last executing test programs: 28.787163523s ago: executing program 2 (id=4478): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xeb, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000002000000000000000100008018150000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000001801000020756c2500000000002020207b1a00ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\t\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000400000018110000000004000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000140000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='rxrpc_receive\x00', r4, 0x0, 0x8}, 0x18) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x100404, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x12, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffde6}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x80, 0x0, 0x0, 0x0, 0x3ff, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xb9cb}, 0xc403, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x5, r5, 0x1) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 22.381370509s ago: executing program 2 (id=4478): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xeb, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000002000000000000000100008018150000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000001801000020756c2500000000002020207b1a00ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\t\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000400000018110000000004000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000140000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='rxrpc_receive\x00', r4, 0x0, 0x8}, 0x18) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x100404, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x12, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffde6}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x80, 0x0, 0x0, 0x0, 0x3ff, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xb9cb}, 0xc403, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x5, r5, 0x1) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 17.700760981s ago: executing program 2 (id=4478): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xeb, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000002000000000000000100008018150000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000001801000020756c2500000000002020207b1a00ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\t\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000400000018110000000004000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000140000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='rxrpc_receive\x00', r4, 0x0, 0x8}, 0x18) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x100404, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x12, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffde6}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x80, 0x0, 0x0, 0x0, 0x3ff, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xb9cb}, 0xc403, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x5, r5, 0x1) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 11.538451333s ago: executing program 2 (id=4478): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xeb, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000002000000000000000100008018150000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000001801000020756c2500000000002020207b1a00ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\t\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000400000018110000000004000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000140000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='rxrpc_receive\x00', r4, 0x0, 0x8}, 0x18) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x100404, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x12, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffde6}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x80, 0x0, 0x0, 0x0, 0x3ff, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xb9cb}, 0xc403, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x5, r5, 0x1) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 8.358485995s ago: executing program 1 (id=4949): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r0], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x81, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x100000001, 0x81}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x100000001}, 0x0, 0x6, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000000503c3b0062bf59f0c2ddb1542f4ff662c71f5075a99624fb083c5743ba0600000066101403c09443ae15b592d2916c0d81cd4ac9d573ff58578a3fe25295b4711f3d82bd9e026d85c30371c536edb384945e1027ab166c232765dbb4e4b8f964846f4ab881484dbd20665fb146eca6dcad7beaa47e66577c01ccfe745347b4d86bb19114d5b69a705d2e63d90cce240d782664b61c0d43a0e184ee479d78fe8e7b227780c27e762362056add441f30c11e49f1a5950b41f3b66f8e31b7c5", @ANYRESOCT=0x0, @ANYBLOB="07000000000000000000000000e171d38c336b9f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000000000000000e2"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0xf3, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/uts\x00') syz_clone(0x8080400, &(0x7f0000000680)="1ad8e0db7ea5ae70759627e514511cf6fa10e9139332c7c1f8452e31429dd5e572ac118f310e5c4c983adc301fff77f2aba23a8797f25ee9d8b726f3d0b97913f8e347addcb8fb95b5e1480c7508a0821c7935777c83af3858f70088f26b147fafe8098665fd7bc345d453b68c2e76f709964f2697b0fbb6bda358a1a3fee6faa58cee4687f18b8468cea1beff947ff305bf80a50d44fd9bd4a8a3a64c80d7b1cc3960c6abc3a54285327bb3270cfe4e1159a415d0ac379f68595456045d14b57ae2", 0xc2, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000200)="f842c5861fc9f47e54e2d06a77b3") 7.586712521s ago: executing program 1 (id=4953): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000f8ffffff850000002d000000850000009e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x1, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{0x1}, &(0x7f00000003c0), &(0x7f0000000400)=r2}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r0, 0xe0, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, &(0x7f0000001140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000011c0)=[0x0, 0x0], 0x0, 0xe4, &(0x7f0000001200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000001280), &(0x7f00000012c0), 0x8, 0x79, 0x8, 0x8, &(0x7f0000001300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002580)={0xffffffffffffffff, 0x20, &(0x7f0000002540)={&(0x7f0000001480)=""/4096, 0x1000, 0x0, &(0x7f0000002480)=""/190, 0xbe}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002640)={{}, &(0x7f00000025c0), &(0x7f0000002600)=r2}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002980)={r4, &(0x7f00000027c0)="d6cda1df981773bebeaf5aea30322249721776a7cdc711cb430f3dda63a0e85ed64de15e6537b372d7c4dc0ec930a1404515b5170d89eede89b255ca8141b942f7fdf374ab60a8329e84448c7b69b6f04ae141bfe1a5923961e494174931f67e740a851638d4d9d70d229096eba0864dcc84ff21afc9046d43a47e29956ff920024bcf044c572f07e67523f88cfaa6c66418533bc9c4", &(0x7f00000028c0)=""/172}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r5}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r6}, 0x38) 7.08787651s ago: executing program 4 (id=4957): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r0, 0x58, &(0x7f00000003c0)}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000c80), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@fallback=r0, 0x8, 0x0, 0x6, &(0x7f0000000040), 0xa, 0x0, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], &(0x7f0000000280)=[0x0]}, 0xffffff4c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 6.647780289s ago: executing program 4 (id=4959): openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0x1000}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)=0x6c0000000000) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r4, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x4, 0x0, 0xa, 0x5, 0x9, 0x50, 0xc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000300)='syzkaller\x00', 0x2, 0x6c, &(0x7f0000000340)=""/108, 0x41000, 0x40, '\x00', r5, 0x0, r6, 0x8, &(0x7f0000000600)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x4, 0x1, 0x4c, 0x2}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000680)=[{0x2, 0x1, 0xd, 0x7}, {0x5, 0x1, 0x7, 0x5}], 0x10, 0xfffffff9}, 0x94) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x19, &(0x7f0000000b00)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x200}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @ldst={0x1, 0x3, 0x0, 0x9, 0x9, 0xfffffffffffffffc, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x100}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000500)='syzkaller\x00', 0x99, 0x72, &(0x7f0000000800)=""/114, 0x40f00, 0x0, '\x00', r5, 0x0, r7, 0x8, &(0x7f0000000880)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000008c0)=[r0, r2, r1, r0, r0], &(0x7f0000000900)=[{0x2, 0x4, 0x0, 0xb}, {0x2, 0x1, 0xd, 0x5}, {0x0, 0x4, 0x0, 0x1}], 0x10, 0x4}, 0x94) socketpair(0x26, 0xa, 0x3, &(0x7f0000000340)={0xffffffffffffffff}) recvmsg(r8, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/33, 0x21}], 0x1, &(0x7f0000000680)=""/172, 0xac}, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) 6.321901745s ago: executing program 0 (id=4960): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a089, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x9, 0x5}, 0x2019, 0x0, 0x0, 0x8, 0x1000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="01000000080000000400000021000000c1000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00b9f71134a201ba000000000000000000000000006b770000000000"], 0x50) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="01000000080000000400000021000000c1000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00b9f71134a201ba000000000000000000000000006b770000000000"], 0x50) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000100)={r2, &(0x7f00000000c0), 0x20000000}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0xe, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000004851000000100000095000000000000001800000020646c2500000000002020207b1af8ff00000000bda100000000000007010000f8ffffffb702000008000000b703000000000000850000003400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r3}, 0x8) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x18) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000940), 0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x3, 0x7}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r6, 0x0, &(0x7f0000001700)=""/53}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r6, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001740)={r6, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b80)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0xa5, '\x00', 0x0, r5, 0x3, 0x3}, 0x50) socketpair(0x22, 0x5, 0x9, &(0x7f0000000ac0)) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) sendmsg$tipc(r7, &(0x7f0000000800)={&(0x7f0000000540)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x4, 0x3}}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000580)="3a070068b365748a0e32f4d86985883f2c09bf9b25e9fd5c139d498d3b8493f89c9327111e90c584b762eafd269d82286d13d60e909cb6ddf8f81c2d54733184a9ac287b280883645ffeb7c82b639ccbbb8a6b48c95ce04fc5b4284e1bc80e6f3a24d811afac02bf790b60f4a3ca2971978262834664ef0581afa53425757ac9c09a7f67dbb2e7f6f3bb", 0x8a}, {&(0x7f0000000640)="a333733666341e976620271e4da902e227", 0x11}, {&(0x7f00000009c0)="9bb8dab6790e4e766896c16a3f96290f0fad570bc6dd0fafc211bb4f34b3ac998bae9e45bfd7fa22b8909fedd6fae8e212ae1a055c1c0e026045f823cdd5aa06a46183103d53089c42c628b40d8fb3e3060ba4feabd91f69279ecbadf2df972ceec0f7ef6edfc8e477e8f15638e7f50b5d4cbcb33b8e90acef3b762a803d7728516cdb6b07410a617c1ec743345cbe808bbc24d7ba7dc6e0ba2c5d7a2e85c9e41d02841142e41115ec9a815dc08d1f7bb27760b81b881f25bd74f627a0e0ae75cb6ac1ba769b97f3096a6d033f94d7c34c3c7928c480ca04550c0a6eeb91f50a9ee288b67747a717dc49f46074d5e3437541839a13a9fa0a", 0xf8}, {&(0x7f0000000c00)="57c0339bb8293194324a19f7863078b7b77735ce810f94804ee796dbb06044279a669d268a87cc0d830a9424e01f834781e80f864005801685b4be02aeec826efd2889474b77baa18819d5dc3cc203af38b08bd2a78aec3c2e2d8ce3e575786a1bf08327841b2a9ff87a7c5f26091bb664c7d1564bd39b2d66c8870728a8ac5f7d88f8b352134128ee127d4ea7515d755d8b4a67668da342e6aedf37f18edea1b319db9a950c056b4e4e2b015e0f146e4692b78c6013598cfe946ca453dcf78291394ac8267b1a2ac62da697521a95de7bb0e00cb835668fabb8d2af343d97a5f19638306aeb5e5a09ed49372cee5232a8", 0xf1}, {&(0x7f0000000d00)="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", 0xfe}], 0x5, 0x0, 0x0, 0x20058000}, 0x20000004) write$cgroup_type(r1, &(0x7f0000000380), 0x9) (async) write$cgroup_type(r1, &(0x7f0000000380), 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001000000800000001b4ae8", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0}, 0x50) (async) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x700}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r8}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6.09641524s ago: executing program 3 (id=4961): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000500)='tasks\x00', 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@cgroup=r4, 0x2b, 0x0, 0x42, &(0x7f0000000140)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@type_tag={0xb, 0x0, 0x0, 0x12, 0x3}]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000900)=""/252, 0x28, 0xfc, 0x1}, 0x28) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r7}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x4000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.709159908s ago: executing program 2 (id=4478): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xeb, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000002000000000000000100008018150000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000001801000020756c2500000000002020207b1a00ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\t\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000400000018110000000004000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000140000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='rxrpc_receive\x00', r4, 0x0, 0x8}, 0x18) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x100404, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x12, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffde6}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x80, 0x0, 0x0, 0x0, 0x3ff, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xb9cb}, 0xc403, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x5, r5, 0x1) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 3.502134831s ago: executing program 0 (id=4962): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x81, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x100000001, 0x81}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x100000001}, 0x0, 0x6, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000000503c3b0062bf59f0c2ddb1542f4ff662c71f5075a99624fb083c5743ba0600000066101403c09443ae15b592d2916c0d81cd4ac9d573ff58578a3fe25295b4711f3d82bd9e026d85c30371c536edb384945e1027ab166c232765dbb4e4b8f964846f4ab881484dbd20665fb146eca6dcad7beaa47e66577c01ccfe745347b4d86bb19114d5b69a705d2e63d90cce240d782664b61c0d43a0e184ee479d78fe8e7b227780c27e762362056add441f30c11e49f1a5950b41f3b66f8e31b7c5", @ANYRESOCT=0x0, @ANYBLOB="07000000000000000000000000e171d38c336b9f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000000000000000e2"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0xf3, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/uts\x00') syz_clone(0x8080400, &(0x7f0000000680)="1ad8e0db7ea5ae70759627e514511cf6fa10e9139332c7c1f8452e31429dd5e572ac118f310e5c4c983adc301fff77f2aba23a8797f25ee9d8b726f3d0b97913f8e347addcb8fb95b5e1480c7508a0821c7935777c83af3858f70088f26b147fafe8098665fd7bc345d453b68c2e76f709964f2697b0fbb6bda358a1a3fee6faa58cee4687f18b8468cea1beff947ff305bf80a50d44fd9bd4a8a3a64c80d7b1cc3960c6abc3a54285327bb3270cfe4e1159a415d0ac379f68595456045d14b57ae2", 0xc2, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000200)="f842c5861fc9f47e54e2d06a77b3") 3.501321041s ago: executing program 1 (id=4963): r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x143}, 0x48) 3.499911861s ago: executing program 4 (id=4964): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r0], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x81, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x100000001, 0x81}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x100000001}, 0x0, 0x6, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000000503c3b0062bf59f0c2ddb1542f4ff662c71f5075a99624fb083c5743ba0600000066101403c09443ae15b592d2916c0d81cd4ac9d573ff58578a3fe25295b4711f3d82bd9e026d85c30371c536edb384945e1027ab166c232765dbb4e4b8f964846f4ab881484dbd20665fb146eca6dcad7beaa47e66577c01ccfe745347b4d86bb19114d5b69a705d2e63d90cce240d782664b61c0d43a0e184ee479d78fe8e7b227780c27e762362056add441f30c11e49f1a5950b41f3b66f8e31b7c5", @ANYRESOCT=0x0, @ANYBLOB="07000000000000000000000000e171d38c336b9f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000000000000000e2"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0xf3, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/uts\x00') syz_clone(0x8080400, &(0x7f0000000680)="1ad8e0db7ea5ae70759627e514511cf6fa10e9139332c7c1f8452e31429dd5e572ac118f310e5c4c983adc301fff77f2aba23a8797f25ee9d8b726f3d0b97913f8e347addcb8fb95b5e1480c7508a0821c7935777c83af3858f70088f26b147fafe8098665fd7bc345d453b68c2e76f709964f2697b0fbb6bda358a1a3fee6faa58cee4687f18b8468cea1beff947ff305bf80a50d44fd9bd4a8a3a64c80d7b1cc3960c6abc3a54285327bb3270cfe4e1159a415d0ac379f68595456045d14b57ae2", 0xc2, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000200)="f842c5861fc9f47e54e2d06a77b3") 3.499598931s ago: executing program 3 (id=4972): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffa}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) write$cgroup_subtree(r0, 0x0, 0x33) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1}, 0x48) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400", @ANYRES32=0x1, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x18, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='ata_bmdma_status\x00', r5, 0x0, 0xf7b7}, 0x18) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 3.395432803s ago: executing program 1 (id=4965): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800e000000000000000000000000000000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ff"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r0], &(0x7f0000000240)='GPL\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00'}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, 0x0, &(0x7f0000000180)}, 0x20) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0x18000000000002a0, 0x7ee, 0x0, &(0x7f0000000e80)="b9e403c6631e39495aa05dc7cf1c", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) syz_clone(0x64847000, 0x0, 0xb698cc431f1f4bf7, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x20, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="95f000000000bf02"], &(0x7f0000000340)='GPL\x00', 0x2, 0x18, &(0x7f0000000380)=""/24, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0xc, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)=[r3], &(0x7f0000000a80)=[{0x3, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x2, 0xa, 0x7}, {0x2, 0x1, 0x2, 0x9}, {0x3, 0x2, 0xd, 0x5}, {0x3, 0x3, 0x2, 0x6}, {0x4, 0x2, 0x6}, {0x0, 0x5, 0x5, 0x7}], 0x10, 0x2}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="9feb010018000000001100000000000000000000000038004f04005f00"], &(0x7f0000000d00)=""/13, 0x2b, 0xd, 0x1, 0xfffff000, 0x10000}, 0x28) 2.823016385s ago: executing program 4 (id=4966): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r0], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x81, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x100000001, 0x81}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x100000001}, 0x0, 0x6, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000000503c3b0062bf59f0c2ddb1542f4ff662c71f5075a99624fb083c5743ba0600000066101403c09443ae15b592d2916c0d81cd4ac9d573ff58578a3fe25295b4711f3d82bd9e026d85c30371c536edb384945e1027ab166c232765dbb4e4b8f964846f4ab881484dbd20665fb146eca6dcad7beaa47e66577c01ccfe745347b4d86bb19114d5b69a705d2e63d90cce240d782664b61c0d43a0e184ee479d78fe8e7b227780c27e762362056add441f30c11e49f1a5950b41f3b66f8e31b7c5", @ANYRESOCT=0x0, @ANYBLOB="07000000000000000000000000e171d38c336b9f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000000000000000e2"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0xf3, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/uts\x00') syz_clone(0x8080400, &(0x7f0000000680)="1ad8e0db7ea5ae70759627e514511cf6fa10e9139332c7c1f8452e31429dd5e572ac118f310e5c4c983adc301fff77f2aba23a8797f25ee9d8b726f3d0b97913f8e347addcb8fb95b5e1480c7508a0821c7935777c83af3858f70088f26b147fafe8098665fd7bc345d453b68c2e76f709964f2697b0fbb6bda358a1a3fee6faa58cee4687f18b8468cea1beff947ff305bf80a50d44fd9bd4a8a3a64c80d7b1cc3960c6abc3a54285327bb3270cfe4e1159a415d0ac379f68595456045d14b57ae2", 0xc2, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000200)="f842c5861fc9f47e54e2d06a77b3") 2.764292726s ago: executing program 0 (id=4967): socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x0, 0xa, 0x0, 0x1fc, 0x42030, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x0, 0xa, 0x0, 0x1fc, 0x42030, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffdef) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) (async) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4, 0xffffffffffffffff}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r6, 0x18000000000002a0, 0x72, 0x0, &(0x7f0000000240)="ce010000009a697f65360c5e88a8", 0x0, 0x1fe7, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="9feb0100180000000000000048000000480000000500000000000000000000090300000000000000000000010500000045f6e1c94619910b00000000000000000300000000020000000200000000000000000000000100000d00000000030000000300000000005f2e00fe44d16ed5aa3a6558b0a6ae200e7e17904f4ed626327c0274677bddf5bf0d8d3084b8f96a85849c4a5111c20f0c348b5c02f049cc7e40931414694e8d7261dc61979e7d614e777f5a71e15a8ea11f7cf72be6621cd04a2220e7802a08d1b6533871e4c2aaa931ed5858f898e34387908db11ba71df255de332bda62dccbaf29d71b26950a57976eeac22551faf3256deea8ec9f26ed77e5229ddadff83898ca07d29e93f19f9762dd70e2ed29361beacd4785b580096b3de4919d8bfc1192924a7e7322f6f4230782e85e58d89e494125e1867acaf3f5c34064d514a4c3ad01646be79b664f3283399f1e06fb4cf2c8932a3d31c1935ffddb62e8a803a3240f942a406400a1c40f679df4a88b56a5bf3435fe875cea4f6cfa4108d82b07ab7bd87e708221a80e4e05b8933b36bcf9cd79383def032a258d1e181de5985f4b629c3325836397592b94773586d9cfa8aa65b4ac87ec5c7305714e8c3a5ef9516f33a66051fff38f227d9efa0e5dfcb06ae75d845e2ca25520dec3506590f25c3d88462e98aafa3d081f0edbb3e6e69badfa61d3adfec23c0856863c4dd08e66faf4"], 0x0, 0x65}, 0x28) sendmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x800}, 0x2000c011) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x0, 0x1a, 0x0, 0x80000}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x0, 0x1a, 0x0, 0x80000}, 0x28) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x17, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000", @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000280)={'wg2\x00'}) (async) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) 2.651425648s ago: executing program 0 (id=4968): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff", @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRESOCT=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x72, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) r4 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) (async, rerun: 64) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000480)=ANY=[@ANYRES16=r4], &(0x7f0000000040)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000c40)=ANY=[@ANYRES32, @ANYBLOB="18000000000000cb7d22c69b000000080018110000000000000000000000000000000000ce614cf1e3207f1be83e0abe546964e78ac94c5aed359d84038da90cc6e109dbd07a37a048ae92a04c51b59868e9eb434d236142b7af74b8470a1ef7a9a12676b131acf00407f47d2a192f880aeef3bdb5c9be79ee10b45bceeaa1dd9989a9c8104011a3c35a461afe7bfc1f373f9ddbb9ff4959560e468cb4c7f836f0cf527d2c902372bb04d43bd5376e37bd5d30794a74edee4d32dcd97e3a930a2faed5e7a571b5caf16ae25f1408d89fe8383a644dd64dfd91745daca83dd177", @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095", @ANYRESHEX=r3, @ANYRES8=r6, @ANYRES8=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0bdf946afa000000070000004611ef2e099d19e5e737c29cdcc33c0000004ffb42ffb422731fb4580d0493ca11921b7a60cdaf805892d9034d123b16674da842f64c3309cb0e5eceba6bd225058593e6dec815bdcfa57c179be17152152fe99d9a0e3dde702e8a4ff2f3cc44e621db36c2ae511ffc1867933d0842d3b6a6930853b0601b09ab911b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000300"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (rerun: 32) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0}, 0x90) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r9}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async, rerun: 32) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r10}, 0x10) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES64=r9, @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r12, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000300)="b9ff030768f1258c989e14f05c71", 0x0, 0x2, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 2.313230004s ago: executing program 4 (id=4969): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r0], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x81, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x100000001, 0x81}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x100000001}, 0x0, 0x6, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000000503c3b0062bf59f0c2ddb1542f4ff662c71f5075a99624fb083c5743ba0600000066101403c09443ae15b592d2916c0d81cd4ac9d573ff58578a3fe25295b4711f3d82bd9e026d85c30371c536edb384945e1027ab166c232765dbb4e4b8f964846f4ab881484dbd20665fb146eca6dcad7beaa47e66577c01ccfe745347b4d86bb19114d5b69a705d2e63d90cce240d782664b61c0d43a0e184ee479d78fe8e7b227780c27e762362056add441f30c11e49f1a5950b41f3b66f8e31b7c5", @ANYRESOCT=0x0, @ANYBLOB="07000000000000000000000000e171d38c336b9f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000000000000000e2"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0xf3, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/uts\x00') syz_clone(0x8080400, &(0x7f0000000680)="1ad8e0db7ea5ae70759627e514511cf6fa10e9139332c7c1f8452e31429dd5e572ac118f310e5c4c983adc301fff77f2aba23a8797f25ee9d8b726f3d0b97913f8e347addcb8fb95b5e1480c7508a0821c7935777c83af3858f70088f26b147fafe8098665fd7bc345d453b68c2e76f709964f2697b0fbb6bda358a1a3fee6faa58cee4687f18b8468cea1beff947ff305bf80a50d44fd9bd4a8a3a64c80d7b1cc3960c6abc3a54285327bb3270cfe4e1159a415d0ac379f68595456045d14b57ae2", 0xc2, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000200)="f842c5861fc9f47e54e2d06a77b3") 2.308435155s ago: executing program 0 (id=4980): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="0500"], 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r1}, &(0x7f00000006c0), &(0x7f0000000700)=r0}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001280)={&(0x7f0000001340)=ANY=[@ANYBLOB="9feb010018000000000000008800000088000000050000000b00000000000007000000000f0000000700000604000000060000003900000004000000dbfaffff070000000300000006000000060000000b000000ff01100004000000100000000000000a0500000001000000000000010000000026006d020000000000000007000000000f00001000000001000000006c005e0200005f6100"/165], 0x0, 0xa5, 0x0, 0x0, 0xe}, 0x28) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001", @ANYRES32=0x0, @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000001000)=ANY=[@ANYBLOB="18000000000000001800c363f29a978c15007fd7c7f8bc0e5a7e22ea357c6670", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000300)=ANY=[@ANYRES32=r6, @ANYBLOB="0000000000000000b703000000e0000085"], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r8, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9, &(0x7f0000000800)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000840), 0x0, 0x0, 0xd8, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="1b0000000000000000000000f9f9000000000000", @ANYRES32=r6, @ANYBLOB="cc00"/20, @ANYRES32=r10, @ANYRES32, @ANYBLOB="0100000002000000050c4e0598000000000000000000000000ad566c9780f6bf77ded0b6166cea187261d88a76e61c663e15e5e4d1cfad1d86ee8d72557fdfc5ba8e4533dc00cb5e1bd50a6e2583e038907cd8df1836bfbaf75d1db1112ede"], 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x33) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1880000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001700)={0x11, 0x2f, &(0x7f0000001400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @map_fd={0x18, 0x6, 0x1, 0x0, r4}, @map_fd={0x18, 0x3, 0x1, 0x0, r7}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}, @call={0x85, 0x0, 0x0, 0xc2}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @jmp={0x5, 0x0, 0xa, 0x4, 0xa, 0x24, 0xfffffffffffffff0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001240)='GPL\x00', 0x1264000, 0x0, &(0x7f0000001580), 0x41000, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001680)={0x0, 0x3, 0x40, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[r6, r12, r11], 0x0, 0x10, 0xac}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000000010000040000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x1e, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r13, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.307907405s ago: executing program 1 (id=4970): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="f9039811a9", @ANYRES64=r1], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', r2}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000100000022bf000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000002000000ae"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[], 0xfffffdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="b3960ffd0700008000"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, '\x00', r8, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x3, 0x0, r7, 0x8001, '\x00', r8, 0xffffffffffffffff, 0x4, 0x3, 0x2}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r9}, 0x10) syz_clone(0x44044000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.307091215s ago: executing program 3 (id=4971): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x7f, 0x7, 0x0, 0x4, 0x0, 0x3, 0x14000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x3, 0xc2cc}, 0x400, 0x1ff1, 0xfffffffa, 0x2, 0x1, 0x7, 0x401, 0x0, 0x8001, 0x0, 0x9}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000000c0)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x7b, &(0x7f00000001c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x8e, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=r2, 0x4) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000440), 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0xd, &(0x7f0000000480)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0x9}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5b}}, @ldst={0x1, 0x1, 0x3, 0xa, 0x7, 0x50, 0x8}, @ldst={0x3, 0x2, 0x3, 0x4a1d92618c60725e, 0xa, 0x18}, @generic={0x8, 0x1, 0x3, 0x9, 0xf9}], &(0x7f0000000500)='syzkaller\x00', 0x4, 0x2e, &(0x7f0000000540)=""/46, 0x41100, 0x2b, '\x00', r1, @sched_cls=0x2f, r3, 0x8, &(0x7f0000000580)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x5, &(0x7f00000005c0)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000600)=[{0x0, 0x3, 0x7, 0x7}, {0x4, 0x4, 0x4, 0x7}, {0x1, 0x1, 0xd, 0x3}, {0x3, 0x2, 0x2, 0xc}, {0x3, 0x2, 0x5, 0x3}], 0x10, 0x6}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='freezer.self_freezing\x00', 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000780)={r4, r5, 0x0, r6}, 0x10) r7 = getpid() perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x6, 0xc4, 0x2, 0x5, 0x0, 0x1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8f, 0x1, @perf_config_ext={0x5, 0x2}, 0x100101, 0x5, 0x5, 0x8, 0x1, 0xff, 0x2, 0x0, 0x6, 0x0, 0x9}, r7, 0x0, r0, 0x3) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000840)={r6}, 0x8) r9 = syz_open_procfs$namespace(r7, &(0x7f0000000880)='ns/pid\x00') r10 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1, 0x2, &(0x7f00000008c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000900)='GPL\x00', 0x0, 0x27, &(0x7f0000000940)=""/39, 0x41100, 0x12, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x8, 0x4}, 0x8, 0x10, 0xffffffffffffffff, 0x0, r2, r6, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=@base={0x1a, 0xe, 0x7f9f, 0x2, 0x12518, r8, 0x5, '\x00', r1, 0xffffffffffffffff, 0x3, 0x3, 0x4}, 0x50) r12 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e00)={0x6, 0x29, &(0x7f0000000b00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x30000000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @jmp={0x5, 0x0, 0xd, 0xa, 0x9, 0x0, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @generic={0x0, 0x1, 0x8, 0x2, 0x1}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000c80)='GPL\x00', 0xffff, 0x3c, &(0x7f0000000cc0)=""/60, 0x41000, 0x8, '\x00', r1, 0x25, r6, 0x8, &(0x7f0000000d00)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000d40)={0x5, 0x3, 0xcb, 0x8}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000d80)=[r6], &(0x7f0000000dc0)=[{0x4, 0x5, 0x7, 0x3}, {0x4, 0x3, 0x2, 0x1}, {0x3, 0x2, 0x10, 0xb}]}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f00)={&(0x7f0000000ec0)='fsi_master_break\x00', r6, 0x0, 0x7}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001040)={r12, 0x0, 0x14, 0x3f, &(0x7f0000000f40)="9e336d525521e4bbe685f0487459f406e8e82e43", &(0x7f0000000f80)=""/63, 0x1, 0x0, 0x0, 0x16, &(0x7f0000000fc0), &(0x7f0000001000)="d2aa065961c1187a12401368f21a6d5bac1c6832a37a", 0x0, 0x0, 0x3}, 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=@base={0x9, 0x46f8, 0x1, 0xde, 0xa004, r6, 0x531, '\x00', r1, r6, 0x2, 0x2, 0x4, 0x0, @value=r6}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001140)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xd, '\x00', 0x0, r3, 0x0, 0x0, 0x2}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001200)={&(0x7f00000011c0)='bcache_journal_write\x00', r8, 0x0, 0x877}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r10, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, &(0x7f0000001280)=[0x0, 0x0, 0x0], &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x97, &(0x7f0000001300)=[{}, {}], 0x10, 0x10, &(0x7f0000001340), &(0x7f0000001380), 0x8, 0x2a, 0x8, 0x8, &(0x7f00000013c0)}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001540)={@cgroup=r6, r10, 0x36, 0x2000, 0x0, @value=r6}, 0x20) syz_open_procfs$namespace(r7, &(0x7f0000001580)='ns/uts\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000026c0)={r3, 0x20, &(0x7f0000002680)={&(0x7f00000015c0)=""/4096, 0x1000, 0x0, &(0x7f00000025c0)=""/159, 0x9f}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002840)=@bpf_ext={0x1c, 0x9, &(0x7f0000002700)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r13}}, @map_fd={0x18, 0xb, 0x1, 0x0, r11}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}], &(0x7f0000002780)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f00000027c0)={0x2, 0x8, 0x2, 0x67e6}, 0x10, 0x1eac0, r5, 0x2, 0x0, &(0x7f0000002800)=[{0x5, 0x4, 0x1, 0xa}, {0x1, 0x6, 0xa, 0x5}], 0x10, 0x8}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002bc0)={r6, 0xe0, &(0x7f0000002ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000002900)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000002940)=[0x0], &(0x7f0000002980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5f, &(0x7f00000029c0)=[{}], 0x8, 0x10, &(0x7f0000002a00), &(0x7f0000002a40), 0x8, 0xb7, 0x8, 0x8, &(0x7f0000002a80)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002c00)=@bloom_filter={0x1e, 0x2, 0x1, 0x5, 0x2220a, r9, 0x10001, '\x00', r15, 0xffffffffffffffff, 0x1, 0x4, 0x2, 0xf}, 0x50) r16 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002c80)=r14, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)=@bloom_filter={0x1e, 0x2, 0xae7, 0x6, 0x800, r13, 0x2, '\x00', 0x0, r16, 0x1, 0x2, 0x5, 0xe}, 0x50) 2.245434776s ago: executing program 3 (id=4973): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x18000000000, 0x5}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) 1.999326471s ago: executing program 0 (id=4974): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000f8ffffff850000002d000000850000009e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x1, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{0x1}, &(0x7f00000003c0), &(0x7f0000000400)=r2}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r0, 0xe0, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, &(0x7f0000001140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000011c0)=[0x0, 0x0], 0x0, 0xe4, &(0x7f0000001200)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000001280), &(0x7f00000012c0), 0x8, 0x79, 0x8, 0x8, &(0x7f0000001300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002580)={0xffffffffffffffff, 0x20, &(0x7f0000002540)={&(0x7f0000001480)=""/4096, 0x1000, 0x0, &(0x7f0000002480)=""/190, 0xbe}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002640)={{}, &(0x7f00000025c0), &(0x7f0000002600)=r2}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002980)={r4, &(0x7f00000027c0)="d6cda1df981773bebeaf5aea30322249721776a7cdc711cb430f3dda63a0e85ed64de15e6537b372d7c4dc0ec930a1404515b5170d89eede89b255ca8141b942f7fdf374ab60a8329e84448c7b69b6f04ae141bfe1a5923961e494174931f67e740a851638d4d9d70d229096eba0864dcc84ff21afc9046d43a47e29956ff920024bcf044c572f07e67523f88cfaa6c66418533bc9c4", &(0x7f00000028c0)=""/172}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r5}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r6}, 0x38) 1.452583321s ago: executing program 3 (id=4975): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="180051de0000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="00000000000000007b8af8ff00000000bfa220000000000007020000f81e00ffb70300000800000085000000010000009500000000000000f36893693ec6634e00", @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f0000000340), &(0x7f0000000380)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="180200000000000000000000000000000000744e4e6918829f46d7fa9d5dcd1a33"], &(0x7f0000000140)='GPL\x00', 0x4, 0xa2, &(0x7f00000002c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x30}, 0x22) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0xf5, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x820}, 0x101, 0x0, 0x0, 0x6, 0x0, 0x3, 0xfffe}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00008000"/28], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16=r2, @ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000008000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x18) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000026c0)=ANY=[@ANYBLOB="620af8ff0c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000580), &(0x7f00000004c0), 0x1000, r6}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2010000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.298057434s ago: executing program 4 (id=4976): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000500)='tasks\x00', 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@cgroup=r4, 0x2b, 0x0, 0x42, &(0x7f0000000140)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@enum={0x0, 0x0, 0x0, 0x13}, @type_tag={0xb, 0x0, 0x0, 0x12, 0x3}]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000900)=""/252, 0x34, 0xfc, 0x1}, 0x28) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r7}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x4000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.059734739s ago: executing program 1 (id=4977): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000500)='tasks\x00', 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@cgroup=r4, 0x2b, 0x0, 0x42, &(0x7f0000000140)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@enum={0x0, 0x0, 0x0, 0x13}, @type_tag={0xb, 0x0, 0x0, 0x12, 0x3}]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000900)=""/252, 0x34, 0xfc, 0x1}, 0x28) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r7}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x4000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 541.61249ms ago: executing program 3 (id=4978): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x81, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x100000001, 0x81}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x100000001}, 0x0, 0x6, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="06000000040000003ff400000900000000000000503c3b0062bf59f0c2ddb1542f4ff662c71f5075a99624fb083c5743ba0600000066101403c09443ae15b592d2916c0d81cd4ac9d573ff58578a3fe25295b4711f3d82bd9e026d85c30371c536edb384945e1027ab166c232765dbb4e4b8f964846f4ab881484dbd20665fb146eca6dcad7beaa47e66577c01ccfe745347b4d86bb19114d5b69a705d2e63d90cce240d782664b61c0d43a0e184ee479d78fe8e7b227780c27e762362056add441f30c11e49f1a5950b41f3b66f8e31b7c5", @ANYRESOCT=0x0, @ANYBLOB="07000000000000000000000000e171d38c336b9f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000000000000000e2"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0xf3, 0x0, 0x0, 0x1, 0xa66a6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/uts\x00') syz_clone(0x8080400, &(0x7f0000000680)="1ad8e0db7ea5ae70759627e514511cf6fa10e9139332c7c1f8452e31429dd5e572ac118f310e5c4c983adc301fff77f2aba23a8797f25ee9d8b726f3d0b97913f8e347addcb8fb95b5e1480c7508a0821c7935777c83af3858f70088f26b147fafe8098665fd7bc345d453b68c2e76f709964f2697b0fbb6bda358a1a3fee6faa58cee4687f18b8468cea1beff947ff305bf80a50d44fd9bd4a8a3a64c80d7b1cc3960c6abc3a54285327bb3270cfe4e1159a415d0ac379f68595456045d14b57ae2", 0xc2, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000200)="f842c5861fc9f47e54e2d06a77b3") 0s ago: executing program 2 (id=4478): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xeb, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000002000000000000000100008018150000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000450000001801000020756c2500000000002020207b1a00ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00B\t\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000400000018110000000004000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000140000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='rxrpc_receive\x00', r4, 0x0, 0x8}, 0x18) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x100404, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x12, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffde6}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x1, 0x80, 0x0, 0x0, 0x0, 0x3ff, 0x88008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xb9cb}, 0xc403, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x5, r5, 0x1) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) kernel console output (not intermixed with test programs): 8/0x9a0 [ 539.010623][T13861] do_syscall_64+0x4c/0xa0 [ 539.015063][T13861] ? clear_bhb_loop+0x30/0x80 [ 539.019772][T13861] ? clear_bhb_loop+0x30/0x80 [ 539.024490][T13861] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 539.030420][T13861] RIP: 0033:0x7f3abb78eec9 [ 539.035118][T13861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 539.054947][T13861] RSP: 002b:00007f3abc5e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 539.063405][T13861] RAX: ffffffffffffffda RBX: 00007f3abb9e5fa0 RCX: 00007f3abb78eec9 [ 539.071411][T13861] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 539.079590][T13861] RBP: 00007f3abc5e1090 R08: 0000000000000000 R09: 0000000000000000 [ 539.087682][T13861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 539.095780][T13861] R13: 00007f3abb9e6038 R14: 00007f3abb9e5fa0 R15: 00007fffc81ebda8 [ 539.103810][T13861] [ 539.204729][T13863] device veth0_vlan left promiscuous mode [ 539.229006][T13863] device veth0_vlan entered promiscuous mode [ 539.291661][T13870] FAULT_INJECTION: forcing a failure. [ 539.291661][T13870] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 539.326585][T13870] CPU: 1 PID: 13870 Comm: syz.4.4160 Tainted: G W syzkaller #0 [ 539.333640][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 539.335577][T13870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 539.335591][T13870] Call Trace: [ 539.335597][T13870] [ 539.335604][T13870] __dump_stack+0x21/0x24 [ 539.347908][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 539.353355][T13870] dump_stack_lvl+0xee/0x150 [ 539.353384][T13870] ? __cfi_dump_stack_lvl+0x8/0x8 [ 539.353403][T13870] ? dump_stack+0x9/0x24 [ 539.353424][T13870] dump_stack+0x15/0x24 [ 539.362765][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 539.364018][T13870] should_fail_ex+0x3d4/0x520 [ 539.401433][T13870] should_fail+0xb/0x10 [ 539.405896][T13870] should_fail_usercopy+0x1a/0x20 [ 539.410967][T13870] _copy_from_user+0x1e/0xc0 [ 539.415626][T13870] ___bpf_copy_key+0xb6/0x110 [ 539.420346][T13870] map_update_elem+0x2a6/0x660 [ 539.425241][T13870] __sys_bpf+0x448/0x780 [ 539.429519][T13870] ? bpf_link_show_fdinfo+0x320/0x320 [ 539.434962][T13870] ? __cfi_ksys_write+0x10/0x10 [ 539.439945][T13870] ? debug_smp_processor_id+0x17/0x20 [ 539.445360][T13870] __x64_sys_bpf+0x7c/0x90 [ 539.449887][T13870] x64_sys_call+0x488/0x9a0 [ 539.454407][T13870] do_syscall_64+0x4c/0xa0 [ 539.458851][T13870] ? clear_bhb_loop+0x30/0x80 [ 539.463651][T13870] ? clear_bhb_loop+0x30/0x80 [ 539.468344][T13870] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 539.474269][T13870] RIP: 0033:0x7f3abb78eec9 [ 539.478791][T13870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 539.498578][T13870] RSP: 002b:00007f3abc5e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 539.507020][T13870] RAX: ffffffffffffffda RBX: 00007f3abb9e5fa0 RCX: 00007f3abb78eec9 [ 539.515188][T13870] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 539.523412][T13870] RBP: 00007f3abc5e1090 R08: 0000000000000000 R09: 0000000000000000 [ 539.531569][T13870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 539.539565][T13870] R13: 00007f3abb9e6038 R14: 00007f3abb9e5fa0 R15: 00007fffc81ebda8 [ 539.548078][T13870] [ 539.729306][T13882] device sit0 entered promiscuous mode [ 540.548091][T13898] bond_slave_1: mtu less than device minimum [ 540.626276][T13902] bond_slave_1: mtu less than device minimum [ 541.827666][T13936] device sit0 left promiscuous mode [ 541.881570][T13938] bond_slave_1: mtu less than device minimum [ 541.890367][T13936] device sit0 entered promiscuous mode [ 542.080653][T13943] device sit0 left promiscuous mode [ 542.114093][T13950] FAULT_INJECTION: forcing a failure. [ 542.114093][T13950] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 542.141647][T13943] device sit0 entered promiscuous mode [ 542.147656][T13950] CPU: 0 PID: 13950 Comm: syz.2.4190 Tainted: G W syzkaller #0 [ 542.156637][T13950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 542.166808][T13950] Call Trace: [ 542.170114][T13950] [ 542.173075][T13950] __dump_stack+0x21/0x24 [ 542.177448][T13950] dump_stack_lvl+0xee/0x150 [ 542.182092][T13950] ? __cfi_dump_stack_lvl+0x8/0x8 [ 542.187154][T13950] ? __kmalloc_node+0xb2/0x1e0 [ 542.191974][T13950] dump_stack+0x15/0x24 [ 542.196290][T13950] should_fail_ex+0x3d4/0x520 [ 542.201100][T13950] should_fail+0xb/0x10 [ 542.205306][T13950] should_fail_usercopy+0x1a/0x20 [ 542.210440][T13950] _copy_from_user+0x1e/0xc0 [ 542.215061][T13950] map_update_elem+0x440/0x660 [ 542.219832][T13950] __sys_bpf+0x448/0x780 [ 542.224092][T13950] ? bpf_link_show_fdinfo+0x320/0x320 [ 542.229555][T13950] ? __cfi_ksys_write+0x10/0x10 [ 542.234508][T13950] ? debug_smp_processor_id+0x17/0x20 [ 542.239908][T13950] __x64_sys_bpf+0x7c/0x90 [ 542.244543][T13950] x64_sys_call+0x488/0x9a0 [ 542.249163][T13950] do_syscall_64+0x4c/0xa0 [ 542.253677][T13950] ? clear_bhb_loop+0x30/0x80 [ 542.258367][T13950] ? clear_bhb_loop+0x30/0x80 [ 542.263058][T13950] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 542.269206][T13950] RIP: 0033:0x7f0cca78eec9 [ 542.273623][T13950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 542.293419][T13950] RSP: 002b:00007f0ccb608038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 542.302029][T13950] RAX: ffffffffffffffda RBX: 00007f0cca9e5fa0 RCX: 00007f0cca78eec9 [ 542.310038][T13950] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 542.318058][T13950] RBP: 00007f0ccb608090 R08: 0000000000000000 R09: 0000000000000000 [ 542.326124][T13950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 542.334208][T13950] R13: 00007f0cca9e6038 R14: 00007f0cca9e5fa0 R15: 00007ffe5fec0d88 [ 542.342198][T13950] [ 542.430373][T13952] device wg2 left promiscuous mode [ 542.508783][T13968] bond_slave_1: mtu less than device minimum [ 543.175356][T13982] bond_slave_1: mtu less than device minimum [ 543.496797][T13984] device syzkaller0 entered promiscuous mode [ 543.923821][T13993] device sit0 left promiscuous mode [ 544.017787][T13994] device sit0 entered promiscuous mode [ 544.553907][T14011] bond_slave_1: mtu less than device minimum [ 545.781465][T14031] device sit0 left promiscuous mode [ 545.820128][T14030] device sit0 entered promiscuous mode [ 546.451552][T14047] bond_slave_1: mtu less than device minimum [ 548.471020][T14065] FAULT_INJECTION: forcing a failure. [ 548.471020][T14065] name failslab, interval 1, probability 0, space 0, times 0 [ 548.488615][T14065] CPU: 1 PID: 14065 Comm: syz.4.4229 Tainted: G W syzkaller #0 [ 548.497838][T14065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 548.508008][T14065] Call Trace: [ 548.511397][T14065] [ 548.514340][T14065] __dump_stack+0x21/0x24 [ 548.518767][T14065] dump_stack_lvl+0xee/0x150 [ 548.523453][T14065] ? __cfi_dump_stack_lvl+0x8/0x8 [ 548.528485][T14065] ? number+0xd1d/0xf70 [ 548.532682][T14065] dump_stack+0x15/0x24 [ 548.536930][T14065] should_fail_ex+0x3d4/0x520 [ 548.541617][T14065] __should_failslab+0xac/0xf0 [ 548.546386][T14065] ? __kthread_create_on_node+0x3f6/0x520 [ 548.552126][T14065] should_failslab+0x9/0x20 [ 548.556646][T14065] __kmem_cache_alloc_node+0x3d/0x2c0 [ 548.562040][T14065] ? vsnprintf+0x1896/0x1960 [ 548.566645][T14065] ? __kthread_create_on_node+0x3f6/0x520 [ 548.572457][T14065] __kmalloc_node_track_caller+0xa0/0x1e0 [ 548.578366][T14065] kvasprintf+0xd9/0x180 [ 548.582713][T14065] ? __cfi_kvasprintf+0x10/0x10 [ 548.587576][T14065] ? vsnprintf+0x189d/0x1960 [ 548.592177][T14065] __kthread_create_on_node+0x3f6/0x520 [ 548.597816][T14065] ? kthread_create_on_node+0x120/0x120 [ 548.603369][T14065] ? kasan_save_alloc_info+0x25/0x30 [ 548.608756][T14065] ? __cfi_cpu_map_kthread_run+0x10/0x10 [ 548.614406][T14065] kthread_create_on_node+0xda/0x120 [ 548.619841][T14065] ? __cfi_kthread_create_on_node+0x10/0x10 [ 548.625736][T14065] ? bpf_map_kmalloc_node+0x1cf/0x2c0 [ 548.631128][T14065] cpu_map_update_elem+0x929/0xde0 [ 548.636254][T14065] ? __cfi_cpu_map_update_elem+0x10/0x10 [ 548.641896][T14065] ? kvmalloc_node+0x2bf/0x480 [ 548.646662][T14065] bpf_map_update_value+0x1a5/0x420 [ 548.651876][T14065] map_update_elem+0x4be/0x660 [ 548.656647][T14065] __sys_bpf+0x448/0x780 [ 548.660890][T14065] ? bpf_link_show_fdinfo+0x320/0x320 [ 548.666370][T14065] ? __cfi_ksys_write+0x10/0x10 [ 548.671262][T14065] ? __bpf_trace_sys_enter+0x62/0x70 [ 548.676633][T14065] __x64_sys_bpf+0x7c/0x90 [ 548.681144][T14065] x64_sys_call+0x488/0x9a0 [ 548.685690][T14065] do_syscall_64+0x4c/0xa0 [ 548.690134][T14065] ? clear_bhb_loop+0x30/0x80 [ 548.694842][T14065] ? clear_bhb_loop+0x30/0x80 [ 548.699586][T14065] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 548.705502][T14065] RIP: 0033:0x7f3abb78eec9 [ 548.709921][T14065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 548.729666][T14065] RSP: 002b:00007f3abc5e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 548.738193][T14065] RAX: ffffffffffffffda RBX: 00007f3abb9e5fa0 RCX: 00007f3abb78eec9 [ 548.746193][T14065] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 548.754227][T14065] RBP: 00007f3abc5e1090 R08: 0000000000000000 R09: 0000000000000000 [ 548.762290][T14065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 548.770460][T14065] R13: 00007f3abb9e6038 R14: 00007f3abb9e5fa0 R15: 00007fffc81ebda8 [ 548.778555][T14065] [ 548.840068][T14061] device veth0_vlan left promiscuous mode [ 548.874794][T14061] device veth0_vlan entered promiscuous mode [ 548.964844][T14082] device sit0 left promiscuous mode [ 549.007099][T14084] bond_slave_1: mtu less than device minimum [ 549.021369][T14082] device sit0 entered promiscuous mode [ 549.407550][T14086] @0Ù: renamed from bond_slave_1 [ 549.578354][T14101] FAULT_INJECTION: forcing a failure. [ 549.578354][T14101] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 549.655901][T14101] CPU: 1 PID: 14101 Comm: syz.3.4242 Tainted: G W syzkaller #0 [ 549.664911][T14101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 549.674997][T14101] Call Trace: [ 549.678301][T14101] [ 549.681260][T14101] __dump_stack+0x21/0x24 [ 549.685802][T14101] dump_stack_lvl+0xee/0x150 [ 549.690538][T14101] ? __cfi_dump_stack_lvl+0x8/0x8 [ 549.695597][T14101] dump_stack+0x15/0x24 [ 549.699784][T14101] should_fail_ex+0x3d4/0x520 [ 549.704641][T14101] should_fail+0xb/0x10 [ 549.708857][T14101] should_fail_usercopy+0x1a/0x20 [ 549.714021][T14101] _copy_to_user+0x1e/0x90 [ 549.718483][T14101] simple_read_from_buffer+0xe9/0x160 [ 549.724054][T14101] proc_fail_nth_read+0x19a/0x210 [ 549.729233][T14101] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 549.734915][T14101] ? security_file_permission+0x94/0xb0 [ 549.740525][T14101] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 549.746113][T14101] vfs_read+0x26e/0x8c0 [ 549.750313][T14101] ? __cfi_vfs_read+0x10/0x10 [ 549.755034][T14101] ? __kasan_check_write+0x14/0x20 [ 549.760174][T14101] ? mutex_lock+0x8d/0x1a0 [ 549.764719][T14101] ? __cfi_mutex_lock+0x10/0x10 [ 549.769601][T14101] ? __fdget_pos+0x2cd/0x380 [ 549.774228][T14101] ? ksys_read+0x71/0x240 [ 549.778601][T14101] ksys_read+0x140/0x240 [ 549.782976][T14101] ? __cfi_ksys_read+0x10/0x10 [ 549.787871][T14101] ? fpregs_restore_userregs+0x128/0x260 [ 549.793570][T14101] __x64_sys_read+0x7b/0x90 [ 549.798127][T14101] x64_sys_call+0x2f/0x9a0 [ 549.802597][T14101] do_syscall_64+0x4c/0xa0 [ 549.807052][T14101] ? clear_bhb_loop+0x30/0x80 [ 549.811769][T14101] ? clear_bhb_loop+0x30/0x80 [ 549.816654][T14101] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 549.822582][T14101] RIP: 0033:0x7fcf5138d8dc [ 549.827200][T14101] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 549.847006][T14101] RSP: 002b:00007fcf4fdf7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 549.855626][T14101] RAX: ffffffffffffffda RBX: 00007fcf515e5fa0 RCX: 00007fcf5138d8dc [ 549.863791][T14101] RDX: 000000000000000f RSI: 00007fcf4fdf70a0 RDI: 0000000000000009 [ 549.871881][T14101] RBP: 00007fcf4fdf7090 R08: 0000000000000000 R09: 0000000000000000 [ 549.879880][T14101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 549.887958][T14101] R13: 00007fcf515e6038 R14: 00007fcf515e5fa0 R15: 00007fff43fed978 [ 549.896035][T14101] [ 550.134521][T14119] FAULT_INJECTION: forcing a failure. [ 550.134521][T14119] name failslab, interval 1, probability 0, space 0, times 0 [ 550.196958][T14119] CPU: 1 PID: 14119 Comm: syz.3.4244 Tainted: G W syzkaller #0 [ 550.206059][T14119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 550.216235][T14119] Call Trace: [ 550.219545][T14119] [ 550.222521][T14119] __dump_stack+0x21/0x24 [ 550.226890][T14119] dump_stack_lvl+0xee/0x150 [ 550.231544][T14119] ? __cfi_dump_stack_lvl+0x8/0x8 [ 550.236607][T14119] ? __stack_depot_save+0x36/0x480 [ 550.241751][T14119] dump_stack+0x15/0x24 [ 550.246291][T14119] should_fail_ex+0x3d4/0x520 [ 550.251104][T14119] __should_failslab+0xac/0xf0 [ 550.256476][T14119] ? __kthread_create_on_node+0x123/0x520 [ 550.262326][T14119] should_failslab+0x9/0x20 [ 550.266873][T14119] __kmem_cache_alloc_node+0x3d/0x2c0 [ 550.272291][T14119] ? __kthread_create_on_node+0x123/0x520 [ 550.278049][T14119] kmalloc_trace+0x29/0xb0 [ 550.282605][T14119] ? __cfi_cpu_map_kthread_run+0x10/0x10 [ 550.288271][T14119] __kthread_create_on_node+0x123/0x520 [ 550.293857][T14119] ? kthread_create_on_node+0x120/0x120 [ 550.299421][T14119] ? kvmalloc_node+0x294/0x480 [ 550.304195][T14119] ? kasan_save_alloc_info+0x25/0x30 [ 550.309562][T14119] ? __cfi_cpu_map_kthread_run+0x10/0x10 [ 550.315299][T14119] kthread_create_on_node+0xda/0x120 [ 550.320682][T14119] ? __cfi_kthread_create_on_node+0x10/0x10 [ 550.326582][T14119] ? bpf_map_kmalloc_node+0x1cf/0x2c0 [ 550.331962][T14119] cpu_map_update_elem+0x929/0xde0 [ 550.337089][T14119] ? __cfi_cpu_map_update_elem+0x10/0x10 [ 550.343282][T14119] ? kvmalloc_node+0x2bf/0x480 [ 550.348057][T14119] bpf_map_update_value+0x1a5/0x420 [ 550.353273][T14119] map_update_elem+0x4be/0x660 [ 550.358049][T14119] __sys_bpf+0x448/0x780 [ 550.362386][T14119] ? bpf_link_show_fdinfo+0x320/0x320 [ 550.367767][T14119] ? __cfi_ksys_write+0x10/0x10 [ 550.372642][T14119] ? debug_smp_processor_id+0x17/0x20 [ 550.378214][T14119] __x64_sys_bpf+0x7c/0x90 [ 550.382682][T14119] x64_sys_call+0x488/0x9a0 [ 550.387214][T14119] do_syscall_64+0x4c/0xa0 [ 550.391731][T14119] ? clear_bhb_loop+0x30/0x80 [ 550.396449][T14119] ? clear_bhb_loop+0x30/0x80 [ 550.401150][T14119] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 550.407150][T14119] RIP: 0033:0x7fcf5138eec9 [ 550.411581][T14119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 550.431997][T14119] RSP: 002b:00007fcf4fdd6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 550.441044][T14119] RAX: ffffffffffffffda RBX: 00007fcf515e6090 RCX: 00007fcf5138eec9 [ 550.449116][T14119] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 550.457181][T14119] RBP: 00007fcf4fdd6090 R08: 0000000000000000 R09: 0000000000000000 [ 550.465264][T14119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 550.473248][T14119] R13: 00007fcf515e6128 R14: 00007fcf515e6090 R15: 00007fff43fed978 [ 550.481323][T14119] [ 550.515604][T14128] bond_slave_1: mtu less than device minimum [ 550.576318][T14130] device sit0 left promiscuous mode [ 550.634367][T14122] bond_slave_1: mtu less than device minimum [ 550.650380][T14130] device sit0 entered promiscuous mode [ 552.681729][T14164] FAULT_INJECTION: forcing a failure. [ 552.681729][T14164] name failslab, interval 1, probability 0, space 0, times 0 [ 552.695053][T14164] CPU: 0 PID: 14164 Comm: syz.4.4262 Tainted: G W syzkaller #0 [ 552.704305][T14164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 552.714391][T14164] Call Trace: [ 552.717784][T14164] [ 552.720854][T14164] __dump_stack+0x21/0x24 [ 552.725218][T14164] dump_stack_lvl+0xee/0x150 [ 552.729845][T14164] ? __cfi_dump_stack_lvl+0x8/0x8 [ 552.734902][T14164] ? number+0xd1d/0xf70 [ 552.739178][T14164] dump_stack+0x15/0x24 [ 552.743608][T14164] should_fail_ex+0x3d4/0x520 [ 552.748412][T14164] __should_failslab+0xac/0xf0 [ 552.753304][T14164] ? __kthread_create_on_node+0x3f6/0x520 [ 552.759234][T14164] should_failslab+0x9/0x20 [ 552.763774][T14164] __kmem_cache_alloc_node+0x3d/0x2c0 [ 552.769460][T14164] ? vsnprintf+0x1896/0x1960 [ 552.774098][T14164] ? __kthread_create_on_node+0x3f6/0x520 [ 552.779865][T14164] __kmalloc_node_track_caller+0xa0/0x1e0 [ 552.785639][T14164] kvasprintf+0xd9/0x180 [ 552.789956][T14164] ? __cfi_kvasprintf+0x10/0x10 [ 552.794857][T14164] ? vsnprintf+0x189d/0x1960 [ 552.799485][T14164] __kthread_create_on_node+0x3f6/0x520 [ 552.805297][T14164] ? kthread_create_on_node+0x120/0x120 [ 552.811012][T14164] ? kasan_save_alloc_info+0x25/0x30 [ 552.816590][T14164] ? __cfi_cpu_map_kthread_run+0x10/0x10 [ 552.822367][T14164] kthread_create_on_node+0xda/0x120 [ 552.827705][T14164] ? __cfi_kthread_create_on_node+0x10/0x10 [ 552.833656][T14164] ? bpf_map_kmalloc_node+0x1cf/0x2c0 [ 552.839162][T14164] cpu_map_update_elem+0x929/0xde0 [ 552.844631][T14164] ? __cfi_cpu_map_update_elem+0x10/0x10 [ 552.850355][T14164] ? kvmalloc_node+0x2bf/0x480 [ 552.855157][T14164] bpf_map_update_value+0x1a5/0x420 [ 552.860484][T14164] map_update_elem+0x4be/0x660 [ 552.865305][T14164] __sys_bpf+0x448/0x780 [ 552.869666][T14164] ? bpf_link_show_fdinfo+0x320/0x320 [ 552.875173][T14164] ? __cfi_ksys_write+0x10/0x10 [ 552.880255][T14164] ? debug_smp_processor_id+0x17/0x20 [ 552.885722][T14164] __x64_sys_bpf+0x7c/0x90 [ 552.890278][T14164] x64_sys_call+0x488/0x9a0 [ 552.894935][T14164] do_syscall_64+0x4c/0xa0 [ 552.899672][T14164] ? clear_bhb_loop+0x30/0x80 [ 552.904425][T14164] ? clear_bhb_loop+0x30/0x80 [ 552.909141][T14164] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 552.915079][T14164] RIP: 0033:0x7f3abb78eec9 [ 552.919612][T14164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 552.939283][T14164] RSP: 002b:00007f3abc5e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 552.947730][T14164] RAX: ffffffffffffffda RBX: 00007f3abb9e5fa0 RCX: 00007f3abb78eec9 [ 552.955752][T14164] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 552.963759][T14164] RBP: 00007f3abc5e1090 R08: 0000000000000000 R09: 0000000000000000 [ 552.971880][T14164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 552.980056][T14164] R13: 00007f3abb9e6038 R14: 00007f3abb9e5fa0 R15: 00007fffc81ebda8 [ 552.988155][T14164] [ 553.176930][T14171] device sit0 left promiscuous mode [ 553.231318][T14171] device sit0 entered promiscuous mode [ 553.673206][T14174] bridge0: port 2(bridge_slave_1) entered blocking state [ 553.680607][T14174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 553.759854][T14174] device bridge0 entered promiscuous mode [ 553.938306][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 555.296140][T14189] FAULT_INJECTION: forcing a failure. [ 555.296140][T14189] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 555.312276][T14189] CPU: 1 PID: 14189 Comm: syz.3.4271 Tainted: G W syzkaller #0 [ 555.321471][T14189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 555.331778][T14189] Call Trace: [ 555.335266][T14189] [ 555.338307][T14189] __dump_stack+0x21/0x24 [ 555.342679][T14189] dump_stack_lvl+0xee/0x150 [ 555.347455][T14189] ? __cfi_dump_stack_lvl+0x8/0x8 [ 555.352701][T14189] dump_stack+0x15/0x24 [ 555.357353][T14189] should_fail_ex+0x3d4/0x520 [ 555.362195][T14189] should_fail+0xb/0x10 [ 555.366483][T14189] should_fail_usercopy+0x1a/0x20 [ 555.371638][T14189] _copy_from_user+0x1e/0xc0 [ 555.376736][T14189] __sys_bpf+0x277/0x780 [ 555.381110][T14189] ? bpf_link_show_fdinfo+0x320/0x320 [ 555.386872][T14189] ? fpregs_restore_userregs+0x128/0x260 [ 555.392909][T14189] __x64_sys_bpf+0x7c/0x90 [ 555.397675][T14189] x64_sys_call+0x488/0x9a0 [ 555.402425][T14189] do_syscall_64+0x4c/0xa0 [ 555.406892][T14189] ? clear_bhb_loop+0x30/0x80 [ 555.411742][T14189] ? clear_bhb_loop+0x30/0x80 [ 555.416775][T14189] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 555.423068][T14189] RIP: 0033:0x7fcf5138eec9 [ 555.427690][T14189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 555.447587][T14189] RSP: 002b:00007fcf4fdf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 555.456603][T14189] RAX: ffffffffffffffda RBX: 00007fcf515e5fa0 RCX: 00007fcf5138eec9 [ 555.464711][T14189] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 555.472891][T14189] RBP: 00007fcf4fdf7090 R08: 0000000000000000 R09: 0000000000000000 [ 555.481206][T14189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 555.489825][T14189] R13: 00007fcf515e6038 R14: 00007fcf515e5fa0 R15: 00007fff43fed978 [ 555.498013][T14189] [ 555.682305][T14193] device sit0 left promiscuous mode [ 555.784845][T14196] bond_slave_1: mtu less than device minimum [ 555.794137][T14194] device sit0 entered promiscuous mode [ 556.179621][T14205] FAULT_INJECTION: forcing a failure. [ 556.179621][T14205] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 556.216056][T14210] device sit0 left promiscuous mode [ 556.240349][T14205] CPU: 1 PID: 14205 Comm: syz.0.4276 Tainted: G W syzkaller #0 [ 556.249528][T14205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 556.259796][T14205] Call Trace: [ 556.263200][T14205] [ 556.266210][T14205] __dump_stack+0x21/0x24 [ 556.271019][T14205] dump_stack_lvl+0xee/0x150 [ 556.275655][T14205] ? __cfi_dump_stack_lvl+0x8/0x8 [ 556.281010][T14205] dump_stack+0x15/0x24 [ 556.285469][T14205] should_fail_ex+0x3d4/0x520 [ 556.290386][T14205] should_fail+0xb/0x10 [ 556.294615][T14205] should_fail_usercopy+0x1a/0x20 [ 556.299783][T14205] _copy_to_user+0x1e/0x90 [ 556.304515][T14205] simple_read_from_buffer+0xe9/0x160 [ 556.310010][T14205] proc_fail_nth_read+0x19a/0x210 [ 556.315430][T14205] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 556.321117][T14205] ? security_file_permission+0x94/0xb0 [ 556.326946][T14205] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 556.332834][T14205] vfs_read+0x26e/0x8c0 [ 556.337042][T14205] ? __cfi_vfs_read+0x10/0x10 [ 556.341952][T14205] ? __kasan_check_write+0x14/0x20 [ 556.347446][T14205] ? mutex_lock+0x8d/0x1a0 [ 556.351988][T14205] ? __cfi_mutex_lock+0x10/0x10 [ 556.357064][T14205] ? __fdget_pos+0x2cd/0x380 [ 556.361799][T14205] ? ksys_read+0x71/0x240 [ 556.366190][T14205] ksys_read+0x140/0x240 [ 556.370649][T14205] ? __cfi_ksys_read+0x10/0x10 [ 556.375475][T14205] ? fpregs_restore_userregs+0x128/0x260 [ 556.381353][T14205] __x64_sys_read+0x7b/0x90 [ 556.386076][T14205] x64_sys_call+0x2f/0x9a0 [ 556.390539][T14205] do_syscall_64+0x4c/0xa0 [ 556.395081][T14205] ? clear_bhb_loop+0x30/0x80 [ 556.399880][T14205] ? clear_bhb_loop+0x30/0x80 [ 556.404605][T14205] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 556.410744][T14205] RIP: 0033:0x7f74d758d8dc [ 556.415379][T14205] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 556.435119][T14205] RSP: 002b:00007f74d849f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 556.443789][T14205] RAX: ffffffffffffffda RBX: 00007f74d77e5fa0 RCX: 00007f74d758d8dc [ 556.452138][T14205] RDX: 000000000000000f RSI: 00007f74d849f0a0 RDI: 0000000000000005 [ 556.460344][T14205] RBP: 00007f74d849f090 R08: 0000000000000000 R09: 0000000000000000 [ 556.468649][T14205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 556.476843][T14205] R13: 00007f74d77e6038 R14: 00007f74d77e5fa0 R15: 00007ffdb722fe88 [ 556.484938][T14205] [ 556.562612][T14216] device sit0 entered promiscuous mode [ 556.682044][T14221] syz.1.4282[14221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 556.682126][T14221] syz.1.4282[14221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 556.805523][T14222] syz.1.4282[14222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 556.896306][T14222] syz.1.4282[14222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.084603][T14226] device pim6reg1 entered promiscuous mode [ 557.161179][T14232] bond_slave_1: mtu less than device minimum [ 557.290985][T14244] device sit0 left promiscuous mode [ 557.872664][T14257] device sit0 left promiscuous mode [ 557.982286][T14257] device sit0 entered promiscuous mode [ 558.512783][T14269] FAULT_INJECTION: forcing a failure. [ 558.512783][T14269] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 558.526326][T14269] CPU: 0 PID: 14269 Comm: syz.2.4300 Tainted: G W syzkaller #0 [ 558.535394][T14269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 558.545744][T14269] Call Trace: [ 558.549133][T14269] [ 558.552110][T14269] __dump_stack+0x21/0x24 [ 558.556492][T14269] dump_stack_lvl+0xee/0x150 [ 558.561118][T14269] ? __cfi_dump_stack_lvl+0x8/0x8 [ 558.566287][T14269] ? __kasan_kmalloc+0x95/0xb0 [ 558.571328][T14269] ? kvmalloc_node+0x294/0x480 [ 558.576313][T14269] ? __kmalloc_node+0xb2/0x1e0 [ 558.581302][T14269] ? selinux_capable+0x29c/0x380 [ 558.586295][T14269] dump_stack+0x15/0x24 [ 558.590563][T14269] should_fail_ex+0x3d4/0x520 [ 558.595366][T14269] should_fail+0xb/0x10 [ 558.599561][T14269] should_fail_usercopy+0x1a/0x20 [ 558.604894][T14269] _copy_from_user+0x1e/0xc0 [ 558.609523][T14269] ___bpf_copy_key+0xb6/0x110 [ 558.614403][T14269] map_update_elem+0x2a6/0x660 [ 558.619202][T14269] __sys_bpf+0x448/0x780 [ 558.623645][T14269] ? bpf_link_show_fdinfo+0x320/0x320 [ 558.629136][T14269] ? __cfi_ksys_write+0x10/0x10 [ 558.634133][T14269] ? debug_smp_processor_id+0x17/0x20 [ 558.639727][T14269] __x64_sys_bpf+0x7c/0x90 [ 558.644334][T14269] x64_sys_call+0x488/0x9a0 [ 558.649139][T14269] do_syscall_64+0x4c/0xa0 [ 558.653759][T14269] ? clear_bhb_loop+0x30/0x80 [ 558.658565][T14269] ? clear_bhb_loop+0x30/0x80 [ 558.663375][T14269] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 558.669400][T14269] RIP: 0033:0x7f0cca78eec9 [ 558.673936][T14269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 558.693762][T14269] RSP: 002b:00007f0ccb608038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 558.702668][T14269] RAX: ffffffffffffffda RBX: 00007f0cca9e5fa0 RCX: 00007f0cca78eec9 [ 558.710871][T14269] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 558.719066][T14269] RBP: 00007f0ccb608090 R08: 0000000000000000 R09: 0000000000000000 [ 558.727249][T14269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 558.735522][T14269] R13: 00007f0cca9e6038 R14: 00007f0cca9e5fa0 R15: 00007ffe5fec0d88 [ 558.743766][T14269] [ 558.749418][T14262] bond_slave_1: mtu less than device minimum [ 560.613114][T14307] bond_slave_1: mtu less than device minimum [ 560.770454][T14309] device sit0 left promiscuous mode [ 560.872888][T14312] device sit0 entered promiscuous mode [ 561.505690][T14320] device syzkaller0 entered promiscuous mode [ 561.689016][T14349] bond_slave_1: mtu less than device minimum [ 562.417821][T14361] device pim6reg1 entered promiscuous mode [ 562.433696][T14363] FAULT_INJECTION: forcing a failure. [ 562.433696][T14363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 562.454872][T14363] CPU: 0 PID: 14363 Comm: syz.4.4329 Tainted: G W syzkaller #0 [ 562.464008][T14363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 562.474471][T14363] Call Trace: [ 562.478052][T14363] [ 562.481024][T14363] __dump_stack+0x21/0x24 [ 562.485420][T14363] dump_stack_lvl+0xee/0x150 [ 562.490320][T14363] ? __cfi_dump_stack_lvl+0x8/0x8 [ 562.495700][T14363] ? __kmalloc_node+0xb2/0x1e0 [ 562.500527][T14363] dump_stack+0x15/0x24 [ 562.504785][T14363] should_fail_ex+0x3d4/0x520 [ 562.509614][T14363] should_fail+0xb/0x10 [ 562.513987][T14363] should_fail_usercopy+0x1a/0x20 [ 562.519073][T14363] _copy_from_user+0x1e/0xc0 [ 562.523877][T14363] map_update_elem+0x440/0x660 [ 562.528835][T14363] __sys_bpf+0x448/0x780 [ 562.533254][T14363] ? bpf_link_show_fdinfo+0x320/0x320 [ 562.538683][T14363] ? __cfi_ksys_write+0x10/0x10 [ 562.543770][T14363] ? debug_smp_processor_id+0x17/0x20 [ 562.549292][T14363] __x64_sys_bpf+0x7c/0x90 [ 562.553761][T14363] x64_sys_call+0x488/0x9a0 [ 562.558301][T14363] do_syscall_64+0x4c/0xa0 [ 562.562756][T14363] ? clear_bhb_loop+0x30/0x80 [ 562.567466][T14363] ? clear_bhb_loop+0x30/0x80 [ 562.572195][T14363] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 562.578206][T14363] RIP: 0033:0x7f3abb78eec9 [ 562.582647][T14363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 562.602767][T14363] RSP: 002b:00007f3abc5e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 562.611222][T14363] RAX: ffffffffffffffda RBX: 00007f3abb9e5fa0 RCX: 00007f3abb78eec9 [ 562.619227][T14363] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 562.627289][T14363] RBP: 00007f3abc5e1090 R08: 0000000000000000 R09: 0000000000000000 [ 562.635465][T14363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 562.643549][T14363] R13: 00007f3abb9e6038 R14: 00007f3abb9e5fa0 R15: 00007fffc81ebda8 [ 562.651751][T14363] [ 563.396991][T14381] device sit0 left promiscuous mode [ 563.438776][T14381] device sit0 entered promiscuous mode [ 563.635781][T14391] bond_slave_1: mtu less than device minimum [ 564.970375][T14423] bond_slave_1: mtu less than device minimum [ 565.013437][T14427] bond_slave_1: mtu less than device minimum [ 565.131549][T14438] device sit0 entered promiscuous mode [ 566.190902][T14464] bond_slave_1: mtu less than device minimum [ 566.642299][T14486] device sit0 left promiscuous mode [ 566.828696][T14485] device sit0 entered promiscuous mode [ 568.272672][T14534] device sit0 left promiscuous mode [ 568.392413][T14533] device sit0 entered promiscuous mode [ 569.077601][T14541] FAULT_INJECTION: forcing a failure. [ 569.077601][T14541] name failslab, interval 1, probability 0, space 0, times 0 [ 569.090694][T14541] CPU: 1 PID: 14541 Comm: syz.2.4385 Tainted: G W syzkaller #0 [ 569.099860][T14541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 569.109928][T14541] Call Trace: [ 569.113229][T14541] [ 569.116173][T14541] __dump_stack+0x21/0x24 [ 569.120512][T14541] dump_stack_lvl+0xee/0x150 [ 569.125198][T14541] ? __cfi_dump_stack_lvl+0x8/0x8 [ 569.130243][T14541] dump_stack+0x15/0x24 [ 569.134514][T14541] should_fail_ex+0x3d4/0x520 [ 569.139500][T14541] __should_failslab+0xac/0xf0 [ 569.144471][T14541] ? __kthread_create_on_node+0x123/0x520 [ 569.150740][T14541] should_failslab+0x9/0x20 [ 569.155283][T14541] __kmem_cache_alloc_node+0x3d/0x2c0 [ 569.160933][T14541] ? __kthread_create_on_node+0x123/0x520 [ 569.166852][T14541] kmalloc_trace+0x29/0xb0 [ 569.171371][T14541] ? __cfi_cpu_map_kthread_run+0x10/0x10 [ 569.177018][T14541] __kthread_create_on_node+0x123/0x520 [ 569.182658][T14541] ? kthread_create_on_node+0x120/0x120 [ 569.188218][T14541] ? kvmalloc_node+0x294/0x480 [ 569.192985][T14541] ? kasan_save_alloc_info+0x25/0x30 [ 569.198282][T14541] ? __cfi_cpu_map_kthread_run+0x10/0x10 [ 569.203928][T14541] kthread_create_on_node+0xda/0x120 [ 569.209239][T14541] ? __cfi_kthread_create_on_node+0x10/0x10 [ 569.215234][T14541] ? bpf_map_kmalloc_node+0x1cf/0x2c0 [ 569.220877][T14541] cpu_map_update_elem+0x929/0xde0 [ 569.226003][T14541] ? __cfi_cpu_map_update_elem+0x10/0x10 [ 569.231670][T14541] bpf_map_update_value+0x1a5/0x420 [ 569.236968][T14541] map_update_elem+0x4be/0x660 [ 569.241743][T14541] __sys_bpf+0x448/0x780 [ 569.246108][T14541] ? bpf_link_show_fdinfo+0x320/0x320 [ 569.251493][T14541] ? fpregs_restore_userregs+0x128/0x260 [ 569.257136][T14541] __x64_sys_bpf+0x7c/0x90 [ 569.261651][T14541] x64_sys_call+0x488/0x9a0 [ 569.266512][T14541] do_syscall_64+0x4c/0xa0 [ 569.270933][T14541] ? clear_bhb_loop+0x30/0x80 [ 569.275706][T14541] ? clear_bhb_loop+0x30/0x80 [ 569.280479][T14541] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 569.286385][T14541] RIP: 0033:0x7f0cca78eec9 [ 569.290835][T14541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 569.310567][T14541] RSP: 002b:00007f0ccb608038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 569.319084][T14541] RAX: ffffffffffffffda RBX: 00007f0cca9e5fa0 RCX: 00007f0cca78eec9 [ 569.327094][T14541] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 569.335158][T14541] RBP: 00007f0ccb608090 R08: 0000000000000000 R09: 0000000000000000 [ 569.343139][T14541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 569.351123][T14541] R13: 00007f0cca9e6038 R14: 00007f0cca9e5fa0 R15: 00007ffe5fec0d88 [ 569.359116][T14541] [ 569.805881][T14549] bond_slave_1: mtu less than device minimum [ 570.087967][T14552] FAULT_INJECTION: forcing a failure. [ 570.087967][T14552] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 570.119391][T14552] CPU: 1 PID: 14552 Comm: syz.1.4389 Tainted: G W syzkaller #0 [ 570.128465][T14552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 570.138554][T14552] Call Trace: [ 570.141860][T14552] [ 570.144829][T14552] __dump_stack+0x21/0x24 [ 570.149461][T14552] dump_stack_lvl+0xee/0x150 [ 570.154091][T14552] ? __cfi_dump_stack_lvl+0x8/0x8 [ 570.159166][T14552] dump_stack+0x15/0x24 [ 570.163463][T14552] should_fail_ex+0x3d4/0x520 [ 570.168203][T14552] should_fail+0xb/0x10 [ 570.172419][T14552] should_fail_usercopy+0x1a/0x20 [ 570.177630][T14552] _copy_from_user+0x1e/0xc0 [ 570.182262][T14552] do_vfs_ioctl+0x172d/0x1c80 [ 570.186978][T14552] ? __ia32_compat_sys_ioctl+0x790/0x790 [ 570.192656][T14552] ? ioctl_has_perm+0x391/0x4c0 [ 570.197571][T14552] ? has_cap_mac_admin+0x330/0x330 [ 570.202802][T14552] ? __hrtimer_run_queues+0x991/0x9f0 [ 570.208225][T14552] ? selinux_file_ioctl+0x377/0x480 [ 570.213479][T14552] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 570.219683][T14552] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 570.225363][T14552] ? __fget_files+0x7b/0x330 [ 570.230002][T14552] ? __fget_files+0x2d5/0x330 [ 570.234777][T14552] ? security_file_ioctl+0x95/0xc0 [ 570.239944][T14552] __se_sys_ioctl+0x9f/0x1b0 [ 570.244661][T14552] __x64_sys_ioctl+0x7b/0x90 [ 570.249721][T14552] x64_sys_call+0x58b/0x9a0 [ 570.254262][T14552] do_syscall_64+0x4c/0xa0 [ 570.258716][T14552] ? clear_bhb_loop+0x30/0x80 [ 570.263583][T14552] ? clear_bhb_loop+0x30/0x80 [ 570.268302][T14552] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 570.274318][T14552] RIP: 0033:0x7fa71718eec9 [ 570.278851][T14552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 570.298673][T14552] RSP: 002b:00007fa715bf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 570.307297][T14552] RAX: ffffffffffffffda RBX: 00007fa7173e6090 RCX: 00007fa71718eec9 [ 570.315658][T14552] RDX: 0000200000000040 RSI: 0000000040305829 RDI: 0000000000000008 [ 570.323666][T14552] RBP: 00007fa715bf7090 R08: 0000000000000000 R09: 0000000000000000 [ 570.331959][T14552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 570.340183][T14552] R13: 00007fa7173e6128 R14: 00007fa7173e6090 R15: 00007ffc33616c08 [ 570.348502][T14552] [ 570.554738][T14562] device sit0 left promiscuous mode [ 570.611556][T14562] device sit0 entered promiscuous mode [ 571.117376][T14569] device pim6reg1 left promiscuous mode [ 571.280534][T14573] device sit0 left promiscuous mode [ 571.369051][T14578] device sit0 entered promiscuous mode [ 571.807079][T14582] bond_slave_1: mtu less than device minimum [ 571.999021][T14599] FAULT_INJECTION: forcing a failure. [ 571.999021][T14599] name failslab, interval 1, probability 0, space 0, times 0 [ 572.043796][T14599] CPU: 0 PID: 14599 Comm: syz.0.4403 Tainted: G W syzkaller #0 [ 572.052988][T14599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 572.063549][T14599] Call Trace: [ 572.067046][T14599] [ 572.070002][T14599] __dump_stack+0x21/0x24 [ 572.074361][T14599] dump_stack_lvl+0xee/0x150 [ 572.079007][T14599] ? __cfi_dump_stack_lvl+0x8/0x8 [ 572.084330][T14599] ? number+0xd1d/0xf70 [ 572.088611][T14599] dump_stack+0x15/0x24 [ 572.092886][T14599] should_fail_ex+0x3d4/0x520 [ 572.097610][T14599] __should_failslab+0xac/0xf0 [ 572.102415][T14599] ? __kthread_create_on_node+0x3f6/0x520 [ 572.108206][T14599] should_failslab+0x9/0x20 [ 572.112743][T14599] __kmem_cache_alloc_node+0x3d/0x2c0 [ 572.118159][T14599] ? vsnprintf+0x1896/0x1960 [ 572.122871][T14599] ? __kthread_create_on_node+0x3f6/0x520 [ 572.128626][T14599] __kmalloc_node_track_caller+0xa0/0x1e0 [ 572.134406][T14599] kvasprintf+0xd9/0x180 [ 572.138697][T14599] ? __cfi_kvasprintf+0x10/0x10 [ 572.143773][T14599] ? vsnprintf+0x189d/0x1960 [ 572.148414][T14599] __kthread_create_on_node+0x3f6/0x520 [ 572.154102][T14599] ? kthread_create_on_node+0x120/0x120 [ 572.159951][T14599] ? kasan_save_alloc_info+0x25/0x30 [ 572.165297][T14599] ? __cfi_cpu_map_kthread_run+0x10/0x10 [ 572.171236][T14599] kthread_create_on_node+0xda/0x120 [ 572.176559][T14599] ? __cfi_kthread_create_on_node+0x10/0x10 [ 572.182586][T14599] ? bpf_map_kmalloc_node+0x1cf/0x2c0 [ 572.187977][T14599] cpu_map_update_elem+0x929/0xde0 [ 572.193279][T14599] ? __cfi_cpu_map_update_elem+0x10/0x10 [ 572.198920][T14599] ? kvmalloc_node+0x2bf/0x480 [ 572.203787][T14599] bpf_map_update_value+0x1a5/0x420 [ 572.209017][T14599] map_update_elem+0x4be/0x660 [ 572.213799][T14599] __sys_bpf+0x448/0x780 [ 572.218069][T14599] ? bpf_link_show_fdinfo+0x320/0x320 [ 572.223481][T14599] ? __cfi_ksys_write+0x10/0x10 [ 572.228353][T14599] ? debug_smp_processor_id+0x17/0x20 [ 572.233746][T14599] __x64_sys_bpf+0x7c/0x90 [ 572.238200][T14599] x64_sys_call+0x488/0x9a0 [ 572.242899][T14599] do_syscall_64+0x4c/0xa0 [ 572.247323][T14599] ? clear_bhb_loop+0x30/0x80 [ 572.252019][T14599] ? clear_bhb_loop+0x30/0x80 [ 572.256906][T14599] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 572.262985][T14599] RIP: 0033:0x7f74d758eec9 [ 572.267411][T14599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 572.287197][T14599] RSP: 002b:00007f74d849f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 572.295710][T14599] RAX: ffffffffffffffda RBX: 00007f74d77e5fa0 RCX: 00007f74d758eec9 [ 572.303771][T14599] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 572.311837][T14599] RBP: 00007f74d849f090 R08: 0000000000000000 R09: 0000000000000000 [ 572.319813][T14599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 572.327783][T14599] R13: 00007f74d77e6038 R14: 00007f74d77e5fa0 R15: 00007ffdb722fe88 [ 572.335777][T14599] [ 572.767270][T14614] FAULT_INJECTION: forcing a failure. [ 572.767270][T14614] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 572.784566][T14614] CPU: 1 PID: 14614 Comm: syz.4.4406 Tainted: G W syzkaller #0 [ 572.794000][T14614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 572.804083][T14614] Call Trace: [ 572.807675][T14614] [ 572.810719][T14614] __dump_stack+0x21/0x24 [ 572.815158][T14614] dump_stack_lvl+0xee/0x150 [ 572.819772][T14614] ? __cfi_dump_stack_lvl+0x8/0x8 [ 572.824909][T14614] dump_stack+0x15/0x24 [ 572.829090][T14614] should_fail_ex+0x3d4/0x520 [ 572.834161][T14614] should_fail+0xb/0x10 [ 572.838350][T14614] should_fail_usercopy+0x1a/0x20 [ 572.843549][T14614] _copy_to_user+0x1e/0x90 [ 572.847998][T14614] simple_read_from_buffer+0xe9/0x160 [ 572.853433][T14614] proc_fail_nth_read+0x19a/0x210 [ 572.858584][T14614] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 572.864692][T14614] ? security_file_permission+0x94/0xb0 [ 572.870268][T14614] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 572.875931][T14614] vfs_read+0x26e/0x8c0 [ 572.880230][T14614] ? __cfi_vfs_read+0x10/0x10 [ 572.885196][T14614] ? __kasan_check_write+0x14/0x20 [ 572.890342][T14614] ? mutex_lock+0x8d/0x1a0 [ 572.895006][T14614] ? __cfi_mutex_lock+0x10/0x10 [ 572.899895][T14614] ? __fdget_pos+0x2cd/0x380 [ 572.904678][T14614] ? ksys_read+0x71/0x240 [ 572.909093][T14614] ksys_read+0x140/0x240 [ 572.913388][T14614] ? __cfi_ksys_read+0x10/0x10 [ 572.918498][T14614] __x64_sys_read+0x7b/0x90 [ 572.923140][T14614] x64_sys_call+0x2f/0x9a0 [ 572.927705][T14614] do_syscall_64+0x4c/0xa0 [ 572.932145][T14614] ? clear_bhb_loop+0x30/0x80 [ 572.936936][T14614] ? clear_bhb_loop+0x30/0x80 [ 572.941648][T14614] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 572.947746][T14614] RIP: 0033:0x7f3abb78d8dc [ 572.952209][T14614] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 572.971934][T14614] RSP: 002b:00007f3abc5c0030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 572.980380][T14614] RAX: ffffffffffffffda RBX: 00007f3abb9e6090 RCX: 00007f3abb78d8dc [ 572.988424][T14614] RDX: 000000000000000f RSI: 00007f3abc5c00a0 RDI: 0000000000000009 [ 572.996776][T14614] RBP: 00007f3abc5c0090 R08: 0000000000000000 R09: 0000000000000000 [ 573.004865][T14614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 573.012877][T14614] R13: 00007f3abb9e6128 R14: 00007f3abb9e6090 R15: 00007fffc81ebda8 [ 573.020901][T14614] [ 573.047021][T14629] bond_slave_1: mtu less than device minimum [ 573.086949][T14624] bond_slave_1: mtu less than device minimum [ 573.146835][T14631] device sit0 left promiscuous mode [ 573.167621][T14631] device sit0 entered promiscuous mode [ 574.236479][T14658] FAULT_INJECTION: forcing a failure. [ 574.236479][T14658] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 574.252965][T14658] CPU: 0 PID: 14658 Comm: syz.0.4420 Tainted: G W syzkaller #0 [ 574.262226][T14658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 574.272664][T14658] Call Trace: [ 574.275975][T14658] [ 574.278931][T14658] __dump_stack+0x21/0x24 [ 574.283384][T14658] dump_stack_lvl+0xee/0x150 [ 574.288114][T14658] ? __cfi_dump_stack_lvl+0x8/0x8 [ 574.293216][T14658] dump_stack+0x15/0x24 [ 574.297488][T14658] should_fail_ex+0x3d4/0x520 [ 574.302229][T14658] should_fail+0xb/0x10 [ 574.306528][T14658] should_fail_usercopy+0x1a/0x20 [ 574.311686][T14658] _copy_to_user+0x1e/0x90 [ 574.316599][T14658] simple_read_from_buffer+0xe9/0x160 [ 574.322183][T14658] proc_fail_nth_read+0x19a/0x210 [ 574.327346][T14658] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 574.332933][T14658] ? security_file_permission+0x94/0xb0 [ 574.338557][T14658] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 574.344167][T14658] vfs_read+0x26e/0x8c0 [ 574.348460][T14658] ? __cfi_vfs_read+0x10/0x10 [ 574.353192][T14658] ? __kasan_check_write+0x14/0x20 [ 574.358343][T14658] ? mutex_lock+0x8d/0x1a0 [ 574.363066][T14658] ? __cfi_mutex_lock+0x10/0x10 [ 574.368136][T14658] ? __fdget_pos+0x2cd/0x380 [ 574.372784][T14658] ? ksys_read+0x71/0x240 [ 574.377173][T14658] ksys_read+0x140/0x240 [ 574.381467][T14658] ? __cfi_ksys_read+0x10/0x10 [ 574.386459][T14658] ? fpregs_restore_userregs+0x128/0x260 [ 574.392160][T14658] __x64_sys_read+0x7b/0x90 [ 574.396802][T14658] x64_sys_call+0x2f/0x9a0 [ 574.401259][T14658] do_syscall_64+0x4c/0xa0 [ 574.405810][T14658] ? clear_bhb_loop+0x30/0x80 [ 574.410697][T14658] ? clear_bhb_loop+0x30/0x80 [ 574.415416][T14658] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 574.421359][T14658] RIP: 0033:0x7f74d758d8dc [ 574.425808][T14658] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 574.445624][T14658] RSP: 002b:00007f74d849f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 574.454172][T14658] RAX: ffffffffffffffda RBX: 00007f74d77e5fa0 RCX: 00007f74d758d8dc [ 574.462265][T14658] RDX: 000000000000000f RSI: 00007f74d849f0a0 RDI: 000000000000000a [ 574.470356][T14658] RBP: 00007f74d849f090 R08: 0000000000000000 R09: 0000000000000000 [ 574.478448][T14658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 574.486636][T14658] R13: 00007f74d77e6038 R14: 00007f74d77e5fa0 R15: 00007ffdb722fe88 [ 574.494884][T14658] [ 575.468345][T14688] device syzkaller0 entered promiscuous mode [ 575.872446][T14697] device sit0 left promiscuous mode [ 575.943482][T14697] device sit0 entered promiscuous mode [ 576.524708][T14704] bond_slave_1: mtu less than device minimum [ 577.058811][T14731] device syzkaller0 entered promiscuous mode [ 577.850807][T14743] bond_slave_1: mtu less than device minimum [ 577.866227][T14745] device sit0 left promiscuous mode [ 577.891100][T14745] device sit0 entered promiscuous mode [ 579.091030][T14793] syz.0.4462[14793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 579.091652][T14793] syz.0.4462[14793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 579.161361][T14793] syz.0.4462[14793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 579.179014][T14793] syz.0.4462[14793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 579.407215][T14793] device pim6reg1 entered promiscuous mode [ 579.866790][T14804] device sit0 left promiscuous mode [ 579.895639][T14809] device sit0 entered promiscuous mode [ 580.697834][T14819] bond_slave_1: mtu less than device minimum [ 581.696188][T14844] device sit0 left promiscuous mode [ 581.821324][T14845] device sit0 entered promiscuous mode [ 582.123036][T14849] bond_slave_1: mtu less than device minimum [ 582.471563][ T563] device bridge_slave_1 left promiscuous mode [ 582.479402][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.492493][ T563] device bridge_slave_0 left promiscuous mode [ 582.499237][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.507562][ T563] device veth1_macvtap left promiscuous mode [ 582.514209][ T563] device veth0_vlan left promiscuous mode [ 582.674538][T14874] device pim6reg1 entered promiscuous mode [ 582.680997][T14883] device pim6reg1 left promiscuous mode [ 582.899240][T14900] bond_slave_1: mtu less than device minimum [ 582.943958][T14850] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.984472][T14850] bridge0: port 1(bridge_slave_0) entered disabled state [ 583.022851][T14850] device bridge_slave_0 entered promiscuous mode [ 583.039741][T14850] bridge0: port 2(bridge_slave_1) entered blocking state [ 583.046998][T14850] bridge0: port 2(bridge_slave_1) entered disabled state [ 583.067990][T14850] device bridge_slave_1 entered promiscuous mode [ 583.081191][T14903] device sit0 left promiscuous mode [ 583.203873][T14903] device sit0 entered promiscuous mode [ 583.746278][T14910] device wg2 entered promiscuous mode [ 584.284225][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 584.308083][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 584.333373][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 584.342905][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 584.352293][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.359473][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 584.368326][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 584.400013][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 584.416324][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.423517][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.465955][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 584.515724][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 584.615186][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 584.861002][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 584.916912][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 584.951179][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 584.992852][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 585.030771][T14850] device veth0_vlan entered promiscuous mode [ 585.042257][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 585.087922][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 585.174081][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 585.208677][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 585.246039][T14850] device veth1_macvtap entered promiscuous mode [ 585.309779][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 585.320585][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 585.345338][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 585.403951][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 585.419102][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 585.860332][T14956] device sit0 left promiscuous mode [ 585.954609][T14957] device sit0 entered promiscuous mode [ 586.432725][T14970] device dummy0 entered promiscuous mode [ 586.521808][T14977] bond_slave_1: mtu less than device minimum [ 586.590982][ T563] device bridge_slave_1 left promiscuous mode [ 586.602740][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.622016][ T563] device bridge_slave_0 left promiscuous mode [ 586.630457][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.659899][ T563] device veth1_macvtap left promiscuous mode [ 586.678214][ T563] device veth0_vlan left promiscuous mode [ 586.900425][T14965] bridge0: port 1(bridge_slave_0) entered blocking state [ 586.907499][T14965] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.916295][T14965] device bridge_slave_0 entered promiscuous mode [ 586.937514][T14965] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.945004][T14965] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.953110][T14965] device bridge_slave_1 entered promiscuous mode [ 588.003721][T15005] device syzkaller0 entered promiscuous mode [ 588.305625][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 588.313647][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 588.346613][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 588.357565][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 588.372589][T13575] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.379729][T13575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.393702][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 588.403277][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 588.413694][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 588.423772][T13575] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.430898][T13575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.464895][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 588.474252][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 588.488183][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 588.498906][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 588.535946][T14965] device veth0_vlan entered promiscuous mode [ 588.552415][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 588.583733][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 588.598413][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 588.608373][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 588.623631][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 588.648740][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 588.681834][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 588.690749][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 588.700264][T14965] device veth1_macvtap entered promiscuous mode [ 588.730386][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 588.752101][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 588.774694][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 588.805815][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 588.996691][T14965] syz-executor (14965) used greatest stack depth: 21152 bytes left [ 589.012691][T15033] bond_slave_1: mtu less than device minimum [ 589.122690][T15038] device sit0 left promiscuous mode [ 589.176041][T15038] device sit0 entered promiscuous mode [ 589.891968][T15045] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.916327][T15045] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.969682][T15045] device bridge_slave_0 entered promiscuous mode [ 590.038497][T15045] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.045896][T15045] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.056092][T15045] device bridge_slave_1 entered promiscuous mode [ 591.000150][ T563] device bridge_slave_1 left promiscuous mode [ 591.008720][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 591.099199][ T563] device bridge_slave_0 left promiscuous mode [ 591.111289][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 591.179736][ T563] device veth1_macvtap left promiscuous mode [ 591.200134][ T563] device veth0_vlan left promiscuous mode [ 591.437563][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 591.446010][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 591.518297][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 591.539152][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 591.595239][ T377] bridge0: port 1(bridge_slave_0) entered blocking state [ 591.602449][ T377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 591.611892][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 591.619712][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 591.628214][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 591.636935][ T377] bridge0: port 2(bridge_slave_1) entered blocking state [ 591.644134][ T377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 591.652900][T15083] bond_slave_1: mtu less than device minimum [ 591.670022][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 591.706444][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 591.718702][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 591.732771][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 591.753376][T15045] device veth0_vlan entered promiscuous mode [ 591.767488][T15045] device veth1_macvtap entered promiscuous mode [ 591.834312][T15088] device veth1_macvtap left promiscuous mode [ 591.871136][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 591.883913][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 591.893639][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 591.905516][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 591.914271][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 591.922885][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 591.931539][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 591.950989][T15092] device sit0 left promiscuous mode [ 591.963401][T15090] device sit0 entered promiscuous mode [ 592.290384][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 592.303779][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 592.313082][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 592.323406][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 592.373649][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 592.387183][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 593.725195][T15124] device pim6reg1 entered promiscuous mode [ 593.787534][ T563] device bridge_slave_1 left promiscuous mode [ 593.795664][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.811764][ T563] device bridge_slave_0 left promiscuous mode [ 593.818893][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.833738][ T563] device veth1_macvtap left promiscuous mode [ 593.841957][ T563] device veth0_vlan left promiscuous mode [ 593.991746][T15132] bond_slave_1: mtu less than device minimum [ 594.105969][T15137] device sit0 left promiscuous mode [ 594.164314][T15137] device sit0 entered promiscuous mode [ 594.556646][T15116] bridge0: port 1(bridge_slave_0) entered blocking state [ 594.564485][T15116] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.572695][T15116] device bridge_slave_0 entered promiscuous mode [ 594.611276][T15116] bridge0: port 2(bridge_slave_1) entered blocking state [ 594.618635][T15116] bridge0: port 2(bridge_slave_1) entered disabled state [ 594.629527][T15116] device bridge_slave_1 entered promiscuous mode [ 595.486110][T15116] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.493319][T15116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 595.559422][ T377] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.638934][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 595.668814][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 595.694634][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 595.715124][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 595.728738][ T377] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.735963][ T377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 595.818557][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 595.830629][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 595.847761][ T377] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.854917][ T377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 595.907417][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 595.916171][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 595.924571][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 595.935872][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 595.946214][T15185] bond_slave_1: mtu less than device minimum [ 595.988721][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 596.013443][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 596.064255][T15116] device veth0_vlan entered promiscuous mode [ 596.142191][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 596.160020][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 596.169981][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 596.177671][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 596.205909][T15200] device sit0 left promiscuous mode [ 596.236585][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 596.263392][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 596.291198][T15116] device veth1_macvtap entered promiscuous mode [ 596.309876][T15200] device sit0 entered promiscuous mode [ 596.553974][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 596.572176][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 596.643856][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 596.692097][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 596.703448][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 597.528768][T15225] bond_slave_1: mtu less than device minimum [ 597.977232][ T563] device bridge_slave_1 left promiscuous mode [ 597.999489][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.017009][ T563] device bridge_slave_0 left promiscuous mode [ 598.036990][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.045901][ T563] device veth1_macvtap left promiscuous mode [ 598.052289][ T563] device veth0_vlan left promiscuous mode [ 598.186069][T15254] device sit0 left promiscuous mode [ 598.270833][T15257] device sit0 entered promiscuous mode [ 598.892867][T15241] bridge0: port 1(bridge_slave_0) entered blocking state [ 598.929360][T15241] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.969462][T15241] device bridge_slave_0 entered promiscuous mode [ 599.024425][T15241] bridge0: port 2(bridge_slave_1) entered blocking state [ 599.033323][T15241] bridge0: port 2(bridge_slave_1) entered disabled state [ 599.050765][T15241] device bridge_slave_1 entered promiscuous mode [ 599.294343][T15267] bridge0: port 3(team_slave_1) entered blocking state [ 599.302062][T15267] bridge0: port 3(team_slave_1) entered disabled state [ 599.323909][T15267] device team_slave_1 entered promiscuous mode [ 599.431866][T15269] bond_slave_1: mtu less than device minimum [ 599.645375][T15271] device veth1_macvtap left promiscuous mode [ 599.707162][T15272] device veth1_macvtap entered promiscuous mode [ 599.714079][T15272] device macsec0 entered promiscuous mode [ 599.866680][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 599.879545][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 599.936587][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 599.964560][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 599.980017][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.987134][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 600.012256][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 600.028186][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 600.045034][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 600.052267][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 600.111376][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 600.135544][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 600.175044][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 600.200605][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 600.237535][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 600.305365][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 600.334537][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 600.347965][T15305] device sit0 left promiscuous mode [ 600.371644][T15307] device sit0 left promiscuous mode [ 600.396331][T15313] device sit0 entered promiscuous mode [ 600.964179][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 600.979863][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 600.997155][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 601.015247][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 601.025743][T15241] device veth0_vlan entered promiscuous mode [ 601.050475][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 601.079747][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 601.162081][T15241] device veth1_macvtap entered promiscuous mode [ 601.208621][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 601.239154][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 601.258495][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 601.267744][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 601.306557][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 602.345490][T15356] syz.3.4614[15356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 602.346511][T15356] syz.3.4614[15356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 603.186714][T15361] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.206622][T15361] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.217973][T15361] device bridge_slave_0 entered promiscuous mode [ 603.331213][T15361] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.338672][T15361] bridge0: port 2(bridge_slave_1) entered disabled state [ 603.346951][T15361] device bridge_slave_1 entered promiscuous mode [ 603.454093][ T10] device bridge_slave_1 left promiscuous mode [ 603.462172][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 603.473423][ T10] device bridge_slave_0 left promiscuous mode [ 603.480389][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.499689][ T10] device veth1_macvtap left promiscuous mode [ 603.506359][ T10] device veth0_vlan left promiscuous mode [ 604.161136][T15375] device sit0 left promiscuous mode [ 604.177846][T15375] device sit0 entered promiscuous mode [ 604.616928][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 604.628249][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 604.657160][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 604.666912][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 604.737167][ T563] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.744395][ T563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.858023][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 604.904502][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 604.950446][ T563] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.957641][ T563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 604.989591][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 605.144072][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 605.160685][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 605.183776][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 605.200226][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 605.271964][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 605.292011][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 605.332059][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 605.356254][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 605.394989][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 605.403768][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 605.422843][T15361] device veth0_vlan entered promiscuous mode [ 605.478655][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 605.507924][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 605.535961][T15361] device veth1_macvtap entered promiscuous mode [ 605.563093][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 605.571585][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 605.580997][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 605.608683][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 605.620502][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 606.430957][ T563] device bridge_slave_1 left promiscuous mode [ 606.437197][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.446531][ T563] device bridge_slave_0 left promiscuous mode [ 606.454864][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.464312][ T563] device veth1_macvtap left promiscuous mode [ 606.470695][ T563] device veth0_vlan left promiscuous mode [ 606.670532][T15407] bridge0: port 3(team_slave_1) entered blocking state [ 606.681946][T15407] bridge0: port 3(team_slave_1) entered disabled state [ 606.700793][T15407] device team_slave_1 entered promiscuous mode [ 606.765571][T15418] bond_slave_1: mtu less than device minimum [ 606.864140][T15420] device sit0 left promiscuous mode [ 606.972975][T15420] device sit0 entered promiscuous mode [ 607.410905][T15426] device sit0 entered promiscuous mode [ 607.894457][T15438] device sit0 left promiscuous mode [ 607.958318][T15438] device sit0 entered promiscuous mode [ 608.412645][T15421] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.449787][T15421] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.484927][T15421] device bridge_slave_0 entered promiscuous mode [ 608.512643][T15446] device sit0 left promiscuous mode [ 608.552072][T15447] device sit0 entered promiscuous mode [ 608.788378][T15421] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.795694][T15421] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.803664][T15421] device bridge_slave_1 entered promiscuous mode [ 608.813304][T15454] bond_slave_1: mtu less than device minimum [ 608.861181][T15458] device sit0 left promiscuous mode [ 608.942718][T15459] device sit0 entered promiscuous mode [ 609.207393][T15463] bond_slave_1: mtu less than device minimum [ 609.439672][T15472] device sit0 left promiscuous mode [ 609.572205][T15470] device sit0 entered promiscuous mode [ 610.253758][T15490] device sit0 left promiscuous mode [ 610.273024][T15477] device sit0 entered promiscuous mode [ 610.556846][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 610.618720][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 610.710411][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 610.747546][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 610.790686][ T563] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.797962][ T563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.805843][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 610.870518][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 610.906102][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 610.974496][ T563] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.981659][ T563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 611.100110][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 611.123280][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 611.174860][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 611.250651][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 611.283733][T15508] bond_slave_1: mtu less than device minimum [ 611.418381][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 611.445229][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 611.635908][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 611.724413][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 611.775810][T15421] device veth0_vlan entered promiscuous mode [ 611.803964][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 611.858689][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 611.968223][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 612.022907][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 612.085988][T15421] device veth1_macvtap entered promiscuous mode [ 612.222771][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 612.260081][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 612.268551][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 612.384178][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 612.420114][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 612.465749][T15528] device sit0 left promiscuous mode [ 612.566723][T15528] device sit0 entered promiscuous mode [ 613.840562][ T563] device bridge_slave_1 left promiscuous mode [ 613.846816][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 613.854900][ T563] device bridge_slave_0 left promiscuous mode [ 613.861156][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.871655][ T563] device veth1_macvtap left promiscuous mode [ 613.877874][ T563] device veth0_vlan left promiscuous mode [ 614.137683][T15538] device sit0 left promiscuous mode [ 614.187364][T15542] device sit0 left promiscuous mode [ 614.216589][T15545] device sit0 entered promiscuous mode [ 614.600925][T15538] device sit0 entered promiscuous mode [ 615.101811][T15548] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.109499][T15548] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.120256][T15548] device bridge_slave_0 entered promiscuous mode [ 615.127837][T15548] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.135401][T15548] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.144164][T15548] device bridge_slave_1 entered promiscuous mode [ 615.263565][T15556] device sit0 left promiscuous mode [ 615.423554][T15556] device sit0 entered promiscuous mode [ 615.865115][T15564] device sit0 left promiscuous mode [ 615.906496][T15565] device sit0 entered promiscuous mode [ 616.664877][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 616.677006][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 616.760577][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 616.837713][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 616.872194][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.879368][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 616.949710][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 616.964663][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 616.985044][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.992293][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 617.009466][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 617.038443][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 617.049779][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 617.069719][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 617.104153][T15585] bond_slave_1: mtu less than device minimum [ 617.120773][T15589] device sit0 left promiscuous mode [ 617.176905][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 617.222484][T15588] device sit0 entered promiscuous mode [ 617.680703][T15548] device veth0_vlan entered promiscuous mode [ 617.718978][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 617.727852][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 617.774508][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 617.840435][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 617.960601][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 617.979588][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 618.011991][T15548] device veth1_macvtap entered promiscuous mode [ 618.029053][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 618.068234][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 618.099716][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 618.192760][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 618.211503][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 618.251820][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 618.285739][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 619.721177][ T377] device bridge_slave_1 left promiscuous mode [ 619.727631][ T377] bridge0: port 2(bridge_slave_1) entered disabled state [ 619.735502][ T377] device bridge_slave_0 left promiscuous mode [ 619.742089][ T377] bridge0: port 1(bridge_slave_0) entered disabled state [ 619.751024][ T377] device veth1_macvtap left promiscuous mode [ 619.757211][ T377] device veth0_vlan left promiscuous mode [ 620.157133][T15617] device sit0 left promiscuous mode [ 620.374009][T15622] device sit0 entered promiscuous mode [ 621.017986][T15633] bond_slave_1: mtu less than device minimum [ 621.364924][T15625] bridge0: port 1(bridge_slave_0) entered blocking state [ 621.374423][T15625] bridge0: port 1(bridge_slave_0) entered disabled state [ 621.399846][T15625] device bridge_slave_0 entered promiscuous mode [ 621.410605][T15625] bridge0: port 2(bridge_slave_1) entered blocking state [ 621.420494][T15625] bridge0: port 2(bridge_slave_1) entered disabled state [ 621.455728][T15625] device bridge_slave_1 entered promiscuous mode [ 621.718281][T15640] device sit0 left promiscuous mode [ 621.749752][T15640] device sit0 entered promiscuous mode [ 621.923455][T15647] device sit0 left promiscuous mode [ 621.994416][T15648] device sit0 entered promiscuous mode [ 622.778022][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 622.843473][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 622.938813][T15667] device sit0 left promiscuous mode [ 623.002127][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 623.050757][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 623.089619][ T377] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.096780][ T377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 623.148203][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 623.250438][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 623.299799][ T377] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.306996][ T377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 623.359699][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 623.425591][T15666] device sit0 entered promiscuous mode [ 623.659711][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 623.674487][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 623.723391][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 623.758187][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 623.787838][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 623.801482][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 623.812956][T15625] device veth0_vlan entered promiscuous mode [ 623.830544][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 623.839142][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 623.847471][T15683] bond_slave_1: mtu less than device minimum [ 623.876267][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 623.899805][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 623.912760][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 623.922379][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 623.935493][T15625] device veth1_macvtap entered promiscuous mode [ 623.968341][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 623.976929][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 623.986039][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 624.018879][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 624.028056][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 624.207076][T15686] device sit0 left promiscuous mode [ 624.278955][T15686] device sit0 entered promiscuous mode [ 624.870844][ T377] device bridge_slave_1 left promiscuous mode [ 624.877244][ T377] bridge0: port 2(bridge_slave_1) entered disabled state [ 624.886120][ T377] device bridge_slave_0 left promiscuous mode [ 624.892697][ T377] bridge0: port 1(bridge_slave_0) entered disabled state [ 624.901674][ T377] device veth1_macvtap left promiscuous mode [ 624.907990][ T377] device veth0_vlan left promiscuous mode [ 626.371546][T15697] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.405131][T15697] bridge0: port 1(bridge_slave_0) entered disabled state [ 626.414799][T15697] device bridge_slave_0 entered promiscuous mode [ 626.423570][T15697] bridge0: port 2(bridge_slave_1) entered blocking state [ 626.434966][T15697] bridge0: port 2(bridge_slave_1) entered disabled state [ 626.446183][T15697] device bridge_slave_1 entered promiscuous mode [ 626.481236][T15706] device sit0 left promiscuous mode [ 627.848780][T15706] device sit0 entered promiscuous mode [ 628.192017][T15718] device sit0 left promiscuous mode [ 628.270799][T15718] device sit0 entered promiscuous mode [ 628.916427][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 628.947448][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 629.013125][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 629.048482][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.057113][T13575] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.064651][T13575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.078889][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 629.110634][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 629.169645][T13575] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.176868][T13575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.227766][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 629.259227][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 629.305521][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.480830][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 629.551002][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.652931][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 629.668386][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 629.739962][T15697] device veth0_vlan entered promiscuous mode [ 629.760401][T15697] device veth1_macvtap entered promiscuous mode [ 629.778499][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 629.819884][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 629.848924][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 629.881757][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 629.902531][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 629.919671][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 629.928437][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 629.970558][T15756] bond_slave_1: mtu less than device minimum [ 629.984536][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 630.023104][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 630.118255][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 630.162975][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 630.618483][T15764] device syzkaller0 entered promiscuous mode [ 630.664112][T15773] device sit0 left promiscuous mode [ 630.721672][T15774] device sit0 entered promiscuous mode [ 631.035359][T15778] device sit0 left promiscuous mode [ 631.057004][T15778] device sit0 entered promiscuous mode [ 632.338768][T15787] device sit0 left promiscuous mode [ 632.451477][T15790] device sit0 left promiscuous mode [ 632.492910][T15791] device sit0 entered promiscuous mode [ 632.996573][T15792] device sit0 entered promiscuous mode [ 633.139520][ T378] device bridge_slave_1 left promiscuous mode [ 633.161585][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.172797][ T378] device bridge_slave_0 left promiscuous mode [ 633.179077][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.195915][ T378] device veth1_macvtap left promiscuous mode [ 633.202645][ T378] device veth0_vlan left promiscuous mode [ 633.536421][T15800] device sit0 left promiscuous mode [ 633.571484][T15802] device sit0 entered promiscuous mode [ 633.693312][T15809] bond_slave_1: mtu less than device minimum [ 633.943946][T15795] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.991666][T15795] bridge0: port 1(bridge_slave_0) entered disabled state [ 634.026038][T15795] device bridge_slave_0 entered promiscuous mode [ 634.060471][T15795] bridge0: port 2(bridge_slave_1) entered blocking state [ 634.082734][T15795] bridge0: port 2(bridge_slave_1) entered disabled state [ 634.100030][T15795] device bridge_slave_1 entered promiscuous mode [ 634.264757][T15824] device sit0 left promiscuous mode [ 634.337479][T15824] device sit0 entered promiscuous mode [ 634.950496][T15826] device sit0 left promiscuous mode [ 634.983384][T15828] device sit0 entered promiscuous mode [ 635.150169][T15835] device sit0 left promiscuous mode [ 635.201625][T15839] device sit0 left promiscuous mode [ 635.283402][T15835] device sit0 entered promiscuous mode [ 635.467283][T15841] device sit0 entered promiscuous mode [ 635.706159][T15848] device sit0 left promiscuous mode [ 635.763906][T15848] device sit0 entered promiscuous mode [ 636.116910][T15856] device sit0 left promiscuous mode [ 636.153553][T15853] device sit0 left promiscuous mode [ 636.217135][T15862] device sit0 entered promiscuous mode [ 636.658231][T15863] device sit0 entered promiscuous mode [ 636.914896][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 636.934891][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 636.952634][T15871] device sit0 left promiscuous mode [ 637.003473][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 637.034265][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 637.079032][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 637.086457][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 637.181891][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 637.264937][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 637.324184][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 637.331576][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 637.339623][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 637.377873][T15876] device sit0 entered promiscuous mode [ 637.819630][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 637.847149][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 637.872535][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 637.882198][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 637.919384][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 637.927920][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 637.946985][T15795] device veth0_vlan entered promiscuous mode [ 637.960011][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 637.971201][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.980129][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 637.988491][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 637.997162][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 638.005252][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 638.014790][T15795] device veth1_macvtap entered promiscuous mode [ 638.031332][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 638.040088][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 638.048501][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 638.074770][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 638.083871][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 638.192076][T15891] device sit0 left promiscuous mode [ 638.208272][T15890] device sit0 left promiscuous mode [ 638.257349][T15890] device sit0 entered promiscuous mode [ 638.446709][T15891] device sit0 entered promiscuous mode [ 639.490283][T13575] device bridge_slave_1 left promiscuous mode [ 639.496448][T13575] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.504083][T13575] device bridge_slave_0 left promiscuous mode [ 639.510503][T13575] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.518559][T13575] device veth1_macvtap left promiscuous mode [ 639.524796][T13575] device veth0_vlan left promiscuous mode [ 640.292446][T15907] bond_slave_1: mtu less than device minimum [ 640.300280][T15909] device sit0 left promiscuous mode [ 640.355135][T15911] device sit0 left promiscuous mode [ 640.372697][T15909] device sit0 entered promiscuous mode [ 640.645463][T15904] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.653034][T15904] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.661387][T15904] device bridge_slave_0 entered promiscuous mode [ 640.668492][T15911] device sit0 entered promiscuous mode [ 640.684737][T15904] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.692562][T15904] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.710323][T15904] device bridge_slave_1 entered promiscuous mode [ 641.423509][T15931] device sit0 left promiscuous mode [ 641.561994][T15932] device sit0 entered promiscuous mode [ 642.377465][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 642.397464][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 642.441619][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 642.509309][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 642.547967][T13575] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.555291][T13575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 642.595682][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 642.688188][T15954] device sit0 left promiscuous mode [ 642.710710][T15956] device sit0 entered promiscuous mode [ 643.184654][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 643.220376][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 643.246263][T13575] bridge0: port 2(bridge_slave_1) entered blocking state [ 643.253392][T13575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 643.329916][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 643.386072][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 643.469953][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 643.512134][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 643.825800][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 643.841869][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 643.933896][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 643.979598][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 643.999188][T15904] device veth0_vlan entered promiscuous mode [ 644.045214][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 644.063092][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 644.134772][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 644.153600][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 644.196873][T15904] device veth1_macvtap entered promiscuous mode [ 644.230653][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 644.260825][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 644.295731][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 644.340988][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 644.420536][T15972] device sit0 left promiscuous mode [ 644.436894][T15974] device sit0 left promiscuous mode [ 644.460840][T15976] device sit0 left promiscuous mode [ 644.490968][T15972] device sit0 entered promiscuous mode [ 644.793625][T15974] device sit0 entered promiscuous mode [ 645.000478][T15976] device sit0 entered promiscuous mode [ 645.710173][ T378] device bridge_slave_1 left promiscuous mode [ 645.716677][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 645.724351][ T378] device bridge_slave_0 left promiscuous mode [ 645.730667][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 645.738810][ T378] device veth1_macvtap left promiscuous mode [ 645.745204][ T378] device veth0_vlan left promiscuous mode [ 646.209997][T15988] device sit0 left promiscuous mode [ 646.278586][T15988] device sit0 entered promiscuous mode [ 647.277479][T15993] bridge0: port 1(bridge_slave_0) entered blocking state [ 647.287518][T15993] bridge0: port 1(bridge_slave_0) entered disabled state [ 647.382886][T15993] device bridge_slave_0 entered promiscuous mode [ 647.410568][T15993] bridge0: port 2(bridge_slave_1) entered blocking state [ 647.417662][T15993] bridge0: port 2(bridge_slave_1) entered disabled state [ 647.443731][T15993] device bridge_slave_1 entered promiscuous mode [ 647.450494][T16007] device sit0 left promiscuous mode [ 647.503742][T16009] device sit0 entered promiscuous mode [ 648.278025][T16020] bond_slave_1: mtu less than device minimum [ 648.416313][T16025] bond_slave_1: mtu less than device minimum [ 648.502137][T16023] device sit0 left promiscuous mode [ 648.591956][T16031] device sit0 entered promiscuous mode [ 649.149557][T16030] device sit0 left promiscuous mode [ 649.174585][T16036] device sit0 entered promiscuous mode [ 649.308817][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 649.320781][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 649.337816][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 649.365560][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 649.376223][T13575] bridge0: port 1(bridge_slave_0) entered blocking state [ 649.383445][T13575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 649.391230][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 649.414529][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 649.423065][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 649.431742][T13575] bridge0: port 2(bridge_slave_1) entered blocking state [ 649.438780][T13575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 649.447811][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 649.456315][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 649.464628][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 649.473093][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 649.485524][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 649.494455][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 649.510394][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 649.518522][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 649.527271][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 649.535613][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 649.543991][T15993] device veth0_vlan entered promiscuous mode [ 649.556386][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 649.564952][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 649.574864][T15993] device veth1_macvtap entered promiscuous mode [ 649.585308][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 649.593296][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 649.601940][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 649.613564][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 649.622116][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 650.529919][ T377] device bridge_slave_1 left promiscuous mode [ 650.536096][ T377] bridge0: port 2(bridge_slave_1) entered disabled state [ 650.543814][ T377] device bridge_slave_0 left promiscuous mode [ 650.550072][ T377] bridge0: port 1(bridge_slave_0) entered disabled state [ 650.558247][ T377] device veth1_macvtap left promiscuous mode [ 650.564516][ T377] device veth0_vlan left promiscuous mode [ 652.050308][T16057] bridge0: port 1(bridge_slave_0) entered blocking state [ 652.076611][T16057] bridge0: port 1(bridge_slave_0) entered disabled state [ 652.102702][T16057] device bridge_slave_0 entered promiscuous mode [ 652.121713][T16057] bridge0: port 2(bridge_slave_1) entered blocking state [ 652.128976][T16057] bridge0: port 2(bridge_slave_1) entered disabled state [ 652.167162][T16057] device bridge_slave_1 entered promiscuous mode [ 652.194992][T16070] device sit0 left promiscuous mode [ 652.296187][T16071] device sit0 entered promiscuous mode [ 653.175410][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 653.207323][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 653.318179][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 653.361356][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 653.376384][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.383621][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 653.397808][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 653.412952][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 653.451251][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.458431][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 653.469563][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 653.543616][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 653.779984][T16095] device sit0 left promiscuous mode [ 653.824285][T16096] device sit0 entered promiscuous mode [ 654.188314][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 654.236560][T16104] device sit0 left promiscuous mode [ 654.285766][T16105] device sit0 entered promiscuous mode [ 654.551591][T16112] device sit0 left promiscuous mode [ 654.577858][T16113] device sit0 entered promiscuous mode [ 654.842794][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 654.881498][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 654.950201][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 654.962500][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 654.986418][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 655.029576][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 655.083354][T16057] device veth0_vlan entered promiscuous mode [ 655.152679][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 655.181737][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 655.197071][T16057] device veth1_macvtap entered promiscuous mode [ 655.223252][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 655.266387][T16122] device sit0 left promiscuous mode [ 655.287664][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 655.303741][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 655.338593][T16122] device sit0 entered promiscuous mode [ 655.499116][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 655.526705][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 655.567956][T16125] device sit0 left promiscuous mode [ 655.680417][T16125] device sit0 entered promiscuous mode [ 656.789993][ T377] device bridge_slave_1 left promiscuous mode [ 656.796246][ T377] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.804101][ T377] device bridge_slave_0 left promiscuous mode [ 656.810468][ T377] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.818512][ T377] device veth1_macvtap left promiscuous mode [ 656.824663][ T377] device veth0_vlan left promiscuous mode [ 658.426975][T16147] device sit0 left promiscuous mode [ 658.509900][T16147] device sit0 entered promiscuous mode [ 658.766530][T16141] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.773960][T16141] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.782346][T16141] device bridge_slave_0 entered promiscuous mode [ 658.789866][T16141] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.797023][T16141] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.805036][T16141] device bridge_slave_1 entered promiscuous mode [ 658.831112][T16164] device sit0 left promiscuous mode [ 658.845079][T16163] device pim6reg1 entered promiscuous mode [ 658.891040][T16167] device sit0 entered promiscuous mode [ 660.052267][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 660.066749][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 660.147609][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 660.162993][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 660.173797][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 660.181109][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 660.189123][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 660.260131][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 660.331865][ T378] bridge0: port 2(bridge_slave_1) entered blocking state [ 660.339113][ T378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 660.447868][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 660.472282][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 660.530018][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 660.692011][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 660.730057][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 660.783824][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 660.793616][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 660.812289][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 660.833724][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 660.924284][T16221] device sit0 left promiscuous mode [ 660.948277][T16141] device veth0_vlan entered promiscuous mode [ 660.974814][T16223] bond_slave_1: mtu less than device minimum [ 660.995112][T16221] device sit0 entered promiscuous mode [ 661.213280][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 661.239508][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 661.274683][T16141] device veth1_macvtap entered promiscuous mode [ 661.317546][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 661.339670][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 661.390073][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 661.446269][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 661.482589][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 661.618143][T16241] device wg2 left promiscuous mode [ 661.660096][T16241] device wg2 entered promiscuous mode [ 662.271042][ T377] device bridge_slave_1 left promiscuous mode [ 662.277378][ T377] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.285669][ T377] device bridge_slave_0 left promiscuous mode [ 662.292381][ T377] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.302468][ T377] device veth1_macvtap left promiscuous mode [ 662.308782][ T377] device veth0_vlan left promiscuous mode [ 663.917364][T16270] device wg2 left promiscuous mode [ 664.011396][T16271] device wg2 entered promiscuous mode [ 664.169126][T16281] device sit0 left promiscuous mode [ 664.186251][T16267] bridge0: port 1(bridge_slave_0) entered blocking state [ 664.199279][T16267] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.212394][T16267] device bridge_slave_0 entered promiscuous mode [ 664.222723][T16267] bridge0: port 2(bridge_slave_1) entered blocking state [ 664.230178][T16267] bridge0: port 2(bridge_slave_1) entered disabled state [ 664.268540][T16267] device bridge_slave_1 entered promiscuous mode [ 664.305003][T16281] device sit0 entered promiscuous mode [ 664.471399][T16303] device veth0_vlan left promiscuous mode [ 664.482506][T16303] device veth0_vlan entered promiscuous mode [ 664.532544][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 664.556995][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 664.588500][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 665.059503][T16318] device sit0 left promiscuous mode [ 665.156101][T16318] device sit0 entered promiscuous mode [ 665.421042][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 665.450018][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 665.458520][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 665.469759][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 665.493833][ T563] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.500999][ T563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 665.508671][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 665.547140][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 665.575156][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 665.597106][T13575] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.604317][T13575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 665.706073][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 665.732740][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 666.389741][T16343] device veth0_vlan left promiscuous mode [ 666.416610][T16343] device veth0_vlan entered promiscuous mode [ 666.473875][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 666.489627][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 666.524127][T16352] device sit0 left promiscuous mode [ 666.552446][T16353] device sit0 entered promiscuous mode [ 666.966424][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 666.976957][ T563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 667.043348][T16366] device sit0 left promiscuous mode [ 667.179728][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 667.188487][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 667.204783][T16367] device sit0 entered promiscuous mode [ 667.439632][T16369] device sit0 left promiscuous mode [ 667.460387][T16267] device veth0_vlan entered promiscuous mode [ 667.468715][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 667.481302][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 667.516692][T16267] device veth1_macvtap entered promiscuous mode [ 667.548950][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 667.557964][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 667.566852][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 667.672359][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 667.681825][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 667.786983][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 667.796415][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 668.820291][ T378] device bridge_slave_1 left promiscuous mode [ 668.826665][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.834564][ T378] device bridge_slave_0 left promiscuous mode [ 668.840939][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.849854][ T378] device veth1_macvtap left promiscuous mode [ 668.856176][ T378] device veth0_vlan left promiscuous mode [ 670.720076][T16404] device sit0 left promiscuous mode [ 671.050351][T16391] bridge0: port 1(bridge_slave_0) entered blocking state [ 671.101937][T16391] bridge0: port 1(bridge_slave_0) entered disabled state [ 671.109640][T16391] device bridge_slave_0 entered promiscuous mode [ 671.129475][T16413] device veth0_vlan left promiscuous mode [ 671.198499][T16413] device veth0_vlan entered promiscuous mode [ 671.223735][T16391] bridge0: port 2(bridge_slave_1) entered blocking state [ 671.234660][T16391] bridge0: port 2(bridge_slave_1) entered disabled state [ 671.259545][T16391] device bridge_slave_1 entered promiscuous mode [ 672.152698][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 672.161456][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 672.223491][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 672.232480][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 672.241312][ T378] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.248458][ T378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 672.269414][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 672.339498][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 672.348305][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 672.357098][T13575] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.364469][T13575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 672.372281][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 672.380632][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 672.414807][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 672.423219][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 672.483316][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 672.515999][T16391] device veth0_vlan entered promiscuous mode [ 672.530496][T16391] device veth1_macvtap entered promiscuous mode [ 672.569611][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 672.584818][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 672.593095][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 672.601574][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 672.610486][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 672.619029][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 672.628313][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 672.637294][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 672.717991][T16391] syz-executor (16391) used greatest stack depth: 20656 bytes left [ 673.740104][ T563] device bridge_slave_1 left promiscuous mode [ 673.746365][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.754383][ T563] device bridge_slave_0 left promiscuous mode [ 673.760800][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.768953][ T563] device veth1_macvtap left promiscuous mode [ 673.775128][ T563] device veth0_vlan left promiscuous mode [ 674.805349][T16446] device sit0 entered promiscuous mode [ 674.942185][T16442] device sit0 left promiscuous mode [ 674.964372][T16447] device sit0 entered promiscuous mode [ 675.242516][T16452] bridge0: port 1(bridge_slave_0) entered blocking state [ 675.253547][T16452] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.269097][T16452] device bridge_slave_0 entered promiscuous mode [ 675.281937][T16452] bridge0: port 2(bridge_slave_1) entered blocking state [ 675.289299][T16452] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.320534][T16452] device bridge_slave_1 entered promiscuous mode [ 675.375212][T16465] device sit0 left promiscuous mode [ 675.498272][T16467] device sit0 entered promiscuous mode [ 675.912401][T16478] device sit0 left promiscuous mode [ 676.014273][T16477] device sit0 entered promiscuous mode [ 677.299847][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 677.309584][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 677.350361][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 677.381627][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 677.392696][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.399909][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 677.409409][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 677.419420][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 677.428039][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.435506][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 677.471977][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 677.487868][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 677.505818][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 677.515581][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 677.608967][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 677.619607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 677.633695][T16509] device sit0 left promiscuous mode [ 677.712111][T16452] device veth0_vlan entered promiscuous mode [ 677.727619][T16507] device sit0 entered promiscuous mode [ 677.956911][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 677.965446][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 678.040303][T16521] device sit0 left promiscuous mode [ 678.125960][T16522] device sit0 entered promiscuous mode [ 678.372409][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 678.382130][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 678.446809][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 678.465821][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 678.522584][T16452] device veth1_macvtap entered promiscuous mode [ 678.538640][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 678.626120][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 678.657017][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 678.734459][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 678.745866][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 678.759442][T16537] device sit0 left promiscuous mode [ 678.781412][T16538] device sit0 left promiscuous mode [ 678.818258][T16539] device sit0 entered promiscuous mode [ 679.118809][T16537] device sit0 entered promiscuous mode [ 680.010022][T13575] device bridge_slave_1 left promiscuous mode [ 680.016372][T13575] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.023979][T13575] device bridge_slave_0 left promiscuous mode [ 680.030271][T13575] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.038562][T13575] device veth1_macvtap left promiscuous mode [ 680.045128][T13575] device veth0_vlan left promiscuous mode [ 681.150950][T16550] syz.4.4942[16550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.151042][T16550] syz.4.4942[16550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.182368][T16550] syz.4.4942[16550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.209724][T16550] syz.4.4942[16550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.681956][T16571] device sit0 left promiscuous mode [ 681.849499][T16574] device sit0 entered promiscuous mode [ 682.154790][T16577] device sit0 left promiscuous mode [ 682.199563][T16569] bridge0: port 1(bridge_slave_0) entered blocking state [ 682.219442][T16569] bridge0: port 1(bridge_slave_0) entered disabled state [ 682.227173][T16569] device bridge_slave_0 entered promiscuous mode [ 682.241171][T16569] bridge0: port 2(bridge_slave_1) entered blocking state [ 682.248269][T16569] bridge0: port 2(bridge_slave_1) entered disabled state [ 682.255999][T16569] device bridge_slave_1 entered promiscuous mode [ 682.296232][T16589] device sit0 entered promiscuous mode [ 682.529896][T16577] device sit0 entered promiscuous mode [ 683.200811][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 683.216886][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 683.241302][T16603] ip6_vti0: mtu greater than device maximum [ 683.257701][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 683.292111][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 683.327663][T13575] bridge0: port 1(bridge_slave_0) entered blocking state [ 683.334900][T13575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 683.342939][T16605] device sit0 left promiscuous mode [ 683.390692][T16607] device sit0 entered promiscuous mode [ 683.692150][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 683.729537][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 683.740888][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 683.750415][T13575] bridge0: port 2(bridge_slave_1) entered blocking state [ 683.758111][T13575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 683.803779][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 683.822930][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 683.941440][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 683.952680][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 683.973624][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 683.983582][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 683.998057][T16569] device veth0_vlan entered promiscuous mode [ 684.012083][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 684.070033][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 684.089902][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 684.137073][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 684.218233][T16569] device veth1_macvtap entered promiscuous mode [ 684.229398][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 684.241842][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 684.254759][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 684.340459][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 684.401622][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 684.464937][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 684.530149][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 685.320177][ T563] device bridge_slave_1 left promiscuous mode [ 685.326569][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.339435][ T563] device bridge_slave_0 left promiscuous mode [ 685.345671][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.375426][ T563] device veth1_macvtap left promiscuous mode [ 685.382306][ T563] device veth0_vlan left promiscuous mode [ 686.956289][T16634] device sit0 left promiscuous mode [ 686.994780][T16638] device sit0 left promiscuous mode [ 687.019413][T16634] device sit0 entered promiscuous mode [ 687.352935][T16638] device sit0 entered promiscuous mode [ 687.691361][T16653] device sit0 left promiscuous mode [ 687.705571][T16655] device wg2 left promiscuous mode [ 687.765958][T16653] device sit0 entered promiscuous mode [ 687.938768][T16650] bridge0: port 1(bridge_slave_0) entered blocking state [ 687.946249][T16650] bridge0: port 1(bridge_slave_0) entered disabled state [ 687.954936][T16650] device bridge_slave_0 entered promiscuous mode [ 687.962329][T16650] bridge0: port 2(bridge_slave_1) entered blocking state [ 687.970061][T16650] bridge0: port 2(bridge_slave_1) entered disabled state [ 687.977646][T16650] device bridge_slave_1 entered promiscuous mode [ 688.058584][T16650] bridge0: port 2(bridge_slave_1) entered blocking state [ 688.065722][T16650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 688.073259][T16650] bridge0: port 1(bridge_slave_0) entered blocking state [ 688.080342][T16650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 688.113750][T13575] bridge0: port 1(bridge_slave_0) entered disabled state [ 688.133282][T13575] bridge0: port 2(bridge_slave_1) entered disabled state [ 688.143353][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 688.151795][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 688.172373][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 688.187544][T13575] bridge0: port 1(bridge_slave_0) entered blocking state [ 688.194720][T13575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 688.246095][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 688.278049][T13575] bridge0: port 2(bridge_slave_1) entered blocking state [ 688.285285][T13575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 688.629696][T16675] device syzkaller0 entered promiscuous mode [ 688.730906][T16681] device sit0 left promiscuous mode [ 688.801584][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 688.830060][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 689.098286][T16685] device sit0 entered promiscuous mode [ 689.170784][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 689.200317][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 689.238013][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 689.308315][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 689.327606][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 689.362003][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 689.404811][T16650] device veth0_vlan entered promiscuous mode [ 689.483347][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 689.523493][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 689.559561][T16650] device veth1_macvtap entered promiscuous mode [ 689.651818][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 689.682349][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 689.726485][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 689.770830][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 689.822612][T13575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 690.004114][T16702] device sit0 left promiscuous mode [ 690.085590][T16703] device sit0 entered promiscuous mode SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=4478 state=3 status=67 (errno 32: Broken pipe) [ 690.595913][ T28] audit: type=1400 audit(1758977949.541:158): avc: denied { write } for pid=274 comm="syz-executor" path="pipe:[1521]" dev="pipefs" ino=1521 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 691.690540][ T563] device bridge_slave_1 left promiscuous mode [ 691.696714][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.704489][ T563] device bridge_slave_0 left promiscuous mode [ 691.710775][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.718623][ T563] device team_slave_1 left promiscuous mode [ 691.724638][ T563] bridge0: port 3(team_slave_1) entered disabled state [ 691.732059][ T563] device bridge_slave_1 left promiscuous mode [ 691.738331][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.745883][ T563] device bridge_slave_0 left promiscuous mode [ 691.752794][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.760754][ T563] device bridge_slave_1 left promiscuous mode [ 691.766880][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.774619][ T563] device bridge_slave_0 left promiscuous mode [ 691.780932][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.789653][ T563] device veth1_macvtap left promiscuous mode [ 691.795797][ T563] device veth0_vlan left promiscuous mode [ 691.802261][ T563] device veth1_macvtap left promiscuous mode [ 691.808370][ T563] device veth0_vlan left promiscuous mode [ 691.814472][ T563] device veth1_macvtap left promiscuous mode [ 691.820737][ T563] device veth0_vlan left promiscuous mode [ 693.210175][ T563] device team_slave_1 left promiscuous mode [ 693.216194][ T563] bridge0: port 3(team_slave_1) entered disabled state [ 693.223893][ T563] device bridge_slave_1 left promiscuous mode [ 693.230236][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 693.237839][ T563] device bridge_slave_0 left promiscuous mode [ 693.244324][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.252619][ T563] device bridge_slave_1 left promiscuous mode [ 693.258755][ T563] bridge0: port 2(bridge_slave_1) entered disabled state [ 693.266564][ T563] device bridge_slave_0 left promiscuous mode [ 693.272938][ T563] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.281882][ T563] device veth1_macvtap left promiscuous mode [ 693.287940][ T563] device veth0_vlan left promiscuous mode [ 693.294622][ T563] device veth0_vlan left promiscuous mode