last executing test programs: 19.07773306s ago: executing program 2 (id=5258): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000600)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r5}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 15.681784853s ago: executing program 2 (id=5258): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000600)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r5}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 11.523491207s ago: executing program 2 (id=5258): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000600)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r5}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 7.075959377s ago: executing program 2 (id=5258): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000600)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r5}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 5.151108405s ago: executing program 1 (id=5623): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 4.423150032s ago: executing program 3 (id=5634): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001cc0)=ANY=[@ANYBLOB="0104000002000000e27f00000101000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES8=r0, @ANYRESDEC=r1, @ANYBLOB="0018000000d20000b53ce36f7a577572d8b6a19144001000000000000000002afbd0500211791b9fbc4eda35c077b58747ee74e673a2f69ff2db099426bb53df11a9fb19ec9f53deb3f8d7bbfe3742116cf7265dbbe098b38edc4991b17e29e219d06d4b6e5ee29c76a19baf796e98922e083f482bc77a75d30ac710c1c2b91e2f77b6a783bf17c62cb37e592437a812"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3}, 0x0, &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r5) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"/3112], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000580)="b9ff0b076859268cb89e14f088a8", 0x0, 0xf00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.309782762s ago: executing program 3 (id=5635): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001200)={{0x1, 0xffffffffffffffff}, &(0x7f0000000d00), &(0x7f00000011c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x2000000000000241, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xffffffffffffffe0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1, 0x0, 0x0, @void, @value}, 0x20) sendmsg$inet(r2, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000780)}, {&(0x7f0000000500)="da235535795b933b1aaa2fd7151dce98929c6c25df9acf04a1fe567d2350", 0x1e}, {&(0x7f0000000880)="e097472c3e6599c0da3618362687fd2eb6fad22cd98869a2410fc9b118a7ad8818cd8a3967aee83f35a79e4bfbe527ad788c54c7f066a6505d3bb598bc2def2f798a5dd750bfcd6b35c062533eed5c7b2f9565b14f5d8cd03f82680f076258c61cacac38a9", 0x65}, {&(0x7f0000000900)="a75fcbcbfaceab960ba0f57672db75c4168caffd3b8eaf10421778b3053296aab24ffd0facd82d9786f0ea", 0x2b}], 0x4, &(0x7f0000000980)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x18}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffff1}, 0x1000, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000800006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000ac0)={0xffffffffffffffff, &(0x7f0000000a40)="5961cd1f0b205e0cb7decbe3d077fb9f1280cf1578c937a7b0c9f0e451a1d90e57ad5c7898649f83fbd76f91365f577f177c4d742b32cee817ed00c149cf2d36f0da01f15ff5a75605cc69dcf0317a257d6a522a942aef1fddb815a99400d12fa9cde2e9f5e6e15f1afad9bca449d63d74667ed4a98af1a11f"}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001"], 0xfdef) 4.242441349s ago: executing program 1 (id=5637): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x4a69f6aa, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa8, 0xa8, 0x6, [@volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @fwd={0x8}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x5}}, @ptr={0xa, 0x0, 0x0, 0x2, 0x1}, @ptr={0x7, 0x0, 0x0, 0x2, 0x4}, @fwd={0xb}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x408}}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x2}, {0xb, 0x2}, {0xf, 0x2}, {0xd, 0x4}, {0x7, 0x2}, {0xd, 0x3}]}]}, {0x0, [0x0, 0x30, 0x0, 0x61]}}, &(0x7f0000000340)=""/204, 0xc6, 0xcc, 0x0, 0x0, 0x10000, @value}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000004c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0], 0x0, 0xa1, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x99, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x11, 0x14, &(0x7f00000007c0)=@raw=[@generic={0x7, 0x0, 0x5, 0x6, 0x81}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x6}, @tail_call, @alu={0x4, 0x0, 0x3, 0x1, 0x8, 0xfffffffffffffffc, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x83}, @alu={0x7, 0x0, 0x3, 0xb, 0x9, 0x8, 0x10}, @alu={0x4, 0x1, 0x4, 0xa, 0x3, 0x10}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], &(0x7f0000000880)='syzkaller\x00', 0x8, 0xb5, &(0x7f00000008c0)=""/181, 0x41100, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000009c0)={0x2, 0x4, 0xfffeffff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000a00)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000a40)=[{0x5, 0x3, 0x3, 0x2}], 0x10, 0xf, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000bc0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000b40), &(0x7f0000000b80)='%pB \x00'}, 0x20) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c40)=@generic={&(0x7f0000000c00)='./file0\x00', 0x0, 0x10}, 0x18) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x3, 0x17, &(0x7f0000000080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0x6}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc29}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x4}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x3, '\x00', r2, @sched_cls=0x36, r3, 0x8, &(0x7f0000000480)={0x7, 0x1}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x7, &(0x7f0000000c80)=[r6, 0xffffffffffffffff, 0xffffffffffffffff, r7], &(0x7f0000000cc0)=[{0x4, 0x4, 0xa, 0xb}, {0x4, 0x5, 0x7, 0x9}, {0x3, 0x5, 0xc, 0xb}, {0x2, 0x1000, 0x6, 0x7}, {0x2, 0x5, 0xe, 0x5}, {0x5, 0x3, 0x4, 0xc}, {0x2, 0x5, 0xe, 0x3}], 0x10, 0x9, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000e00)={0x1, 0xffffffffffffffff}, 0x4) r10 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x9, 0x3, 0x6, 0x36, 0x0, 0x4, 0x48100, 0xd, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000e40), 0xc}, 0x1090, 0x2, 0x8000, 0x5, 0x10000, 0x7, 0x3ff, 0x0, 0x9, 0x0, 0x9}, 0x0, 0x4, 0xffffffffffffffff, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001040)={r6, 0x58, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r13 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@generic={&(0x7f0000001100)='./file0\x00'}, 0x18) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0xd, 0x1, &(0x7f0000000f00)=@raw=[@generic={0xfa, 0x0, 0x8, 0x4, 0x9}], &(0x7f0000000f40)='GPL\x00', 0xfff, 0x2e, &(0x7f0000000f80)=""/46, 0x40f00, 0x39, '\x00', r12, @fallback=0x19, r3, 0x8, &(0x7f0000001080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000010c0)={0x5, 0x7, 0x5, 0x4}, 0x10, r4, r5, 0x5, &(0x7f0000001180)=[r9, r6, r13, r9, r9, r6], &(0x7f00000011c0)=[{0x2, 0x2, 0xe, 0x7}, {0x1, 0x1, 0xc, 0x5}, {0x5, 0x4, 0xa}, {0x4, 0x4, 0xb, 0xb}, {0x1, 0x3, 0x10, 0xa}], 0x10, 0x546, @void, @value}, 0x94) r15 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001300), 0x2, 0x0) write$cgroup_subtree(r15, &(0x7f0000001340)={[{0x2b, 'pids'}, {0x2b, 'net'}, {0x2d, 'net_prio'}]}, 0x15) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={r8, 0xe0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5, &(0x7f0000001400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001480)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdf, &(0x7f00000014c0)=[{}], 0x8, 0x10, &(0x7f0000001500), &(0x7f0000001540), 0x8, 0xf9, 0x8, 0x8, &(0x7f0000001580)}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001380)={@ifindex=r16, r5, 0x27, 0x2000, 0x0, @value}, 0x20) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r17, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001900)={r13, 0x58, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r20 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001980)={r1, 0x6, 0x10}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000019c0)={r14, 0xffffffffffffffff}, 0x4) r22 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001a00)={r11, 0x4, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x20, 0x7, &(0x7f0000001740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x9}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x12}]}, &(0x7f0000001780)='syzkaller\x00', 0xe20d, 0x8b, &(0x7f00000017c0)=""/139, 0x41000, 0xa, '\x00', r19, @netfilter=0x2d, r18, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001940)={0x3, 0x7, 0xc4d0, 0x9}, 0x10, r17, r14, 0x3, &(0x7f0000001a40)=[r9, r6, r20, r21, r9, r9, r7, r22], &(0x7f0000001a80)=[{0x1, 0x3, 0x6, 0x8}, {0x2, 0x3, 0x1, 0x9}, {0x0, 0x3, 0x0, 0x6}], 0x10, 0x8460, @void, @value}, 0x94) r23 = perf_event_open$cgroup(&(0x7f0000001b80)={0x3, 0x80, 0xfd, 0x8, 0x3, 0x3e, 0x0, 0x5, 0x24001, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x2}, 0x80, 0x4, 0x3, 0x7, 0x7f, 0xef15, 0x2, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0xc, r10, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r23, 0x40082404, &(0x7f0000001c00)=0xa) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000001c40)='FREEZING\x00', 0x9) r24 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001f40)={&(0x7f0000001e40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@restrict={0xf, 0x0, 0x0, 0xb, 0x1}, @const={0x10, 0x0, 0x0, 0xa, 0x3}, @struct={0x6, 0x3, 0x0, 0x4, 0x1, 0xb, [{0x0, 0x4, 0x7fff}, {0x1, 0x3, 0x7}, {0x2, 0x5, 0x7fffffff}]}]}, {0x0, [0x61, 0x5f, 0x0]}}, &(0x7f0000001ec0)=""/109, 0x65, 0x6d, 0x1, 0xe2, 0x0, @void, @value}, 0x28) r25 = bpf$ITER_CREATE(0x21, &(0x7f0000002000), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000020c0)={0x6, 0xc, &(0x7f0000001c80)=@raw=[@generic={0x2, 0x1, 0x8, 0x101, 0xf7}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], &(0x7f0000001d00)='syzkaller\x00', 0x7, 0xcc, &(0x7f0000001d40)=""/204, 0x41100, 0x12, '\x00', r16, 0x25, r24, 0x8, &(0x7f0000001f80)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000001fc0)={0x2, 0x9, 0x8, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002040)=[0xffffffffffffffff, r0, r25, r7], &(0x7f0000002080), 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002480)={&(0x7f0000002180)='mm_compaction_migratepages\x00', 0xffffffffffffffff, 0x0, 0x400}, 0x18) 3.476629779s ago: executing program 1 (id=5641): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1b, 0x0, 0x0, 0x8000, 0x4, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18010000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b702f90000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x0, 0x0, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x7) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000340)=ANY=[@ANYRESHEX=r0, @ANYBLOB="7cf218"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4c, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000f0ffffffffff030000000035"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) recvmsg(0xffffffffffffffff, 0x0, 0x100) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) 3.444070792s ago: executing program 3 (id=5642): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b0000000000000000f500000000ac1414aa"], 0xfdef) 3.375161359s ago: executing program 3 (id=5643): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000838500000071000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x50) 3.281751748s ago: executing program 0 (id=5645): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 3.281310328s ago: executing program 3 (id=5646): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 3.209257494s ago: executing program 2 (id=5258): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000600)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r5}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1.134949676s ago: executing program 0 (id=5647): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_type(r1, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r2, &(0x7f0000000280), 0x9) r3 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r4, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000c40)=r4, 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='memory.max\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x0, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)) 1.133715196s ago: executing program 3 (id=5648): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000001000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x14, 0x5, 0x9, 0x7, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e408"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x2d, &(0x7f00000000c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000243d2812a3d7b0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r9, 0x400454cd, 0x308) 1.132458156s ago: executing program 1 (id=5650): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x48) r6 = perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x99, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x0, 0x80008}, 0x0, 0x8, 0x0, 0x8, 0x7fffffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x90) r7 = gettid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}}, r7, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f00000005c0)={0x4, 0x80, 0xf, 0x7, 0x9, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x8a92, 0xa6, 0x9, 0x2, 0x80000001, 0xfffeffff, 0x8000, 0x0, 0x2, 0x0, 0x9}, 0xffffffffffffffff, 0x9, r6, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000280)=ANY=[], 0x31) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xe, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x25, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x6}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffebd) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r7, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='hrtimer_init\x00', r1}, 0x10) 1.029610145s ago: executing program 4 (id=5651): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000001c0)='xprtrdma_cb_setup\x00'}, 0x18) (async, rerun: 64) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (rerun: 64) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x37, 0x9, 0x5, 0x9, 0x0, 0x9, 0x4848, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000200), 0xa}, 0xd8, 0x10, 0x669d, 0x5, 0x7f010b09, 0x5, 0x800, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xe) (async) r5 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r3, @ANYRES64=r4, @ANYRES32=r3, @ANYBLOB="52780b3fa961ed749c5a99ff2685429e5f3128dde20a7e1ae9a91e6072ca3c46e7c57ff5093a411be023ffd35c47f8d9410df5d5421a39904fd3d922734f2090e74db7eafd10661fc4e83a5c9c832f2cdd26cd6a573c6758f0cc3a5c0adf70348dc04f9986fa907f0e72084f397f191a304d0e42bdd829eacbf48af3cc"], 0x8202) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000002c0)=']&$\x00') (async, rerun: 64) close(r2) (async, rerun: 64) close(r1) 980.45937ms ago: executing program 0 (id=5652): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00e859af3c", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='mm_lru_insertion\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd"], 0xfdef) r9 = openat$cgroup_ro(r7, &(0x7f0000000340)='blkio.bfq.io_merged\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000300)='svc_unregister\x00', r9, 0x0, 0x80}, 0x18) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x6f4, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000600), 0x5, r10}, 0x38) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000500)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 977.687991ms ago: executing program 0 (id=5653): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000080e7bab1f46a00fb", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000900), 0x3, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37, 0x2000, 0x0, 0x0, 0x0, @void, @value}, 0x20) 965.617811ms ago: executing program 0 (id=5654): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000480)='mm_page_alloc\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="00000005000000a001000000000000000100000d", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000300"/28], 0x50) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001180)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r3, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0400"/20, @ANYRES32=r5, @ANYRES32=r2, @ANYBLOB="00005b350500000004001a000000000035d669ab9fe40cd7f565f840472a5876629161a966806429fe402ed6e7e6849c0c5185b40b4e0acdc9114ffc941baeaec69264331ff33cc3d034b90a6733878bd2992c1934736b6b12d895073c64ea2fc6e7154b17cf11f5a2494a7915fdf56028a066be06e50452dba41fc7391298acebcbf1519dbb470527bc6b136ffa6fdf3e561f91b881934b42f62d6d452e559eb6c62919e90216d0ef887c3d491b2a894fcabf7d4c02f610"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x5, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 865.045371ms ago: executing program 4 (id=5655): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000838500000071000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r1, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 806.643236ms ago: executing program 4 (id=5656): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x4888, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632f77fbac141411e0000601be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3}, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)=0x2) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000076fd820d000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r1, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d00)={r2, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000ac0)=[0x0, 0x0, 0x0], 0x0, 0x11, &(0x7f0000000b00)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000b40), &(0x7f0000000b80), 0x8, 0x7f, 0x8, 0x8, &(0x7f0000000bc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1c, 0x8, &(0x7f0000000300)=@raw=[@exit, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x5}, @exit], &(0x7f0000000380)='GPL\x00', 0x3, 0x99, &(0x7f0000000680)=""/153, 0x41000, 0x48, '\x00', r5, @fallback=0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, r6, r2, 0x3, &(0x7f0000000d40)=[r3, r3, r1], &(0x7f0000000d80)=[{0x1, 0x5, 0x8, 0x14}, {0x3, 0x5, 0xc}, {0x5, 0x3, 0xc, 0xa}], 0x10, 0x8e40000, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) sendmsg$tipc(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811d40a203bf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796", 0x3d}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8a, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 780.591489ms ago: executing program 1 (id=5657): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 518.595813ms ago: executing program 4 (id=5658): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r6}, 0x18) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 174.157255ms ago: executing program 1 (id=5659): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 90.745402ms ago: executing program 0 (id=5660): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 89.579742ms ago: executing program 4 (id=5661): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x7, 0xe, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000380)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_kthread_work_queue_work\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2000000000000000, 0x0, 0xfff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 534.671µs ago: executing program 4 (id=5662): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x749c, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0xffffffffffffffff) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000600)=@base={0xa, 0x4, 0x8000, 0x5c, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 0s ago: executing program 2 (id=5258): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000600)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r5}, &(0x7f0000000380), &(0x7f00000003c0)='%+9llu \x00'}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r4, 0x8924, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x214, 0x0, 0x0, 0x0, 0x3, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6005, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) kernel console output (not intermixed with test programs): 000 R09: 0000000000000000 [ 348.374420][T11450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 348.382315][T11450] R13: 0000000000000000 R14: 00007f0267038f80 R15: 00007ffd8d551e88 [ 348.390230][T11450] [ 350.025098][T11507] device syzkaller0 entered promiscuous mode [ 351.967187][T11590] FAULT_INJECTION: forcing a failure. [ 351.967187][T11590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 352.006587][T11590] CPU: 0 PID: 11590 Comm: syz.4.4075 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 352.017794][T11590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 352.027693][T11590] Call Trace: [ 352.030814][T11590] [ 352.033599][T11590] dump_stack_lvl+0x151/0x1c0 [ 352.038110][T11590] ? io_uring_drop_tctx_refs+0x190/0x190 [ 352.043580][T11590] dump_stack+0x15/0x20 [ 352.047562][T11590] should_fail+0x3c6/0x510 [ 352.051817][T11590] should_fail_usercopy+0x1a/0x20 [ 352.056678][T11590] _copy_from_user+0x20/0xd0 [ 352.061196][T11590] __sys_bpf+0x1e9/0x760 [ 352.065266][T11590] ? fput_many+0x160/0x1b0 [ 352.069523][T11590] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 352.074743][T11590] ? debug_smp_processor_id+0x17/0x20 [ 352.079938][T11590] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 352.085839][T11590] __x64_sys_bpf+0x7c/0x90 [ 352.090098][T11590] x64_sys_call+0x87f/0x9a0 [ 352.094524][T11590] do_syscall_64+0x3b/0xb0 [ 352.098770][T11590] ? clear_bhb_loop+0x35/0x90 [ 352.103284][T11590] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 352.109016][T11590] RIP: 0033:0x7f3bce6c9ef9 [ 352.113266][T11590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 352.132707][T11590] RSP: 002b:00007f3bcd343038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 352.140952][T11590] RAX: ffffffffffffffda RBX: 00007f3bce881f80 RCX: 00007f3bce6c9ef9 [ 352.148776][T11590] RDX: 0000000000000050 RSI: 0000000020000900 RDI: 000000000000000a [ 352.156577][T11590] RBP: 00007f3bcd343090 R08: 0000000000000000 R09: 0000000000000000 [ 352.164386][T11590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.172374][T11590] R13: 0000000000000000 R14: 00007f3bce881f80 R15: 00007fff46a6d188 [ 352.180283][T11590] [ 352.657432][T11604] device sit0 entered promiscuous mode [ 353.169336][T11618] FAULT_INJECTION: forcing a failure. [ 353.169336][T11618] name failslab, interval 1, probability 0, space 0, times 0 [ 353.401098][T11618] CPU: 1 PID: 11618 Comm: syz.4.4086 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 353.412300][T11618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 353.422196][T11618] Call Trace: [ 353.425317][T11618] [ 353.428095][T11618] dump_stack_lvl+0x151/0x1c0 [ 353.432652][T11618] ? io_uring_drop_tctx_refs+0x190/0x190 [ 353.438076][T11618] ? x64_sys_call+0x87f/0x9a0 [ 353.442687][T11618] dump_stack+0x15/0x20 [ 353.446668][T11618] should_fail+0x3c6/0x510 [ 353.450924][T11618] __should_failslab+0xa4/0xe0 [ 353.455531][T11618] should_failslab+0x9/0x20 [ 353.459957][T11618] slab_pre_alloc_hook+0x37/0xd0 [ 353.464727][T11618] ? skb_ensure_writable+0x2d0/0x440 [ 353.469931][T11618] __kmalloc_track_caller+0x6c/0x260 [ 353.475052][T11618] ? skb_ensure_writable+0x2d0/0x440 [ 353.480175][T11618] ? skb_ensure_writable+0x2d0/0x440 [ 353.485293][T11618] pskb_expand_head+0x113/0x1240 [ 353.490068][T11618] ? __kasan_check_write+0x14/0x20 [ 353.495033][T11618] skb_ensure_writable+0x2d0/0x440 [ 353.499962][T11618] bpf_clone_redirect+0x117/0x390 [ 353.504826][T11618] bpf_prog_e2f29814702bf05a+0x56/0x9f0 [ 353.510206][T11618] ? swiotlb_late_init_with_tbl+0x50/0x340 [ 353.515851][T11618] ? __stack_depot_save+0x34/0x470 [ 353.520888][T11618] ? __kasan_slab_alloc+0xc3/0xe0 [ 353.525743][T11618] ? __kasan_slab_alloc+0xb1/0xe0 [ 353.530599][T11618] ? slab_post_alloc_hook+0x53/0x2c0 [ 353.535718][T11618] ? kmem_cache_alloc+0xf5/0x200 [ 353.541668][T11618] ? __build_skb+0x2a/0x300 [ 353.546008][T11618] ? build_skb+0x25/0x1f0 [ 353.550167][T11618] ? bpf_prog_test_run_skb+0x38e/0x1420 [ 353.555549][T11618] ? bpf_prog_test_run+0x3b0/0x630 [ 353.560559][T11618] ? __sys_bpf+0x525/0x760 [ 353.564838][T11618] ? __x64_sys_bpf+0x7c/0x90 [ 353.569268][T11618] ? x64_sys_call+0x87f/0x9a0 [ 353.573845][T11618] ? do_syscall_64+0x3b/0xb0 [ 353.578217][T11618] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 353.584119][T11618] ? __kasan_check_read+0x11/0x20 [ 353.589112][T11618] ? bpf_test_timer_continue+0x140/0x460 [ 353.594575][T11618] bpf_test_run+0x478/0xa10 [ 353.598922][T11618] ? convert___skb_to_skb+0x570/0x570 [ 353.604118][T11618] ? eth_type_trans+0x2e4/0x620 [ 353.608805][T11618] ? eth_get_headlen+0x240/0x240 [ 353.613575][T11618] ? bpf_prog_test_run_skb+0x7bd/0x1420 [ 353.618960][T11618] ? convert___skb_to_skb+0x44/0x570 [ 353.624077][T11618] ? memcpy+0x56/0x70 [ 353.627896][T11618] bpf_prog_test_run_skb+0xb41/0x1420 [ 353.633103][T11618] ? __kasan_check_write+0x14/0x20 [ 353.638053][T11618] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 353.643778][T11618] ? __kasan_check_write+0x14/0x20 [ 353.648729][T11618] ? fput_many+0x160/0x1b0 [ 353.652977][T11618] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 353.658709][T11618] bpf_prog_test_run+0x3b0/0x630 [ 353.663482][T11618] ? bpf_prog_query+0x220/0x220 [ 353.668168][T11618] ? selinux_bpf+0xd2/0x100 [ 353.672507][T11618] ? security_bpf+0x82/0xb0 [ 353.676849][T11618] __sys_bpf+0x525/0x760 [ 353.680927][T11618] ? fput_many+0x160/0x1b0 [ 353.685181][T11618] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 353.690480][T11618] ? debug_smp_processor_id+0x17/0x20 [ 353.695680][T11618] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 353.701627][T11618] __x64_sys_bpf+0x7c/0x90 [ 353.705844][T11618] x64_sys_call+0x87f/0x9a0 [ 353.710357][T11618] do_syscall_64+0x3b/0xb0 [ 353.714620][T11618] ? clear_bhb_loop+0x35/0x90 [ 353.719116][T11618] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 353.724853][T11618] RIP: 0033:0x7f3bce6c9ef9 [ 353.729099][T11618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.748550][T11618] RSP: 002b:00007f3bcd343038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 353.756784][T11618] RAX: ffffffffffffffda RBX: 00007f3bce881f80 RCX: 00007f3bce6c9ef9 [ 353.764597][T11618] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 353.772418][T11618] RBP: 00007f3bcd343090 R08: 0000000000000000 R09: 0000000000000000 [ 353.780219][T11618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 353.788031][T11618] R13: 0000000000000000 R14: 00007f3bce881f80 R15: 00007fff46a6d188 [ 353.795853][T11618] [ 353.839079][T11633] syz.0.4090[11633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.839152][T11633] syz.0.4090[11633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.547349][T11768] device veth1_macvtap entered promiscuous mode [ 360.707130][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 362.370491][T11797] device veth1_macvtap left promiscuous mode [ 362.376731][T11797] device macsec0 entered promiscuous mode [ 367.304088][T11998] FAULT_INJECTION: forcing a failure. [ 367.304088][T11998] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 367.336548][T11998] CPU: 0 PID: 11998 Comm: syz.3.4231 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 367.347836][T11998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 367.357730][T11998] Call Trace: [ 367.360852][T11998] [ 367.363650][T11998] dump_stack_lvl+0x151/0x1c0 [ 367.368144][T11998] ? io_uring_drop_tctx_refs+0x190/0x190 [ 367.373656][T11998] dump_stack+0x15/0x20 [ 367.377697][T11998] should_fail+0x3c6/0x510 [ 367.381950][T11998] should_fail_usercopy+0x1a/0x20 [ 367.386815][T11998] _copy_from_user+0x20/0xd0 [ 367.391236][T11998] bpf_test_init+0x13b/0x1b0 [ 367.395664][T11998] bpf_prog_test_run_skb+0x268/0x1420 [ 367.400870][T11998] ? __kasan_check_write+0x14/0x20 [ 367.405819][T11998] ? proc_fail_nth_write+0x20b/0x290 [ 367.410937][T11998] ? selinux_file_permission+0x2c4/0x570 [ 367.416404][T11998] ? proc_fail_nth_read+0x210/0x210 [ 367.421441][T11998] ? fsnotify_perm+0x6a/0x5d0 [ 367.425953][T11998] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 367.431769][T11998] ? __kasan_check_write+0x14/0x20 [ 367.436928][T11998] ? fput_many+0x160/0x1b0 [ 367.441175][T11998] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 367.446907][T11998] bpf_prog_test_run+0x3b0/0x630 [ 367.451677][T11998] ? bpf_prog_query+0x220/0x220 [ 367.456364][T11998] ? selinux_bpf+0xd2/0x100 [ 367.460703][T11998] ? security_bpf+0x82/0xb0 [ 367.465128][T11998] __sys_bpf+0x525/0x760 [ 367.469220][T11998] ? fput_many+0x160/0x1b0 [ 367.473462][T11998] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 367.478697][T11998] ? debug_smp_processor_id+0x17/0x20 [ 367.483876][T11998] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 367.489779][T11998] __x64_sys_bpf+0x7c/0x90 [ 367.494031][T11998] x64_sys_call+0x87f/0x9a0 [ 367.498371][T11998] do_syscall_64+0x3b/0xb0 [ 367.502628][T11998] ? clear_bhb_loop+0x35/0x90 [ 367.507224][T11998] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 367.512952][T11998] RIP: 0033:0x7f15879cdef9 [ 367.517228][T11998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 367.536649][T11998] RSP: 002b:00007f1586647038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 367.544893][T11998] RAX: ffffffffffffffda RBX: 00007f1587b85f80 RCX: 00007f15879cdef9 [ 367.552710][T11998] RDX: 0000000000000050 RSI: 0000000020000080 RDI: 000000000000000a [ 367.560535][T11998] RBP: 00007f1586647090 R08: 0000000000000000 R09: 0000000000000000 [ 367.568325][T11998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 367.576137][T11998] R13: 0000000000000000 R14: 00007f1587b85f80 R15: 00007ffe0cf7f898 [ 367.583954][T11998] [ 368.897757][T12063] syz.4.4255[12063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.897818][T12063] syz.4.4255[12063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.909908][T12063] syz.4.4255[12063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.911821][T12066] syz.4.4255[12066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.921524][T12063] syz.4.4255[12063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.637963][T12216] syz.2.4315[12216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.660356][T12216] syz.2.4315[12216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.767697][T12216] syz.2.4315[12216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.780210][T12216] syz.2.4315[12216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.216663][T12268] FAULT_INJECTION: forcing a failure. [ 373.216663][T12268] name failslab, interval 1, probability 0, space 0, times 0 [ 373.246786][T12268] CPU: 1 PID: 12268 Comm: syz.3.4337 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 373.257981][T12268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 373.267973][T12268] Call Trace: [ 373.271096][T12268] [ 373.273874][T12268] dump_stack_lvl+0x151/0x1c0 [ 373.278388][T12268] ? io_uring_drop_tctx_refs+0x190/0x190 [ 373.283853][T12268] ? kmem_cache_free+0x116/0x2e0 [ 373.288626][T12268] ? kasan_set_track+0x5d/0x70 [ 373.293231][T12268] ? kasan_set_free_info+0x23/0x40 [ 373.298263][T12268] ? ____kasan_slab_free+0x126/0x160 [ 373.303382][T12268] dump_stack+0x15/0x20 [ 373.307375][T12268] should_fail+0x3c6/0x510 [ 373.311627][T12268] __should_failslab+0xa4/0xe0 [ 373.316230][T12268] should_failslab+0x9/0x20 [ 373.320567][T12268] slab_pre_alloc_hook+0x37/0xd0 [ 373.325352][T12268] __kmalloc+0x6d/0x270 [ 373.329344][T12268] ? bpf_test_init+0x101/0x1b0 [ 373.333941][T12268] bpf_test_init+0x101/0x1b0 [ 373.338365][T12268] bpf_prog_test_run_skb+0x268/0x1420 [ 373.343569][T12268] ? __kasan_check_write+0x14/0x20 [ 373.348522][T12268] ? proc_fail_nth_write+0x20b/0x290 [ 373.353682][T12268] ? selinux_file_permission+0x2c4/0x570 [ 373.359106][T12268] ? proc_fail_nth_read+0x210/0x210 [ 373.364139][T12268] ? fsnotify_perm+0x6a/0x5d0 [ 373.368655][T12268] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 373.374381][T12268] ? __kasan_check_write+0x14/0x20 [ 373.379326][T12268] ? fput_many+0x160/0x1b0 [ 373.383580][T12268] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 373.389402][T12268] bpf_prog_test_run+0x3b0/0x630 [ 373.394188][T12268] ? bpf_prog_query+0x220/0x220 [ 373.398858][T12268] ? selinux_bpf+0xd2/0x100 [ 373.403198][T12268] ? security_bpf+0x82/0xb0 [ 373.407541][T12268] __sys_bpf+0x525/0x760 [ 373.411613][T12268] ? fput_many+0x160/0x1b0 [ 373.415874][T12268] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 373.421081][T12268] ? debug_smp_processor_id+0x17/0x20 [ 373.426282][T12268] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 373.432185][T12268] __x64_sys_bpf+0x7c/0x90 [ 373.436438][T12268] x64_sys_call+0x87f/0x9a0 [ 373.440776][T12268] do_syscall_64+0x3b/0xb0 [ 373.445031][T12268] ? clear_bhb_loop+0x35/0x90 [ 373.449543][T12268] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 373.455270][T12268] RIP: 0033:0x7f15879cdef9 [ 373.459526][T12268] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 373.478966][T12268] RSP: 002b:00007f1586647038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 373.487213][T12268] RAX: ffffffffffffffda RBX: 00007f1587b85f80 RCX: 00007f15879cdef9 [ 373.495028][T12268] RDX: 0000000000000050 RSI: 0000000020000900 RDI: 000000000000000a [ 373.502832][T12268] RBP: 00007f1586647090 R08: 0000000000000000 R09: 0000000000000000 [ 373.510644][T12268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 373.518457][T12268] R13: 0000000000000000 R14: 00007f1587b85f80 R15: 00007ffe0cf7f898 [ 373.526273][T12268] [ 374.171121][T12301] syz.2.4350[12301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.171195][T12301] syz.2.4350[12301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.875023][T12456] device veth1_macvtap left promiscuous mode [ 378.890288][T12560] device sit0 entered promiscuous mode [ 382.121628][T12640] FAULT_INJECTION: forcing a failure. [ 382.121628][T12640] name failslab, interval 1, probability 0, space 0, times 0 [ 382.258566][T12640] CPU: 1 PID: 12640 Comm: syz.3.4480 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 382.269792][T12640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 382.279664][T12640] Call Trace: [ 382.282784][T12640] [ 382.285563][T12640] dump_stack_lvl+0x151/0x1c0 [ 382.290073][T12640] ? io_uring_drop_tctx_refs+0x190/0x190 [ 382.295543][T12640] dump_stack+0x15/0x20 [ 382.299538][T12640] should_fail+0x3c6/0x510 [ 382.303794][T12640] __should_failslab+0xa4/0xe0 [ 382.308388][T12640] should_failslab+0x9/0x20 [ 382.312817][T12640] slab_pre_alloc_hook+0x37/0xd0 [ 382.317590][T12640] __kmalloc+0x6d/0x270 [ 382.321580][T12640] ? sk_prot_alloc+0xf9/0x330 [ 382.326095][T12640] sk_prot_alloc+0xf9/0x330 [ 382.330433][T12640] ? _copy_from_user+0x96/0xd0 [ 382.335034][T12640] sk_alloc+0x38/0x430 [ 382.339029][T12640] bpf_prog_test_run_skb+0x362/0x1420 [ 382.344320][T12640] ? __kasan_check_write+0x14/0x20 [ 382.349268][T12640] ? proc_fail_nth_write+0x20b/0x290 [ 382.354396][T12640] ? selinux_file_permission+0x2c4/0x570 [ 382.359859][T12640] ? proc_fail_nth_read+0x210/0x210 [ 382.364893][T12640] ? fsnotify_perm+0x6a/0x5d0 [ 382.369407][T12640] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 382.375134][T12640] ? __kasan_check_write+0x14/0x20 [ 382.380165][T12640] ? fput_many+0x160/0x1b0 [ 382.384419][T12640] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 382.390259][T12640] bpf_prog_test_run+0x3b0/0x630 [ 382.395009][T12640] ? bpf_prog_query+0x220/0x220 [ 382.399695][T12640] ? selinux_bpf+0xd2/0x100 [ 382.404035][T12640] ? security_bpf+0x82/0xb0 [ 382.408376][T12640] __sys_bpf+0x525/0x760 [ 382.412454][T12640] ? fput_many+0x160/0x1b0 [ 382.416705][T12640] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 382.421919][T12640] ? debug_smp_processor_id+0x17/0x20 [ 382.427124][T12640] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 382.433025][T12640] __x64_sys_bpf+0x7c/0x90 [ 382.437278][T12640] x64_sys_call+0x87f/0x9a0 [ 382.441616][T12640] do_syscall_64+0x3b/0xb0 [ 382.445871][T12640] ? clear_bhb_loop+0x35/0x90 [ 382.450384][T12640] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 382.456111][T12640] RIP: 0033:0x7f15879cdef9 [ 382.460368][T12640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 382.479808][T12640] RSP: 002b:00007f1586626038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 382.488052][T12640] RAX: ffffffffffffffda RBX: 00007f1587b86058 RCX: 00007f15879cdef9 [ 382.495862][T12640] RDX: 0000000000000050 RSI: 0000000020000080 RDI: 000000000000000a [ 382.503674][T12640] RBP: 00007f1586626090 R08: 0000000000000000 R09: 0000000000000000 [ 382.511573][T12640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 382.519383][T12640] R13: 0000000000000000 R14: 00007f1587b86058 R15: 00007ffe0cf7f898 [ 382.527203][T12640] [ 383.049259][T12641] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.056274][T12641] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.733110][ T30] audit: type=1400 audit(1727124631.073:155): avc: denied { create } for pid=12675 comm="syz.3.4494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 389.769641][T12877] bridge0: port 3(veth0_to_batadv) entered blocking state [ 389.782078][T12877] bridge0: port 3(veth0_to_batadv) entered disabled state [ 389.892408][T12877] device veth0_to_batadv entered promiscuous mode [ 389.914928][T12877] bridge0: port 3(veth0_to_batadv) entered blocking state [ 389.923819][T12877] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 389.957957][T12882] device veth0_to_batadv left promiscuous mode [ 389.964216][T12882] bridge0: port 3(veth0_to_batadv) entered disabled state [ 390.619345][T12922] FAULT_INJECTION: forcing a failure. [ 390.619345][T12922] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 390.645620][T12922] CPU: 1 PID: 12922 Comm: syz.0.4592 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 390.656913][T12922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 390.666812][T12922] Call Trace: [ 390.669928][T12922] [ 390.672704][T12922] dump_stack_lvl+0x151/0x1c0 [ 390.677220][T12922] ? io_uring_drop_tctx_refs+0x190/0x190 [ 390.682689][T12922] dump_stack+0x15/0x20 [ 390.686679][T12922] should_fail+0x3c6/0x510 [ 390.690937][T12922] should_fail_usercopy+0x1a/0x20 [ 390.695792][T12922] _copy_from_user+0x20/0xd0 [ 390.700569][T12922] bpf_test_init+0x13b/0x1b0 [ 390.704993][T12922] bpf_prog_test_run_skb+0x268/0x1420 [ 390.710201][T12922] ? __kasan_check_write+0x14/0x20 [ 390.715149][T12922] ? proc_fail_nth_write+0x20b/0x290 [ 390.720269][T12922] ? selinux_file_permission+0x2c4/0x570 [ 390.725750][T12922] ? proc_fail_nth_read+0x210/0x210 [ 390.730768][T12922] ? fsnotify_perm+0x6a/0x5d0 [ 390.735287][T12922] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 390.741016][T12922] ? __kasan_check_write+0x14/0x20 [ 390.745967][T12922] ? fput_many+0x160/0x1b0 [ 390.750214][T12922] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 390.755948][T12922] bpf_prog_test_run+0x3b0/0x630 [ 390.760721][T12922] ? bpf_prog_query+0x220/0x220 [ 390.765401][T12922] ? selinux_bpf+0xd2/0x100 [ 390.769743][T12922] ? security_bpf+0x82/0xb0 [ 390.774082][T12922] __sys_bpf+0x525/0x760 [ 390.778162][T12922] ? fput_many+0x160/0x1b0 [ 390.782412][T12922] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 390.787623][T12922] ? debug_smp_processor_id+0x17/0x20 [ 390.792828][T12922] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 390.798738][T12922] __x64_sys_bpf+0x7c/0x90 [ 390.802987][T12922] x64_sys_call+0x87f/0x9a0 [ 390.807322][T12922] do_syscall_64+0x3b/0xb0 [ 390.811575][T12922] ? clear_bhb_loop+0x35/0x90 [ 390.816101][T12922] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 390.821825][T12922] RIP: 0033:0x7f4f14ae3ef9 [ 390.826069][T12922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 390.845514][T12922] RSP: 002b:00007f4f1375d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 390.853760][T12922] RAX: ffffffffffffffda RBX: 00007f4f14c9bf80 RCX: 00007f4f14ae3ef9 [ 390.861674][T12922] RDX: 0000000000000050 RSI: 0000000020000900 RDI: 000000000000000a [ 390.869475][T12922] RBP: 00007f4f1375d090 R08: 0000000000000000 R09: 0000000000000000 [ 390.877286][T12922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 390.885096][T12922] R13: 0000000000000000 R14: 00007f4f14c9bf80 R15: 00007ffe4c3e1108 [ 390.892917][T12922] [ 390.909022][T12926] device syzkaller0 entered promiscuous mode [ 391.343407][T12958] syz.2.4605[12958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.343477][T12958] syz.2.4605[12958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.249110][T13112] ÿÿÿÿÿÿ: renamed from vlan1 [ 395.849730][T13173] device veth0_vlan left promiscuous mode [ 395.939114][T13173] device veth0_vlan entered promiscuous mode [ 396.535821][T13216] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 396.551756][T13217] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 396.558093][T13217] pim6reg0: linktype set to 769 [ 396.563028][T13217] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 396.569169][T13217] pim6reg0: linktype set to 769 [ 396.573993][T13216] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 396.587673][T13216] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 396.595582][T13217] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 396.605206][T13217] pim6reg0: linktype set to 769 [ 396.694991][T13230] device sit0 left promiscuous mode [ 397.521429][T13232] device sit0 entered promiscuous mode [ 434.002710][T14020] device veth1_macvtap left promiscuous mode [ 434.026568][T14020] device macsec0 entered promiscuous mode [ 438.782918][T14101] device veth1_macvtap left promiscuous mode [ 438.836375][T14101] device macsec0 entered promiscuous mode [ 440.655364][T14144] bridge0: port 3(veth0_to_batadv) entered blocking state [ 440.696692][T14144] bridge0: port 3(veth0_to_batadv) entered disabled state [ 440.772200][T14144] device veth0_to_batadv entered promiscuous mode [ 440.801754][T14144] bridge0: port 3(veth0_to_batadv) entered blocking state [ 440.810014][T14144] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 440.869208][T14146] device veth0_to_batadv left promiscuous mode [ 440.875279][T14146] bridge0: port 3(veth0_to_batadv) entered disabled state [ 442.659711][T14190] bridge0: port 3(veth0_to_batadv) entered blocking state [ 442.675744][T14190] bridge0: port 3(veth0_to_batadv) entered disabled state [ 442.865179][T14190] device veth0_to_batadv entered promiscuous mode [ 442.886416][T14190] bridge0: port 3(veth0_to_batadv) entered blocking state [ 442.896174][T14190] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 442.964159][T14192] device veth0_to_batadv left promiscuous mode [ 442.980089][T14192] bridge0: port 3(veth0_to_batadv) entered disabled state [ 443.445965][T14208] device veth0_vlan left promiscuous mode [ 443.529925][T14208] device veth0_vlan entered promiscuous mode [ 443.927857][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.935978][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 444.006294][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 445.529441][T14248] device veth0_vlan left promiscuous mode [ 445.577487][T14248] device veth0_vlan entered promiscuous mode [ 445.590684][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 445.606154][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 445.613955][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 453.230846][T14373] Â: renamed from pim6reg1 [ 454.676664][T14394] device macsec0 left promiscuous mode [ 454.706423][T14395] device veth1_macvtap entered promiscuous mode [ 454.719114][T14395] device macsec0 entered promiscuous mode [ 454.739864][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 455.818939][T14429] device sit0 left promiscuous mode [ 456.632632][T14440] device sit0 entered promiscuous mode [ 456.644443][T14441] device veth0_vlan left promiscuous mode [ 456.672220][T14441] device veth0_vlan entered promiscuous mode [ 456.692466][T14453] syz.4.5170[14453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.692543][T14453] syz.4.5170[14453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.770282][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 456.805720][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 456.813663][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 456.822401][T14463] FAULT_INJECTION: forcing a failure. [ 456.822401][T14463] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 456.836772][T14463] CPU: 0 PID: 14463 Comm: syz.0.5172 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 456.847967][T14463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 456.857861][T14463] Call Trace: [ 456.860984][T14463] [ 456.863857][T14463] dump_stack_lvl+0x151/0x1c0 [ 456.868458][T14463] ? io_uring_drop_tctx_refs+0x190/0x190 [ 456.873934][T14463] dump_stack+0x15/0x20 [ 456.877926][T14463] should_fail+0x3c6/0x510 [ 456.882173][T14463] should_fail_usercopy+0x1a/0x20 [ 456.887038][T14463] _copy_from_user+0x20/0xd0 [ 456.891457][T14463] __sys_bpf+0x1e9/0x760 [ 456.895538][T14463] ? fput_many+0x160/0x1b0 [ 456.899790][T14463] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 456.905000][T14463] ? debug_smp_processor_id+0x17/0x20 [ 456.910203][T14463] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 456.916106][T14463] __x64_sys_bpf+0x7c/0x90 [ 456.920362][T14463] x64_sys_call+0x87f/0x9a0 [ 456.924700][T14463] do_syscall_64+0x3b/0xb0 [ 456.928953][T14463] ? clear_bhb_loop+0x35/0x90 [ 456.933465][T14463] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 456.939289][T14463] RIP: 0033:0x7f4f14ae3ef9 [ 456.943536][T14463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.962980][T14463] RSP: 002b:00007f4f1375d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 456.971223][T14463] RAX: ffffffffffffffda RBX: 00007f4f14c9bf80 RCX: 00007f4f14ae3ef9 [ 456.979126][T14463] RDX: 0000000000000020 RSI: 00000000200007c0 RDI: 0000000000000003 [ 456.986940][T14463] RBP: 00007f4f1375d090 R08: 0000000000000000 R09: 0000000000000000 [ 456.994748][T14463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 457.002559][T14463] R13: 0000000000000000 R14: 00007f4f14c9bf80 R15: 00007ffe4c3e1108 [ 457.010376][T14463] [ 458.387237][T14516] device sit0 left promiscuous mode [ 465.172877][T14590] device sit0 left promiscuous mode [ 465.495179][T14605] syz.0.5225[14605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.495253][T14605] syz.0.5225[14605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.933758][T14595] device sit0 entered promiscuous mode [ 467.241070][T14642] syz.3.5238[14642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.241174][T14642] syz.3.5238[14642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.304645][T14643] device syzkaller0 entered promiscuous mode [ 468.662211][T14688] syz.4.5250[14688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.662288][T14688] syz.4.5250[14688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.817148][T14684] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.848549][T14684] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.862316][T14684] device bridge_slave_0 entered promiscuous mode [ 468.897745][ T380] device bridge_slave_1 left promiscuous mode [ 468.903992][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.952282][ T380] device bridge_slave_0 left promiscuous mode [ 468.996399][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.036496][ T380] device veth0_vlan left promiscuous mode [ 469.430106][T14684] bridge0: port 2(bridge_slave_1) entered blocking state [ 469.449043][T14684] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.536054][T14684] device bridge_slave_1 entered promiscuous mode [ 470.058618][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 470.072765][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 470.089767][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 470.099237][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 470.110294][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.117170][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.125020][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 470.134176][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 470.142448][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.149309][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.195599][T14684] device veth0_vlan entered promiscuous mode [ 470.216964][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 470.225087][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 470.235478][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 470.245143][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 470.252698][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 470.264155][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 470.272346][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 470.286492][T14684] device veth1_macvtap entered promiscuous mode [ 470.296556][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 470.305603][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 470.356671][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 470.600971][T14727] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.607970][T14727] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.615301][T14727] device bridge_slave_0 entered promiscuous mode [ 470.624191][T14727] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.631330][T14727] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.638980][T14727] device bridge_slave_1 entered promiscuous mode [ 470.743981][T14727] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.750864][T14727] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.757974][T14727] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.764812][T14727] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.795653][ T2599] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.803281][ T2599] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.829181][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 470.836694][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 470.852028][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 470.860258][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 470.869273][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.876140][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.975708][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 471.016786][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 471.060221][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.067112][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 471.110930][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 471.151314][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 471.206537][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 471.217786][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 471.233489][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 471.242826][T14741] FAULT_INJECTION: forcing a failure. [ 471.242826][T14741] name failslab, interval 1, probability 0, space 0, times 0 [ 471.255807][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 471.264451][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 471.306413][T14741] CPU: 0 PID: 14741 Comm: syz.3.5267 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 471.317609][T14741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 471.327504][T14741] Call Trace: [ 471.330627][T14741] [ 471.333407][T14741] dump_stack_lvl+0x151/0x1c0 [ 471.338002][T14741] ? io_uring_drop_tctx_refs+0x190/0x190 [ 471.343470][T14741] ? kstrtol_from_user+0x310/0x310 [ 471.348418][T14741] dump_stack+0x15/0x20 [ 471.352409][T14741] should_fail+0x3c6/0x510 [ 471.356664][T14741] __should_failslab+0xa4/0xe0 [ 471.361262][T14741] should_failslab+0x9/0x20 [ 471.365774][T14741] slab_pre_alloc_hook+0x37/0xd0 [ 471.370550][T14741] __kmalloc+0x6d/0x270 [ 471.374540][T14741] ? kvmalloc_node+0x1f0/0x4d0 [ 471.379149][T14741] kvmalloc_node+0x1f0/0x4d0 [ 471.383570][T14741] ? vm_mmap+0xb0/0xb0 [ 471.387476][T14741] vmemdup_user+0x26/0xe0 [ 471.391641][T14741] map_delete_elem+0x205/0x4e0 [ 471.396248][T14741] __sys_bpf+0x42e/0x760 [ 471.400318][T14741] ? fput_many+0x160/0x1b0 [ 471.404574][T14741] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 471.409787][T14741] ? debug_smp_processor_id+0x17/0x20 [ 471.414984][T14741] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 471.420888][T14741] __x64_sys_bpf+0x7c/0x90 [ 471.425156][T14741] x64_sys_call+0x87f/0x9a0 [ 471.429480][T14741] do_syscall_64+0x3b/0xb0 [ 471.433733][T14741] ? clear_bhb_loop+0x35/0x90 [ 471.438248][T14741] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 471.443982][T14741] RIP: 0033:0x7f15879cdef9 [ 471.448321][T14741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 471.467763][T14741] RSP: 002b:00007f1586647038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 471.476006][T14741] RAX: ffffffffffffffda RBX: 00007f1587b85f80 RCX: 00007f15879cdef9 [ 471.483904][T14741] RDX: 0000000000000020 RSI: 00000000200007c0 RDI: 0000000000000003 [ 471.491716][T14741] RBP: 00007f1586647090 R08: 0000000000000000 R09: 0000000000000000 [ 471.499526][T14741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 471.507340][T14741] R13: 0000000000000000 R14: 00007f1587b85f80 R15: 00007ffe0cf7f898 [ 471.515159][T14741] [ 471.522500][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 471.531981][T14727] device veth0_vlan entered promiscuous mode [ 471.546348][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 471.553805][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 471.572941][T14727] device veth1_macvtap entered promiscuous mode [ 471.582243][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 471.591397][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 471.599583][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 471.633371][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 471.644929][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 471.663081][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 471.687152][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 471.871312][ T45] device bridge_slave_1 left promiscuous mode [ 471.897175][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.958365][ T45] device bridge_slave_0 left promiscuous mode [ 471.964332][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.068215][ T45] device veth1_macvtap left promiscuous mode [ 472.074062][ T45] device veth0_vlan left promiscuous mode [ 472.333386][T14761] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.340458][T14761] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.347659][T14761] device bridge_slave_0 entered promiscuous mode [ 472.354642][T14761] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.361736][T14761] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.369410][T14761] device bridge_slave_1 entered promiscuous mode [ 472.442156][T14761] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.449028][T14761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.456138][T14761] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.462919][T14761] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.534691][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 472.543317][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 472.554507][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 472.585264][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 472.593211][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 472.612015][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 472.624420][T14761] device veth0_vlan entered promiscuous mode [ 472.631778][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 472.639877][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 472.647726][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 472.663673][T14761] device veth1_macvtap entered promiscuous mode [ 472.670982][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 472.687463][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 472.695949][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 472.957961][T14776] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.964935][T14776] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.057889][T14776] device bridge_slave_0 entered promiscuous mode [ 473.113267][T14776] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.137565][T14776] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.144864][T14776] device bridge_slave_1 entered promiscuous mode [ 473.330933][T14806] device pim6reg1 entered promiscuous mode [ 473.367747][ T45] device bridge_slave_1 left promiscuous mode [ 473.373780][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.381683][ T45] device bridge_slave_0 left promiscuous mode [ 473.387823][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.395823][ T45] device veth1_macvtap left promiscuous mode [ 473.402258][ T45] device veth0_vlan left promiscuous mode [ 473.522901][T14776] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.529797][T14776] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.536900][T14776] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.543637][T14776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.623302][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 473.631574][ T900] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.640071][ T900] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.659633][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 473.669717][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.676581][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.688706][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 473.699073][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.705942][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.724534][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 473.734163][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 473.754535][T14776] device veth0_vlan entered promiscuous mode [ 473.765745][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 473.774821][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 473.783912][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 473.793090][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 473.817143][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 473.847401][T14776] device veth1_macvtap entered promiscuous mode [ 473.866825][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 473.874922][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 473.884419][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 473.892719][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 474.581453][T14820] device sit0 entered promiscuous mode [ 474.913595][T14832] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.920672][T14832] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.928835][T14832] device bridge_slave_0 entered promiscuous mode [ 474.935837][T14832] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.957183][T14832] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.976713][T14832] device bridge_slave_1 entered promiscuous mode [ 475.716165][ T45] device bridge_slave_1 left promiscuous mode [ 475.724918][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.820373][ T45] device bridge_slave_0 left promiscuous mode [ 475.833029][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.841713][T14846] FAULT_INJECTION: forcing a failure. [ 475.841713][T14846] name failslab, interval 1, probability 0, space 0, times 0 [ 475.855176][ T45] device veth1_macvtap left promiscuous mode [ 475.861254][ T45] device veth0_vlan left promiscuous mode [ 475.869466][T14846] CPU: 0 PID: 14846 Comm: syz.4.5299 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 475.880754][T14846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 475.890650][T14846] Call Trace: [ 475.893772][T14846] [ 475.896547][T14846] dump_stack_lvl+0x151/0x1c0 [ 475.901064][T14846] ? io_uring_drop_tctx_refs+0x190/0x190 [ 475.906533][T14846] ? kstrtol_from_user+0x310/0x310 [ 475.911525][T14846] dump_stack+0x15/0x20 [ 475.915557][T14846] should_fail+0x3c6/0x510 [ 475.919983][T14846] __should_failslab+0xa4/0xe0 [ 475.924582][T14846] should_failslab+0x9/0x20 [ 475.928924][T14846] slab_pre_alloc_hook+0x37/0xd0 [ 475.933695][T14846] __kmalloc+0x6d/0x270 [ 475.937699][T14846] ? kvmalloc_node+0x1f0/0x4d0 [ 475.942379][T14846] kvmalloc_node+0x1f0/0x4d0 [ 475.946806][T14846] ? vm_mmap+0xb0/0xb0 [ 475.950706][T14846] vmemdup_user+0x26/0xe0 [ 475.954870][T14846] map_delete_elem+0x205/0x4e0 [ 475.959471][T14846] __sys_bpf+0x42e/0x760 [ 475.963548][T14846] ? fput_many+0x160/0x1b0 [ 475.967806][T14846] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 475.973011][T14846] ? debug_smp_processor_id+0x17/0x20 [ 475.978216][T14846] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 475.984119][T14846] __x64_sys_bpf+0x7c/0x90 [ 475.988372][T14846] x64_sys_call+0x87f/0x9a0 [ 475.992715][T14846] do_syscall_64+0x3b/0xb0 [ 475.996966][T14846] ? clear_bhb_loop+0x35/0x90 [ 476.001477][T14846] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 476.007209][T14846] RIP: 0033:0x7f3bce6c9ef9 [ 476.011463][T14846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 476.030910][T14846] RSP: 002b:00007f3bcd343038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 476.039153][T14846] RAX: ffffffffffffffda RBX: 00007f3bce881f80 RCX: 00007f3bce6c9ef9 [ 476.046962][T14846] RDX: 0000000000000020 RSI: 00000000200007c0 RDI: 0000000000000003 [ 476.054781][T14846] RBP: 00007f3bcd343090 R08: 0000000000000000 R09: 0000000000000000 [ 476.062581][T14846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 476.070405][T14846] R13: 0000000000000000 R14: 00007f3bce881f80 R15: 00007fff46a6d188 [ 476.078222][T14846] [ 477.314329][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 477.326936][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 477.343001][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 477.361989][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 477.384893][ T2599] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.391770][ T2599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.410350][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 477.419711][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 477.429765][ T2599] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.436624][ T2599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.615687][T14832] device veth0_vlan entered promiscuous mode [ 477.629416][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 477.649573][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 477.711178][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 477.781959][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 477.866518][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 477.874344][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 477.967804][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 477.976052][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 477.984068][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 477.992598][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 478.000200][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 478.080684][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 478.097661][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 478.182191][T14832] device veth1_macvtap entered promiscuous mode [ 478.456409][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 478.490086][T14876] device syzkaller0 entered promiscuous mode [ 478.498431][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 478.507761][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 478.515933][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 478.525011][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 478.827196][ T45] device bridge_slave_1 left promiscuous mode [ 478.833254][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.843777][ T45] device bridge_slave_0 left promiscuous mode [ 478.849916][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.877728][ T45] device veth1_macvtap left promiscuous mode [ 478.883634][ T45] device veth0_vlan left promiscuous mode [ 478.987035][T14886] device pim6reg1 entered promiscuous mode [ 479.821504][ T45] device bridge_slave_1 left promiscuous mode [ 479.861188][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.969268][ T45] device bridge_slave_0 left promiscuous mode [ 480.039612][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 480.140574][ T45] device veth1_macvtap left promiscuous mode [ 480.221273][ T45] device veth0_vlan left promiscuous mode [ 480.600341][T14901] bridge0: port 1(bridge_slave_0) entered blocking state [ 480.607225][T14901] bridge0: port 1(bridge_slave_0) entered disabled state [ 480.614488][T14901] device bridge_slave_0 entered promiscuous mode [ 480.621371][T14901] bridge0: port 2(bridge_slave_1) entered blocking state [ 480.628795][T14901] bridge0: port 2(bridge_slave_1) entered disabled state [ 480.636098][T14901] device bridge_slave_1 entered promiscuous mode [ 480.729313][T14901] bridge0: port 2(bridge_slave_1) entered blocking state [ 480.736167][T14901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 480.743299][T14901] bridge0: port 1(bridge_slave_0) entered blocking state [ 480.750060][T14901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 480.775876][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 480.783820][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 480.792680][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 480.800024][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 480.818404][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 480.826699][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 480.833533][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 480.841496][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 480.849620][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 480.856478][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 480.864413][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 480.872867][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 480.896503][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 480.952164][T14901] device veth0_vlan entered promiscuous mode [ 480.991939][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 481.011243][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 481.023402][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 481.048975][T14901] device veth1_macvtap entered promiscuous mode [ 481.088737][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 481.459739][T14930] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 481.509750][T14930] device syzkaller0 entered promiscuous mode [ 481.575894][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 481.584571][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 481.739985][T14938] syz.3.5329[14938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.740060][T14938] syz.3.5329[14938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.397329][ T45] device bridge_slave_1 left promiscuous mode [ 482.414561][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.422410][ T45] device bridge_slave_0 left promiscuous mode [ 482.428512][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.436988][ T45] device veth1_macvtap left promiscuous mode [ 482.442870][ T45] device veth0_vlan left promiscuous mode [ 482.603752][T14950] bridge0: port 1(bridge_slave_0) entered blocking state [ 482.646574][T14950] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.653981][T14950] device bridge_slave_0 entered promiscuous mode [ 482.667544][T14950] bridge0: port 2(bridge_slave_1) entered blocking state [ 482.674561][T14950] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.682113][T14950] device bridge_slave_1 entered promiscuous mode [ 482.827240][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 482.837113][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 482.893901][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 482.974632][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 483.048386][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.055266][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 483.202267][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 483.281684][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 483.401554][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.408528][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 483.675522][T14950] device veth0_vlan entered promiscuous mode [ 483.685954][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 483.694738][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 483.703419][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 483.711802][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 483.720444][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 483.743385][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 483.758393][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 483.786763][T14974] device syzkaller0 entered promiscuous mode [ 483.861458][T14985] device syzkaller0 entered promiscuous mode [ 483.893528][T14950] device veth1_macvtap entered promiscuous mode [ 484.112388][T14996] syz.0.5349[14996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.112449][T14996] syz.0.5349[14996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 484.631093][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 484.650537][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 484.658978][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 484.681950][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 484.691358][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 484.700743][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 484.709387][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 485.547038][ T45] device bridge_slave_1 left promiscuous mode [ 485.552972][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.560277][ T45] device bridge_slave_0 left promiscuous mode [ 485.566214][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.574116][ T45] device veth1_macvtap left promiscuous mode [ 485.580000][ T45] device veth0_vlan left promiscuous mode [ 485.738959][T15025] FAULT_INJECTION: forcing a failure. [ 485.738959][T15025] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 485.796440][T15025] CPU: 1 PID: 15025 Comm: syz.3.5360 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 485.807646][T15025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 485.817538][T15025] Call Trace: [ 485.820663][T15025] [ 485.823443][T15025] dump_stack_lvl+0x151/0x1c0 [ 485.827957][T15025] ? io_uring_drop_tctx_refs+0x190/0x190 [ 485.833510][T15025] ? __kmalloc+0x13a/0x270 [ 485.837761][T15025] ? kvmalloc_node+0x1f0/0x4d0 [ 485.842362][T15025] dump_stack+0x15/0x20 [ 485.846357][T15025] should_fail+0x3c6/0x510 [ 485.850614][T15025] should_fail_usercopy+0x1a/0x20 [ 485.855552][T15025] _copy_from_user+0x20/0xd0 [ 485.859983][T15025] vmemdup_user+0x63/0xe0 [ 485.864150][T15025] map_delete_elem+0x205/0x4e0 [ 485.868747][T15025] __sys_bpf+0x42e/0x760 [ 485.872825][T15025] ? fput_many+0x160/0x1b0 [ 485.877079][T15025] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 485.882292][T15025] ? debug_smp_processor_id+0x17/0x20 [ 485.887495][T15025] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 485.893403][T15025] __x64_sys_bpf+0x7c/0x90 [ 485.897649][T15025] x64_sys_call+0x87f/0x9a0 [ 485.901989][T15025] do_syscall_64+0x3b/0xb0 [ 485.906242][T15025] ? clear_bhb_loop+0x35/0x90 [ 485.910762][T15025] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 485.916485][T15025] RIP: 0033:0x7f15879cdef9 [ 485.920737][T15025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 485.940268][T15025] RSP: 002b:00007f1586647038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 485.948597][T15025] RAX: ffffffffffffffda RBX: 00007f1587b85f80 RCX: 00007f15879cdef9 [ 485.956407][T15025] RDX: 0000000000000020 RSI: 00000000200007c0 RDI: 0000000000000003 [ 485.964221][T15025] RBP: 00007f1586647090 R08: 0000000000000000 R09: 0000000000000000 [ 485.972057][T15025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 485.979842][T15025] R13: 0000000000000000 R14: 00007f1587b85f80 R15: 00007ffe0cf7f898 [ 485.987659][T15025] [ 486.005610][T15017] bridge0: port 1(bridge_slave_0) entered blocking state [ 486.013571][T15017] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.021353][T15017] device bridge_slave_0 entered promiscuous mode [ 486.028716][T15017] bridge0: port 2(bridge_slave_1) entered blocking state [ 486.035861][T15017] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.043839][T15017] device bridge_slave_1 entered promiscuous mode [ 486.115729][T15017] bridge0: port 2(bridge_slave_1) entered blocking state [ 486.122620][T15017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 486.148934][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.157762][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 486.165137][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 486.198202][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 486.207314][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 486.215365][ T901] bridge0: port 1(bridge_slave_0) entered blocking state [ 486.222240][ T901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 486.231808][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 486.239914][ T901] bridge0: port 2(bridge_slave_1) entered blocking state [ 486.246865][ T901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 486.269891][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 486.279693][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 486.287791][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 486.299657][T15017] device veth0_vlan entered promiscuous mode [ 486.306195][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 486.315099][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 486.323014][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 486.336938][T15017] device veth1_macvtap entered promiscuous mode [ 486.345005][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 486.369583][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 486.390786][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 486.789431][T15043] device syzkaller0 entered promiscuous mode [ 487.206839][ T10] device bridge_slave_1 left promiscuous mode [ 487.212770][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.220046][ T10] device bridge_slave_0 left promiscuous mode [ 487.225959][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 487.233769][ T10] device veth1_macvtap left promiscuous mode [ 487.239609][ T10] device veth0_vlan left promiscuous mode [ 487.490196][T15059] bridge0: port 1(bridge_slave_0) entered blocking state [ 487.497225][T15059] bridge0: port 1(bridge_slave_0) entered disabled state [ 487.504566][T15059] device bridge_slave_0 entered promiscuous mode [ 487.511809][T15059] bridge0: port 2(bridge_slave_1) entered blocking state [ 487.519170][T15059] bridge0: port 2(bridge_slave_1) entered disabled state [ 487.537757][T15059] device bridge_slave_1 entered promiscuous mode [ 487.628652][T15059] bridge0: port 2(bridge_slave_1) entered blocking state [ 487.635527][T15059] bridge0: port 2(bridge_slave_1) entered forwarding state [ 487.642642][T15059] bridge0: port 1(bridge_slave_0) entered blocking state [ 487.649406][T15059] bridge0: port 1(bridge_slave_0) entered forwarding state [ 488.069620][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.090038][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.175611][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 488.185825][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 488.193474][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 488.201788][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 488.209848][ T2599] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.216682][ T2599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 488.224034][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 488.234494][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 488.242691][ T2599] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.249570][ T2599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 488.278087][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 488.292598][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 488.300823][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 488.310259][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 488.334634][T15059] device veth0_vlan entered promiscuous mode [ 488.358824][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 488.392453][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 488.470261][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 488.503753][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 488.524269][T15059] device veth1_macvtap entered promiscuous mode [ 488.537079][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 488.545479][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 488.557012][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 488.564928][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 488.573049][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 488.712242][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 488.720392][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 488.743271][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 488.751472][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 489.822161][T15106] device syzkaller0 entered promiscuous mode [ 490.738314][T15122] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.745229][T15122] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.755753][T15122] device bridge_slave_0 entered promiscuous mode [ 490.841559][T15122] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.890754][T15122] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.938319][T15122] device bridge_slave_1 entered promiscuous mode [ 491.138258][ T10] device bridge_slave_1 left promiscuous mode [ 491.146625][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.232785][ T10] device bridge_slave_0 left promiscuous mode [ 491.276530][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.284647][ T10] device veth1_macvtap left promiscuous mode [ 491.290749][ T10] device veth0_vlan left promiscuous mode [ 491.517811][T15122] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.524697][T15122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 491.531807][T15122] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.538575][T15122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 491.564231][ T901] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.572015][ T901] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.581500][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 491.598042][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 491.665139][T15122] device veth0_vlan entered promiscuous mode [ 491.712479][ T30] audit: type=1400 audit(1727124738.053:156): avc: denied { write } for pid=15160 comm="syz.4.5402" name="cgroup.subtree_control" dev="cgroup2" ino=342 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 491.739535][ T30] audit: type=1400 audit(1727124738.053:157): avc: denied { open } for pid=15160 comm="syz.4.5402" path="" dev="cgroup2" ino=342 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 491.767960][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 491.781893][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 491.790672][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 491.800350][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 491.808140][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 491.816190][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.823050][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 491.832399][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 491.841053][ T39] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.847931][ T39] bridge0: port 2(bridge_slave_1) entered forwarding state [ 491.856906][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 491.864831][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 491.888254][T15122] device veth1_macvtap entered promiscuous mode [ 491.897958][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 491.906227][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 491.914477][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 491.929752][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 491.938625][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 491.947598][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 491.956070][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 492.280877][T15183] device syzkaller0 entered promiscuous mode [ 492.803848][ T10] device bridge_slave_1 left promiscuous mode [ 492.820762][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.860230][ T10] device bridge_slave_0 left promiscuous mode [ 492.866207][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.875414][ T10] device veth1_macvtap left promiscuous mode [ 492.881447][ T10] device veth0_vlan left promiscuous mode [ 493.205149][T15188] FAULT_INJECTION: forcing a failure. [ 493.205149][T15188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 493.280939][T15188] CPU: 1 PID: 15188 Comm: syz.0.5410 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 493.292141][T15188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 493.302031][T15188] Call Trace: [ 493.305153][T15188] [ 493.307933][T15188] dump_stack_lvl+0x151/0x1c0 [ 493.312448][T15188] ? io_uring_drop_tctx_refs+0x190/0x190 [ 493.317911][T15188] ? __kmalloc+0x13a/0x270 [ 493.322250][T15188] ? kvmalloc_node+0x1f0/0x4d0 [ 493.326863][T15188] dump_stack+0x15/0x20 [ 493.330845][T15188] should_fail+0x3c6/0x510 [ 493.335099][T15188] should_fail_usercopy+0x1a/0x20 [ 493.339958][T15188] _copy_from_user+0x20/0xd0 [ 493.344392][T15188] vmemdup_user+0x63/0xe0 [ 493.348551][T15188] map_delete_elem+0x205/0x4e0 [ 493.353153][T15188] __sys_bpf+0x42e/0x760 [ 493.357317][T15188] ? fput_many+0x160/0x1b0 [ 493.361569][T15188] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 493.366780][T15188] ? debug_smp_processor_id+0x17/0x20 [ 493.371983][T15188] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 493.377886][T15188] __x64_sys_bpf+0x7c/0x90 [ 493.382147][T15188] x64_sys_call+0x87f/0x9a0 [ 493.386566][T15188] do_syscall_64+0x3b/0xb0 [ 493.390817][T15188] ? clear_bhb_loop+0x35/0x90 [ 493.395333][T15188] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 493.401060][T15188] RIP: 0033:0x7f4f14ae3ef9 [ 493.405323][T15188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 493.424843][T15188] RSP: 002b:00007f4f1375d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 493.433094][T15188] RAX: ffffffffffffffda RBX: 00007f4f14c9bf80 RCX: 00007f4f14ae3ef9 [ 493.440901][T15188] RDX: 0000000000000020 RSI: 00000000200007c0 RDI: 0000000000000003 [ 493.448800][T15188] RBP: 00007f4f1375d090 R08: 0000000000000000 R09: 0000000000000000 [ 493.456609][T15188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 493.464508][T15188] R13: 0000000000000000 R14: 00007f4f14c9bf80 R15: 00007ffe4c3e1108 [ 493.472323][T15188] [ 493.485774][T15193] bridge0: port 1(bridge_slave_0) entered blocking state [ 493.495634][T15193] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.516777][T15193] device bridge_slave_0 entered promiscuous mode [ 493.547784][T15193] bridge0: port 2(bridge_slave_1) entered blocking state [ 493.602587][T15193] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.651780][T15193] device bridge_slave_1 entered promiscuous mode [ 494.342414][T15205] device syzkaller0 entered promiscuous mode [ 494.436822][T15215] device sit0 entered promiscuous mode [ 494.665239][T15224] FAULT_INJECTION: forcing a failure. [ 494.665239][T15224] name failslab, interval 1, probability 0, space 0, times 0 [ 494.817505][T15224] CPU: 0 PID: 15224 Comm: syz.3.5424 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 494.828809][T15224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 494.838706][T15224] Call Trace: [ 494.841826][T15224] [ 494.844608][T15224] dump_stack_lvl+0x151/0x1c0 [ 494.849117][T15224] ? io_uring_drop_tctx_refs+0x190/0x190 [ 494.854591][T15224] dump_stack+0x15/0x20 [ 494.858578][T15224] should_fail+0x3c6/0x510 [ 494.862830][T15224] __should_failslab+0xa4/0xe0 [ 494.867432][T15224] ? __build_skb+0x2a/0x300 [ 494.871770][T15224] should_failslab+0x9/0x20 [ 494.876110][T15224] slab_pre_alloc_hook+0x37/0xd0 [ 494.880886][T15224] ? __build_skb+0x2a/0x300 [ 494.885222][T15224] kmem_cache_alloc+0x44/0x200 [ 494.889821][T15224] ? __put_user_ns+0x60/0x60 [ 494.894248][T15224] __build_skb+0x2a/0x300 [ 494.898414][T15224] build_skb+0x25/0x1f0 [ 494.902408][T15224] bpf_prog_test_run_skb+0x38e/0x1420 [ 494.907617][T15224] ? __kasan_check_write+0x14/0x20 [ 494.912562][T15224] ? proc_fail_nth_write+0x20b/0x290 [ 494.917685][T15224] ? selinux_file_permission+0x2c4/0x570 [ 494.923152][T15224] ? fsnotify_perm+0x6a/0x5d0 [ 494.927666][T15224] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 494.933395][T15224] ? __kasan_check_write+0x14/0x20 [ 494.938340][T15224] ? fput_many+0x160/0x1b0 [ 494.942597][T15224] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 494.948322][T15224] bpf_prog_test_run+0x3b0/0x630 [ 494.953099][T15224] ? bpf_prog_query+0x220/0x220 [ 494.957782][T15224] ? selinux_bpf+0xd2/0x100 [ 494.962120][T15224] ? security_bpf+0x82/0xb0 [ 494.966462][T15224] __sys_bpf+0x525/0x760 [ 494.970540][T15224] ? fput_many+0x160/0x1b0 [ 494.974792][T15224] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 494.980003][T15224] ? debug_smp_processor_id+0x17/0x20 [ 494.985209][T15224] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 494.991110][T15224] __x64_sys_bpf+0x7c/0x90 [ 494.995371][T15224] x64_sys_call+0x87f/0x9a0 [ 494.999835][T15224] do_syscall_64+0x3b/0xb0 [ 495.004051][T15224] ? clear_bhb_loop+0x35/0x90 [ 495.008559][T15224] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 495.014405][T15224] RIP: 0033:0x7f15879cdef9 [ 495.018658][T15224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 495.038111][T15224] RSP: 002b:00007f1586647038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 495.046343][T15224] RAX: ffffffffffffffda RBX: 00007f1587b85f80 RCX: 00007f15879cdef9 [ 495.054155][T15224] RDX: 0000000000000050 RSI: 0000000020000900 RDI: 000000000000000a [ 495.061977][T15224] RBP: 00007f1586647090 R08: 0000000000000000 R09: 0000000000000000 [ 495.069988][T15224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 495.077895][T15224] R13: 0000000000000000 R14: 00007f1587b85f80 R15: 00007ffe0cf7f898 [ 495.085705][T15224] [ 495.125935][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 495.284259][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 495.316749][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 495.338267][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 495.348692][ T2599] bridge0: port 1(bridge_slave_0) entered blocking state [ 495.355531][ T2599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 495.459609][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 495.467849][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 495.475870][ T2599] bridge0: port 2(bridge_slave_1) entered blocking state [ 495.482733][ T2599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 495.522695][T15193] device veth0_vlan entered promiscuous mode [ 495.531110][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 495.539916][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 495.587855][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 495.595127][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 495.603747][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 495.611440][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 495.619481][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 495.633519][T15193] device veth1_macvtap entered promiscuous mode [ 495.668703][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 495.689521][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 495.763798][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 495.847953][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 495.855949][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 495.864665][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 495.872963][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 495.918445][T15252] device veth0_vlan left promiscuous mode [ 495.948302][T15252] device veth0_vlan entered promiscuous mode [ 495.971764][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 495.980939][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 495.990817][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 496.016564][T15262] syz.0.5440[15262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 496.016637][T15262] syz.0.5440[15262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 496.666922][ T380] device bridge_slave_1 left promiscuous mode [ 496.684050][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 496.691422][ T380] device bridge_slave_0 left promiscuous mode [ 496.697420][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 496.705261][ T380] device veth1_macvtap left promiscuous mode [ 496.711272][ T380] device veth0_vlan left promiscuous mode [ 497.438703][T15277] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.446726][T15277] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.454357][T15277] device bridge_slave_0 entered promiscuous mode [ 497.462966][T15277] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.470106][T15277] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.478598][T15277] device bridge_slave_1 entered promiscuous mode [ 497.548097][T15277] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.554980][T15277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 497.562172][T15277] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.568936][T15277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 497.586669][ T2599] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.621745][ T2599] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.614985][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 508.636191][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 508.688720][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 508.703095][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 508.715843][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 508.722728][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 508.732037][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 508.740254][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 508.748303][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 508.755124][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 508.797084][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 508.807869][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 508.823417][T15277] device veth0_vlan entered promiscuous mode [ 508.833934][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 508.848211][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 508.855906][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 508.864108][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 508.872359][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 508.879991][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 508.887817][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 508.895066][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 508.948515][T15323] syz.4.5455[15323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.948582][T15323] syz.4.5455[15323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.961657][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 508.980913][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 508.997780][T15277] device veth1_macvtap entered promiscuous mode [ 509.014389][T15313] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.021737][T15313] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.030626][T15313] device bridge_slave_0 entered promiscuous mode [ 509.059421][T15313] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.066560][T15313] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.073649][T15313] device bridge_slave_1 entered promiscuous mode [ 509.083794][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 509.091762][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 509.101837][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 509.111980][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 509.120350][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 509.136523][T15309] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.143375][T15309] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.151919][T15309] device bridge_slave_0 entered promiscuous mode [ 509.172999][T15309] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.186114][T15309] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.193722][T15309] device bridge_slave_1 entered promiscuous mode [ 509.207856][T15338] bridge0: port 3(vlan1) entered blocking state [ 509.213921][T15338] bridge0: port 3(vlan1) entered disabled state [ 509.220651][T15338] device vlan1 entered promiscuous mode [ 509.226174][T15338] bridge0: port 3(vlan1) entered blocking state [ 509.232235][T15338] bridge0: port 3(vlan1) entered forwarding state [ 509.244847][T15312] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.251722][T15312] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.259305][T15312] device bridge_slave_0 entered promiscuous mode [ 509.283201][T15312] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.290112][T15312] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.297702][T15312] device bridge_slave_1 entered promiscuous mode [ 509.399992][T15313] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.406858][T15313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 509.413955][T15313] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.420786][T15313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 509.434467][T15309] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.441338][T15309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 509.448464][T15309] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.455232][T15309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 509.474879][ T10] device bridge_slave_1 left promiscuous mode [ 509.481047][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.488680][ T10] device bridge_slave_0 left promiscuous mode [ 509.494588][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.502371][ T10] device veth0_vlan left promiscuous mode [ 509.572614][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 509.582145][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 509.590954][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 509.599706][ T39] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.607176][ T39] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.628902][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 509.636228][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 509.643747][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 509.653226][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 509.661262][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.668129][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 509.675282][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 509.683519][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 509.691484][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.698320][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 509.705456][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 509.713310][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 509.737360][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 509.745185][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 509.755966][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 509.764160][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 509.776610][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 509.784805][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 509.795952][T15309] device veth0_vlan entered promiscuous mode [ 509.805176][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 509.813258][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 509.821233][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 509.829148][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 509.836912][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 509.844176][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 509.862362][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 509.870484][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 509.882041][T15309] device veth1_macvtap entered promiscuous mode [ 509.898777][T15313] device veth0_vlan entered promiscuous mode [ 509.905675][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 509.913254][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 509.921439][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 509.929642][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 509.937299][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 509.956903][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 509.964169][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 509.971959][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 509.979216][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 509.986447][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 509.994542][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 510.002541][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.009390][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 510.016630][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 510.024711][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 510.032688][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.039554][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.047215][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 510.078328][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 510.087319][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 510.095644][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 510.104126][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 510.112498][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 510.120443][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 510.128174][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 510.135897][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 510.143626][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 510.151745][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 510.159996][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 510.167676][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 510.182644][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 510.189942][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 510.197546][T15312] device veth0_vlan entered promiscuous mode [ 510.221671][T15313] device veth1_macvtap entered promiscuous mode [ 510.229875][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 510.237901][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 510.245758][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 510.267628][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 510.275729][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 510.288828][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 510.297654][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 510.320590][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 510.329863][T15312] device veth1_macvtap entered promiscuous mode [ 510.341077][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 510.349142][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 510.370137][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 510.378210][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 510.758403][T15346] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.798790][T15346] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.835148][T15346] device bridge_slave_0 entered promiscuous mode [ 510.873759][ T10] device bridge_slave_1 left promiscuous mode [ 510.893176][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.927624][ T10] device bridge_slave_0 left promiscuous mode [ 510.952310][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.968865][ T10] device bridge_slave_1 left promiscuous mode [ 510.981404][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.995554][ T10] device bridge_slave_0 left promiscuous mode [ 511.008097][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.022386][ T10] device bridge_slave_1 left promiscuous mode [ 511.033124][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.045994][ T10] device bridge_slave_0 left promiscuous mode [ 511.057506][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.075072][ T10] device veth1_macvtap left promiscuous mode [ 511.084796][ T10] device veth0_vlan left promiscuous mode [ 511.092387][ T10] device veth1_macvtap left promiscuous mode [ 511.098545][ T10] device veth0_vlan left promiscuous mode [ 511.104356][ T10] device veth1_macvtap left promiscuous mode [ 511.126488][ T10] device veth0_vlan left promiscuous mode [ 511.989320][T15346] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.996174][T15346] bridge0: port 2(bridge_slave_1) entered disabled state [ 512.057008][T15346] device bridge_slave_1 entered promiscuous mode [ 512.560075][T15386] bridge0: port 3(vlan1) entered blocking state [ 512.567130][T15386] bridge0: port 3(vlan1) entered disabled state [ 512.574894][T15386] device vlan1 entered promiscuous mode [ 512.581072][T15386] bridge0: port 3(vlan1) entered blocking state [ 512.587159][T15386] bridge0: port 3(vlan1) entered forwarding state [ 512.703587][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 512.711634][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 512.729224][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 512.738540][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 512.747110][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 512.753970][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 512.761458][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 512.770819][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 512.779121][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 512.785972][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 512.807756][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 512.815321][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 512.824375][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 512.839134][T15346] device veth0_vlan entered promiscuous mode [ 512.848992][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 512.857785][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 512.866962][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 512.874308][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 512.889100][T15346] device veth1_macvtap entered promiscuous mode [ 512.898730][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 512.912058][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 512.925111][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 512.980616][T15396] syz.1.5473[15396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 512.980695][T15396] syz.1.5473[15396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 513.827384][ T10] device bridge_slave_1 left promiscuous mode [ 513.844703][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 513.852120][ T10] device bridge_slave_0 left promiscuous mode [ 513.858408][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 513.865906][ T10] device veth1_macvtap left promiscuous mode [ 513.871785][ T10] device veth0_vlan left promiscuous mode [ 514.539643][T15408] bridge0: port 1(bridge_slave_0) entered blocking state [ 514.546968][T15408] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.554231][T15408] device bridge_slave_0 entered promiscuous mode [ 514.561247][T15408] bridge0: port 2(bridge_slave_1) entered blocking state [ 514.586648][T15408] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.602391][T15408] device bridge_slave_1 entered promiscuous mode [ 515.090354][T15408] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.097234][T15408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 515.104363][T15408] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.111138][T15408] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.175861][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.196678][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.272611][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 515.280275][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 515.301091][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 515.331029][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 515.406960][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.413831][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.438401][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 515.446648][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 515.456871][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.463812][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 515.570058][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 515.598400][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 515.606226][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 515.755875][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 515.828487][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 515.838741][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 515.859867][T15408] device veth0_vlan entered promiscuous mode [ 515.909069][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 515.917752][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 515.992293][T15408] device veth1_macvtap entered promiscuous mode [ 516.001627][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 516.010083][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 516.017519][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 516.025660][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 516.033972][ T2599] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 516.056011][T15461] device veth1_macvtap left promiscuous mode [ 516.066935][T15461] device macsec0 entered promiscuous mode [ 516.074006][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 516.082623][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 516.098424][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 516.106793][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 516.826993][ T10] device bridge_slave_1 left promiscuous mode [ 516.832910][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.840416][ T10] device bridge_slave_0 left promiscuous mode [ 516.846372][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.853910][ T10] device veth1_macvtap left promiscuous mode [ 516.859811][ T10] device veth0_vlan left promiscuous mode [ 517.823728][T15483] bridge0: port 1(bridge_slave_0) entered blocking state [ 517.832502][T15483] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.842346][T15483] device bridge_slave_0 entered promiscuous mode [ 517.855392][T15483] bridge0: port 2(bridge_slave_1) entered blocking state [ 517.862737][T15483] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.884538][T15483] device bridge_slave_1 entered promiscuous mode [ 518.129087][T15483] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.136053][T15483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 518.143165][T15483] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.150113][T15483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 518.252710][ T361] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.284784][ T361] bridge0: port 2(bridge_slave_1) entered disabled state [ 518.467097][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 518.474449][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 518.629838][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 518.706984][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 518.715012][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.721966][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 518.750908][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 518.785553][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 518.796264][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.803145][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 518.811010][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 518.900828][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 518.960220][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 519.009505][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 519.064242][T15483] device veth0_vlan entered promiscuous mode [ 519.093683][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 519.103252][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 519.145587][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 519.164402][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 519.180982][T15527] bridge0: port 2(bridge_slave_1) entered disabled state [ 519.188605][T15527] bridge0: port 1(bridge_slave_0) entered disabled state [ 519.206018][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 519.215506][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 519.224973][T15527] bridge0: port 2(bridge_slave_1) entered blocking state [ 519.231960][T15527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 519.239780][T15527] bridge0: port 1(bridge_slave_0) entered blocking state [ 519.246683][T15527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 519.258442][T15527] device bridge0 entered promiscuous mode [ 519.282865][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 519.293219][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 519.303823][T15483] device veth1_macvtap entered promiscuous mode [ 519.324250][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 519.332156][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 519.343394][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 519.362595][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 519.377316][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 520.937124][ T10] device bridge_slave_1 left promiscuous mode [ 520.943074][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 520.974667][ T10] device bridge_slave_0 left promiscuous mode [ 520.980703][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 520.988644][ T10] device veth1_macvtap left promiscuous mode [ 520.994458][ T10] device veth0_vlan left promiscuous mode [ 521.081652][T15547] device sit0 left promiscuous mode [ 521.513446][T15557] device sit0 entered promiscuous mode [ 521.866926][T15550] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.873778][T15550] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.881493][T15550] device bridge_slave_0 entered promiscuous mode [ 521.888592][T15550] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.895520][T15550] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.903160][T15550] device bridge_slave_1 entered promiscuous mode [ 522.311277][T15550] bridge0: port 2(bridge_slave_1) entered blocking state [ 522.318159][T15550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 522.325244][T15550] bridge0: port 1(bridge_slave_0) entered blocking state [ 522.332041][T15550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 522.416616][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 522.424951][ T901] bridge0: port 1(bridge_slave_0) entered disabled state [ 522.432659][ T901] bridge0: port 2(bridge_slave_1) entered disabled state [ 522.451430][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 522.460046][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 522.466910][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 522.474657][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 522.506245][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 522.513231][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 522.578807][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 522.609509][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 522.627060][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 522.642377][T15550] device veth0_vlan entered promiscuous mode [ 522.649141][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 522.657128][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 522.664465][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 522.688767][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 522.702686][T15550] device veth1_macvtap entered promiscuous mode [ 522.720018][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 522.744666][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 522.813089][T15604] FAULT_INJECTION: forcing a failure. [ 522.813089][T15604] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 522.832935][T15604] CPU: 1 PID: 15604 Comm: syz.1.5540 Tainted: G W 5.15.161-syzkaller-00425-gb92c0d35d015 #0 [ 522.844134][T15604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 522.854028][T15604] Call Trace: [ 522.857152][T15604] [ 522.859930][T15604] dump_stack_lvl+0x151/0x1c0 [ 522.864442][T15604] ? io_uring_drop_tctx_refs+0x190/0x190 [ 522.869915][T15604] ? bpf_test_run+0x8de/0xa10 [ 522.874436][T15604] dump_stack+0x15/0x20 [ 522.878422][T15604] should_fail+0x3c6/0x510 [ 522.882675][T15604] should_fail_usercopy+0x1a/0x20 [ 522.887531][T15604] _copy_to_user+0x20/0x90 [ 522.891779][T15604] bpf_test_finish+0x235/0x5a0 [ 522.896381][T15604] ? convert_skb_to___skb+0x360/0x360 [ 522.901587][T15604] ? convert_skb_to___skb+0x208/0x360 [ 522.906795][T15604] bpf_prog_test_run_skb+0xd4d/0x1420 [ 522.912003][T15604] ? __kasan_check_write+0x14/0x20 [ 522.916952][T15604] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 522.922678][T15604] ? __kasan_check_write+0x14/0x20 [ 522.927631][T15604] ? fput_many+0x160/0x1b0 [ 522.931880][T15604] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 522.937607][T15604] bpf_prog_test_run+0x3b0/0x630 [ 522.942381][T15604] ? bpf_prog_query+0x220/0x220 [ 522.947067][T15604] ? selinux_bpf+0xd2/0x100 [ 522.951406][T15604] ? security_bpf+0x82/0xb0 [ 522.955754][T15604] __sys_bpf+0x525/0x760 [ 522.959825][T15604] ? fput_many+0x160/0x1b0 [ 522.964079][T15604] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 522.969297][T15604] ? debug_smp_processor_id+0x17/0x20 [ 522.974494][T15604] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 522.980396][T15604] __x64_sys_bpf+0x7c/0x90 [ 522.984647][T15604] x64_sys_call+0x87f/0x9a0 [ 522.988988][T15604] do_syscall_64+0x3b/0xb0 [ 522.993278][T15604] ? clear_bhb_loop+0x35/0x90 [ 522.997765][T15604] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 523.003496][T15604] RIP: 0033:0x7f274f248ef9 [ 523.007743][T15604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 523.027182][T15604] RSP: 002b:00007f274dec2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 523.035431][T15604] RAX: ffffffffffffffda RBX: 00007f274f400f80 RCX: 00007f274f248ef9 [ 523.043235][T15604] RDX: 0000000000000050 RSI: 0000000020000900 RDI: 000000000000000a [ 523.051044][T15604] RBP: 00007f274dec2090 R08: 0000000000000000 R09: 0000000000000000 [ 523.058858][T15604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 523.066755][T15604] R13: 0000000000000000 R14: 00007f274f400f80 R15: 00007ffcf4a659d8 [ 523.074574][T15604] [ 523.141947][T15610] device veth0_vlan left promiscuous mode [ 523.150373][T15610] device veth0_vlan entered promiscuous mode [ 524.586862][ T380] device bridge_slave_1 left promiscuous mode [ 524.592789][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 524.600052][ T380] device bridge_slave_0 left promiscuous mode [ 524.605963][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 524.613545][ T380] device veth1_macvtap left promiscuous mode [ 524.619391][ T380] device veth0_vlan left promiscuous mode [ 525.210181][T15624] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.256609][T15624] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.265456][T15624] device bridge_slave_0 entered promiscuous mode [ 525.272891][T15624] bridge0: port 2(bridge_slave_1) entered blocking state [ 525.288993][T15624] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.297817][T15624] device bridge_slave_1 entered promiscuous mode [ 525.363242][T15624] bridge0: port 2(bridge_slave_1) entered blocking state [ 525.370134][T15624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 525.377253][T15624] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.384083][T15624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 525.448366][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 525.456185][ T2802] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.537056][ T2802] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.601406][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 525.612738][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.619614][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 525.836477][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 525.844516][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 525.851462][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 525.927118][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 525.934987][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 526.011460][T15624] device veth0_vlan entered promiscuous mode [ 526.078333][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 526.088922][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 526.098022][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 526.105362][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 526.124475][T15624] device veth1_macvtap entered promiscuous mode [ 526.135079][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 526.148499][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 526.164259][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 526.190568][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 526.205050][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 526.225402][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 526.253232][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 526.666976][T15662] device syzkaller0 entered promiscuous mode [ 527.866893][ T380] device bridge_slave_1 left promiscuous mode [ 527.872962][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 527.880295][ T380] device bridge_slave_0 left promiscuous mode [ 527.886219][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.893883][ T380] device veth1_macvtap left promiscuous mode [ 527.899720][ T380] device veth0_vlan left promiscuous mode [ 528.456456][T15678] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.532955][T15678] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.601525][T15678] device bridge_slave_0 entered promiscuous mode [ 528.678717][T15678] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.685574][T15678] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.767130][T15678] device bridge_slave_1 entered promiscuous mode [ 529.034880][T15678] bridge0: port 2(bridge_slave_1) entered blocking state [ 529.041770][T15678] bridge0: port 2(bridge_slave_1) entered forwarding state [ 529.048876][T15678] bridge0: port 1(bridge_slave_0) entered blocking state [ 529.055637][T15678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 529.166721][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 529.182653][ T2802] bridge0: port 1(bridge_slave_0) entered disabled state [ 529.237748][ T2802] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.346346][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 529.354545][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 529.558895][ T2802] bridge0: port 1(bridge_slave_0) entered blocking state [ 529.565750][ T2802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 529.626472][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 529.663164][T15720] syz.3.5571[15720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 529.663237][T15720] syz.3.5571[15720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 529.676089][ T30] audit: type=1400 audit(1727124776.013:158): avc: denied { append } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 529.709534][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 529.717787][ T2802] bridge0: port 2(bridge_slave_1) entered blocking state [ 529.724620][ T2802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 529.732093][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 529.739757][ T30] audit: type=1400 audit(1727124776.013:159): avc: denied { open } for pid=82 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 529.762944][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 529.771345][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 529.781752][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 529.794535][ T30] audit: type=1400 audit(1727124776.013:160): avc: denied { getattr } for pid=82 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 530.010618][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 530.018763][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 530.032052][T15678] device veth0_vlan entered promiscuous mode [ 530.062036][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 530.076799][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 530.102599][T15678] device veth1_macvtap entered promiscuous mode [ 530.111907][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 530.120628][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 530.128507][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 530.136828][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 530.145219][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 530.202590][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 530.229197][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 530.267992][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 530.336934][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 531.217071][ T380] device bridge_slave_1 left promiscuous mode [ 531.223119][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.230892][ T380] device bridge_slave_0 left promiscuous mode [ 531.236997][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.244886][ T380] device veth1_macvtap left promiscuous mode [ 531.251115][ T380] device veth0_vlan left promiscuous mode [ 532.531572][T15774] device veth1_macvtap left promiscuous mode [ 532.556786][T15774] device macsec0 entered promiscuous mode [ 532.641005][T15779] bridge0: port 1(bridge_slave_0) entered blocking state [ 532.655713][T15779] bridge0: port 1(bridge_slave_0) entered disabled state [ 532.669530][T15779] device bridge_slave_0 entered promiscuous mode [ 532.683715][T15779] bridge0: port 2(bridge_slave_1) entered blocking state [ 532.697654][T15779] bridge0: port 2(bridge_slave_1) entered disabled state [ 532.704967][T15779] device bridge_slave_1 entered promiscuous mode [ 533.066424][T15809] syz.4.5601[15809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.066492][T15809] syz.4.5601[15809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.146835][T15810] syz.4.5601[15810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.166286][T15779] bridge0: port 2(bridge_slave_1) entered blocking state [ 533.184336][T15779] bridge0: port 2(bridge_slave_1) entered forwarding state [ 533.191475][T15779] bridge0: port 1(bridge_slave_0) entered blocking state [ 533.198251][T15779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 533.236637][T15809] syz.4.5601[15809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.236703][T15809] syz.4.5601[15809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.248099][T15810] syz.4.5601[15810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.301842][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 533.451007][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 533.526410][T15803] device veth0_vlan left promiscuous mode [ 533.631573][T15803] device veth0_vlan entered promiscuous mode [ 533.786324][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 533.794444][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 533.866630][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 533.916767][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 533.935676][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 533.953550][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 533.983871][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 534.016639][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 534.023489][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 534.166424][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 534.256782][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 534.346405][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 534.353267][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 534.554946][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 534.567034][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 534.574852][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 534.585602][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 534.603215][T15779] device veth0_vlan entered promiscuous mode [ 534.632027][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 534.658152][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 534.708881][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 534.780073][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 534.818114][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 534.825420][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 534.886889][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 534.905226][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 534.942883][T15779] device veth1_macvtap entered promiscuous mode [ 534.965729][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 534.973542][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 534.981970][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 535.006741][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 535.016659][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 535.607471][ T10] device bridge_slave_1 left promiscuous mode [ 535.613509][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 535.621363][ T10] device bridge_slave_0 left promiscuous mode [ 535.627395][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 535.635407][ T10] device veth1_macvtap left promiscuous mode [ 535.641628][ T10] device veth0_vlan left promiscuous mode [ 537.332880][T15895] bond_slave_1: mtu less than device minimum [ 537.342319][T15878] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.376425][T15878] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.383827][T15878] device bridge_slave_0 entered promiscuous mode [ 537.397774][T15878] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.404624][T15878] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.417226][T15878] device bridge_slave_1 entered promiscuous mode [ 537.907151][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 537.934324][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 537.959062][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 537.978595][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 538.016948][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 538.023803][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 538.130855][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 538.177685][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 538.191131][T15922] syz.0.5640[15922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 538.191205][T15922] syz.0.5640[15922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 538.255801][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 538.273849][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 538.490954][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 538.539396][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 538.599905][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 538.662426][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 538.676017][T15878] device veth0_vlan entered promiscuous mode [ 538.692538][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 538.702227][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 538.709848][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 538.721460][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 538.734200][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 538.746623][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 538.774365][T15878] device veth1_macvtap entered promiscuous mode [ 538.794484][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 538.808573][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 538.816941][ T2802] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 538.835701][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 538.844304][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 538.853479][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 538.861917][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 539.587302][ T380] device bridge_slave_1 left promiscuous mode [ 539.593243][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 539.600581][ T380] device bridge_slave_0 left promiscuous mode [ 539.606590][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 539.614240][ T380] device veth1_macvtap left promiscuous mode [ 539.620090][ T380] device veth0_vlan left promiscuous mode [ 541.173696][T15962] device syzkaller0 entered promiscuous mode [ 541.215253][T15949] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.224597][T15949] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.256670][T15949] device bridge_slave_0 entered promiscuous mode [ 541.264585][T15949] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.291743][T15949] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.299078][T15949] device bridge_slave_1 entered promiscuous mode [ 541.411936][T15949] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.418842][T15949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 541.425943][T15949] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.432720][T15949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 541.539281][ T63] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.556739][ T63] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.587259][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 541.594594][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 541.627676][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 541.642444][ T63] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.649325][ T63] bridge0: port 1(bridge_slave_0) entered forwarding state [ 541.676403][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 541.684371][ T63] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.691221][ T63] bridge0: port 2(bridge_slave_1) entered forwarding state [ 541.766455][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 541.774356][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 541.848002][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 541.882797][T15949] device veth0_vlan entered promiscuous mode [ 541.938878][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 541.956883][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 541.964229][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 542.056689][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 542.072278][T15949] device veth1_macvtap entered promiscuous mode [ 542.092114][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 542.106091][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=5258 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 543.107464][ T10] device bridge_slave_1 left promiscuous mode [ 543.113393][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.120720][ T10] device bridge_slave_0 left promiscuous mode [ 543.126799][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 543.134172][ T10] device veth1_macvtap left promiscuous mode [ 543.140159][ T10] device veth0_vlan left promiscuous mode [ 544.427454][ T10] device bridge_slave_1 left promiscuous mode [ 544.433367][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.440677][ T10] device bridge_slave_0 left promiscuous mode [ 544.446692][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.454297][ T10] device vlan1 left promiscuous mode [ 544.459570][ T10] bridge0: port 3(vlan1) entered disabled state [ 544.465932][ T10] device bridge_slave_1 left promiscuous mode [ 544.472442][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.479745][ T10] device bridge_slave_0 left promiscuous mode [ 544.485646][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.493375][ T10] device bridge_slave_1 left promiscuous mode [ 544.499325][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.506569][ T10] device bridge_slave_0 left promiscuous mode [ 544.512480][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.520352][ T10] device vlan1 left promiscuous mode [ 544.525497][ T10] bridge0: port 3(vlan1) entered disabled state [ 544.531907][ T10] device bridge_slave_1 left promiscuous mode [ 544.537838][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.545105][ T10] device bridge_slave_0 left promiscuous mode [ 544.551148][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.559437][ T10] device veth0_vlan left promiscuous mode [ 544.565294][ T10] device veth1_macvtap left promiscuous mode [ 544.571161][ T10] device veth0_vlan left promiscuous mode [ 544.577036][ T10] device veth0_vlan left promiscuous mode [ 544.582859][ T10] device veth0_vlan left promiscuous mode