ 303.740830][ T6261] ? clear_bhb_loop+0x50/0xa0 [ 303.745521][ T6261] ? clear_bhb_loop+0x50/0xa0 [ 303.750220][ T6261] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 303.756132][ T6261] RIP: 0033:0x7fb1b0a2aba9 [ 303.760651][ T6261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 303.780362][ T6261] RSP: 002b:00007fb1af493038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 303.788800][ T6261] RAX: ffffffffffffffda RBX: 00007fb1b0c71fa0 RCX: 00007fb1b0a2aba9 [ 303.796886][ T6261] RDX: 0000000000000010 RSI: 0000200000000140 RDI: 0000000000000011 [ 303.804877][ T6261] RBP: 00007fb1af493090 R08: 0000000000000000 R09: 0000000000000000 [ 303.812886][ T6261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 303.820878][ T6261] R13: 00007fb1b0c72038 R14: 00007fb1b0c71fa0 R15: 00007fffc6794808 [ 303.829015][ T6261] [ 304.230538][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 304.253740][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.296656][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.308636][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.318551][ T1265] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.325673][ T1265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.350732][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.370474][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.378740][ T1265] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.385823][ T1265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.394545][ T1265] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.457067][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.473980][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.501296][ T6304] FAULT_INJECTION: forcing a failure. [ 304.501296][ T6304] name failslab, interval 1, probability 0, space 0, times 0 [ 304.530328][ T6304] CPU: 0 PID: 6304 Comm: syz.0.1844 Tainted: G W syzkaller #0 [ 304.539156][ T6304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 304.549218][ T6304] Call Trace: [ 304.552520][ T6304] [ 304.555447][ T6304] __dump_stack+0x21/0x30 [ 304.559803][ T6304] dump_stack_lvl+0xee/0x150 [ 304.564409][ T6304] ? show_regs_print_info+0x20/0x20 [ 304.569608][ T6304] dump_stack+0x15/0x20 [ 304.573759][ T6304] should_fail+0x3c1/0x510 [ 304.578271][ T6304] __should_failslab+0xa4/0xe0 [ 304.583027][ T6304] should_failslab+0x9/0x20 [ 304.587613][ T6304] slab_pre_alloc_hook+0x3b/0xe0 [ 304.592541][ T6304] ? security_file_alloc+0x33/0x120 [ 304.597733][ T6304] kmem_cache_alloc+0x44/0x260 [ 304.602632][ T6304] security_file_alloc+0x33/0x120 [ 304.607684][ T6304] __alloc_file+0xb5/0x2a0 [ 304.612298][ T6304] alloc_empty_file+0x97/0x180 [ 304.617084][ T6304] alloc_file+0x59/0x540 [ 304.621339][ T6304] alloc_file_pseudo+0x17a/0x1f0 [ 304.626297][ T6304] ? alloc_empty_file_noaccount+0x80/0x80 [ 304.632028][ T6304] ? _raw_spin_lock_bh+0x8e/0xe0 [ 304.636977][ T6304] anon_inode_getfile+0xa6/0x180 [ 304.641927][ T6304] bpf_link_prime+0xf0/0x250 [ 304.646521][ T6304] bpf_raw_tracepoint_open+0x4d4/0x960 [ 304.651986][ T6304] ? bpf_obj_get_info_by_fd+0x2990/0x2990 [ 304.657713][ T6304] ? vfs_write+0xc17/0xf70 [ 304.662658][ T6304] ? selinux_bpf+0xce/0xf0 [ 304.667079][ T6304] ? security_bpf+0x82/0xa0 [ 304.671582][ T6304] __sys_bpf+0x490/0x730 [ 304.675841][ T6304] ? bpf_link_show_fdinfo+0x310/0x310 [ 304.681221][ T6304] ? debug_smp_processor_id+0x17/0x20 [ 304.686605][ T6304] __x64_sys_bpf+0x7c/0x90 [ 304.691108][ T6304] x64_sys_call+0x4b9/0x9a0 [ 304.695616][ T6304] do_syscall_64+0x4c/0xa0 [ 304.700065][ T6304] ? clear_bhb_loop+0x50/0xa0 [ 304.704774][ T6304] ? clear_bhb_loop+0x50/0xa0 [ 304.709671][ T6304] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 304.715675][ T6304] RIP: 0033:0x7fb1b0a2aba9 [ 304.720099][ T6304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 304.739735][ T6304] RSP: 002b:00007fb1af493038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 304.748166][ T6304] RAX: ffffffffffffffda RBX: 00007fb1b0c71fa0 RCX: 00007fb1b0a2aba9 [ 304.756227][ T6304] RDX: 0000000000000010 RSI: 0000200000000140 RDI: 0000000000000011 [ 304.764338][ T6304] RBP: 00007fb1af493090 R08: 0000000000000000 R09: 0000000000000000 [ 304.772436][ T6304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.780409][ T6304] R13: 00007fb1b0c72038 R14: 00007fb1b0c71fa0 R15: 00007fffc6794808 [ 304.788584][ T6304] [ 304.794702][ T6307] device wg2 entered promiscuous mode [ 304.871770][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.916144][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.967964][ T6202] device veth0_vlan entered promiscuous mode [ 305.031891][ T6318] device pim6reg1 entered promiscuous mode [ 305.038710][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.052827][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.062631][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.101519][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 305.110878][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 305.134091][ T6202] device veth1_macvtap entered promiscuous mode [ 305.160265][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 305.185694][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 305.194659][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 305.203988][ T6327] device sit0 left promiscuous mode [ 305.258628][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 305.300483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 305.362982][ T6328] device sit0 entered promiscuous mode [ 305.507558][ T6343] FAULT_INJECTION: forcing a failure. [ 305.507558][ T6343] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 305.521209][ T6343] CPU: 1 PID: 6343 Comm: syz.4.1858 Tainted: G W syzkaller #0 [ 305.530125][ T6343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 305.540217][ T6343] Call Trace: [ 305.543495][ T6343] [ 305.546425][ T6343] __dump_stack+0x21/0x30 [ 305.550769][ T6343] dump_stack_lvl+0xee/0x150 [ 305.555363][ T6343] ? show_regs_print_info+0x20/0x20 [ 305.560567][ T6343] dump_stack+0x15/0x20 [ 305.564748][ T6343] should_fail+0x3c1/0x510 [ 305.569171][ T6343] should_fail_usercopy+0x1a/0x20 [ 305.574193][ T6343] _copy_to_user+0x20/0x90 [ 305.578612][ T6343] simple_read_from_buffer+0xe9/0x160 [ 305.583989][ T6343] proc_fail_nth_read+0x19a/0x210 [ 305.589015][ T6343] ? proc_fault_inject_write+0x2f0/0x2f0 [ 305.594654][ T6343] ? security_file_permission+0x83/0xa0 [ 305.600485][ T6343] ? proc_fault_inject_write+0x2f0/0x2f0 [ 305.606125][ T6343] vfs_read+0x282/0xbe0 [ 305.610282][ T6343] ? kernel_read+0x1f0/0x1f0 [ 305.614870][ T6343] ? __kasan_check_write+0x14/0x20 [ 305.619989][ T6343] ? mutex_lock+0x95/0x1a0 [ 305.624407][ T6343] ? wait_for_completion_killable_timeout+0x10/0x10 [ 305.630997][ T6343] ? __fget_files+0x2c4/0x320 [ 305.635682][ T6343] ? __fdget_pos+0x2d2/0x380 [ 305.640278][ T6343] ? ksys_read+0x71/0x240 [ 305.644608][ T6343] ksys_read+0x140/0x240 [ 305.648850][ T6343] ? vfs_write+0xf70/0xf70 [ 305.653264][ T6343] ? debug_smp_processor_id+0x17/0x20 [ 305.658642][ T6343] __x64_sys_read+0x7b/0x90 [ 305.663148][ T6343] x64_sys_call+0x96d/0x9a0 [ 305.667681][ T6343] do_syscall_64+0x4c/0xa0 [ 305.672103][ T6343] ? clear_bhb_loop+0x50/0xa0 [ 305.676784][ T6343] ? clear_bhb_loop+0x50/0xa0 [ 305.681466][ T6343] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 305.687470][ T6343] RIP: 0033:0x7f13e576d5bc [ 305.691887][ T6343] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 305.711501][ T6343] RSP: 002b:00007f13e41d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 305.719923][ T6343] RAX: ffffffffffffffda RBX: 00007f13e59b5fa0 RCX: 00007f13e576d5bc [ 305.727906][ T6343] RDX: 000000000000000f RSI: 00007f13e41d70a0 RDI: 0000000000000007 [ 305.735880][ T6343] RBP: 00007f13e41d7090 R08: 0000000000000000 R09: 0000000000000000 [ 305.743904][ T6343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.751888][ T6343] R13: 00007f13e59b6038 R14: 00007f13e59b5fa0 R15: 00007ffeb89edcb8 [ 305.759870][ T6343] [ 305.786582][ T6337] device veth0_vlan left promiscuous mode [ 305.794551][ T6337] device veth0_vlan entered promiscuous mode [ 305.912627][ T6341] ªªªªªª: renamed from vlan0 [ 305.925233][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.939791][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.950442][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.852405][ T10] device bridge_slave_1 left promiscuous mode [ 307.858628][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.923582][ T10] device bridge_slave_0 left promiscuous mode [ 307.929762][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.045458][ T10] device veth1_macvtap left promiscuous mode [ 308.085838][ T10] device veth0_vlan left promiscuous mode [ 308.795445][ T6377] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.870450][ T6377] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.915528][ T6377] device bridge_slave_0 entered promiscuous mode [ 308.998567][ T6377] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.081163][ T6377] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.088748][ T6377] device bridge_slave_1 entered promiscuous mode [ 309.209721][ T30] audit: type=1400 audit(1757550759.930:162): avc: denied { read } for pid=6417 comm="syz.0.1881" name="cgroup.subtree_control" dev="cgroup2" ino=369 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 309.429328][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 309.449867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.476428][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 309.487465][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.496078][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.503283][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.535231][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 309.599720][ T6444] device syzkaller0 entered promiscuous mode [ 309.616480][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 309.630902][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.660941][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.668000][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.690882][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 309.710233][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.889436][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 309.900391][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.957772][ T6454] device syzkaller0 entered promiscuous mode [ 309.979598][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 309.996898][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 310.023754][ T6377] device veth0_vlan entered promiscuous mode [ 310.040183][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 310.051408][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 310.068649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.101598][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 310.121326][ T6377] device veth1_macvtap entered promiscuous mode [ 310.287906][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 310.297707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 310.342801][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 310.414357][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 311.601787][ T10] device bridge_slave_1 left promiscuous mode [ 311.607986][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.615576][ T10] device bridge_slave_0 left promiscuous mode [ 311.621804][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.629666][ T10] device veth1_macvtap left promiscuous mode [ 311.635768][ T10] device veth0_vlan left promiscuous mode [ 312.568394][ T6490] device sit0 left promiscuous mode [ 312.617226][ T6491] device sit0 entered promiscuous mode [ 312.802182][ T6497] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.829906][ T6497] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.860915][ T6497] device bridge_slave_0 entered promiscuous mode [ 312.890088][ T6497] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.910236][ T6497] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.933863][ T6497] device bridge_slave_1 entered promiscuous mode [ 313.277178][ T6497] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.284306][ T6497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.291714][ T6497] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.298750][ T6497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.431839][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.470573][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.524148][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.560366][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.570823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.579271][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.586443][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.637819][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.651836][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.664542][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.671678][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.762304][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 313.776012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.798645][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 313.807552][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.904752][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 313.922832][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.054742][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 314.072630][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.083850][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.103876][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.120872][ T6497] device veth0_vlan entered promiscuous mode [ 314.200574][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 314.230861][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 314.263948][ T6497] device veth1_macvtap entered promiscuous mode [ 314.275098][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 314.306645][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 314.315500][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 314.327260][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 314.335889][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 315.820758][ T10] device bridge_slave_1 left promiscuous mode [ 315.826920][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.834507][ T10] device bridge_slave_0 left promiscuous mode [ 315.840749][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.848600][ T10] device veth1_macvtap left promiscuous mode [ 315.854793][ T10] device veth0_vlan left promiscuous mode [ 316.737463][ T6582] device pim6reg1 entered promiscuous mode [ 316.921990][ T6606] device pim6reg1 entered promiscuous mode [ 317.008117][ T6600] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.015365][ T6600] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.060641][ T6600] device bridge_slave_0 entered promiscuous mode [ 317.145748][ T6600] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.176259][ T6600] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.186159][ T6600] device bridge_slave_1 entered promiscuous mode [ 317.746428][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 317.755221][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 317.841813][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 317.898123][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 317.986543][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.993898][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.002672][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.011761][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.023474][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.030577][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.088696][ T6674] syz.1.1955[6674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.088774][ T6674] syz.1.1955[6674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.100517][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 318.170597][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 318.178927][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 318.187455][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 318.198224][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 318.264608][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 318.276610][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 318.336729][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 318.384543][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 318.407481][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 318.479885][ T6600] device veth0_vlan entered promiscuous mode [ 318.493860][ T6689] bond_slave_1: mtu less than device minimum [ 318.779312][ T6697] device pim6reg1 entered promiscuous mode [ 318.787203][ T6600] device veth1_macvtap entered promiscuous mode [ 318.822983][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 318.837812][ T6694] device bridge0 entered promiscuous mode [ 318.853731][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 318.868734][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 318.932762][ T6710] ±ÿ: renamed from team_slave_1 [ 318.938448][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 318.950586][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 320.351165][ T10] device bridge_slave_1 left promiscuous mode [ 320.357316][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.365175][ T10] device bridge_slave_0 left promiscuous mode [ 320.371392][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.379694][ T10] device veth1_macvtap left promiscuous mode [ 320.385849][ T10] device veth0_vlan left promiscuous mode [ 321.344144][ T6754] FAULT_INJECTION: forcing a failure. [ 321.344144][ T6754] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 321.398641][ T6754] CPU: 1 PID: 6754 Comm: syz.1.1983 Tainted: G W syzkaller #0 [ 321.407468][ T6754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 321.417558][ T6754] Call Trace: [ 321.420863][ T6754] [ 321.423832][ T6754] __dump_stack+0x21/0x30 [ 321.428301][ T6754] dump_stack_lvl+0xee/0x150 [ 321.432930][ T6754] ? show_regs_print_info+0x20/0x20 [ 321.438167][ T6754] ? vfs_write+0xc17/0xf70 [ 321.442627][ T6754] dump_stack+0x15/0x20 [ 321.446815][ T6754] should_fail+0x3c1/0x510 [ 321.451355][ T6754] should_fail_usercopy+0x1a/0x20 [ 321.456418][ T6754] _copy_from_user+0x20/0xd0 [ 321.461044][ T6754] __sys_bpf+0x233/0x730 [ 321.465316][ T6754] ? bpf_link_show_fdinfo+0x310/0x310 [ 321.470718][ T6754] ? debug_smp_processor_id+0x17/0x20 [ 321.476143][ T6754] __x64_sys_bpf+0x7c/0x90 [ 321.480590][ T6754] x64_sys_call+0x4b9/0x9a0 [ 321.485117][ T6754] do_syscall_64+0x4c/0xa0 [ 321.489673][ T6754] ? clear_bhb_loop+0x50/0xa0 [ 321.494381][ T6754] ? clear_bhb_loop+0x50/0xa0 [ 321.499082][ T6754] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 321.505037][ T6754] RIP: 0033:0x7fa6d68f7ba9 [ 321.509508][ T6754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 321.529180][ T6754] RSP: 002b:00007fa6d5360038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 321.537624][ T6754] RAX: ffffffffffffffda RBX: 00007fa6d6b3efa0 RCX: 00007fa6d68f7ba9 [ 321.545746][ T6754] RDX: 0000000000000020 RSI: 00002000000001c0 RDI: 0000000000000004 [ 321.553849][ T6754] RBP: 00007fa6d5360090 R08: 0000000000000000 R09: 0000000000000000 [ 321.562049][ T6754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 321.570046][ T6754] R13: 00007fa6d6b3f038 R14: 00007fa6d6b3efa0 R15: 00007ffe6978aa28 [ 321.578148][ T6754] [ 321.758122][ T6752] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.815599][ T6752] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.882189][ T6752] device bridge_slave_0 entered promiscuous mode [ 321.889402][ T6752] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.010282][ T6752] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.022312][ T6752] device bridge_slave_1 entered promiscuous mode [ 322.344704][ T6797] FAULT_INJECTION: forcing a failure. [ 322.344704][ T6797] name failslab, interval 1, probability 0, space 0, times 0 [ 322.360061][ T6797] CPU: 0 PID: 6797 Comm: syz.4.1996 Tainted: G W syzkaller #0 [ 322.368865][ T6797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 322.378932][ T6797] Call Trace: [ 322.382216][ T6797] [ 322.385155][ T6797] __dump_stack+0x21/0x30 [ 322.389493][ T6797] dump_stack_lvl+0xee/0x150 [ 322.394089][ T6797] ? show_regs_print_info+0x20/0x20 [ 322.399438][ T6797] ? finish_task_switch+0x32a/0x780 [ 322.404640][ T6797] dump_stack+0x15/0x20 [ 322.408794][ T6797] should_fail+0x3c1/0x510 [ 322.413217][ T6797] __should_failslab+0xa4/0xe0 [ 322.418005][ T6797] should_failslab+0x9/0x20 [ 322.422506][ T6797] slab_pre_alloc_hook+0x3b/0xe0 [ 322.427444][ T6797] ? __alloc_skb+0xe0/0x740 [ 322.431946][ T6797] kmem_cache_alloc+0x44/0x260 [ 322.436710][ T6797] __alloc_skb+0xe0/0x740 [ 322.441125][ T6797] alloc_skb_with_frags+0xa8/0x620 [ 322.446238][ T6797] sock_alloc_send_pskb+0x853/0x980 [ 322.451449][ T6797] ? is_bpf_text_address+0x177/0x190 [ 322.456749][ T6797] ? __kernel_text_address+0xa0/0x100 [ 322.462218][ T6797] ? sock_kzfree_s+0x60/0x60 [ 322.466826][ T6797] ? stack_trace_save+0x98/0xe0 [ 322.471679][ T6797] tun_get_user+0x4e6/0x33c0 [ 322.476277][ T6797] ? __kasan_init_slab_obj+0x20/0x40 [ 322.481570][ T6797] ? kmem_cache_free+0x100/0x320 [ 322.486616][ T6797] ? __x64_sys_openat+0x136/0x160 [ 322.491646][ T6797] ? x64_sys_call+0x219/0x9a0 [ 322.496337][ T6797] ? tun_do_read+0x1c40/0x1c40 [ 322.501103][ T6797] ? kstrtouint_from_user+0x1a0/0x200 [ 322.506782][ T6797] ? kstrtol_from_user+0x260/0x260 [ 322.511909][ T6797] ? bpf_probe_read_user+0x4a/0x70 [ 322.517031][ T6797] ? avc_policy_seqno+0x1b/0x70 [ 322.521892][ T6797] ? selinux_file_permission+0x2aa/0x510 [ 322.527560][ T6797] tun_chr_write_iter+0x1eb/0x2e0 [ 322.532602][ T6797] vfs_write+0x802/0xf70 [ 322.536854][ T6797] ? file_end_write+0x1b0/0x1b0 [ 322.541733][ T6797] ? __fget_files+0x2c4/0x320 [ 322.546418][ T6797] ? __fdget_pos+0x1f7/0x380 [ 322.551054][ T6797] ? ksys_write+0x71/0x240 [ 322.555473][ T6797] ksys_write+0x140/0x240 [ 322.559982][ T6797] ? __ia32_sys_read+0x90/0x90 [ 322.564764][ T6797] ? debug_smp_processor_id+0x17/0x20 [ 322.570144][ T6797] __x64_sys_write+0x7b/0x90 [ 322.574752][ T6797] x64_sys_call+0x8ef/0x9a0 [ 322.579312][ T6797] do_syscall_64+0x4c/0xa0 [ 322.583721][ T6797] ? clear_bhb_loop+0x50/0xa0 [ 322.588485][ T6797] ? clear_bhb_loop+0x50/0xa0 [ 322.593165][ T6797] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 322.599061][ T6797] RIP: 0033:0x7f13e576eba9 [ 322.603472][ T6797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 322.623086][ T6797] RSP: 002b:00007f13e41d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 322.631518][ T6797] RAX: ffffffffffffffda RBX: 00007f13e59b5fa0 RCX: 00007f13e576eba9 [ 322.639511][ T6797] RDX: 000000000000fdef RSI: 0000200000000140 RDI: 00000000000000c8 [ 322.647485][ T6797] RBP: 00007f13e41d7090 R08: 0000000000000000 R09: 0000000000000000 [ 322.655456][ T6797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 322.663441][ T6797] R13: 00007f13e59b6038 R14: 00007f13e59b5fa0 R15: 00007ffeb89edcb8 [ 322.671421][ T6797] [ 322.767642][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 322.788837][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.799301][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.844312][ T6823] FAULT_INJECTION: forcing a failure. [ 322.844312][ T6823] name failslab, interval 1, probability 0, space 0, times 0 [ 322.857766][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.869085][ T6823] CPU: 0 PID: 6823 Comm: syz.4.2004 Tainted: G W syzkaller #0 [ 322.877882][ T6823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 322.887943][ T6823] Call Trace: [ 322.891306][ T6823] [ 322.894244][ T6823] __dump_stack+0x21/0x30 [ 322.898583][ T6823] dump_stack_lvl+0xee/0x150 [ 322.903287][ T6823] ? show_regs_print_info+0x20/0x20 [ 322.908492][ T6823] ? kstrtouint_from_user+0x1a0/0x200 [ 322.913867][ T6823] dump_stack+0x15/0x20 [ 322.918019][ T6823] should_fail+0x3c1/0x510 [ 322.922442][ T6823] __should_failslab+0xa4/0xe0 [ 322.927207][ T6823] should_failslab+0x9/0x20 [ 322.931713][ T6823] slab_pre_alloc_hook+0x3b/0xe0 [ 322.936657][ T6823] __kmalloc+0x6d/0x2c0 [ 322.940813][ T6823] ? kvmalloc_node+0x206/0x300 [ 322.945575][ T6823] kvmalloc_node+0x206/0x300 [ 322.950165][ T6823] ? vm_mmap+0xb0/0xb0 [ 322.954242][ T6823] ? __fdget+0x1a1/0x230 [ 322.958486][ T6823] map_get_next_key+0x279/0x4c0 [ 322.963420][ T6823] __sys_bpf+0x390/0x730 [ 322.967747][ T6823] ? bpf_link_show_fdinfo+0x310/0x310 [ 322.973121][ T6823] ? debug_smp_processor_id+0x17/0x20 [ 322.978500][ T6823] __x64_sys_bpf+0x7c/0x90 [ 322.982913][ T6823] x64_sys_call+0x4b9/0x9a0 [ 322.987413][ T6823] do_syscall_64+0x4c/0xa0 [ 322.991825][ T6823] ? clear_bhb_loop+0x50/0xa0 [ 322.996502][ T6823] ? clear_bhb_loop+0x50/0xa0 [ 323.001199][ T6823] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 323.007098][ T6823] RIP: 0033:0x7f13e576eba9 [ 323.011509][ T6823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.031114][ T6823] RSP: 002b:00007f13e41d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 323.039535][ T6823] RAX: ffffffffffffffda RBX: 00007f13e59b5fa0 RCX: 00007f13e576eba9 [ 323.047512][ T6823] RDX: 0000000000000020 RSI: 00002000000001c0 RDI: 0000000000000004 [ 323.055482][ T6823] RBP: 00007f13e41d7090 R08: 0000000000000000 R09: 0000000000000000 [ 323.063450][ T6823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.071419][ T6823] R13: 00007f13e59b6038 R14: 00007f13e59b5fa0 R15: 00007ffeb89edcb8 [ 323.079396][ T6823] [ 323.084499][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.091590][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.100235][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 323.120036][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 323.128427][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.166896][ T6839] FAULT_INJECTION: forcing a failure. [ 323.166896][ T6839] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 323.181527][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.188586][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.226902][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 323.234903][ T6839] CPU: 0 PID: 6839 Comm: syz.4.2010 Tainted: G W syzkaller #0 [ 323.243689][ T6839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 323.253761][ T6839] Call Trace: [ 323.257059][ T6839] [ 323.260015][ T6839] __dump_stack+0x21/0x30 [ 323.264369][ T6839] dump_stack_lvl+0xee/0x150 [ 323.268990][ T6839] ? show_regs_print_info+0x20/0x20 [ 323.274227][ T6839] ? stack_trace_save+0x98/0xe0 [ 323.279109][ T6839] dump_stack+0x15/0x20 [ 323.283294][ T6839] should_fail+0x3c1/0x510 [ 323.287733][ T6839] should_fail_alloc_page+0x55/0x80 [ 323.292956][ T6839] prepare_alloc_pages+0x156/0x600 [ 323.298092][ T6839] ? __alloc_pages_bulk+0xab0/0xab0 [ 323.303362][ T6839] __alloc_pages+0x10a/0x440 [ 323.307985][ T6839] ? prep_new_page+0x110/0x110 [ 323.312770][ T6839] kmalloc_order+0x4c/0x160 [ 323.317273][ T6839] ? alloc_skb_with_frags+0xa8/0x620 [ 323.322552][ T6839] kmalloc_order_trace+0x18/0xb0 [ 323.327491][ T6839] __kmalloc_track_caller+0x198/0x2c0 [ 323.332900][ T6839] ? kmem_cache_alloc+0xf7/0x260 [ 323.337840][ T6839] ? alloc_skb_with_frags+0xa8/0x620 [ 323.343129][ T6839] __alloc_skb+0x21a/0x740 [ 323.347552][ T6839] alloc_skb_with_frags+0xa8/0x620 [ 323.352679][ T6839] sock_alloc_send_pskb+0x853/0x980 [ 323.357879][ T6839] ? is_bpf_text_address+0x177/0x190 [ 323.363170][ T6839] ? __kernel_text_address+0xa0/0x100 [ 323.368589][ T6839] ? sock_kzfree_s+0x60/0x60 [ 323.373186][ T6839] ? stack_trace_save+0x98/0xe0 [ 323.378047][ T6839] tun_get_user+0x4e6/0x33c0 [ 323.382642][ T6839] ? __kasan_init_slab_obj+0x20/0x40 [ 323.387933][ T6839] ? kmem_cache_free+0x100/0x320 [ 323.392867][ T6839] ? __x64_sys_openat+0x136/0x160 [ 323.397887][ T6839] ? x64_sys_call+0x219/0x9a0 [ 323.402564][ T6839] ? tun_do_read+0x1c40/0x1c40 [ 323.407335][ T6839] ? kstrtouint_from_user+0x1a0/0x200 [ 323.413250][ T6839] ? kstrtol_from_user+0x260/0x260 [ 323.418368][ T6839] ? bpf_probe_read_user+0x4a/0x70 [ 323.423489][ T6839] ? avc_policy_seqno+0x1b/0x70 [ 323.428366][ T6839] ? selinux_file_permission+0x2aa/0x510 [ 323.434256][ T6839] tun_chr_write_iter+0x1eb/0x2e0 [ 323.439289][ T6839] vfs_write+0x802/0xf70 [ 323.443551][ T6839] ? file_end_write+0x1b0/0x1b0 [ 323.448515][ T6839] ? __fget_files+0x2c4/0x320 [ 323.453329][ T6839] ? __fdget_pos+0x1f7/0x380 [ 323.457931][ T6839] ? ksys_write+0x71/0x240 [ 323.462364][ T6839] ksys_write+0x140/0x240 [ 323.466732][ T6839] ? __ia32_sys_read+0x90/0x90 [ 323.471535][ T6839] ? debug_smp_processor_id+0x17/0x20 [ 323.477053][ T6839] __x64_sys_write+0x7b/0x90 [ 323.480599][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.481675][ T6839] x64_sys_call+0x8ef/0x9a0 [ 323.481702][ T6839] do_syscall_64+0x4c/0xa0 [ 323.493288][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 323.493937][ T6839] ? clear_bhb_loop+0x50/0xa0 [ 323.498828][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 323.506178][ T6839] ? clear_bhb_loop+0x50/0xa0 [ 323.506209][ T6839] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 323.506231][ T6839] RIP: 0033:0x7f13e576eba9 [ 323.506248][ T6839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.506266][ T6839] RSP: 002b:00007f13e41d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 323.561901][ T6839] RAX: ffffffffffffffda RBX: 00007f13e59b5fa0 RCX: 00007f13e576eba9 [ 323.569874][ T6839] RDX: 000000000000fdef RSI: 0000200000000140 RDI: 00000000000000c8 [ 323.578186][ T6839] RBP: 00007f13e41d7090 R08: 0000000000000000 R09: 0000000000000000 [ 323.586345][ T6839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.594319][ T6839] R13: 00007f13e59b6038 R14: 00007f13e59b5fa0 R15: 00007ffeb89edcb8 [ 323.602301][ T6839] [ 323.698069][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 323.727247][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.745214][ T6752] device veth0_vlan entered promiscuous mode [ 323.783340][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 323.794988][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.817508][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.826412][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.874986][ T6864] device syzkaller0 entered promiscuous mode [ 323.952668][ T6871] FAULT_INJECTION: forcing a failure. [ 323.952668][ T6871] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 323.966287][ T6871] CPU: 0 PID: 6871 Comm: syz.4.2022 Tainted: G W syzkaller #0 [ 323.975101][ T6871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 323.985179][ T6871] Call Trace: [ 323.988480][ T6871] [ 323.991424][ T6871] __dump_stack+0x21/0x30 [ 323.995786][ T6871] dump_stack_lvl+0xee/0x150 [ 324.000395][ T6871] ? show_regs_print_info+0x20/0x20 [ 324.005616][ T6871] ? vfs_write+0xc17/0xf70 [ 324.010064][ T6871] dump_stack+0x15/0x20 [ 324.014250][ T6871] should_fail+0x3c1/0x510 [ 324.018704][ T6871] should_fail_usercopy+0x1a/0x20 [ 324.023749][ T6871] _copy_from_user+0x20/0xd0 [ 324.028393][ T6871] __sys_bpf+0x233/0x730 [ 324.032666][ T6871] ? bpf_link_show_fdinfo+0x310/0x310 [ 324.038060][ T6871] ? debug_smp_processor_id+0x17/0x20 [ 324.043478][ T6871] __x64_sys_bpf+0x7c/0x90 [ 324.047898][ T6871] x64_sys_call+0x4b9/0x9a0 [ 324.052410][ T6871] do_syscall_64+0x4c/0xa0 [ 324.056843][ T6871] ? clear_bhb_loop+0x50/0xa0 [ 324.061615][ T6871] ? clear_bhb_loop+0x50/0xa0 [ 324.066327][ T6871] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 324.072235][ T6871] RIP: 0033:0x7f13e576eba9 [ 324.076658][ T6871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 324.096359][ T6871] RSP: 002b:00007f13e41d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 324.104792][ T6871] RAX: ffffffffffffffda RBX: 00007f13e59b5fa0 RCX: 00007f13e576eba9 [ 324.112772][ T6871] RDX: 0000000000000010 RSI: 0000200000000140 RDI: 0000000000000011 [ 324.120746][ T6871] RBP: 00007f13e41d7090 R08: 0000000000000000 R09: 0000000000000000 [ 324.128717][ T6871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 324.136688][ T6871] R13: 00007f13e59b6038 R14: 00007f13e59b5fa0 R15: 00007ffeb89edcb8 [ 324.144765][ T6871] [ 324.198858][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 324.220639][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 324.230457][ T6752] device veth1_macvtap entered promiscuous mode [ 324.269727][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 324.284754][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 324.367627][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 324.390695][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 324.491293][ T6882] FAULT_INJECTION: forcing a failure. [ 324.491293][ T6882] name fail_usercopy, interval 1, probability 0, space 0, times 0 SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=3 req=1178 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 324.540033][ T6882] CPU: 0 PID: 6882 Comm: syz.1.2027 Tainted: G W syzkaller #0 [ 324.548869][ T6882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 324.558944][ T6882] Call Trace: [ 324.562334][ T6882] [ 324.565281][ T6882] __dump_stack+0x21/0x30 [ 324.569636][ T6882] dump_stack_lvl+0xee/0x150 [ 324.574249][ T6882] ? show_regs_print_info+0x20/0x20 [ 324.579476][ T6882] dump_stack+0x15/0x20 [ 324.583654][ T6882] should_fail+0x3c1/0x510 [ 324.588088][ T6882] should_fail_usercopy+0x1a/0x20 [ 324.593140][ T6882] _copy_to_user+0x20/0x90 [ 324.597570][ T6882] simple_read_from_buffer+0xe9/0x160 [ 324.603057][ T6882] proc_fail_nth_read+0x19a/0x210 [ 324.608093][ T6882] ? proc_fault_inject_write+0x2f0/0x2f0 [ 324.613741][ T6882] ? security_file_permission+0x83/0xa0 [ 324.619300][ T6882] ? proc_fault_inject_write+0x2f0/0x2f0 [ 324.624938][ T6882] vfs_read+0x282/0xbe0 [ 324.629116][ T6882] ? kernel_read+0x1f0/0x1f0 [ 324.633708][ T6882] ? __kasan_check_write+0x14/0x20 [ 324.638821][ T6882] ? mutex_lock+0x95/0x1a0 [ 324.643239][ T6882] ? wait_for_completion_killable_timeout+0x10/0x10 [ 324.649831][ T6882] ? __fget_files+0x2c4/0x320 [ 324.654514][ T6882] ? __fdget_pos+0x2d2/0x380 [ 324.659102][ T6882] ? ksys_read+0x71/0x240 [ 324.663426][ T6882] ksys_read+0x140/0x240 [ 324.667666][ T6882] ? vfs_write+0xf70/0xf70 [ 324.672110][ T6882] ? __kasan_check_write+0x14/0x20 [ 324.677248][ T6882] ? switch_fpu_return+0x15d/0x2c0 [ 324.682378][ T6882] __x64_sys_read+0x7b/0x90 [ 324.686882][ T6882] x64_sys_call+0x96d/0x9a0 [ 324.691391][ T6882] do_syscall_64+0x4c/0xa0 [ 324.695812][ T6882] ? clear_bhb_loop+0x50/0xa0 [ 324.700500][ T6882] ? clear_bhb_loop+0x50/0xa0 [ 324.705179][ T6882] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 324.711074][ T6882] RIP: 0033:0x7fa6d68f65bc [ 324.715489][ T6882] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 324.735103][ T6882] RSP: 002b:00007fa6d5360030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 324.743522][ T6882] RAX: ffffffffffffffda RBX: 00007fa6d6b3efa0 RCX: 00007fa6d68f65bc [ 324.751586][ T6882] RDX: 000000000000000f RSI: 00007fa6d53600a0 RDI: 0000000000000005 [ 324.759587][ T6882] RBP: 00007fa6d5360090 R08: 0000000000000000 R09: 0000000000000000 [ 324.767573][ T6882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 324.775640][ T6882] R13: 00007fa6d6b3f038 R14: 00007fa6d6b3efa0 R15: 00007ffe6978aa28 [ 324.783627][ T6882] [ 324.786757][ T30] audit: type=1400 audit(1757550775.290:163): avc: denied { write } for pid=260 comm="syz-executor" path="pipe:[520]" dev="pipefs" ino=520 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 324.884917][ T30] audit: type=1400 audit(1757550775.610:164): avc: denied { create } for pid=6883 comm="syz.2.2028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 324.886448][ T286] device syz_tun left promiscuous mode [ 324.980074][ T286] Ÿë: port 1(syz_tun) entered disabled state [ 325.960614][ T1265] device bridge_slave_1 left promiscuous mode [ 325.966929][ T1265] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.976075][ T1265] device bridge_slave_0 left promiscuous mode [ 325.982725][ T1265] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.991578][ T1265] device veth1_macvtap left promiscuous mode [ 325.997590][ T1265] device veth0_vlan left promiscuous mode [ 327.361106][ T1265] device bridge_slave_1 left promiscuous mode [ 327.367278][ T1265] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.374776][ T1265] device bridge_slave_0 left promiscuous mode [ 327.380969][ T1265] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.389945][ T1265] device veth0_macvtap left promiscuous mode [ 327.396234][ T1265] bridge0: port 3(veth0_macvtap) entered disabled state [ 327.403678][ T1265] device bridge_slave_1 left promiscuous mode [ 327.409800][ T1265] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.417362][ T1265] device bridge_slave_0 left promiscuous mode [ 327.423536][ T1265] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.431785][ T1265] device bridge_slave_1 left promiscuous mode [ 327.437921][ T1265] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.445428][ T1265] device bridge_slave_0 left promiscuous mode [ 327.451564][ T1265] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.461599][ T1265] device veth1_macvtap left promiscuous mode [ 327.468421][ T1265] device veth1_macvtap left promiscuous mode