last executing test programs: 30.30452812s ago: executing program 4 (id=4750): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="170000000000000004000000ff000000000068ceab33365623cb265dd7d15c1258cd662e624ba8a3e7c7dde31f718ee148f24695d83040b12c397e5446f48280c619a41399b3d4e049045125a0834b1f3520904e"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000007000000020000000400000005"], 0x87) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r4, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r6}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_devices(r3, &(0x7f0000000640)=ANY=[@ANYRESHEX], 0xffdd) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r2}, 0x8) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0xffff, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={r8}, 0x4) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='!\xda^[\x00') r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r11}, 0x10) recvmsg(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r9) sendmsg$tipc(r10, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 29.932022497s ago: executing program 4 (id=4753): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000300"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000009b000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095000000000000002f81c461b3fea834ceb0e17d9838c2830ca7ce46e581a192326a3698c79205e02f1561b0a3c595448e9f7024b45fb2006c9917fe2a42fcd2ce278009682dc8f7c867b177ec5bd50b92aedef35b6cd87b56690b4c96f63ab021ee1cf616d8af74911d5e51b76d2c31b8bece7b0f"], &(0x7f0000000080)='GPL\x00'}, 0x65) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xe, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x7}, 0x0, 0xf, r4, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r8, &(0x7f0000000040)=ANY=[@ANYBLOB="514888d3123e24da2b6370"], 0xb) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4205e74424f", 0xb0, &(0x7f0000000280), &(0x7f0000000440), &(0x7f00000004c0)="df2239a5abfe7f736463aa3ae5541525d85b9df771aae02a28043c0e57aead8f2a4b3a139507dd43ac6862d4dca5877e23f4111791863277a703b41bea7d69d3a8a7ca074f8c3f27cffde6d291cb265ddfc009e96d29") ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000080)) 29.708368992s ago: executing program 4 (id=4754): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd74) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001}, 0x0, 0xb4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000004c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r6) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r8, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r9}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r11, &(0x7f0000000180), 0x40001) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x36) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r12}, 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2ca8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80006, 0x0, @perf_config_ext, 0x0, 0x10003, 0x80000000, 0x0, 0x2, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40305829, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 29.356772669s ago: executing program 4 (id=4757): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0900000001000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="00ac709dfb0049097dd5e26ae312bec13b0b792b", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000020000000000000000000000b50000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00'}, 0x10) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000500)='./file0\x00', 0x81) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xe, 0x5, 0x5, 0x7, 0x0, 0xffffffff, 0x80002, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x9f}, 0x440, 0x7ff, 0x400, 0x3, 0x7, 0x0, 0x5, 0x0, 0x1, 0x0, 0x8}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair(0x26, 0x5, 0xe183, &(0x7f0000000400)) mkdirat$cgroup(r3, &(0x7f00000002c0)='syz0\x00', 0x1ff) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r4}, 0x8) getpid() r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd2b5bcf84850f0f4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) close(0x3) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000780)=ANY=[@ANYRES32=r3, @ANYRES32=r6, @ANYBLOB="040000000c00000000000000", @ANYRES32=r1, @ANYBLOB="4431d1b2da2ffc0c656d7a1526ec9381ab4b5037f85f2d085562a575fcb050ed725c3efd48ad965f8310963fc69d43b82896045f9bcf00512bc0b8be93993ac0029843d36856e966301a4d7ecc8cd1b8117380358e4fc2afa8d4c95bdb1596e0afe74c52939eb7505e8d0b022b9e00a90147da214eceee73e7316b5a292e7c5938e0c32d82a7380391", @ANYRES64=0x0], 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r7}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 29.031988455s ago: executing program 4 (id=4758): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x9}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xd, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, [@call={0x85, 0x0, 0x0, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x15) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x2, 0xfffffffffffffe7a, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r8}, 0x10) close(r4) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 27.984725336s ago: executing program 4 (id=4766): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.kill\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r4, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000500)=[0x0], &(0x7f0000000780)=[0x0], 0x0, 0xc2, &(0x7f00000007c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x15, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000a80)={0x3, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x5, 0x13, &(0x7f0000000e40)=ANY=[@ANYBLOB="33000100000000ecff04000800cff1bee565e184066bd0e43b0ae107c9fa628f59ab343d7f6d68f9638cac9abd332bee0939c54689bdadb538b01a9a09f1ae14bed88b35cd734e14c1bb412a851987eedfc506859b2f7927db8306c3b9e49d79f7b597a9ea3f901f48cb9a91c8ed155cf8c3e3f411a1779b933cd9aeb4096c43d7c7bf631f3b0f4666e6733c19f65f8b7dbb8ace0feca3c6b280a16196b495165acb75173e66aa0f2ee00f0f2848527d3d8f0bb64bdfdff45cb5ef861a0aaf945ad6fc", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b70300000000000085000000bf0900000000000055090100000000009500000000000000c8b5020008000000950000000000000018300000040000000000000000000000bf91000000000000b7020000"], &(0x7f0000000300)='GPL\x00', 0xe, 0x15, &(0x7f0000000340)=""/21, 0x40f00, 0x0, '\x00', r5, @fallback=0x33, r4, 0x8, &(0x7f0000000a00)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0xa, 0x8, 0x4}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000ac0)=[r3, r4, r4, r3, r3], &(0x7f0000000b00)=[{0x2, 0x4, 0x8, 0xb}, {0x4, 0x3, 0x2, 0xa}, {0x2, 0x3, 0x1, 0x4}, {0x1, 0x2, 0x2, 0x7}], 0x10, 0x5}, 0x94) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)=r5) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x80000000, 0x0, r0, 0x2b, '\x00', r5, r2, 0x5, 0x5}, 0x50) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) (async) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.kill\x00', 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r4, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000500)=[0x0], &(0x7f0000000780)=[0x0], 0x0, 0xc2, &(0x7f00000007c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x15, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000a80)={0x3}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x5, 0x13, &(0x7f0000000e40)=ANY=[@ANYBLOB="33000100000000ecff04000800cff1bee565e184066bd0e43b0ae107c9fa628f59ab343d7f6d68f9638cac9abd332bee0939c54689bdadb538b01a9a09f1ae14bed88b35cd734e14c1bb412a851987eedfc506859b2f7927db8306c3b9e49d79f7b597a9ea3f901f48cb9a91c8ed155cf8c3e3f411a1779b933cd9aeb4096c43d7c7bf631f3b0f4666e6733c19f65f8b7dbb8ace0feca3c6b280a16196b495165acb75173e66aa0f2ee00f0f2848527d3d8f0bb64bdfdff45cb5ef861a0aaf945ad6fc", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b70300000000000085000000bf0900000000000055090100000000009500000000000000c8b5020008000000950000000000000018300000040000000000000000000000bf91000000000000b7020000"], &(0x7f0000000300)='GPL\x00', 0xe, 0x15, &(0x7f0000000340)=""/21, 0x40f00, 0x0, '\x00', r5, @fallback=0x33, r4, 0x8, &(0x7f0000000a00)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0xa, 0x8, 0x4}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000ac0)=[r3, r4, r4, r3, r3], &(0x7f0000000b00)=[{0x2, 0x4, 0x8, 0xb}, {0x4, 0x3, 0x2, 0xa}, {0x2, 0x3, 0x1, 0x4}, {0x1, 0x2, 0x2, 0x7}], 0x10, 0x5}, 0x94) (async) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)=r5) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x80000000, 0x0, r0, 0x2b, '\x00', r5, r2, 0x5, 0x5}, 0x50) (async) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) (async) 19.756117549s ago: executing program 1 (id=4841): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x3, 0x2}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff003, 0x4, 0x7f, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000b00), &(0x7f0000000580), 0x7, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0, 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32=0x0, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00i\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) ioctl$TUNSETIFF(r5, 0x400454ca, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000540)='console\x00', r4}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000020000000c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 19.570445482s ago: executing program 1 (id=4847): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000002c0)={'veth1_virt_wifi\x00', 0x400}) 16.389063105s ago: executing program 1 (id=4847): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000002c0)={'veth1_virt_wifi\x00', 0x400}) 14.203096498s ago: executing program 1 (id=4847): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000002c0)={'veth1_virt_wifi\x00', 0x400}) 13.008675362s ago: executing program 32 (id=4766): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.kill\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r4, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000500)=[0x0], &(0x7f0000000780)=[0x0], 0x0, 0xc2, &(0x7f00000007c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x15, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000a80)={0x3, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x5, 0x13, &(0x7f0000000e40)=ANY=[@ANYBLOB="33000100000000ecff04000800cff1bee565e184066bd0e43b0ae107c9fa628f59ab343d7f6d68f9638cac9abd332bee0939c54689bdadb538b01a9a09f1ae14bed88b35cd734e14c1bb412a851987eedfc506859b2f7927db8306c3b9e49d79f7b597a9ea3f901f48cb9a91c8ed155cf8c3e3f411a1779b933cd9aeb4096c43d7c7bf631f3b0f4666e6733c19f65f8b7dbb8ace0feca3c6b280a16196b495165acb75173e66aa0f2ee00f0f2848527d3d8f0bb64bdfdff45cb5ef861a0aaf945ad6fc", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b70300000000000085000000bf0900000000000055090100000000009500000000000000c8b5020008000000950000000000000018300000040000000000000000000000bf91000000000000b7020000"], &(0x7f0000000300)='GPL\x00', 0xe, 0x15, &(0x7f0000000340)=""/21, 0x40f00, 0x0, '\x00', r5, @fallback=0x33, r4, 0x8, &(0x7f0000000a00)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0xa, 0x8, 0x4}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000ac0)=[r3, r4, r4, r3, r3], &(0x7f0000000b00)=[{0x2, 0x4, 0x8, 0xb}, {0x4, 0x3, 0x2, 0xa}, {0x2, 0x3, 0x1, 0x4}, {0x1, 0x2, 0x2, 0x7}], 0x10, 0x5}, 0x94) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)=r5) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x80000000, 0x0, r0, 0x2b, '\x00', r5, r2, 0x5, 0x5}, 0x50) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) (async) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.kill\x00', 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r4, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000500)=[0x0], &(0x7f0000000780)=[0x0], 0x0, 0xc2, &(0x7f00000007c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x15, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000a80)={0x3}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x5, 0x13, &(0x7f0000000e40)=ANY=[@ANYBLOB="33000100000000ecff04000800cff1bee565e184066bd0e43b0ae107c9fa628f59ab343d7f6d68f9638cac9abd332bee0939c54689bdadb538b01a9a09f1ae14bed88b35cd734e14c1bb412a851987eedfc506859b2f7927db8306c3b9e49d79f7b597a9ea3f901f48cb9a91c8ed155cf8c3e3f411a1779b933cd9aeb4096c43d7c7bf631f3b0f4666e6733c19f65f8b7dbb8ace0feca3c6b280a16196b495165acb75173e66aa0f2ee00f0f2848527d3d8f0bb64bdfdff45cb5ef861a0aaf945ad6fc", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b70300000000000085000000bf0900000000000055090100000000009500000000000000c8b5020008000000950000000000000018300000040000000000000000000000bf91000000000000b7020000"], &(0x7f0000000300)='GPL\x00', 0xe, 0x15, &(0x7f0000000340)=""/21, 0x40f00, 0x0, '\x00', r5, @fallback=0x33, r4, 0x8, &(0x7f0000000a00)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0xa, 0x8, 0x4}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000ac0)=[r3, r4, r4, r3, r3], &(0x7f0000000b00)=[{0x2, 0x4, 0x8, 0xb}, {0x4, 0x3, 0x2, 0xa}, {0x2, 0x3, 0x1, 0x4}, {0x1, 0x2, 0x2, 0x7}], 0x10, 0x5}, 0x94) (async) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)=r5) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x80000000, 0x0, r0, 0x2b, '\x00', r5, r2, 0x5, 0x5}, 0x50) (async) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) (async) 11.293446236s ago: executing program 1 (id=4847): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000002c0)={'veth1_virt_wifi\x00', 0x400}) 8.440229263s ago: executing program 0 (id=4940): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00edff03000000080060000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x101481, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a2, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x702, 0xe, 0x700, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) 8.312326895s ago: executing program 3 (id=4941): sendmsg$sock(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000001c0)="f0750f69", 0x4}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r0}, 0x10) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000200000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000015ebffffff0000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffff124cb3dd9b3206909500000000000000000000000000000000000000000000000bbfc00bf9b1a98c0c08b2688f51"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x820a4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0xc052, 0x9d3, 0x3f, 0x9, 0xfffffffffffffff8, 0x80000000, 0xfffb, 0x0, 0xfffffffc, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x4, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000000000018100000", @ANYRES32, @ANYBLOB="0000000000000000950000000000000045"], 0x0}, 0x94) (async) socketpair(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r8, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) (async) close(r7) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000004ce324cc199d407c0000bc0000c300000000fda21d4906e6178734b8117b0000000000000000006084b0a2d244a6f3be2b317696881047db494bdf6652044558"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9], 0x0}, 0x94) 5.891603133s ago: executing program 0 (id=4943): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x23, 0x5, 0x1000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000d313f800", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) socketpair(0x10, 0x3, 0x6, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) recvmsg(0xffffffffffffffff, 0x0, 0x1f00) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)) 5.784558665s ago: executing program 3 (id=4944): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ff"], 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r2}, 0x10) r4 = gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8983, &(0x7f0000000080)) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r6}, 0x10) close(r3) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1000000}, 0x94) 5.591772229s ago: executing program 2 (id=4946): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x21}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)=r3}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r7, 0x40047451, &(0x7f0000000180)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000028c0), 0x20a40, 0x0) close(r9) (async) close(r9) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) (async) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f00000006c0)) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22ff892f"], 0x280) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) 5.382847293s ago: executing program 5 (id=4948): sendmsg$inet(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="c7", 0x1}], 0x1}, 0x24048811) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x6, 0x6, 0x3, 0x0, 0x800, 0x30429, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7f, 0x0, @perf_config_ext={0x5, 0x7}, 0x194c, 0x4, 0x7, 0x6, 0x22, 0x9, 0x2, 0x0, 0x200000, 0x0, 0x1000}, r0, 0x9, 0xffffffffffffffff, 0x4) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2a, &(0x7f0000000100)=r2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x13, &(0x7f0000000040)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="30899608897def555671ecf890f483e186f92f7309e8"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, r2}, 0xfffffeae) 5.373336793s ago: executing program 1 (id=4847): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r1}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000002c0)={'veth1_virt_wifi\x00', 0x400}) 4.677066867s ago: executing program 0 (id=4949): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000bc0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x50) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c40)={0xffffffffffffffff, 0xe, 0x18}, 0xc) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000c80)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0xd, 0x12, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x4, 0x0, 0x2, 0x4, 0x3, 0x50, 0xffffffffffffffff}, @ldst={0x3, 0x1, 0x3, 0x9, 0x9, 0xffffffffffffffc0, 0x4}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0xffffffff}, @map_fd={0x18, 0xb}]}, &(0x7f0000000900)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sock_ops, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a80)={0x1, 0xc, 0x425c, 0x1}, 0x10, 0x0, r0, 0x2, &(0x7f0000000d00)=[0xffffffffffffffff, 0xffffffffffffffff, r2, r3, r4], &(0x7f0000000d40)=[{0x4, 0x5, 0x6}, {0x4, 0x4, 0x6, 0xb}], 0x10, 0x8}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6334ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) close(r6) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r9}, 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r10}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) write$cgroup_subtree(r11, &(0x7f00000002c0)=ANY=[@ANYBLOB="2b6e6574202b6e65b6482c60097420"], 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000240000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, r11}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r14, &(0x7f0000000000), 0xffc0) syz_clone(0x8c100000, &(0x7f0000000640)="5db245afffd7f393c24ea04046371c94487e615b15024105eb6ba65aaa80849431e0c164ec5a9d6818c94820eb2f518314022da06e25982e525c267164268614a3ed376c98ee6a2d38218827c4038908c715d60d8adeeba8e1fdfbddb265c4d0d30424f536dc2e77a8167aadf3d3b5d1e1ef82d7111bdbf71c74cb97dd7f9181601c574b312e2d3c852ccd01b20daa77b02a4cc05291fcdbc2730c", 0x9b, &(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000580)="c3178abbb55da734d9d7110b9dadcee6f250ca9ea869e48cd56ec39b4025667b6414e4fc2459b5e1ce43fdcdc2802f8cd2ac17a9327fc7ba5d032aa54c28ca3c70882e6c5d43661e") 4.675877707s ago: executing program 2 (id=4950): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'erspan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8942, &(0x7f0000000080)) r3 = openat$cgroup_devices(r1, &(0x7f0000000240)='devices.allow\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x0, 0x1, 0xbb, &(0x7f0000000180)=""/187, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x267e}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x18) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40010) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1a008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x4, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000000000008500000029000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r9, 0x2f000000, 0xe, 0x0, &(0x7f0000000180)="e4e647c9d9b8e9a2f2ab30da5800", 0x0, 0x8000001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000000000000061181c000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB='a *:'], 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000380)='mm_vmscan_lru_isolate\x00', r0, 0x0, 0x7f}, 0x18) 4.675033417s ago: executing program 3 (id=4951): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='rxrpc_client\x00', r0, 0x0, 0x10}, 0xffffff71) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001580)={0x0, 0xffffffffffffff3c, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f"}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a"}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae"}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0xbe9c06, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000400000000000000008500000030000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000000080)='GPL\x00'}, 0x65) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x1, 0x0}, 0x8) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001300)=ANY=[@ANYRES16=r0], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES8=r2], 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000079123000000000009500000000004000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) 4.673997577s ago: executing program 5 (id=4952): r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000900000000fcffc1f1c7ed894d646300", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r6}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@ptr={0x8, 0x0, 0x0, 0x2, 0x1}, @var={0xf, 0x0, 0x0, 0xe, 0x2, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0x7ff0}}]}, {0x0, [0x0]}}, &(0x7f0000000680)=""/138, 0x4f, 0x8a, 0x1, 0x7}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x11, 0x2, &(0x7f0000000740)=ANY=[@ANYRES64=r0, @ANYRES32=r8], &(0x7f0000000480)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, r8, 0x8, 0x0, 0x0, 0x9}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000901302f42abaeccc8dc414b3b9c0a473710e470f6fb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r10}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 2.563838839s ago: executing program 3 (id=4953): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x17, 0x4, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffc428}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000280)=0x80000001) socketpair(0x18, 0x0, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r4, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2.539938979s ago: executing program 2 (id=4954): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r0, @ANYRES16=0x0], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000480)={'bond0\x00', 0x1000}) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0e000000040000000800000007"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xc, 0xd, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000015000000850000000700000095"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={r6, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="0000090000980500000000000800", 0x0, 0x7fffffff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x17, 0x59, &(0x7f0000000580)=ANY=[@ANYBLOB="ac4666643503573c6f4f3336f70250e5224041c73db6205e100fd8f6198b4ac9d5cf034f21857755ee3101952ae9301d475ca08c170b67a6fc7c9fcbc0c55d8e9b3e1e04ed411c77b18a6ff7e1f0c27d", @ANYBLOB="6fc352fb44dde10a704ae2e8491f9d27777952d5dc28cb24f82054b2a99f09d1b6dc8e1f917ff5cded4314ec072ee983a44a9c58f0446f27003eba9a35f2ad2a18a1c494cece8583d7087b89527983a29cd9e8ed2f3bd3f561ca41ac6b8ee86b3417b54fa4577c5051f16fe24f52d721dbe4a6de4575bb81e19ad50de43c46d37e62bbb8e7275cda360d7f5f296a537d045a1a23be36fa1f8a52964b0c", @ANYRES16=r2], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r7}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000940)=ANY=[@ANYBLOB="9feb810018"], &(0x7f00000005c0)=""/240, 0x4a, 0xf0, 0x1}, 0x28) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000002280)=ANY=[@ANYBLOB="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", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r8}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2, @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000b704000000000000850000000300000095000000005f620000000000"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x15, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r9}, 0x10) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002240)={&(0x7f0000001080)="40c0717625963a25ef372c2aadedd90784c76461861b9113a973e16e3e98b4c0535e9c015a6188b95201126cd40fa7b6f8f479f3c882b26b171f57a75c8170cb40deb99fcc9680676117028f96535b1d9e849554293ec2463846da7226495242b7faf909", &(0x7f0000001100)=""/220, &(0x7f0000001200)="7ccfc0d012b49ec8e4f4918c6780", &(0x7f0000001240)="33a4525757fcbd5b80607ebcc35f557fbedbd523c2b290b0e95732816f8349508cfbe877d62e69598da60cf01abd8750407257540999340c02d01b41be128bba84b7c273ffa5efccb523012265530be04f7527141e9bf03729d916daa5671205fbd8a4770223c9da791a8eb1c8c8cfc3d5a459c995c93fb554be4ba3fe4b2635c39a15225201c0e5f3b909d4afacd0191d01829f0dc4c7394d8aa4c9c8e239e473ce4320b53d57861efc44468288a20aaf2ce671339646fc9862445eb9236c0c4d56d2b2b675011d2f1d72b6cc4da02ac11e032c3f97948d16d025cd414ac72e8a7be3e1d1e5f525f73a898c0d1d3cd8df84f2b3832d3953a78173704b99a9bac79284e4d597bb98db2b26eb324a143b51549a0d75f77f1cc36ecefe62889ef735e7a0430833dbf4d65373914ee6a738fe7bd9a0f02b3b8b5c7520aeef27b2723dca17cdafc197dea52d6f1e0858da89f516eb8a22e4a7c51a1ef842b1128e008c0582322244f138ef1b1849b3abbee81c22b7a1f56747556ed57bd3538598c06305f114dc5b37bdd9cf786d943e6a249f6fad9b4907a2ee38a9f8eeb3e76f8832a27f6b7dcbad66d220602bf0857925a967b91ef67f5213025c9506f8c7b859735627cf3642a6ec9e69d48f0a8b579755aed542e1b9ac547b1b44e63df5548532ceab676cff090ab2ad0b4bbd7976f1dc7754ea66984a56ac13cc9d3580feab177839b206e2ca3bae080a2cc34dac158ed7393bdcca10af605dde920251a2bb97d2c5664e53b11fe85aef35607a8b2d8d8943bde28cc8301e1415b9ca94c1195e47ce1b58ea2444106c526882fda382320edccb6c78a68b703195ef736f430d2e476e4287df3f282698dabba106924cdc622944e5b3f4da8f229c87cdfcfc4ae3049a8dcf5fc1d5fb7ac59691dbd6d832bb59fbae10683a8ef41036801ff8efdb61e2ac4139d458123acc5e41bfc8bffd59b79d066e02d63fe9fa0692038b75fe4edfbb41bf5acc2d910d5dcec78b8dfecd1fbc9976f7faabe90dd2db31c01b316ad12743a19e9f0e84f0f4930e0e7186b46eb92c333956955776d42df65eeac01f970928bd1f6852f0594f25d88aadd8fee96c484ddf629df366c3502f59f96b6089efb0dde840ccd314aadfa37c64da9bff04fee2e1c7f00e28318027a815a9706b14a2d7b2c06ba7a023d7066da09d51fb5249923ecbc683dc9d012cb86b14b7f2b262281081b7961dc73a87ab9461c954e33a06fc0396f4973d443ffdc7337da53178c0a8ca2e02b3eb6e7435fac6bda58ab80aea1d4a1c28b4bd434d13a3498908bc46ef0d68fe12198f5aa8ed05c6ec0590e9feef760b7c7d71d0bf55c47f8cd9e2f7a6f2f15833aeb151eca798b5efd4238914c8a1a96561e36788ef93efe2fc18d034d1ca2357a11145555f8ade061b2fe690d7490772a3db029640130520ec85da9a0c76f582665aa71c07527a3e8d897ad022c4e8f75216de31fe04ffcd20afef397dcc7283714fa7c6aea840a36aa95d32635c11b9519f3328ae3286036c0407ed9474fb59e5aaf618848dfe5ad1aded2e5fd43844d6a3d5b28519d603013414cdecd4d0b09feaad4146424ef3cf7d73d771df95281f19dd4343672630a237eb25e45d8629f7b7d06d8b50763b88bd41f1c6df44bc7d7f2f8d944295d9fd75dd4ffb899d84abb260c580228015f68063d1603efded8689d267d735740973e5d011258751c61e83031c9cb7edc4718dd7d235148ee000aaae9cd0ac3243bf34e45e1042663ff63db940bbaaeceb900d800bc2c5da59d7c00a3531c16c8b4854043fa3111665b462a3c29499caa3275a88b0daf571fb156ae51c1a5631357f4de347feb3d245c61aa26c2fcc24bc6696a6e9e467d9455ea210c2f7197968e70c47fd41e74c054c5faea5af63a1402fa03d5d82ebebd087db09e1d8a42508838ecd5581502e876aaf2e838a8303434c4f14766be03b9300cf44a7ada7cb3ea4ac65b3a344f34008c395411ddf672b2e8518b315f385b7a91e5fe616fbbb8bde5f70025d6e80679384edd02be53de7228fb3a9157e663b86d76accda381533781e91e489f65bc4280e3467c9a089574379e1d3a8191f8e0b5d81ca50195d1e3d3235a20137c8794e74dfa9638d52bdfcc91f01a92d6a1bfc3a8acde30534f5a8d6fc8d74c0d8f3e93269f83bf7ad721c3153f3b6ae8e93d68422f8861426a4861f007aa232291fad66568db4cf4506590962abe9a71833292da291ff1fae21d537ca77b408be7a56a4f8704dd61f9497cd9c1f47485af0e04ff6eeb8b5838dc5093a4ad4786d512a2ef8113352e2b391fe5fef196947809e48e02c878a5023f33b899143dd63ace3a895f24fee4a36e702dfc810b5fe44e03bec4474a3e2d32f3572ac28114c6b61a037e47315568c39cb8ed0d695b3570a693772ea02e83f1c365da07de52f06263419b10e282ce4b0ecf502c41f1f7bde065178cff0d02c8e2f9fc6312e431646dbcb0c1bc754e5dc7f23fb8145f446f97e0274ebf8664f32d9191a8b46b116ce5dff0bf0641a2a750ba85dcc72ae5f7cbb9a402daf012057ed42787b0775ac17d9a1bfb074d997325df1358f311229ca5c02263ae712043a3d6772ee4fe60f70e26e5e3ceb0a3f2e55428d3d8f61963b61d92931ba6267e99c0d3f315dae0f5384118a888359aae74dba153f467483bc104b12676588620075455ea3ecaf0e9a40b410f8ac47b6ba99256ef81d22c24ff36b8c0bc95631422f0021b05cba4ba48ee09ba716e312736d93f59713e2d3466b821089991dd91b06200f20051c1d0638ecc2f6ed46358e30adc880b97930d56adbc658d966d19115a09947b75f273f73476e57361bfeb1a6e2b5b9b7e5ed35a5c1e208d65232454d82816a01ac88cae74f2e5928df89dfe5832e99f18138ee3929d9430597924907f031532836d76db12364e1b706449938c0eb929a96800a99a4f1d80d9316c967fff26d57ab619eaa0566b48ca40fce5a3f11a0586be249fbb0526371e0b2152be3b74e16834ac9a5591421de2c7e983c8fc3eebff18494757d989fae28dfc9e7c85d48696622e9129d00e2ad6be26b62212e05bc1fd83c3dd1b42fa7cd1dee8511d976b79879664864b8632b5eeeffdf4e486a0a4d9b9a9b7c99512ba3a91caeb7686e05650c023f7cb5636b4caed77bf53a786885ba66e765744d4710397117c2f1a6e3655dd86a5c2ab5a3104dd371deb04e45fc3f632bb8bc123a0a4b3424530bc60522478e6d8a35f75e638bfdd31d59161d58b6f1025a39314267fcbf3c850114c9f7a76c07eb37026fe9487e3f0ab45173a415ddbe29f254b1e3957439fef219d5b1dc5cd5a5bfb82df27096ed638137619da5e0a11ef05e1adbd6e8e774ca58516f3a3f4906a0b67e9b56bebe88b029fd75000663e686c422fe836bdbb40bcb636c085e35342d0d78455a3dbb1c578f5a92307eec39d7e7f5b2a61fd3d50f7eeccb90baaa9b0d9f3ae6fb7230124f68d84dd3da40719572c592478b0c1f7fa6181aa01fac26041dabd68af6d7c3f7aee288211c4e51e31aecce4c241dd99826277620fb1bf75e2095fecad39685bb0ec8a5b55143f768f40cd5527dd4928e0c0991a1cd43c75fd2f64c7db8c81aea1ea9d969b2107e13ce14387e911ee23d5e333b5fefdec550267877f52c6d0506ba8df9cd1247ce431168407b5e1ed8516bb09be388252d81286fb0953c56eeb7a9ffc2e7821eb8ad950b6037bd186ecd83e3e9688c2fd077183ea3bbbc6c160ebcda8a5d73682249a64e10e55eaef0dcd860d4e2b129c7c73ecb6798bc2cc746a561e476a102270d3aa08f0fc23dae89ae3abc31db8352ed638c0481005fe47568eace148c6bfcff7e80edfc2756e86165ec221678345592749f442b841acf0d3f979dae169d45c5b3458aa072be340b6014057133ba4e339086cf39af454bdf5446ffb25ecccf2705edb2ec50e570fc72a6420cfdb5fc5b9352fbd431cb1cfd9959a42b3c4add198b759f692b703088ef83b5dca82ec6e27f1ac310f987585ba5e3eda1465452129736b2e80dee5fabea20ebd2386e7283e721b614ec3ccf279768f0fe0f41e140bb32bae4ba8f61b5bdcc4751540c54af0cf8975e0adb7185ebdc9adb6ae76801b97f3a63f8426d2ad7b482f6645ea024b98f968f24686241507c75b2a1db1b1b782160dbd2ba1ee01c573e414c47c1e03b2c1125fc25bee6eb4ce09cd2f974b1073f63ed6875293dc7d7240e5d920bb27d1ad7abbaaf06115edaec297a5ebb1ab57322af0738269a71aba0fbe44aca523df8a0c85b8f15c366f345835e6d923628432cee0d8554cacb20d6ba5dfada6f62ebe9241c6234d9d4c07a1c4d6f4a6e20269a86e1504bc216b4f9c3d8624ffac461009540ef68df6a78a4d22bfa12e1cf4d67e72dd3207e831c04e8bd3db272a79601857f93a96d7490d63c1630d76690bc7333e87fcbdb302809be42d6a1b43607b073add47a805e9736f961d32022c34577297ced19cfb8263b89b92f378e79317566d1fd4828b8d081943e33a2b18dfa0bf4aefdb9cef2eb60fed7ce5c448b28b79d32c172c8e0df3ec15f04f556eb9b64ce3e6bf342cad5b46ccba3718cefabfb20597f83e5175134987780dcb1018e00365aaa8cde7133bd9d524226f9e51c0cdedcce7fccfc562241fd0b5804f3cd0762050a19c4fe23252007b15af6c32dc42d4df2fbbcb49934622559f959f04fe8107b04c49ac5f7d7f350a302bf0d64521ea0b15e8b5ab3620f601e27023f4f01735475fbc9f46fead88d7a2da3679e87172d79b275c483ce62b58c65b8605982516bef8f1c14b69cd4f1128b6bb98b91a5fe057c6535d45445091ff02c2ad571dce4de5c6a031474de2827b59f3d875571b0d449bfb3a6c881de0b42cfc52b19835530a93249a3a2b903b0b78ad2430ef7317d245036e3ea6f3fb90f1777460d712c94763095273093cdb3b3014f82f96eaaaff0de1e64b01f5334a42b0c290ff362c7a95a99994899f717a59541971e249ebcebdc5be6e55e796e5e9e1a45f8de99fbaf9c233b976e88bfeb933105f30488c4f00410debff81a7c626236271a2da3772fc294d9a892f5310c7774c7fba2bf81162275b12051520cbdb73230145957c74ccf36faaf475a2b7165fae0175d026a3862bd39f3484520b156e6948d949d81437d959b3e2b5d8ffcc7a4497e9fb4a0c963dc8ed3ea433c81ab91531172f64ac892192f982ca85819b48e2b6bb1cb4cbdc7e2a8e79fd93b0884eda56f8244d053ccdbb78f85bf917ee965c7b19916ff9e1ec21fdfb8e9da1747464676f776fc5955783fa12c46e06e451f28baba45a714d5c7cb219166eed67747c6ab755cc37fa9055aee6a4f8bc31e5c8290e0f1abf0612b1b2d86cd99c833904c8ccd22588adec7bbe4bd2dd5b3e9c7d2e22a9f0cc3907b61fcf7727e15d72f95d4316f7b07badac54b8b9b8b08520e314774ac265d4714c9711f13d1e30d0574fd564d4b608755324f73937805a2d43e0ff028d7934925593cad53b330643302421d671b2e3785e25afbfa9f167484abc2db87983ef717cafe648557e9ec178c59faa4793a8f5ab381248e45fb8f10e372b22354d522467c3ff94ad05a59038f9ec026c616b236cc80741906de702374bc9cfbf7461750aa1a45122449de43e7191d89a61bb2d45ff3d0cb7545d1d2d7ec75fcf2618f2acc85aa4b360c981b90049e98a11117e93caa49b91b8d13fe9c375c4aa582324fcedbcc75915b8949", 0x4, r4}, 0x38) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000380)={'pim6reg1\x00', @broadcast}) (async) syz_clone(0x400, &(0x7f0000000680)="821648f30f645f12732f051d7ea4eef0219ae17aa64419a9d18c007a628f6fccc1d39091e2bb66abe8873849f0161d7a92805f8779db147f328dbd4aad47a49532db36d3bfb99abd2af174f997cdbda7d87fd5f39dfb61e9fd3069190a3aeafda20ebe0929b62aaa341ae1890a6977a7abcecb53af5c315936c1e3651687ec4d8e76c756a062e65f4e4bd704920512cb6a31ea8259ad77ed606e51d4ab4ac2c413c3e31dcff737945fcbcabed46721f6bb1da0835f67ee6d80a5c53fa1b629c46ee471296425691c5fcc7723efadefddb878540c2102e87aa2ff0cf5eaed8aa4", 0xe0, &(0x7f0000000200), &(0x7f0000000340), &(0x7f0000000500)="b7feaa982a9e03c79ac7fd3b9133c8afe501d54d69d4408ead3bf5acb50c0a0d255547b8f13f32d80557d51627defc7e65248c935b6145a2bdd0f1a02f4cba13c66d7e247ab922f1401efd6aab138626b5a12e53b63ee5de38c3") (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002480)) 2.442681721s ago: executing program 5 (id=4955): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)}, 0x2020) close(r2) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071123b00000000008000000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r3, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f00000000c0)=[0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5d, &(0x7f0000000200)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000240), &(0x7f0000000380), 0x8, 0x87, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) 2.372502473s ago: executing program 0 (id=4956): perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x200c8000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000008c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x600000000000000, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, 0x0, 0x4040001) recvmsg$unix(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000006c0)=""/109, 0xffffffe6}], 0x1}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xd, 0x367, 0x5, 0xfff, 0x20905, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, &(0x7f0000000080)="9e5e405091808b9d7a36e311e9bd57eba99b4e60fd017b02b64375ccbfedd8e7f4ea9dedea613b6c1b79fcb8c172a7bbc0758a60af8cc286691332d958b3dec1d357d7473e167e1081682d31db7179a25728a01ffc989b2c65affc03d5b42972de48183ca4cfd54d871652da7872ee16bae1a4040907382d9e47a75046f5f9e43a3c5f137bc98081ed67aaadae8b38c5"}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') r4 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x61, 0x54}}, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r4, 0x0, 0xe40, 0x0, &(0x7f00000000c0)="5cdd3086ddffff6633c9bbac88a8862608dffd00139fb7a884bdfc14f4870800", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0xfd, 0x0, 0x6f, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x20100000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) sendmsg$inet(r5, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r5) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000000000000000000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000a00008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b700000000000000950000000084d90d279110422913c4cb436f54537230ad20be736e5f9daf7b93c2b0c4321694e77e2439ce7825c4717eac9cba203640bee8faf5b73582d258c9236be7236c4f359b998ffe58cdb5a1077b63378cad0141899c7a5784965918b5ddad381e08fea08e8d833a4edcfa8a0a17f0e5999c531e60532358c2d9a8b114ee9c857075fa1f3a8853073ca627988ff717eb4d4c04e0bf2af95a909b334264a06f018139dd8980d32294406762fa798e1ffe962109765b06c2f5a0e3bb8a1da6fb6088ae727e6fa33254de65551ac562e8b692de9d563a92492d941f0ea2e64f33ab28df83e7e04a0000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) 2.304787924s ago: executing program 5 (id=4957): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x5, 0x5, 0x65, 0x2}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r4, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x87, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x7f, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYRES32=r2, @ANYRES32=r0], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2823, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x44c7, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="b702000010000000bfa300000000000007030000f0ffffff7a0af0ff1100000079a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7050000000000006a0af2fe0000000085000000a3000000b700000000000000950000000000000000e154cd844a954b26c933f7ffffffffe4fbffffff55bb2007ee51050512b5b4090a79507df79f298129da487130e6f24b46001e04aeacea799a22a2fa798b5adc43eb27d53319d0ad379e5752548300000000dbc2777df150b7cdd77b85b941092314fd085f028f2ed1a4b9535550614e09d6378198a6097a670838337af2ab050087ac0394b2f92ffab7d153d62058d0a413b2173619ccf55520f22c9ca8b6712f3024a0041b1df65b3e1b9bf115646d9649fcdce86a7f8b928a15cfec14ce53d13d0ccacda1efc5f9094fa737c28b994a8512c816fdcceaede3faedc51d29a47fc813a2ec00f4c7a53ac271d6d7f4fdc4b4861004eefbc17f43b17d0a4d4a69bf9bc5fa77ee293fbd165a5a68488a010030166565a097b103b44b451de736bb6d43db8db03d4b7745fef1d04ec633dee254a6d491b849a5a787e814c4fd21a18986252a70f8f940b6f0e8c7db4bf23242a18159f09943b1b0452d1b72183aacf4a84f9130b775dd4e9e3070756f97ad791fa99dac06b5747932000574fb30ff0000001989328c8ddc20ea011bf5742e0e0d4334db8b20ce3f9f16cb7fc20fb4791ec85821d0c48fb657c2d7962b0d22772c25a61ec45c3af97a8f17da954aff3fc8c108755f75ca13fb7c8bbd8b6e7dac2bba4b20dc7de058a4dfa7e85a8bdf1d41a2d8bda74d66f40700003fc5ffff006d294d366501753a7ac7fedb8d34f5bc381604fcd46105c457e7dd13cab669ab377e4c2422a47e9ffe2d4a2d32f7528751313694bf57704400b20ef0c248ddd3da32396a614cacad4aff2066bb5d4045c9585638c2153a6eee01738b0c10671f4f559b7dcb98a6273b8c651e24d9f679e4fbe948dfb4cc4a389469608241730459f0123fd39206000000000000eb55dad46de56ef907b059b90b8aa49afb9a79ae5498f6589880ed6eea7b9c670100be05e7de0940313c5870786554df26236ebced9390cb6940b8375d936a7d2120eca291963eb2d537d8ee4de5c183c160119451c31539b22809e1d7f0cda26a9fa87d64cb77872a2cd8a104e16bb1a2bacf13464ca03aff14a9aa4bd9539f5096412b92012e095b84c20243ff98df3347f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b9d30902208d300e4d455c36300000000022320178b00cc6ed7966130b547dbf8b497af002000000cd1d0000002000000001c8000000000000003a48cea769470424d28804c024ab7f4a5c81921f0128dfd70b438af60b060000000000000056642b49b745f3bf2cf7908b6d7d748308eea09fc361b4735efbf3411718d6ee7aebf9ef40662d7836d252c566f5ee934c679dbfae9fb4a79f8a836804ed3a1079b0282a12043408cd60b687dcff91af19010000000000000000456f7d2a42bd13da2022f23daec61854f640f701db0276652f6c031578e93046aaddea8ec4ca37f71c2710a7ea8ae0dc214e1cc275b26adfa892e6de92000000000000000000ddff004cff9ec780f535e62f4eeee50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab5009c68c73de2f04f15d005387577f480000ea65559eb00e76e9d0ada209bcbb5c252b28a60ca770663da451790cc36000906d5a9fad98c308e39bd5ffb6155e3633be3f00000015762e5f5a3a0bc33fdbe28a5ffc83f2f085185cc9d227b6b88295b65909d6adab4b7e508e5bf024ed8f8a005f2bcdb7c89739f5d81e750d50517a59a3ad09e8802e8f4f000000000facd5f99a73145dfcedad69da9cd4375c624600e78f4458542b14f296115d4a31838eeb20c20bb82aa31771cd379ec83554cea5b473332f2011e6539db7384e1f58d81f2f2653c4d9818708e27c89b552d3fcd116bce9c764c714c9402c21d181aae59efb28d4f91652f6750b6ec962802c0320f8059195729d60c534ee8e8ff0755367fe4c25edb85bcff24c757aa8090000000000008c420eb4304f66e3a37aaf000000c42a570f0e9dd5fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc05000000000000006c25b96174327d82761c26e329555f9290af4100000000000010749e1338636555009edf66be445d6975d534b8d63e4ca3b671f2de1cdf519192c6b59a601fd419adc16e2055b85058f793484305d7a1759782e4c571ee855a47bc00edf5e9020c09ab0043ebf7c79a953e023f74afad591821610b857e8717764b633b21cb32f0e03280e09758bd445ab91d20baca005452b79d9b7b574a247f1d2fe45bed3b03b3b7bb431a2994a9973c4e93da3d51de647c10dd49944dc87c92332af00f191b66b6a6f732a91f0e2e9120be61e58c79d497247d278888901d442ad7f8536605a644e9e3d769db497c1960dfde12182334caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733e57f31019876026888c8ccb85c86b4f8ffffff7f000000002c331fca0e541b7ca211c28ed61c525708a13d115b43f8b1894c8fa8a14dc4810f61ae96c18cc7130000000000002100000000000000000000000027c9a4619a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77819ee214e49666c464d35ca9b5143ed3b3dc8c17a23692759ccf5a205378c9fbea532697b861dfb54609fd88e6043bd5c17d5486b0c8a6c769f952283a1f4e3842edb3d42c68a27ef6a1296dff7aa46e820a74f9530bdcc198e353047db70686d147357024eb3cb94f1e89cb5ba0a56aa046b4dc521a3d9356b4b8b5917c4c860495b240e80063bde261fdca4e9eda0072f6df342f3e7071e28ef6806b90cc39c49b91c76b0d395811bc13d30053a97ad3055fe49b8dba30f7f05b47d3e519f1634e8fbd8d3133319e069f9648a2ff93060ff073b3a113e47e447c030931651dd315003b7a6a47c912853826c4c65433a2bb560ae99ec4b227eda2e63a1cb1a2c2bd48a822cbe92b6524e0cd8020ecaa34e19e7194d1eb3de6a5f99f301f89c2ee627e949cdd22000026a9960503a26e9a714ee5f72d8805dd1bfbd081f6a5d1f1289dfe14cb9194e26a44fac273463fc5c0e0a33db7f2d43ea8086cf059f40fa2640000cd9e5f2e236ef5f1e3a94b108eb9750b6bfb74dd35f5a31059c01517cf4b6641fce9a24b96767b837ca037a2050000c375c705c798e0e208e4a5259d0bda526b462af45a6e9a84aebe025c8a7f65819f397574db7ab01bd2b3e3cd28c5aec90f8edfe39a00bafd688a7eea04efdeed96f67012bc3f795edb68b5dec80ad31a858eb756c815e7695d00000000000000000000000000000000000000000000000000007ccf0ce549d97510f7f8765408bb702f0000006d4754c68b7064cf31a681421994e1f307f0ab4ff2e33d3c88fea5d218a276b77adfee7c8fb145783ee1f8adbd2c2604eab3a62a28611da1dae5ce60003111ce5c96a1d6e45ee144ffa3dcca32a33f8f0ce2845b7b7aa0bce228cbf37412cbbdebae06edb51a134301d2627d4927287daf9dcae6720334862d3a18094f1edd9e350337cbb804004d1755cfe7d7fa01872fb99815dcfbbc8141f6e1bbb0901ae91357677fd9d2bb00d4f17fb441c2dfa2b424bf46ae299d68ac27792cdac2b63a6038ab5546ba1e5ad6a329f2c627100e0442f865fc6c179ad3edcb6b000000000000000b0000000000000000ac192d48d76e2a8cae83ae850f73fdfbaca81b6b7b1a0d7b517f41fbd46aa24b0f4b8e0202e3a580947f1925ba4de097e8dcb6bd7f686322b45d4a544ca1e83b592d4a6d46d0a0dc39634550bc77d4cabba01b283082e66778de7c61a1a36838d36c2f8e58cef603770ee3d6a9625be0bc21d2be2da69ac9e9c5e88278d39239501b465102ad16d651ea8bb8cee35527c1ad42ac6a565e449929ccb4469bdd6824b64e13579b7188566e735200000000000000000094e05bcda1e96e4c33ccf6d74046e45bafe9d512c43a3e485dedad9a38b34f7fcd00fafcc25dc36716f0e21e0632425b7a1c1a6bc15c3fc07d914c88103411d8d2b77b72a796fd3aaa7ea493c7bc43e63b2b0d05ad5682121682096b224933fa20255d58a680cc2ec200000000000000000000000000000000f5f6005918fa97c1571b49b0455fd4855a2e0d4fee8c50d5bf93a61a2c852ce8eac060ab1fa761179cb33aa961ce5d2741e31a22a10e4cee7c0b93e092345a93becd8109750cab2aec6edf6b621d9bc301e37b055c16921a713d1c381ea1ca3955da38db227e1cef4811"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x3f) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r8}, 0xc) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0x40047438, 0x110e22fff6) 2.304387664s ago: executing program 2 (id=4958): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) close(r0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) (async) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r2}, 0x8) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r2, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3d, &(0x7f0000000540)=[{}, {}], 0x10, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x9e, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb01001800000000000006000000004000000008000000000000000500000d00000000020000000100000009000000050000000b0000000100000006000000020000000a00000003000000040000000000001010000000002e2e0000002e00"], &(0x7f0000000900)=""/55, 0x60, 0x37, 0x1, 0xffffffff}, 0x28) (async) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="01000000010000000500080001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) (async) close(r3) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="0b09000000000000000000000000000000000000f541478b5e6fbc2db3c77b194d15c7750ac26ec31d708e8602808a1e3222b924f3849d47b418dc7b1549e3de5c21f27cdbf3b0eb84f96249e03d9c158c524efe034269b7bb2f51a63f52fa297901956808338f06176d9c", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r7}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r7, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 2.273080974s ago: executing program 2 (id=4959): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x50) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000440)={0x0, r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x14, 0xf, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={&(0x7f0000000000)="1aa1d03f2cb1ef15581fd11e1a783f8a1e0441d16555ff223e8df80ca76ff7d8e3f51a941f5d45803a58d4ca00679f9acd6700f7e2a59e778f5f19e40ec94e8ab907a9cbbc212106153c89a0293ee4888914b5366aa511c73eb4e9822f16b65697ceab0036e82ceca78846690852a7e4fdd4e86e25a58a7e", &(0x7f0000000180)=""/217, &(0x7f0000000280)="10eb43f7b158c08bb51abd0bf6cdedb9f7d670e9de6ef5838e5f3b84e4dadf0c3c7365b90f077b327401650475398f323ad036a2ec5916717f9fc5b2c9e635fd608e9aa9811e24185ba7ac9612f25ae929f1c4e9fa96f8b025fdcd94acd16130ac83d003adb25ed7f22360b4c896", &(0x7f0000000300)="0e185ac127c605e92906c5e0eea6d5be9756dc5307df15c136b88e0a5f6951c5a277443842d038456634df39b18102559fa6c1bd8936d702a9fb17ad392f3eee6c13fafb8af7de9a569270cf03ed856823d5a6165cb97e486afc3b0fee13ffb7ac9e0fc931259b56ebcdcd82f9b974fde2e1a2be5d9a96d5137b95ab794e462086806c3678796a41a02bceca3b609ba43f40c0889e9c49", 0x8001, r3}, 0x38) (async) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400), 0x18402, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x6) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x404, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0xa) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000000)={&(0x7f00000057c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xb, 0x100, 0xfd, 0x9, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0xcff5, r8, 0x0, 0xf00000000000000}, 0x38) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000265bc171110d9169b7080000000000007b8af8ff00000000020000f8ffffffb703000008000000b7040000000085008559"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r4) 1.566376389s ago: executing program 3 (id=4960): bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="00ffffffff000000000000000000e80000000000e3c8fdf126c379b4e92cb1ab55d4a627f8a12d150e3a1f988f9a9cb4", @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xff600000, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x60ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd60000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYRES64=r1], 0x0, 0x37, 0x0, 0xfffffffe}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x0, 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x2, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r5, 0x0, 0x0}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0xa, 0x4, 0x1, 0x0, r5}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0, 0x8}, 0x512b, 0x5, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xa, 0x8, 0x1, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r7}, 0x38) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000240)={r7, &(0x7f0000000100), &(0x7f0000002240)=""/99}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r6, &(0x7f0000000300), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r6, &(0x7f0000001a40), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="620ac4ff0000000071102b00000000009500000000000000d4eec21f20d72163fb31eee8d11609128c13f7db4b65b634d426821523ef53cd0443283aebbae76879f4dd49999a005187edf4ec5f74aa749059ccc9b7b0f7bf7232bbc7254452c467314bc5980f6d16d1c9c42c95bcf90173121009eee6087a7bf65dcb3058ce59100047194b1c6c0089b8fa4da1b2b8488d121b249f70913243e2336d3041e44f72c99fa622c80d1c01751fe7d846c7d517f2a8c14313c53fb748"], &(0x7f0000000480)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) 1.00875239s ago: executing program 2 (id=4961): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x9ccea72d8f8d6628, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000022000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='tlb_flush\x00', r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20882, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x1, 0x6, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x40002012) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0xfdef) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000ffffffff00000000000000001801050020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000007d0000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$SIOCSIFHWADDR(r10, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r12}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 1.00673566s ago: executing program 0 (id=4962): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ff"], 0x0}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd6300800701082c00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r2}, 0x10) r4 = gettid() perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8983, &(0x7f0000000080)) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r6}, 0x10) close(r3) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000180)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYBLOB="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"/2503], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1000000}, 0x94) 140.838687ms ago: executing program 5 (id=4963): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@ifindex, 0x26, 0x1, 0x5, &(0x7f0000000240)=[0x0], 0x1, 0x0, &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0], 0x0, 0xe2, &(0x7f00000004c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x4c, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@cgroup=r2, r0, 0x8, 0x26, r0, @void, @void, @void, @value=r3, r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='mm_page_alloc\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1f, 0xe, &(0x7f0000000200)=ANY=[@ANYRESHEX=r0], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 128.241417ms ago: executing program 3 (id=4964): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa2000000000027545fc4397876d984ba4004939b0007020000f8ffffffb703000008000000b7040000010000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18776e65000000006f5307ed154299a453800000000004000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffff92) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b0000000700000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000005c0)={&(0x7f0000000040), &(0x7f0000000540)=""/34, &(0x7f0000000580)="94127f0f6d216b6564453e58a90912cb1043103f620ad09ae3a83d936d88", &(0x7f0000000680)="f60473692e7efc2772bab948d6dc2e37ca6247b287b0cab586e190a36263230c62e2ed9f924b86b13b49b04f95e99ce9b26a97bd8a8e44ddd714b33a47908e4510fafdbd38417ba5eb9ff09df7745d35e4de4fbc", 0x2, r3, 0x4}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="34cbf9c55466da0eadc249236ab3cbf316717306be4c08c8c7da1f1ee04ab4b4eac14995ebdf620ff778a4e3452587e42a3c6aa1bd35dfd99f23b525893bc3b5f9f3bed1986bf8d0dddd7c5cdada611f9bf641e421ed71a842d84fa289a542f941d6e06b2b14e2a706ce30acf7d82f224f3e30cadd9d15f3dddbb29dbeb9f68fb68bedb91e0b1ef48832778fe36699c7ebf101659a8f476c4a065eac71d6d1e7fafc6f25ec2c9a8f431fe347a2d30e912c5b2397613ce784637ec71e37566eb0548b461f71028459c6f137c18737d58b56949d022bf1eaf486692bb76836a233c7879d740ad0beaf5159d3380442824f536a41bb22d08fe53952b9c6fed2605d53311c71b455655f96ea6a87e41e9211e90170b0a2b1a2098175ebcd33d517085d224122264cddadd82a3d11bc4a33ce66108b22b1abc6243d306d8f6b8a2ddb5373c190d8f859a3174a200936b079f85edcac7fc03fb993ec0ff8b83f1fd3f1b888d192d99c7ede5d381784d25410cccf1b0bf26a54f065e1e3ec59cc5704fb658fc980a0ac4287ef884ee82007554be3f1e163c81468d0c26c95e3e12393776e32800bb4f086f19080c4fca3d72e8569a5627ce98f2ae0bdb3ec42c23847d47e10b1c58da7e9cea990da842d96e3a51ed7d892f7b28a10486424a69a9109ebd4d7d5a3768400ac000a6d7556ca192e5cd45efb82001ac7b53e03036b6019a07ffb545cd3853e077f08a015f6232488c1139a9409c95ed005261e36b307406ba5714ef395129345866109341feb6c7c458ce08c147a983b46375ddb3621cee0312ba1a434bcd6081e1a8ae8b6d518988b9965faf9aff86df8173b93342cceaec357a100e59b4d66553633626b0b12e9622b8f8fdfe26545b87c57f8ce8609fb8e19b0f6d1cd64e8de85c7327f543b2f38cf3086b57f85e1aaa4add723e4bc4e3ea2c27acec1e545ae3fc870bd42422f6eaf17a1f82699c9cadf224ea1e5d1705b49118d91cc3731aeed60e41bf15a9613aeda8e63a29bc7a95b2d993d23269a310b91f69d16a71243c0f4080d3359f5ddd63c7032bef14ab25eb7df4b28b2132bcbf94a281c8f5de79885a6d679f145fca292b599bb09a1864726d86b65d4781408320b968e2224c23ce7a56d8892970043737ae47f071aaeb219716bc21e3304e301eb5cd32aea951a70621eb870214a72e6c474c3a20f5bd8e089ba16326cc9a80a1a4f5f0e8f58629e20b1c73eb8af330744b187a5cfdb410466378313700ca44eb6dcbc8f3d70f58e134202546f0b1a3b61a298f2a1184b1533bdad308fa2f960087e0f239d2ccbaee3889ddc1a2bea2183b98854d255a6f708909134fab83f42f13e7604f602e264f4a3b2b2a08c673c7ce2813218159b472d3b20ecbf26dd2f7b3ba5298a4ff7444ea0936e098c126f590b05e7697ed8a3d52ba1abc7285de2f160b9b081cb775a5ab77aad1bb98d47e3da53fc4c11d4db47de1e4e6f56ad671f5d8389b33260cc546e4f0bf34fec9b2abd209e6b89e6e381367774676ed6e6eaffe42b07241c276f3c84f17a0762de83eb769bdf28991ddbc23758f01c9ecfba4ab2ca2118fcedd7adde9ff47f643c13e3ad2f13b576985128f233e329fe269d5745cd2b30e5762452a4ff58fdec30623175f8d575ced1c43411e2869aadbe6f1e79a010bca334cb08d545bc2808f359b7777d1bb5675ee210574b9f72cdeb071e07eeaa0988086213a37a972647cf21d3a3bcbd7359da327bacad41b93c5e0e494669109dddcec781774f248f5663e4fac187d42ffccf68335de2adac4f8d3e1bf04b95a9464960186ed019773ffeda18f9827a61edc5fc4088eb0965cb1bd8af1185aa3972b8f73839b4611e303bcbc1f84a330f60fa0a7795ea3cffe0e338406533e12c7deef0b5906c513eab4619a8f02fdd65dcfb7297ef971c4601ad079f7ad38278ae3ff455b37d5492af546975535450693fd4593c8157b3fdb16fd3a106d2f1509d1c06dabb8933269d790a1c5e5f7bdd4a57e1e670d7043cfed88c365b5f8eefe530ef7da5322df981723332c088fce89c2ceee23b420f64332243b9c606d67d538810a94e0ffbd37a119d8fc4d6caec0def40e62613873c74feabde63e12cb2016c1d35cf1bb95bf59e01a63be8825cb3118b74b106f21eef5ee2f41e5fb39fdde058050f780d98ced247c66fc3a03ba04edaf14d698859ba303d511cf0845dc5e269aef2287770a247fd5ae1299b45819ff41725f9da3e4dab7770eb83992b53ae9a9de69e764f6e3aee3e27cfb1bacf531a91605894ae209da6d25872fb54bf36b2ed450b51aa8ee4875b9bc7e55753f61e12a323d301faceb2ecff0686b1359343a94774a6a098dc2df440725cd8331f527d4e22f8090d8879ef4765849705b99465d7ebdf661b81c303d13b87270dc1f227d5954fcbc93bbce6fde2a1f8d573d9cd8130c173a14706f1e9dabc4d16a5b003dd3239faf91769e25cf007b0623141e4e57f11746cd62f20d73956fa84c6a12e1756b6671a64bd7a474ba425907e1a61ba6d2ffa1149165a713a141bfec0f1af51afebdb84d5f14eb51acc284403627d6ce48fd028dc04e00ed963de37f85d155c33e2b4ceb09044c4f1c7791348216b674a8831a232a638f8bfb396fabbe1f880944bc5dcac55df8abc78f804306c88617acfd4adfbb5a055d3d3e91abb763ad84e701cc5679498e04600570f4b2e57c70542043dc590ab363215e6ab3f0bd89383748783d01c9227229edac723d4e2eaa061a44f2630691f25ca6093775183fdf432e01322203dd654b336670116a6a52a27ff2032b1103a4e4be0cc2fb05b24352d72e374e90cc3db2a5a691c7f6b8d1058d7730433c742d8ce52074318b1bce9bb104cf90c8b7f65293c2b74434661444f38d94d977e03433440517f6155a3cad2621c5502dd6148b867a40e6a40be4c8265ec2164b5257f06da1784e98991f42003ced4ba67c23b8c654b542d2d31168fd853cf56cc2c464d7a8a9fbcd2715968788f8527c597ab5f917753c1f1708d2c19972373c5a22af71847de22b9f1e9d38a04ea4dd291da3099cb836a696350bf1263c3c275c27b8b82f604625451a24490b0b5367c2fd05e699546ddf17709d2e2c2710f4361d9dd6e2de2b4353b7f4f8141f6f989dc1a798a974565978e4f9ec0c59a7dbc04bcab072c8513b9ca782c22cdd31fb116c10081740fd8f7d0cbd5c54f1069297f20b45d79bb9ace8e851a655fedf47b2dc76fd30b9ba9f09c9b50d6910ffcdec7078c36fe1e9b19dbb110197496349560a43c0ab42b4ce286643e73a92246ecb71e95ce0d54114772f8477c7d5604c1a52d2f680c5868cf08a2688dd9fef492a01836112cec824483e77da93d104a9e18d06bddf9a4007740a0537ac1a5e09900acc65d52680212a15b68b0ef887228e06f533c1ca95b8f9d81b9fc6608cb5bacf4b867922999c69d46048ec3f408866789f49fcb176fc99ed9d3e6c357ed2e3ce2665925773e5d86c2ceaf8f18519a00d9d2e19e9a6b16af0a53fd7df6974f5db00494460e7f3de6ff6b642859335e020513bb525adddabf0d7d6ae85e7e56e32ca8acc07fe86b7b445358966ba3914c1dfa7b814d9e846ff02a6a8c8f5713a0f727024b5d1ea7e4ce7c64f9b24dd3337a3df33714c5404403b0304b25a66fe3ac85083965877117b3d721e7922f0ac7e278feeb8dc09f58cbcfbb81b11d4699737f37ac240a24b9c4b2b587e68974f7ca5561856f32e389d32056f7d58e4de24c11bd5c5afaa441120370d0c48341e1b8146a6bbca8c15f23c155d2533e97a8e6496bc00533ec83be8488d020708d97385a03bcbf57cadc2c1e575e1ac134cdb5047f3f88eae0230751626cea1c85da9b74ddace668afebb2dc66d302ddf3c5f8f21ac0c0535d00839457e7cac9282a8e49d018b077e38ea512cf28eacff5d98e880abfb5af2e7c039d2e1f1edaad2642963ef29d715f754e2715caa6af046a298b285e3582d903be726b608619332e1a82be48b0f5adf6838f41ff776e5290de8269794bce8fb971267d036bd6bd30e42df918125d573ced78263251bcae2b7b40f1ba855b4f2472312ea8752c4a0e09468bd25615a6c00a9b44c484c5507b8400537f20890e9499ec94ed2b6aeff21e57c6e8a93d80097f85ac9316b03a5f768721bf7d041bb9a6a03eabd615e3c4d74f56c429d53b8fec4b5e86c5b311a6cd4a86f03e04dab25ad65b68a8b8d9053993fd2440ff2b81768213084c831d31a0f8c646aff9090b5463cbee452abd6318340ec41b50f1deba7ffb60b326751de3f6dbf9b17714299233d5c43071367ece2e53212e7f4e084fea60850d4d16908d9bbbb531fbf72143fdb62d1b40afde3d0b2ac2c94c32e456bbef62f8d677e332aec8ccc8eedbac61e7b89b32d57157a39ad5c456258d9c36db0edc82c2baead990ee78007ed89c8f450e92d5e209cc25f7c13f5909ca404fddbdbeff89cc42350c91e9f1fdf9753c6e95f71257f8cbb97838684461cd1244c938b9939a4e9c7727902b6f1a5434e0a06d3fc221771dd87572ae801c5ce6886122f0c91dae57440ffc7ace4e8e0041a1d245103aaadbfc2ecff622228daed2b0cd30f7f59b2617f6f0571ee4403d84e652d78b8e64d5450b6483ef70582dcda9351f2dddd3a4ac84f514f708d3af6242501bd041beae78e6b29b517b534148ea91ef85653fec824d6ddb0c0fa2555ab2564ba29227b1046b48a11ee0e6aafda9d0b80b0f05a8d057cbeb16264cb579aea3ba2b2000052d03c77844ab7c", 0xd4d}], 0x1}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r8, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000600)=""/203, 0xff0f}, {&(0x7f0000000700)=""/234}], 0x1, 0x0, 0xffffff96}, 0x0) 60.780648ms ago: executing program 5 (id=4965): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000100000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) (async) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000300)=r4) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) write$cgroup_devices(r7, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8202, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c25000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x13, &(0x7f0000000a80)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207baaf8ff00000000bda106000000000027010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff40000000bca100000000000007010000f8ffffffb702000008000000b703000000000000850000000500000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r10}, 0x10) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) (async) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 0s ago: executing program 0 (id=4966): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x6, 0x1, &(0x7f00000006c0)=ANY=[@ANYBLOB="8543eb014c0a00ec"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffa, 0x700000, 0x2, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9810}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0400000004000000040000000000010008080000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRESHEX=r5, @ANYBLOB="00000003ffffffff00000000000000008a1e4525475fcb50000067fa00000000f2000000d4fe123d8af2643dc123bf13c5cfa9721eee21f3b1114eefce2dde"], 0x48) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000600)=ANY=[@ANYBLOB="1400000004000000080000000600000000000000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES64=r2, @ANYBLOB="000000000000000000000000000000000000000000000000000000008a87"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRESHEX=r1, @ANYRES16=r4, @ANYRESOCT=r5], &(0x7f0000000880)='GPL\x00', 0xfffffff9, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) socketpair$tipc(0xa, 0x2, 0x11, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00'}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r9}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r10}, 0x8) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.102' (ED25519) to the list of known hosts. [ 22.680170][ T30] audit: type=1400 audit(1757799248.314:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.681725][ T273] cgroup: Unknown subsys name 'net' [ 22.703163][ T30] audit: type=1400 audit(1757799248.324:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.730627][ T30] audit: type=1400 audit(1757799248.344:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.731090][ T273] cgroup: Unknown subsys name 'devices' [ 22.873135][ T273] cgroup: Unknown subsys name 'hugetlb' [ 22.878990][ T273] cgroup: Unknown subsys name 'rlimit' [ 23.018304][ T30] audit: type=1400 audit(1757799248.654:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.041569][ T30] audit: type=1400 audit(1757799248.654:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.066464][ T30] audit: type=1400 audit(1757799248.654:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.071952][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 23.098392][ T30] audit: type=1400 audit(1757799248.734:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.124450][ T30] audit: type=1400 audit(1757799248.734:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.133119][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.150388][ T30] audit: type=1400 audit(1757799248.764:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.185001][ T30] audit: type=1400 audit(1757799248.764:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.741885][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.748972][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.756545][ T282] device bridge_slave_0 entered promiscuous mode [ 23.764582][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.771688][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.779056][ T282] device bridge_slave_1 entered promiscuous mode [ 23.827394][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.834585][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.842236][ T281] device bridge_slave_0 entered promiscuous mode [ 23.864697][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.871801][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.879193][ T281] device bridge_slave_1 entered promiscuous mode [ 23.922121][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.929194][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.936847][ T284] device bridge_slave_0 entered promiscuous mode [ 23.955383][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.962492][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.969882][ T284] device bridge_slave_1 entered promiscuous mode [ 23.987679][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.994792][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.002497][ T283] device bridge_slave_0 entered promiscuous mode [ 24.021227][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.028294][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.035824][ T283] device bridge_slave_1 entered promiscuous mode [ 24.094196][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.101349][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.108785][ T285] device bridge_slave_0 entered promiscuous mode [ 24.128161][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.135246][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.142793][ T285] device bridge_slave_1 entered promiscuous mode [ 24.227572][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.234657][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.281886][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.288964][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.296303][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.303729][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.336335][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.343530][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.350956][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.358381][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.367692][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.374787][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.382139][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.389175][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.403700][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.410788][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.418069][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.425246][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.470853][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.479527][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.488043][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.495698][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.503031][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.510559][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.518809][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.526266][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.534551][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.541865][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.549169][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.556915][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.564977][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.572565][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.580121][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.588501][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.596655][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.603712][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.630984][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.639028][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.647213][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.655605][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.662686][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.671081][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.679280][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.686375][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.693821][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.702110][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.709138][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.716538][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.724876][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.731922][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.739274][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.751360][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.759940][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.768352][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.775570][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.783115][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.792651][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.801000][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.808041][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.831372][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.839518][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.847587][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.856018][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.864331][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.872597][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.880756][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.888301][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.895869][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.904243][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.912305][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.920752][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.929087][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.936157][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.943780][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.952124][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.960894][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.969288][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.977629][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.984682][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.000261][ T282] device veth0_vlan entered promiscuous mode [ 25.010972][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.019481][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.028084][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.036656][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.045856][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.053658][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.070509][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.078804][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.087057][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.095591][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.104137][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.112488][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.127291][ T282] device veth1_macvtap entered promiscuous mode [ 25.138381][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.146745][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.155765][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.163693][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.171826][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.180049][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.187885][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.201279][ T283] device veth0_vlan entered promiscuous mode [ 25.210392][ T284] device veth0_vlan entered promiscuous mode [ 25.218854][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.227415][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.236550][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.245224][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.253765][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.261893][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.270115][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.278743][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.287317][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.295804][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.304448][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.312081][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.323578][ T281] device veth0_vlan entered promiscuous mode [ 25.340064][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.348558][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.356935][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.364630][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.372424][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.380294][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.388842][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.396596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.410991][ T285] device veth0_vlan entered promiscuous mode [ 25.422923][ T281] device veth1_macvtap entered promiscuous mode [ 25.430119][ T282] request_module fs-gadgetfs succeeded, but still no fs? [ 25.437652][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.446284][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.454603][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.463077][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.472846][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.482059][ T283] device veth1_macvtap entered promiscuous mode [ 25.495342][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.504063][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.518692][ T284] device veth1_macvtap entered promiscuous mode [ 25.537337][ T285] device veth1_macvtap entered promiscuous mode [ 25.562959][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.572681][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.581333][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.589804][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.598625][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.607262][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.616004][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.651853][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.660262][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.669090][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.678840][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.687762][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.696710][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.705622][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.714436][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.810417][ C1] hrtimer: interrupt took 27194 ns [ 25.936404][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.943740][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.003801][ T352] device bridge_slave_1 left promiscuous mode [ 26.013026][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.023188][ T352] device bridge_slave_0 left promiscuous mode [ 26.029485][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.176702][ T358] device veth0_vlan left promiscuous mode [ 26.212469][ T358] device veth0_vlan entered promiscuous mode [ 26.323223][ T366] device sit0 entered promiscuous mode [ 26.467835][ T367] device sit0 entered promiscuous mode [ 26.604166][ T373] device veth1_macvtap left promiscuous mode [ 26.610330][ T373] device macsec0 entered promiscuous mode [ 26.889675][ T373] device veth1_macvtap entered promiscuous mode [ 27.282493][ T397] device veth1_macvtap left promiscuous mode [ 27.631105][ T413] device sit0 entered promiscuous mode [ 28.371151][ T30] kauditd_printk_skb: 44 callbacks suppressed [ 28.371167][ T30] audit: type=1400 audit(1757799254.004:118): avc: denied { create } for pid=431 comm="syz.3.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 28.650505][ T30] audit: type=1400 audit(1757799254.274:119): avc: denied { ioctl } for pid=436 comm="syz.0.30" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.848746][ T448] device sit0 left promiscuous mode [ 28.989697][ T449] device sit0 entered promiscuous mode [ 30.330554][ T512] device sit0 left promiscuous mode [ 30.594094][ T514] device sit0 entered promiscuous mode [ 31.724381][ T550] device syzkaller0 entered promiscuous mode [ 31.777593][ T30] audit: type=1400 audit(1757799257.374:120): avc: denied { write } for pid=556 comm="syz.2.65" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.388506][ T570] device syzkaller0 entered promiscuous mode [ 32.888036][ T30] audit: type=1400 audit(1757799258.524:121): avc: denied { create } for pid=581 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 33.041565][ T30] audit: type=1400 audit(1757799258.684:122): avc: denied { create } for pid=584 comm="syz.3.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 33.082822][ T585] device macsec0 entered promiscuous mode [ 33.815689][ T651] device sit0 entered promiscuous mode [ 33.899955][ T30] audit: type=1400 audit(1757799259.534:123): avc: denied { cpu } for pid=649 comm="syz.3.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.235882][ T670] device veth1_macvtap left promiscuous mode [ 34.417053][ T30] audit: type=1400 audit(1757799260.054:124): avc: denied { create } for pid=673 comm="syz.2.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 34.916561][ T694] bridge0: port 3(veth0_macvtap) entered blocking state [ 35.150061][ T694] bridge0: port 3(veth0_macvtap) entered disabled state [ 35.171296][ T694] device veth0_macvtap entered promiscuous mode [ 35.191896][ T694] bridge0: port 3(veth0_macvtap) entered blocking state [ 35.198900][ T694] bridge0: port 3(veth0_macvtap) entered forwarding state [ 35.318490][ T30] audit: type=1400 audit(1757799260.954:125): avc: denied { create } for pid=712 comm="syz.4.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 35.503285][ T30] audit: type=1400 audit(1757799261.144:126): avc: denied { create } for pid=717 comm="syz.1.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 35.523311][ T724] device sit0 left promiscuous mode [ 35.583691][ T724] device sit0 entered promiscuous mode [ 36.444928][ T750] device veth1_macvtap left promiscuous mode [ 36.521303][ T750] device macsec0 left promiscuous mode [ 37.260962][ T780] device sit0 entered promiscuous mode [ 37.712852][ T794] device veth1_macvtap left promiscuous mode [ 38.458721][ T816] device sit0 left promiscuous mode [ 38.975084][ T845] device veth1_macvtap left promiscuous mode [ 39.041041][ T845] device macsec0 left promiscuous mode [ 40.349542][ T914] device sit0 left promiscuous mode [ 41.274627][ T954] bond_slave_1: mtu less than device minimum [ 41.310750][ T954] tun0: tun_chr_ioctl cmd 1074025677 [ 41.316142][ T954] tun0: linktype set to 776 [ 41.361458][ T954] tun0: tun_chr_ioctl cmd 1074025681 [ 42.319049][ T30] audit: type=1400 audit(1757799267.954:127): avc: denied { create } for pid=1011 comm="syz.4.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 42.369789][ T30] audit: type=1400 audit(1757799268.004:128): avc: denied { create } for pid=1011 comm="syz.4.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 43.910397][ C0] sched: RT throttling activated [ 44.925683][ T981] syz.1.179 (981) used greatest stack depth: 21048 bytes left [ 45.990847][ T1018] device sit0 left promiscuous mode [ 46.501355][ T1054] ÿÿÿÿÿÿ: renamed from vlan1 [ 46.612015][ T30] audit: type=1400 audit(1757799272.244:129): avc: denied { create } for pid=1057 comm="syz.0.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 47.412035][ T1072] device syzkaller0 entered promiscuous mode [ 47.733702][ T1092] device sit0 entered promiscuous mode [ 48.193511][ T30] audit: type=1400 audit(1757799273.834:130): avc: denied { create } for pid=1101 comm="syz.4.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 48.693296][ T1144] device wg2 entered promiscuous mode [ 50.022400][ T30] audit: type=1400 audit(1757799275.664:131): avc: denied { create } for pid=1211 comm="syz.0.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 50.096344][ T1179] bond_slave_1: mtu less than device minimum [ 50.118461][ T1212] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.127659][ T1212] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.209444][ T1218] device bridge_slave_1 left promiscuous mode [ 50.244862][ T1218] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.258102][ T1218] device bridge_slave_0 left promiscuous mode [ 50.264496][ T1218] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.549324][ T30] audit: type=1400 audit(1757799276.184:132): avc: denied { create } for pid=1232 comm="syz.0.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 50.657417][ T1237] syz.1.254[1237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.659521][ T1237] syz.1.254[1237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.859396][ T1260] bond_slave_1: mtu less than device minimum [ 50.896264][ T1261] device pim6reg1 entered promiscuous mode [ 50.932484][ T1265] device syzkaller0 entered promiscuous mode [ 50.944996][ T1261] ip6gre0: mtu less than device minimum [ 51.605971][ T1289] syz.4.269 uses obsolete (PF_INET,SOCK_PACKET) [ 51.624173][ T30] audit: type=1400 audit(1757799277.264:133): avc: denied { create } for pid=1288 comm="syz.4.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 52.303001][ T1324] device sit0 left promiscuous mode [ 52.392607][ T1324] device sit0 entered promiscuous mode [ 53.503620][ T1356] device syzkaller0 entered promiscuous mode [ 53.592899][ T1359] device syzkaller0 entered promiscuous mode [ 54.174933][ T1386] bond_slave_1: mtu less than device minimum [ 54.208673][ T1390] device syzkaller0 entered promiscuous mode [ 54.302269][ T30] audit: type=1400 audit(1757799279.934:134): avc: denied { ioctl } for pid=1396 comm="syz.4.298" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 55.204131][ T1427] bond_slave_1: mtu less than device minimum [ 55.699936][ T1435] device syzkaller0 entered promiscuous mode [ 55.949050][ T1443] device syzkaller0 entered promiscuous mode [ 56.046225][ T30] audit: type=1400 audit(1757799281.684:135): avc: denied { create } for pid=1456 comm="syz.3.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 56.686167][ T1479] device syzkaller0 entered promiscuous mode [ 57.162091][ T1506] ±ÿ: renamed from team_slave_1 [ 57.580549][ T1521] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.588886][ T1521] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.250199][ T1560] syz.1.345[1560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.346758][ T30] audit: type=1400 audit(1757799283.984:136): avc: denied { tracepoint } for pid=1564 comm="syz.0.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 58.504292][ T30] audit: type=1400 audit(1757799283.984:137): avc: denied { write } for pid=1558 comm="syz.1.345" name="cgroup.subtree_control" dev="cgroup2" ino=278 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 58.536613][ T30] audit: type=1400 audit(1757799283.984:138): avc: denied { open } for pid=1558 comm="syz.1.345" path="" dev="cgroup2" ino=278 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 58.565594][ T30] audit: type=1400 audit(1757799283.994:139): avc: denied { ioctl } for pid=1558 comm="syz.1.345" path="" dev="cgroup2" ino=278 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 58.682006][ T1574] device veth0_vlan left promiscuous mode [ 58.687815][ T1574] device veth0_vlan entered promiscuous mode [ 58.695741][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 58.710912][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 58.718756][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.652386][ T1609] device sit0 left promiscuous mode [ 60.122604][ T1637] syz.4.368[1637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.115634][ T1674] device pim6reg1 entered promiscuous mode [ 61.753673][ T1685] ªªªªªª: renamed from vlan0 [ 61.802474][ T1685] device wg2 left promiscuous mode [ 61.955200][ T1699] device sit0 entered promiscuous mode [ 62.035721][ T1691] device sit0 entered promiscuous mode [ 62.425207][ T1718] device sit0 entered promiscuous mode [ 62.844113][ T1748] syz.3.400[1748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.844211][ T1748] syz.3.400[1748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.927559][ T30] audit: type=1400 audit(1757799288.564:140): avc: denied { create } for pid=1756 comm="syz.2.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 62.938665][ T1760] kfree: port 1(veth1) entered blocking state [ 62.964525][ T1760] kfree: port 1(veth1) entered disabled state [ 62.971481][ T1760] device veth1 entered promiscuous mode [ 63.290672][ T1789] device sit0 left promiscuous mode [ 63.432400][ T1794] device pim6reg1 entered promiscuous mode [ 63.493701][ T1789] device sit0 entered promiscuous mode [ 64.093986][ T1823] device syzkaller0 entered promiscuous mode [ 64.150712][ T1825] device sit0 left promiscuous mode [ 67.965495][ T1827] device sit0 entered promiscuous mode [ 68.055120][ T1846] cgroup: fork rejected by pids controller in /syz1 [ 68.372042][ T282] syz-executor (282) used greatest stack depth: 20800 bytes left [ 68.651138][ T30] audit: type=1400 audit(1757799294.294:141): avc: denied { create } for pid=1843 comm="syz.3.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 69.002999][ T1880] device veth0_vlan left promiscuous mode [ 69.082818][ T1880] device veth0_vlan entered promiscuous mode [ 69.118941][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.130683][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 69.148024][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.304061][ T1881] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.311334][ T1881] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.318930][ T1881] device bridge_slave_0 entered promiscuous mode [ 69.664958][ T1881] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.673948][ T1881] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.685008][ T1881] device bridge_slave_1 entered promiscuous mode [ 70.500668][ T30] audit: type=1400 audit(1757799296.084:142): avc: denied { create } for pid=1881 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 70.526396][ T30] audit: type=1400 audit(1757799296.144:143): avc: denied { write } for pid=1881 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 70.552233][ T30] audit: type=1400 audit(1757799296.144:144): avc: denied { read } for pid=1881 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 70.699554][ T1931] ip6_vti0: mtu greater than device maximum [ 70.712036][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.723414][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 71.175520][ T1936] device syzkaller0 entered promiscuous mode [ 71.194307][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 71.202820][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 71.211125][ T386] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.218187][ T386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.225689][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.234146][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.242871][ T386] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.249936][ T386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.258883][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.341699][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.349922][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.358091][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.366324][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.374788][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 71.383527][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 71.392363][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 71.400546][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 71.408637][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 71.416303][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.425013][ T1881] device veth0_vlan entered promiscuous mode [ 71.488309][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 71.497054][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 71.507217][ T1881] device veth1_macvtap entered promiscuous mode [ 71.566274][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 71.596050][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 71.608530][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 71.654986][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 71.677867][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 72.447932][ T1956] device syzkaller0 entered promiscuous mode [ 72.522001][ T1962] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 72.684512][ T1962] device veth1_macvtap left promiscuous mode [ 72.750915][ T1962] device macsec0 entered promiscuous mode [ 72.948680][ T1977] device macsec0 entered promiscuous mode [ 73.516524][ T1996] syz.3.470[1996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.516599][ T1996] syz.3.470[1996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.942631][ T2010] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 75.619525][ T30] audit: type=1400 audit(1757799300.564:145): avc: denied { create } for pid=2017 comm="syz.1.476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 75.876095][ T2029] device veth0_vlan left promiscuous mode [ 76.051574][ T30] audit: type=1400 audit(1757799301.684:146): avc: denied { create } for pid=2031 comm="syz.2.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 76.055855][ T2029] device veth0_vlan entered promiscuous mode [ 76.435680][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.444859][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.452725][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 76.604913][ T30] audit: type=1400 audit(1757799302.244:147): avc: denied { read } for pid=2038 comm="syz.0.482" dev="nsfs" ino=4026532553 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.882569][ T30] audit: type=1400 audit(1757799302.244:148): avc: denied { open } for pid=2038 comm="syz.0.482" path="net:[4026532553]" dev="nsfs" ino=4026532553 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.961684][ T2048] device veth0_vlan left promiscuous mode [ 77.979319][ T2048] device veth0_vlan entered promiscuous mode [ 78.059548][ T2049] device syzkaller0 entered promiscuous mode [ 78.075065][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.093539][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 78.106464][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.171393][ T2063] device pim6reg1 entered promiscuous mode [ 78.242576][ T2077] device sit0 left promiscuous mode [ 79.199211][ T30] audit: type=1400 audit(1757799304.834:149): avc: denied { create } for pid=2101 comm="syz.3.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 81.381745][ T2111] syz.3.502[2111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.381829][ T2111] syz.3.502[2111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.910968][ T2167] device sit0 left promiscuous mode [ 82.994112][ T2167] device sit0 entered promiscuous mode [ 83.570756][ T2207] device sit0 entered promiscuous mode [ 86.026468][ T2249] device sit0 left promiscuous mode [ 86.227245][ T2250] device sit0 entered promiscuous mode [ 87.121657][ T30] audit: type=1400 audit(1757799312.744:150): avc: denied { create } for pid=2269 comm="syz.1.546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 87.521860][ T30] audit: type=1400 audit(1757799313.164:151): avc: denied { create } for pid=2282 comm="syz.2.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 87.696023][ T2292] device pim6reg1 entered promiscuous mode [ 90.913757][ T30] audit: type=1400 audit(1757799316.554:152): avc: denied { create } for pid=2304 comm="syz.2.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 91.959584][ T30] audit: type=1400 audit(1757799317.594:153): avc: denied { create } for pid=2348 comm="syz.3.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 92.260622][ T2361] device sit0 entered promiscuous mode [ 92.439743][ T2377] device syzkaller0 entered promiscuous mode [ 95.056097][ T2398] device syzkaller0 entered promiscuous mode [ 96.102430][ T2440] device pim6reg1 entered promiscuous mode [ 96.388991][ T2434] device syzkaller0 entered promiscuous mode [ 96.442241][ T2452] device pim6reg1 entered promiscuous mode [ 97.168708][ T2484] device veth0_vlan left promiscuous mode [ 97.215121][ T2484] device veth0_vlan entered promiscuous mode [ 98.330126][ T2521] ip6_vti0: mtu greater than device maximum [ 98.771798][ T2534] device veth0_vlan left promiscuous mode [ 98.782880][ T2534] device veth0_vlan entered promiscuous mode [ 99.124012][ T30] audit: type=1400 audit(1757799324.764:154): avc: denied { create } for pid=2573 comm="syz.0.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 99.278592][ T2583] device sit0 left promiscuous mode [ 99.311331][ T2583] device sit0 entered promiscuous mode [ 99.565238][ T2596] device sit0 left promiscuous mode [ 99.622903][ T2597] device sit0 entered promiscuous mode [ 100.418631][ T2614] device sit0 left promiscuous mode [ 100.591148][ T2615] device sit0 entered promiscuous mode [ 100.785153][ T2641] tap0: tun_chr_ioctl cmd 1074025680 [ 100.809820][ T2643] device sit0 left promiscuous mode [ 100.957158][ T2651] device pim6reg1 entered promiscuous mode [ 102.137567][ T30] audit: type=1400 audit(1757799327.774:155): avc: denied { create } for pid=2701 comm="syz.0.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 102.171372][ T2700] device syzkaller0 entered promiscuous mode [ 102.371617][ T2733] device sit0 left promiscuous mode [ 102.449671][ T30] audit: type=1400 audit(1757799328.084:156): avc: denied { ioctl } for pid=2741 comm="syz.0.680" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 102.485401][ T2733] device sit0 entered promiscuous mode [ 102.742737][ T2761] device pim6reg1 entered promiscuous mode [ 103.573522][ T2800] device pim6reg1 entered promiscuous mode [ 103.862037][ T2826] device syzkaller0 entered promiscuous mode [ 104.605365][ T2883] bond_slave_1: mtu less than device minimum [ 105.293638][ T2912] device pim6reg1 entered promiscuous mode [ 105.343121][ T2919] device veth1_to_bond entered promiscuous mode [ 105.635960][ T2930] ip6_vti0: mtu greater than device maximum [ 106.096066][ T2941] device veth0_vlan left promiscuous mode [ 106.124424][ T2941] device veth0_vlan entered promiscuous mode [ 106.212152][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.224015][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.234731][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 106.538151][ T2954] device syzkaller0 entered promiscuous mode [ 108.196397][ T2966] bond_slave_1: mtu less than device minimum [ 109.262437][ T2993] tap0: tun_chr_ioctl cmd 2147767521 [ 109.293988][ T2991] device syzkaller0 entered promiscuous mode [ 110.453561][ T3020] syz.2.760[3020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.453669][ T3020] syz.2.760[3020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.713069][ T30] audit: type=1400 audit(1757799336.354:157): avc: denied { create } for pid=3029 comm="syz.1.762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 110.767226][ T3036] device bridge_slave_1 left promiscuous mode [ 110.774210][ T3036] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.782362][ T3036] device bridge_slave_0 left promiscuous mode [ 110.788840][ T3036] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.322569][ T3054] bond_slave_1: mtu less than device minimum [ 111.480108][ T3064] device pim6reg1 entered promiscuous mode [ 111.810699][ T3071] device syzkaller0 entered promiscuous mode [ 115.592948][ T3142] ªªªªªª: renamed from vlan0 [ 115.850067][ T3146] device pim6reg1 entered promiscuous mode [ 116.130792][ T3156] device sit0 left promiscuous mode [ 116.211200][ T3156] device sit0 entered promiscuous mode [ 117.406909][ T3184] ÿÿÿÿÿÿ: renamed from vlan1 [ 118.480105][ T3228] device pim6reg1 entered promiscuous mode [ 119.700154][ T3271] device syzkaller0 entered promiscuous mode [ 119.742277][ T3265] device sit0 entered promiscuous mode [ 119.938919][ T3282] syz.2.838[3282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.939021][ T3282] syz.2.838[3282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.018531][ T3288] device syzkaller0 entered promiscuous mode [ 121.669237][ T3358] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 121.750557][ T3358] syzkaller1: linktype set to 773 [ 122.797293][ T3369] device veth0_vlan left promiscuous mode [ 122.815104][ T3369] device veth0_vlan entered promiscuous mode [ 122.934247][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.957254][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.981143][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.351756][ T3392] device syzkaller0 entered promiscuous mode [ 127.008930][ T3403] device wg2 entered promiscuous mode [ 127.405943][ T3435] pim6reg0: tun_chr_ioctl cmd 1074025672 [ 127.431994][ T3435] pim6reg0: ignored: set checksum enabled [ 127.806902][ T3447] device pim6reg1 entered promiscuous mode [ 129.197398][ T3497] device sit0 left promiscuous mode [ 129.299587][ T3502] device sit0 entered promiscuous mode [ 131.017304][ T3554] FAULT_INJECTION: forcing a failure. [ 131.017304][ T3554] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 131.030495][ T3554] CPU: 0 PID: 3554 Comm: syz.3.924 Not tainted syzkaller #0 [ 131.037814][ T3554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 131.047905][ T3554] Call Trace: [ 131.051195][ T3554] [ 131.054254][ T3554] __dump_stack+0x21/0x30 [ 131.058610][ T3554] dump_stack_lvl+0xee/0x150 [ 131.063205][ T3554] ? show_regs_print_info+0x20/0x20 [ 131.068411][ T3554] ? security_file_permission+0x79/0xa0 [ 131.073962][ T3554] dump_stack+0x15/0x20 [ 131.078120][ T3554] should_fail+0x3c1/0x510 [ 131.082546][ T3554] should_fail_usercopy+0x1a/0x20 [ 131.087574][ T3554] strncpy_from_user+0x24/0x2e0 [ 131.092442][ T3554] ? file_end_write+0x1b0/0x1b0 [ 131.097295][ T3554] strncpy_from_user_nofault+0x73/0x150 [ 131.102848][ T3554] bpf_probe_read_compat_str+0xe6/0x180 [ 131.108524][ T3554] bpf_prog_15fefb20d90ba6ff+0x38/0x4a4 [ 131.115074][ T3554] bpf_trace_run2+0xb0/0x1b0 [ 131.119684][ T3554] ? bpf_trace_run1+0x1b0/0x1b0 [ 131.124540][ T3554] ? ksys_write+0x1eb/0x240 [ 131.129068][ T3554] ? __ia32_sys_read+0x90/0x90 [ 131.133838][ T3554] __bpf_trace_sys_enter+0x62/0x70 [ 131.138956][ T3554] trace_sys_enter+0x3d/0x50 [ 131.143547][ T3554] syscall_trace_enter+0x118/0x180 [ 131.148670][ T3554] syscall_enter_from_user_mode+0x1f/0x30 [ 131.154398][ T3554] do_syscall_64+0x24/0xa0 [ 131.158833][ T3554] ? clear_bhb_loop+0x50/0xa0 [ 131.163512][ T3554] ? clear_bhb_loop+0x50/0xa0 [ 131.168194][ T3554] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 131.174302][ T3554] RIP: 0033:0x7f8acc57dba9 [ 131.178736][ T3554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.198454][ T3554] RSP: 002b:00007f8acafe6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 131.206884][ T3554] RAX: ffffffffffffffda RBX: 00007f8acc7c4fa0 RCX: 00007f8acc57dba9 [ 131.214860][ T3554] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000006 [ 131.222851][ T3554] RBP: 00007f8acafe6090 R08: 0000000000000000 R09: 0000000000000000 [ 131.230821][ T3554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.238792][ T3554] R13: 00007f8acc7c5038 R14: 00007f8acc7c4fa0 R15: 00007fff17105368 [ 131.246782][ T3554] [ 131.412481][ T3555] device veth0_vlan left promiscuous mode [ 131.418542][ T3555] device veth0_vlan entered promiscuous mode [ 131.454933][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.484471][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.500071][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 131.593898][ T3569] device syzkaller0 entered promiscuous mode [ 131.645156][ T3583] syz.3.931[3583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.645240][ T3583] syz.3.931[3583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.268355][ T3602] FAULT_INJECTION: forcing a failure. [ 132.268355][ T3602] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.292841][ T3602] CPU: 1 PID: 3602 Comm: syz.3.937 Not tainted syzkaller #0 [ 132.300152][ T3602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 132.310224][ T3602] Call Trace: [ 132.313519][ T3602] [ 132.316464][ T3602] __dump_stack+0x21/0x30 [ 132.320812][ T3602] dump_stack_lvl+0xee/0x150 [ 132.325544][ T3602] ? show_regs_print_info+0x20/0x20 [ 132.330854][ T3602] ? asm_exc_page_fault+0x27/0x30 [ 132.336066][ T3602] dump_stack+0x15/0x20 [ 132.340323][ T3602] should_fail+0x3c1/0x510 [ 132.344762][ T3602] should_fail_usercopy+0x1a/0x20 [ 132.349796][ T3602] strncpy_from_user+0x24/0x2e0 [ 132.354747][ T3602] strncpy_from_user_nofault+0x73/0x150 [ 132.360340][ T3602] bpf_probe_read_compat_str+0xe6/0x180 [ 132.365901][ T3602] bpf_prog_15fefb20d90ba6ff+0x59/0x6b4 [ 132.371449][ T3602] bpf_trace_run2+0xb0/0x1b0 [ 132.376055][ T3602] ? bpf_trace_run1+0x1b0/0x1b0 [ 132.380999][ T3602] ? ksys_write+0x1eb/0x240 [ 132.385511][ T3602] ? __ia32_sys_read+0x90/0x90 [ 132.390278][ T3602] __bpf_trace_sys_enter+0x62/0x70 [ 132.395417][ T3602] trace_sys_enter+0x3d/0x50 [ 132.400029][ T3602] syscall_trace_enter+0x118/0x180 [ 132.405150][ T3602] syscall_enter_from_user_mode+0x1f/0x30 [ 132.411074][ T3602] do_syscall_64+0x24/0xa0 [ 132.415493][ T3602] ? clear_bhb_loop+0x50/0xa0 [ 132.420435][ T3602] ? clear_bhb_loop+0x50/0xa0 [ 132.425376][ T3602] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 132.431272][ T3602] RIP: 0033:0x7f8acc57dba9 [ 132.435819][ T3602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.455517][ T3602] RSP: 002b:00007f8acafe6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 132.463959][ T3602] RAX: ffffffffffffffda RBX: 00007f8acc7c4fa0 RCX: 00007f8acc57dba9 [ 132.472128][ T3602] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000006 [ 132.480103][ T3602] RBP: 00007f8acafe6090 R08: 0000000000000000 R09: 0000000000000000 [ 132.488102][ T3602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.496269][ T3602] R13: 00007f8acc7c5038 R14: 00007f8acc7c4fa0 R15: 00007fff17105368 [ 132.504346][ T3602] [ 133.163410][ T3620] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 135.309071][ T3710] device syzkaller0 entered promiscuous mode [ 137.461048][ T3774] device wg2 entered promiscuous mode [ 138.412672][ T3833] device sit0 left promiscuous mode [ 138.446759][ T3839] device sit0 entered promiscuous mode [ 139.650139][ T3885] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 139.694929][ T3885] device syzkaller0 entered promiscuous mode [ 140.027140][ T3894] device sit0 left promiscuous mode [ 140.369829][ T3896] device veth0_vlan left promiscuous mode [ 140.397988][ T3896] device veth0_vlan entered promiscuous mode [ 140.471680][ T3908] device veth0_vlan left promiscuous mode [ 140.490616][ T3908] device veth0_vlan entered promiscuous mode [ 140.528850][ T3914] device veth0_vlan left promiscuous mode [ 140.552439][ T3914] device veth0_vlan entered promiscuous mode [ 140.587432][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.600149][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 140.614138][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.032562][ T3928] device veth0_vlan left promiscuous mode [ 141.087145][ T3928] device veth0_vlan entered promiscuous mode [ 141.989004][ T3963] device veth0_vlan left promiscuous mode [ 142.043632][ T3963] device veth0_vlan entered promiscuous mode [ 142.589217][ T3995] FAULT_INJECTION: forcing a failure. [ 142.589217][ T3995] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 142.602599][ T3995] CPU: 0 PID: 3995 Comm: syz.2.1046 Not tainted syzkaller #0 [ 142.609996][ T3995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 142.620070][ T3995] Call Trace: [ 142.623369][ T3995] [ 142.626320][ T3995] __dump_stack+0x21/0x30 [ 142.630786][ T3995] dump_stack_lvl+0xee/0x150 [ 142.635576][ T3995] ? show_regs_print_info+0x20/0x20 [ 142.640808][ T3995] ? asm_exc_page_fault+0x27/0x30 [ 142.645864][ T3995] dump_stack+0x15/0x20 [ 142.650048][ T3995] should_fail+0x3c1/0x510 [ 142.654489][ T3995] should_fail_usercopy+0x1a/0x20 [ 142.659537][ T3995] strncpy_from_user+0x24/0x2e0 [ 142.664418][ T3995] strncpy_from_user_nofault+0x73/0x150 [ 142.669992][ T3995] bpf_probe_read_compat_str+0xe6/0x180 [ 142.675649][ T3995] bpf_prog_15fefb20d90ba6ff+0x59/0x5ec [ 142.681214][ T3995] bpf_trace_run2+0xb0/0x1b0 [ 142.685840][ T3995] ? bpf_trace_run1+0x1b0/0x1b0 [ 142.690709][ T3995] ? ksys_read+0x1eb/0x240 [ 142.695144][ T3995] ? vfs_write+0xf70/0xf70 [ 142.699584][ T3995] __bpf_trace_sys_enter+0x62/0x70 [ 142.704897][ T3995] trace_sys_enter+0x3d/0x50 [ 142.709506][ T3995] syscall_trace_enter+0x118/0x180 [ 142.714639][ T3995] syscall_enter_from_user_mode+0x1f/0x30 [ 142.720385][ T3995] do_syscall_64+0x24/0xa0 [ 142.724818][ T3995] ? clear_bhb_loop+0x50/0xa0 [ 142.729516][ T3995] ? clear_bhb_loop+0x50/0xa0 [ 142.734216][ T3995] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 142.740132][ T3995] RIP: 0033:0x7f4daa5ef65f [ 142.744560][ T3995] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 142.764624][ T3995] RSP: 002b:00007f4da9059030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 142.773208][ T3995] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4daa5ef65f [ 142.781201][ T3995] RDX: 0000000000000001 RSI: 00007f4da90590a0 RDI: 0000000000000007 [ 142.789198][ T3995] RBP: 00007f4da9059090 R08: 0000000000000000 R09: 0000000000000000 [ 142.797415][ T3995] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 142.805416][ T3995] R13: 00007f4daa838038 R14: 00007f4daa837fa0 R15: 00007ffd8eae3958 [ 142.813527][ T3995] [ 143.413907][ T4030] device pim6reg1 entered promiscuous mode [ 146.214119][ T4100] device sit0 left promiscuous mode [ 146.282033][ T4106] device sit0 left promiscuous mode [ 146.601816][ T4100] device sit0 entered promiscuous mode [ 146.757601][ T4121] syz.0.1080[4121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.760869][ T4122] syz.0.1080[4122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.778684][ T4121] syz.0.1080[4121] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.780554][ T4122] syz.0.1080[4122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.270665][ T4184] device veth0_vlan left promiscuous mode [ 148.356799][ T4184] device veth0_vlan entered promiscuous mode [ 148.428008][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.447950][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 148.478176][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 149.085896][ T4207] ref_ctr_offset mismatch. inode: 0x49b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 149.345010][ T4231] Â: renamed from pim6reg1 [ 149.575116][ T4260] device sit0 left promiscuous mode [ 149.589284][ T4260] device sit0 entered promiscuous mode [ 151.911418][ T4379] device veth1_macvtap entered promiscuous mode [ 151.928037][ T4379] device macsec0 entered promiscuous mode [ 151.935025][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 153.550713][ T4427] device veth0_vlan left promiscuous mode [ 153.580825][ T4427] device veth0_vlan entered promiscuous mode [ 155.201107][ T4498] tap0: tun_chr_ioctl cmd 35108 [ 155.213829][ T4498] tap0: tun_chr_ioctl cmd 35092 [ 157.703260][ T4598] syz.2.1215[4598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.703360][ T4598] syz.2.1215[4598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.710150][ T4600] syz.2.1215[4600] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.170152][ T4618] GPL: port 1(veth0_to_team) entered blocking state [ 158.208971][ T4618] GPL: port 1(veth0_to_team) entered disabled state [ 158.250000][ T4618] device veth0_to_team entered promiscuous mode [ 159.171799][ T4649] device sit0 entered promiscuous mode [ 160.269957][ T4694] bond_slave_1: mtu less than device minimum [ 161.757837][ T4746] device pim6reg1 entered promiscuous mode [ 161.788924][ T30] audit: type=1400 audit(1757799387.424:158): avc: denied { create } for pid=4745 comm="syz.3.1259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 163.079456][ T4809] syz.1.1280[4809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.079533][ T4809] syz.1.1280[4809] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.226501][ T4840] device sit0 entered promiscuous mode [ 164.523204][ T4854] ªªªªªª: renamed from vlan0 [ 165.510719][ T4868] device sit0 left promiscuous mode [ 165.593063][ T4868] device sit0 entered promiscuous mode [ 165.870768][ T4885] device wg2 left promiscuous mode [ 166.722043][ T4909] ±ÿ: renamed from team_slave_1 [ 167.524510][ T4927] device syzkaller0 entered promiscuous mode [ 168.291067][ T4937] device pim6reg1 entered promiscuous mode [ 168.693020][ T4964] bridge0: port 3(veth0_macvtap) entered disabled state [ 168.701654][ T4964] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.711724][ T4964] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.765076][ T4970] device veth0_macvtap left promiscuous mode [ 168.771847][ T4970] bridge0: port 3(veth0_macvtap) entered disabled state [ 168.779749][ T4970] device bridge_slave_1 left promiscuous mode [ 168.793692][ T4970] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.802493][ T4970] device bridge_slave_0 left promiscuous mode [ 168.808789][ T4970] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.150156][ T5003] Â: renamed from pim6reg1 [ 169.377824][ T30] audit: type=1400 audit(1757799395.014:159): avc: denied { associate } for pid=5020 comm="syz.2.1341" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 171.689000][ T5130] device syzkaller0 entered promiscuous mode [ 172.470852][ T5162] device sit0 left promiscuous mode [ 172.682401][ T5167] device sit0 entered promiscuous mode [ 174.533152][ T5207] device syzkaller0 entered promiscuous mode [ 174.740628][ T5212] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 174.746615][ T5212] syzkaller0: linktype set to 4 [ 174.824313][ T30] audit: type=1400 audit(1757799400.464:160): avc: denied { setattr } for pid=5220 comm="syz.4.1397" path="/dev/net/tun" dev="devtmpfs" ino=152 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 175.438494][ T5237] bond_slave_1: mtu less than device minimum [ 177.329057][ T5296] bond_slave_1: mtu less than device minimum [ 177.351000][ T5295] device pim6reg1 entered promiscuous mode [ 177.647112][ T5306] device syzkaller0 entered promiscuous mode [ 179.090680][ T5323] sock: sock_set_timeout: `syz.2.1426' (pid 5323) tries to set negative timeout [ 181.195049][ T5381] bond_slave_1: mtu less than device minimum [ 181.264298][ T5384] device pim6reg1 entered promiscuous mode [ 183.045961][ T5408] device wg2 entered promiscuous mode [ 186.807861][ T5490] device syzkaller0 entered promiscuous mode [ 186.846944][ T5488] device veth0_vlan left promiscuous mode [ 186.857339][ T5488] device veth0_vlan entered promiscuous mode [ 187.058519][ T5506] device sit0 left promiscuous mode [ 187.095325][ T5508] device wg2 entered promiscuous mode [ 187.103786][ T5506] device sit0 entered promiscuous mode [ 188.278797][ T5562] ip6_vti0: mtu greater than device maximum [ 188.840724][ T5581] device sit0 left promiscuous mode [ 189.050492][ T5601] Â: renamed from pim6reg1 [ 190.027496][ T5640] device veth0_vlan left promiscuous mode [ 190.048071][ T5640] device veth0_vlan entered promiscuous mode [ 190.229377][ T5653] device sit0 left promiscuous mode [ 190.327100][ T5653] device sit0 entered promiscuous mode [ 190.545838][ T5657] device pim6reg1 entered promiscuous mode [ 190.707258][ T5662] device sit0 left promiscuous mode [ 190.805306][ T5672] device sit0 left promiscuous mode [ 190.963388][ T5677] device sit0 entered promiscuous mode [ 191.221658][ T5678] device sit0 entered promiscuous mode [ 191.483446][ T5674] Â: renamed from pim6reg1 [ 191.494794][ T5685] device sit0 left promiscuous mode [ 192.665442][ T5726] device syzkaller0 entered promiscuous mode [ 192.735921][ T5730] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 192.746820][ T5730] syzkaller0: Linktype set failed because interface is up [ 192.784800][ T332] syzkaller0: tun_net_xmit 48 [ 192.983059][ T5732] device pim6reg1 entered promiscuous mode [ 194.346387][ T5774] ref_ctr_offset mismatch. inode: 0x658 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 197.370606][ T5884] device syzkaller0 entered promiscuous mode [ 197.610720][ T5896] syz.1.1586[5896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.610827][ T5896] syz.1.1586[5896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.804929][ T5905] device sit0 entered promiscuous mode [ 198.192231][ T5908] device syzkaller0 entered promiscuous mode [ 198.640971][ T5927] device veth0_vlan left promiscuous mode [ 198.677254][ T5927] device veth0_vlan entered promiscuous mode [ 199.111616][ T5947] device veth0_vlan left promiscuous mode [ 199.148967][ T5947] device veth0_vlan entered promiscuous mode [ 199.158236][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.184943][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.234627][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 199.639436][ T5974] device syzkaller0 entered promiscuous mode [ 199.787069][ T5998] device macsec0 left promiscuous mode [ 199.811139][ T5998] device veth1_macvtap entered promiscuous mode [ 199.830447][ T5998] device macsec0 entered promiscuous mode [ 199.850406][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 201.504449][ T6058] device sit0 left promiscuous mode [ 201.737369][ T6063] device sit0 entered promiscuous mode [ 206.194733][ T6148] device syzkaller0 entered promiscuous mode [ 206.683346][ T6162] device syzkaller0 entered promiscuous mode [ 207.145342][ T6183] syz.3.1670[6183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.145425][ T6183] syz.3.1670[6183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.586808][ T6206] device sit0 left promiscuous mode [ 207.761369][ T6214] device sit0 entered promiscuous mode [ 208.048271][ T6212] GPL: port 2(erspan0) entered blocking state [ 208.063056][ T6212] GPL: port 2(erspan0) entered disabled state [ 208.079455][ T6212] device erspan0 entered promiscuous mode [ 208.134884][ T6223] device sit0 left promiscuous mode [ 208.347783][ T6225] device sit0 entered promiscuous mode [ 208.433612][ T6230] device sit0 left promiscuous mode [ 208.613367][ T6231] device sit0 entered promiscuous mode [ 208.764890][ T6235] device veth1_macvtap entered promiscuous mode [ 208.802432][ T6235] device macsec0 entered promiscuous mode [ 208.857371][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.697588][ T6274] device pim6reg1 entered promiscuous mode [ 210.798363][ T6313] GPL: port 2(erspan0) entered blocking state [ 210.804554][ T6313] GPL: port 2(erspan0) entered forwarding state [ 211.530629][ T6339] tap0: tun_chr_ioctl cmd 1074025675 [ 211.540623][ T6339] tap0: persist enabled [ 211.549806][ T6339] tap0: tun_chr_ioctl cmd 1074025675 [ 211.660779][ T6339] tap0: persist enabled [ 211.670602][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 213.748868][ T6400] device pim6reg1 entered promiscuous mode [ 213.877783][ T6407] device sit0 left promiscuous mode [ 213.978791][ T6408] tap0: tun_chr_ioctl cmd 2147767520 [ 213.999243][ T6410] tap0: tun_chr_ioctl cmd 1074025677 [ 214.060769][ T6410] tap0: linktype set to 1 [ 214.098147][ T6409] device sit0 entered promiscuous mode [ 216.092992][ T6480] device wg2 left promiscuous mode [ 216.149391][ T6480] device wg2 entered promiscuous mode [ 218.285517][ T6554] device pim6reg1 entered promiscuous mode [ 218.480499][ T6558] device pim6reg1 entered promiscuous mode [ 219.677304][ T6606] device sit0 left promiscuous mode [ 219.772196][ T6613] device sit0 entered promiscuous mode [ 219.960991][ T6617] device sit0 left promiscuous mode [ 219.973706][ T6620] device wg2 entered promiscuous mode [ 221.369696][ T6685] device syzkaller0 entered promiscuous mode [ 228.872130][ T6819] syz.3.1844[6819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.872247][ T6819] syz.3.1844[6819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.916071][ T6858] device veth1_macvtap entered promiscuous mode [ 229.935604][ T6858] device macsec0 entered promiscuous mode [ 229.960593][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.955505][ T6883] device sit0 left promiscuous mode [ 231.314586][ T6890] device veth1_macvtap left promiscuous mode [ 231.325131][ T6890] device macsec0 left promiscuous mode [ 231.412861][ T6890] device veth1_macvtap entered promiscuous mode [ 231.450435][ T6890] device macsec0 entered promiscuous mode [ 232.007258][ T6921] device syzkaller0 entered promiscuous mode [ 237.153832][ T7082] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.181423][ T7082] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.255478][ T7082] device bridge_slave_0 entered promiscuous mode [ 237.276402][ T7113] syz.0.1928[7113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.276483][ T7113] syz.0.1928[7113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.314899][ T7082] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.376410][ T7113] syz.0.1928[7113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.422686][ T7082] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.442556][ T7082] device bridge_slave_1 entered promiscuous mode [ 237.869347][ T7130] device veth0_vlan left promiscuous mode [ 237.884134][ T7130] device veth0_vlan entered promiscuous mode [ 238.012716][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.021589][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 238.029303][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.177202][ T8] GPL: port 2(erspan0) entered disabled state [ 238.184404][ T8] device erspan0 left promiscuous mode [ 238.190410][ T8] GPL: port 2(erspan0) entered disabled state [ 240.118067][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.126135][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.185584][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.194339][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.202875][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.209915][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.225824][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.284468][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.301481][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.309992][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.317095][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.329552][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.339641][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.350841][ T8] device veth0_to_team left promiscuous mode [ 240.356969][ T8] GPL: port 1(veth0_to_team) entered disabled state [ 240.365595][ T8] device bridge_slave_1 left promiscuous mode [ 240.372120][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.379856][ T8] device bridge_slave_0 left promiscuous mode [ 240.386136][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.394738][ T8] device veth0_vlan left promiscuous mode [ 240.624044][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 240.632325][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.648034][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 240.656560][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.670798][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.679452][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.687817][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.695881][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.706178][ T7082] device veth0_vlan entered promiscuous mode [ 240.768316][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.777818][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.787928][ T7082] device veth1_macvtap entered promiscuous mode [ 240.806586][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.816785][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.827280][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.868687][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.940941][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 241.914618][ T7208] device sit0 entered promiscuous mode [ 242.088244][ T7216] device syzkaller0 entered promiscuous mode [ 242.324595][ T7242] bond_slave_1: mtu less than device minimum [ 242.924536][ T7288] bond_slave_1: mtu less than device minimum [ 242.939327][ T7288] syz.2.1975[7288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.939407][ T7288] syz.2.1975[7288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.962034][ T7288] syz.2.1975[7288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.989024][ T7288] syz.2.1975[7288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.196131][ T7312] syz.4.1982[7312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.226427][ T7312] syz.4.1982[7312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.398480][ T7333] device macsec0 entered promiscuous mode [ 244.051559][ T7382] device syzkaller0 entered promiscuous mode [ 244.392264][ T7406] tun0: tun_chr_ioctl cmd 1074025678 [ 244.397813][ T7406] tun0: group set to 0 [ 245.457773][ T7452] device pim6reg1 entered promiscuous mode [ 245.508554][ T7459] device wg2 left promiscuous mode [ 246.021931][ T7479] device team_slave_1 entered promiscuous mode [ 246.074519][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.080903][ T30] audit: type=1400 audit(1757799471.714:161): avc: denied { create } for pid=7478 comm="syz.1.2023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 246.084235][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.834636][ T7507] device sit0 left promiscuous mode [ 246.894967][ T7507] device sit0 entered promiscuous mode [ 248.435095][ T7567] device veth0_vlan left promiscuous mode [ 248.444969][ T7500] syz.3.2027 (7500) used greatest stack depth: 17472 bytes left [ 248.490804][ T7567] device veth0_vlan entered promiscuous mode [ 248.528415][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.544983][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 248.579155][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.218338][ T30] audit: type=1400 audit(1757799475.854:162): avc: denied { create } for pid=7633 comm="syz.4.2068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 251.817237][ T7694] ÿÿÿÿÿÿ: renamed from vlan1 [ 252.693615][ T7740] device syzkaller0 entered promiscuous mode [ 252.796088][ T7749] device wg2 entered promiscuous mode [ 253.436383][ T7760] device veth0_vlan left promiscuous mode [ 253.470433][ T7760] device veth0_vlan entered promiscuous mode [ 253.539420][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.558257][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.580261][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 254.110552][ T7808] device sit0 entered promiscuous mode [ 254.357003][ T7818] device sit0 entered promiscuous mode [ 255.365529][ T7837] device sit0 left promiscuous mode [ 255.612748][ T7868] device pim6reg1 entered promiscuous mode [ 255.631638][ T7858] tap0: tun_chr_ioctl cmd 2147767517 [ 256.094198][ T7263] syz.3.1969 (7263) used greatest stack depth: 15936 bytes left [ 256.196203][ T7906] device pim6reg1 entered promiscuous mode [ 259.792834][ T7993] device syzkaller0 entered promiscuous mode [ 260.384032][ T8038] device syzkaller0 entered promiscuous mode [ 260.683016][ T8048] device syzkaller0 entered promiscuous mode [ 260.807710][ T8050] bond_slave_1: mtu less than device minimum [ 260.880657][ T8046] device veth0 entered promiscuous mode [ 262.415719][ T30] audit: type=1400 audit(1757799488.054:163): avc: denied { create } for pid=8123 comm="syz.1.2203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 264.963829][ T8198] device pim6reg1 entered promiscuous mode [ 265.851691][ T30] audit: type=1400 audit(1757799491.484:164): avc: denied { create } for pid=8210 comm="syz.1.2223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 267.374678][ T8256] device sit0 entered promiscuous mode [ 267.523242][ T8272] device wg2 left promiscuous mode [ 267.799123][ T8294] device syzkaller0 entered promiscuous mode [ 268.191735][ T8310] device wg2 entered promiscuous mode [ 271.180172][ T8413] GPL: port 1(erspan0) entered blocking state [ 271.189289][ T8413] GPL: port 1(erspan0) entered disabled state [ 271.203049][ T8413] device erspan0 entered promiscuous mode [ 276.792729][ T8522] device syzkaller0 entered promiscuous mode [ 276.797554][ T30] audit: type=1400 audit(1757799502.434:165): avc: denied { create } for pid=8538 comm="syz.4.2310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 277.099323][ T8551] device pim6reg1 entered promiscuous mode [ 277.784020][ T8576] device veth1_macvtap left promiscuous mode [ 280.072505][ T8614] device pim6reg1 entered promiscuous mode [ 281.638358][ T8656] syz.3.2342 (8656) used obsolete PPPIOCDETACH ioctl [ 282.449174][ T8708] device syzkaller0 entered promiscuous mode [ 283.387768][ T8744] device syzkaller0 entered promiscuous mode [ 285.444554][ T30] audit: type=1400 audit(1757799511.084:166): avc: denied { create } for pid=8810 comm="syz.4.2389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 286.726601][ T8845] device syzkaller0 entered promiscuous mode [ 286.983047][ T30] audit: type=1400 audit(1757799512.624:167): avc: denied { create } for pid=8847 comm="syz.2.2399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 287.892836][ T8861] device syzkaller0 entered promiscuous mode [ 288.032560][ T8885] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.039857][ T8885] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.092025][ T8889] device wg2 left promiscuous mode [ 288.415566][ T8898] device sit0 entered promiscuous mode [ 288.584144][ T8902] device sit0 left promiscuous mode [ 288.773448][ T8899] device veth0_vlan left promiscuous mode [ 288.784433][ T8899] device veth0_vlan entered promiscuous mode [ 288.847053][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.861191][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 288.872015][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 291.987899][ T8942] ref_ctr_offset mismatch. inode: 0x24e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 292.078975][ T8952] syz.3.2427[8952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.079076][ T8952] syz.3.2427[8952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.340032][ T8962] pim6reg0: tun_chr_ioctl cmd 1074025680 [ 292.396490][ T8962] pim6reg0: tun_chr_ioctl cmd 1074025672 [ 292.410352][ T8962] pim6reg0: ignored: set checksum enabled [ 292.457203][ T8960] device sit0 entered promiscuous mode [ 292.546814][ T8963] -1: renamed from syzkaller0 [ 292.821423][ T8974] device bridge_slave_1 left promiscuous mode [ 292.827657][ T8974] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.916777][ T8974] device bridge_slave_0 left promiscuous mode [ 292.951233][ T8974] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.632104][ T9056] device sit0 left promiscuous mode [ 295.815049][ T9060] device veth0_vlan left promiscuous mode [ 295.833789][ T9060] device veth0_vlan entered promiscuous mode [ 295.900107][ T9056] device sit0 entered promiscuous mode [ 296.069813][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.083770][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 296.100423][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.619376][ T9131] device wg2 left promiscuous mode [ 297.625876][ T9132] device sit0 left promiscuous mode [ 300.672042][ T9275] device veth0_vlan left promiscuous mode [ 300.835656][ T9275] device veth0_vlan entered promiscuous mode [ 300.963385][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.034259][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 301.073088][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 302.337585][ T9320] device veth0_vlan left promiscuous mode [ 302.349304][ T9320] device veth0_vlan entered promiscuous mode [ 303.636612][ T9366] device pim6reg1 entered promiscuous mode [ 304.440366][ T9400] device sit0 left promiscuous mode [ 309.133394][ T9472] device syzkaller0 entered promiscuous mode [ 310.047593][ T9498] device sit0 left promiscuous mode [ 310.390057][ T9511] device sit0 entered promiscuous mode [ 311.023450][ T9527] device veth0_vlan left promiscuous mode [ 311.073508][ T9527] device veth0_vlan entered promiscuous mode [ 311.425478][ T9540] device syzkaller0 entered promiscuous mode [ 311.542527][ T9556] syz.1.2601[9556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.545007][ T9556] syz.1.2601[9556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.470688][ T9575] bond_slave_1: mtu less than device minimum [ 312.598832][ T9587] device syzkaller0 entered promiscuous mode [ 314.557626][ T9636] device veth1_macvtap left promiscuous mode [ 314.563796][ T9636] device macsec0 left promiscuous mode [ 314.592363][ T9636] device veth1_macvtap entered promiscuous mode [ 314.598677][ T9636] device macsec0 entered promiscuous mode [ 316.859103][ T9642] GPL: port 1(veth0_to_team) entered blocking state [ 316.887081][ T9642] GPL: port 1(veth0_to_team) entered disabled state [ 316.962685][ T9642] device veth0_to_team entered promiscuous mode [ 317.357447][ T9665] device sit0 entered promiscuous mode [ 317.558836][ T9675] bond_slave_1: mtu less than device minimum [ 317.599695][ T9685] Â: renamed from pim6reg1 [ 322.327143][ T9870] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 323.141675][ T9914] bond_slave_1: mtu less than device minimum [ 323.311084][ T9912] device sit0 left promiscuous mode [ 327.255625][ T9960] device syzkaller0 entered promiscuous mode [ 327.628304][ T9981] device veth1_macvtap left promiscuous mode [ 327.634743][ T9981] device macsec0 left promiscuous mode [ 328.585134][T10004] device veth0_vlan left promiscuous mode [ 328.606070][T10004] device veth0_vlan entered promiscuous mode [ 328.665147][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.678191][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 328.696800][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 330.305737][T10062] bond_slave_1: mtu less than device minimum [ 332.851590][T10147] device syzkaller0 entered promiscuous mode [ 335.657227][T10202] ªªªªªª: renamed from vlan0 [ 335.667076][T10195] device pim6reg1 entered promiscuous mode [ 337.069526][T10220] syz.1.2789[10220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.069608][T10220] syz.1.2789[10220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.284193][T10217] device syzkaller0 entered promiscuous mode [ 337.519959][T10234] device sit0 entered promiscuous mode [ 338.657638][T10275] device veth0_vlan left promiscuous mode [ 338.746416][T10275] device veth0_vlan entered promiscuous mode [ 338.837631][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.847157][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 338.858772][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 339.765679][T10301] device pim6reg1 entered promiscuous mode [ 340.065966][ T101] udevd[101]: worker [1027] terminated by signal 33 (Unknown signal 33) [ 340.093888][ T101] udevd[101]: worker [1027] failed while handling '/devices/virtual/block/loop3' [ 340.151616][T10308] device sit0 left promiscuous mode [ 340.701573][T10315] device sit0 entered promiscuous mode [ 341.087317][T10342] device pim6reg1 entered promiscuous mode [ 341.302827][T10357] ------------[ cut here ]------------ [ 341.308349][T10357] trace type BPF program uses run-time allocation [ 341.352925][T10357] WARNING: CPU: 1 PID: 10357 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 341.394883][T10357] Modules linked in: [ 341.398905][T10357] CPU: 1 PID: 10357 Comm: syz.2.2830 Not tainted syzkaller #0 [ 341.440489][T10357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 341.461079][T10357] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 341.475214][T10357] Code: ee ff 48 c7 c6 60 ed 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 c6 4c ee ff c6 05 14 93 6b 05 01 48 c7 c7 c0 e9 47 85 e8 33 2b 25 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 341.495658][T10357] RSP: 0018:ffffc90000c6f428 EFLAGS: 00010246 [ 341.504065][T10357] RAX: 731d73ef01066400 RBX: 0000000000000001 RCX: 0000000000080000 [ 341.512569][T10357] RDX: ffffc9000232f000 RSI: 0000000000002cee RDI: 0000000000002cef [ 341.522142][T10357] RBP: ffffc90000c6f470 R08: dffffc0000000000 R09: ffffed103ee265e8 [ 341.540979][T10357] R10: ffffed103ee265e8 R11: 1ffff1103ee265e7 R12: ffff88813a6e4000 [ 341.551721][T10357] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888113691000 [ 341.813627][T10357] FS: 00007f4da90596c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 341.832431][T10357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 341.863701][T10357] CR2: 00007f8acc793198 CR3: 000000011931c000 CR4: 00000000003506b0 [ 341.891813][T10357] DR0: 0000200000000300 DR1: 0000200000000200 DR2: 0000000000000000 [ 341.934761][T10357] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 341.994150][T10357] Call Trace: [ 341.997664][T10357] [ 342.030356][T10357] resolve_pseudo_ldimm64+0x685/0x11d0 [ 342.036026][T10357] ? check_attach_btf_id+0xde0/0xde0 [ 342.111567][T10357] ? __mark_reg_known+0x1b0/0x1b0 [ 342.116679][T10357] ? security_capable+0x87/0xb0 [ 342.152344][T10357] bpf_check+0x2c25/0xf280 [ 342.163941][T10357] ? is_bpf_text_address+0x177/0x190 [ 342.170355][T10357] ? bpf_get_btf_vmlinux+0x60/0x60 [ 342.175644][T10357] ? unwind_get_return_address+0x4d/0x90 [ 342.230348][T10357] ? stack_trace_save+0xe0/0xe0 [ 342.235534][T10357] ? arch_stack_walk+0xee/0x140 [ 342.240827][T10357] ? stack_trace_save+0x98/0xe0 [ 342.270637][T10400] device sit0 left promiscuous mode [ 342.270694][T10357] ? __stack_depot_save+0x34/0x480 [ 342.299438][T10357] ? __kasan_slab_alloc+0x69/0xf0 [ 342.305229][T10357] ? __kasan_kmalloc+0xec/0x110 [ 342.322686][T10357] ? __kasan_kmalloc+0xda/0x110 [ 342.327615][T10357] ? kmem_cache_alloc_trace+0x119/0x270 [ 342.347118][T10357] ? selinux_bpf_prog_alloc+0x51/0x140 [ 342.361382][ T30] audit: type=1400 audit(1757799568.004:168): avc: denied { mounton } for pid=10405 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 342.362479][T10357] ? security_bpf_prog_alloc+0x62/0x90 [ 342.393427][T10396] device sit0 entered promiscuous mode [ 342.409206][T10357] ? bpf_prog_load+0x97c/0x1550 [ 342.414485][T10357] ? __sys_bpf+0x4c3/0x730 [ 342.419006][T10357] ? __x64_sys_bpf+0x7c/0x90 [ 342.430341][T10357] ? x64_sys_call+0x4b9/0x9a0 [ 342.455352][T10357] ? do_syscall_64+0x4c/0xa0 [ 342.460109][T10357] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 342.484461][T10357] ? check_stack_object+0x81/0x140 [ 342.489754][T10357] ? memset+0x35/0x40 [ 342.514969][T10357] ? bpf_obj_name_cpy+0x193/0x1e0 [ 342.520077][T10357] bpf_prog_load+0x1042/0x1550 [ 342.535711][T10357] ? __anon_inode_getfd+0x34b/0x3b0 [ 342.550455][T10357] ? map_freeze+0x360/0x360 [ 342.555177][T10357] ? selinux_bpf+0xc7/0xf0 [ 342.559636][T10357] ? security_bpf+0x82/0xa0 [ 342.564897][T10357] __sys_bpf+0x4c3/0x730 [ 342.569269][T10357] ? bpf_link_show_fdinfo+0x310/0x310 [ 342.580752][T10357] ? __kasan_check_write+0x14/0x20 [ 342.585925][T10357] ? switch_fpu_return+0x15d/0x2c0 [ 342.600313][T10357] __x64_sys_bpf+0x7c/0x90 [ 342.604826][T10357] x64_sys_call+0x4b9/0x9a0 [ 342.609496][T10357] do_syscall_64+0x4c/0xa0 [ 342.628620][T10405] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.640810][T10357] ? clear_bhb_loop+0x50/0xa0 [ 342.645573][T10357] ? clear_bhb_loop+0x50/0xa0 [ 342.660809][T10357] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 342.680331][T10405] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.687802][T10405] device bridge_slave_0 entered promiscuous mode [ 342.694335][T10357] RIP: 0033:0x7f4daa5f0ba9 [ 342.698788][T10357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.760415][T10357] RSP: 002b:00007f4da9059038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 342.768876][T10357] RAX: ffffffffffffffda RBX: 00007f4daa837fa0 RCX: 00007f4daa5f0ba9 [ 342.786064][T10405] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.800742][T10405] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.808493][T10405] device bridge_slave_1 entered promiscuous mode [ 342.826100][T10357] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 342.851044][T10357] RBP: 00007f4daa673e19 R08: 0000000000000000 R09: 0000000000000000 [ 342.859082][T10357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 342.890309][T10357] R13: 00007f4daa838038 R14: 00007f4daa837fa0 R15: 00007ffd8eae3958 [ 342.898377][T10357] [ 342.931877][T10357] ---[ end trace 5655709b86f56752 ]--- [ 343.187729][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 343.202719][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.238798][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 343.276761][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.310097][ T386] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.317234][ T386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.361764][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 343.418289][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.458045][ T386] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.465179][ T386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.548851][T10475] device veth0_vlan left promiscuous mode [ 343.562911][T10475] device veth0_vlan entered promiscuous mode [ 343.666673][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 343.692377][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.733393][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.790915][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 343.840897][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.869529][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 343.927387][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 343.971552][T10405] device veth0_vlan entered promiscuous mode [ 344.133214][T10405] device veth1_macvtap entered promiscuous mode [ 344.148427][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 344.167040][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 344.201467][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 344.493214][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 344.502201][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 344.510935][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 344.519378][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 344.636376][ T30] audit: type=1400 audit(1757799570.274:169): avc: denied { unmount } for pid=10405 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 344.931820][ T2022] device veth0_vlan left promiscuous mode [ 347.921846][T10604] device sit0 left promiscuous mode [ 347.954772][T10604] device sit0 entered promiscuous mode [ 348.128107][T10602] device syzkaller0 entered promiscuous mode [ 348.835794][T10633] device syzkaller0 entered promiscuous mode [ 349.213146][T10649] device veth0_vlan left promiscuous mode [ 349.251161][T10649] device veth0_vlan entered promiscuous mode [ 350.415232][T10696] device sit0 left promiscuous mode [ 350.526567][T10695] device sit0 entered promiscuous mode [ 351.451322][T10756] device sit0 left promiscuous mode [ 353.873328][T10825] device syzkaller0 entered promiscuous mode [ 354.565373][T10830] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.625114][T10830] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.710845][T10830] device bridge_slave_0 entered promiscuous mode [ 354.792306][T10830] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.799411][T10830] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.944527][T10830] device bridge_slave_1 entered promiscuous mode [ 355.222449][ T386] device veth1 left promiscuous mode [ 355.227860][ T386] kfree: port 1(veth1) entered disabled state [ 355.297715][ T386] device veth1_macvtap left promiscuous mode [ 355.370349][ T386] device veth0_vlan left promiscuous mode [ 356.344460][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.371613][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.412023][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.439667][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.485391][ T2022] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.492653][ T2022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.582636][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 356.597943][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.641710][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.690181][ T2022] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.697380][ T2022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.803172][T10924] device pim6reg1 entered promiscuous mode [ 356.820119][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 356.836232][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.861691][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 356.870547][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.961076][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 356.969873][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 356.978549][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 356.986805][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 356.997813][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 357.005663][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 357.040010][T10830] device veth0_vlan entered promiscuous mode [ 357.108833][T10830] device veth1_macvtap entered promiscuous mode [ 357.139795][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 357.148659][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 357.158145][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 357.202234][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 357.210911][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 357.219535][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 357.229262][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 357.375215][T10952] device sit0 left promiscuous mode [ 357.967918][T10974] device syzkaller0 entered promiscuous mode [ 358.057542][T10983] syz.4.2996[10983] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.057780][T10983] syz.4.2996[10983] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.842429][T11090] device sit0 entered promiscuous mode [ 360.363601][T11115] ip6_vti0: mtu greater than device maximum [ 361.385542][T11140] device veth0_vlan left promiscuous mode [ 361.398679][T11140] device veth0_vlan entered promiscuous mode [ 361.431024][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 361.439735][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 361.456037][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.390439][T11206] device sit0 entered promiscuous mode [ 363.758860][T11231] device syzkaller0 entered promiscuous mode [ 366.308814][ T30] audit: type=1400 audit(1757799591.944:170): avc: denied { setattr } for pid=11299 comm="syz.2.3087" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 366.911538][T11309] syz.3.3089[11309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.911650][T11309] syz.3.3089[11309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.300411][T11341] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.359363][T11341] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.401756][T11341] device bridge_slave_0 entered promiscuous mode [ 368.441420][T11341] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.448511][T11341] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.470802][T11341] device bridge_slave_1 entered promiscuous mode [ 369.043144][T11365] device sit0 left promiscuous mode [ 369.381161][ T386] device veth0_to_team left promiscuous mode [ 369.387364][ T386] GPL: port 1(veth0_to_team) entered disabled state [ 369.396661][ T386] device veth1_macvtap left promiscuous mode [ 369.402797][ T386] device veth0_vlan left promiscuous mode [ 369.512047][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 369.519726][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 369.528269][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 369.537420][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 369.546010][ T2022] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.553118][ T2022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.561289][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 369.569790][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 369.578524][ T2022] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.585717][ T2022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.593496][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 369.805024][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 369.814795][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 369.825439][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 369.834978][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.849883][T11341] device veth0_vlan entered promiscuous mode [ 369.881880][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 369.894797][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 369.902426][T11398] syz.0.3117[11398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.902999][T11398] syz.0.3117[11398] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.906464][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 369.935717][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.945457][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.953925][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 369.979604][T11395] device syzkaller0 entered promiscuous mode [ 370.196763][T11341] device veth1_macvtap entered promiscuous mode [ 370.205704][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 370.226045][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 370.235041][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 370.303472][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 370.314243][ T2022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 370.683853][T11418] device pim6reg1 entered promiscuous mode [ 371.116422][T11439] device wg2 entered promiscuous mode [ 371.315110][T11450] syz.3.3131[11450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.315194][T11450] syz.3.3131[11450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.316221][T11489] syz.1.3142[11489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.343468][T11489] syz.1.3142[11489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.357721][T11485] €Â0: renamed from pim6reg1 [ 372.576698][T11494] syz.0.3146[11494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.576781][T11494] syz.0.3146[11494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.098779][T11524] syz.3.3155[11524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.203854][T11524] syz.3.3155[11524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.762519][T11531] syz.2.3157[11531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.860416][T11531] syz.2.3157[11531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.879390][T11545] syz.2.3161[11545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.892190][T11545] syz.2.3161[11545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 378.268890][T11615] bpf_get_probe_write_proto: 2 callbacks suppressed [ 378.268914][T11615] syz.4.3183[11615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 378.354985][T11615] syz.4.3183[11615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.297752][T11751] device sit0 entered promiscuous mode [ 381.859803][T11776] syz.3.3227[11776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.859884][T11776] syz.3.3227[11776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.972249][T11861] nr0: tun_chr_ioctl cmd 1074025673 [ 386.338308][T11874] syz.4.3254[11874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.338390][T11874] syz.4.3254[11874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.166065][T11902] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.200307][T11902] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.207996][T11902] device bridge_slave_0 entered promiscuous mode [ 387.216648][T11902] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.247902][T11902] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.288455][T11902] device bridge_slave_1 entered promiscuous mode [ 388.149183][T11940] device pim6reg1 entered promiscuous mode [ 388.191931][T11945] device wg2 entered promiscuous mode [ 388.229531][ T30] audit: type=1400 audit(1757799613.864:171): avc: denied { attach_queue } for pid=11947 comm="syz.0.3273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 388.270867][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 388.278449][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 388.356959][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 388.399101][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 388.421222][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.428297][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.500361][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 388.511517][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 388.530724][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.550116][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.557214][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.574830][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 388.591315][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.603352][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 388.611982][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.622286][T11963] device veth0_vlan left promiscuous mode [ 388.628786][T11963] device veth0_vlan entered promiscuous mode [ 388.651447][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 388.671963][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 388.719971][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 388.728086][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.779118][T11969] device sit0 left promiscuous mode [ 388.797335][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.806591][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.817138][T11902] device veth0_vlan entered promiscuous mode [ 388.824099][T11967] device pim6reg1 entered promiscuous mode [ 389.520341][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 389.534602][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 389.545148][T11902] device veth1_macvtap entered promiscuous mode [ 389.595103][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 389.604232][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 389.671252][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 389.680662][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 389.808573][T11978] device syzkaller0 entered promiscuous mode [ 389.868364][T11997] device syzkaller0 entered promiscuous mode [ 390.463547][T12033] device sit0 entered promiscuous mode [ 390.764989][T12048] device veth0_vlan left promiscuous mode [ 390.781220][T12048] device veth0_vlan entered promiscuous mode [ 390.906968][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 390.916581][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 390.924578][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 391.124238][T12056] device pim6reg1 entered promiscuous mode [ 392.576796][T12097] device syzkaller0 entered promiscuous mode [ 395.905005][T12166] device pim6reg1 entered promiscuous mode [ 396.373766][T12194] bond_slave_1: mtu less than device minimum [ 396.698244][T12203] device pim6reg1 entered promiscuous mode [ 396.785267][T12205] syz.3.3345[12205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.785355][T12205] syz.3.3345[12205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.110666][T12221] device sit0 left promiscuous mode [ 397.276552][T12222] device sit0 entered promiscuous mode [ 397.856398][T12254] syz.0.3358[12254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.856496][T12254] syz.0.3358[12254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.379743][T12280] device pim6reg1 entered promiscuous mode [ 399.667269][T12315] device syzkaller0 entered promiscuous mode [ 399.726306][T12325] bond_slave_1: mtu less than device minimum [ 400.818896][T12366] device veth0_vlan left promiscuous mode [ 400.849487][T12366] device veth0_vlan entered promiscuous mode [ 401.074890][T12389] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.082219][T12389] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.235170][T12385] device bridge_slave_1 left promiscuous mode [ 401.242577][T12385] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.295439][T12385] device bridge_slave_0 left promiscuous mode [ 401.370613][T12385] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.742637][T12393] device pim6reg1 entered promiscuous mode [ 402.541882][T12420] device syzkaller0 entered promiscuous mode [ 405.249573][T12444] device syzkaller0 entered promiscuous mode [ 406.783633][T12522] device syzkaller0 entered promiscuous mode [ 406.808985][T12522] device veth0_vlan left promiscuous mode [ 406.824440][T12522] device veth0_vlan entered promiscuous mode [ 406.844740][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 406.853994][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 406.861804][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 410.339426][T12671] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.346671][T12671] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.982026][T12702] GPL: port 1(erspan0) entered blocking state [ 410.991615][T12702] GPL: port 1(erspan0) entered disabled state [ 411.011027][T12702] device erspan0 entered promiscuous mode [ 411.077382][T12688] GPL: port 1(erspan0) entered blocking state [ 411.083741][T12688] GPL: port 1(erspan0) entered forwarding state [ 411.794057][T12724] syz.1.3492[12724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.797359][T12724] syz.1.3492[12724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.236198][T12760] device pim6reg1 entered promiscuous mode [ 414.493017][T12803] device syzkaller0 entered promiscuous mode [ 414.744274][T12806] device syzkaller0 entered promiscuous mode [ 414.958851][T12832] device veth1_macvtap left promiscuous mode [ 414.965627][T12832] device macsec0 left promiscuous mode [ 415.063917][T12844] device veth1_macvtap left promiscuous mode [ 415.070151][T12844] device macsec0 entered promiscuous mode [ 415.091863][T12852] device veth0_vlan left promiscuous mode [ 415.119461][T12852] device veth0_vlan entered promiscuous mode [ 415.160164][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 415.169161][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 415.188017][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 415.291112][T12872] device sit0 entered promiscuous mode [ 416.309645][T12955] device wg2 left promiscuous mode [ 416.353164][T12955] device wg2 entered promiscuous mode [ 416.642185][T12979] device syzkaller0 entered promiscuous mode [ 416.838359][T12995] device syzkaller0 entered promiscuous mode [ 417.706854][T13013] device syzkaller0 entered promiscuous mode [ 417.856727][T13028] tun0: tun_chr_ioctl cmd 1074025681 [ 419.545556][T13066] bridge0: port 3(veth0) entered blocking state [ 419.576898][T13066] bridge0: port 3(veth0) entered disabled state [ 419.599197][T13066] device veth0 entered promiscuous mode [ 419.684811][T13072] device wg2 entered promiscuous mode [ 422.112553][T13122] device syzkaller0 entered promiscuous mode [ 422.465960][T13138] device sit0 left promiscuous mode [ 423.053519][T13187] device syzkaller0 entered promiscuous mode [ 423.128345][T13187] tap0: tun_chr_ioctl cmd 1074025676 [ 423.141228][T13187] tap0: tun_chr_ioctl cmd 1074025675 [ 423.151906][T13187] tap0: persist disabled [ 423.399383][T13207] bond_slave_1: mtu less than device minimum [ 423.406119][T13209] device wg2 left promiscuous mode [ 423.459162][T13207] device pim6reg1 entered promiscuous mode [ 423.516811][T13218] syz.4.3630[13218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.516892][T13218] syz.4.3630[13218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.880219][T13251] syz.1.3641[13251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.893032][T13251] syz.1.3641[13251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.956981][T13233] device syzkaller0 entered promiscuous mode [ 424.022316][T13257] device sit0 left promiscuous mode [ 424.124528][T13264] syz.3.3643[13264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.124615][T13264] syz.3.3643[13264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.166820][T13262] device sit0 entered promiscuous mode [ 425.501963][T13291] syz.4.3652[13291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.502049][T13291] syz.4.3652[13291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.285040][T13323] device sit0 entered promiscuous mode [ 427.327237][T13333] syz.0.3663[13333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.327320][T13333] syz.0.3663[13333] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.663269][T13340] device wg2 entered promiscuous mode [ 427.727107][T13345] device team_slave_1 entered promiscuous mode [ 427.787143][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 427.802233][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 428.115615][T13364] device pim6reg1 entered promiscuous mode [ 429.129416][T13411] bpf_get_probe_write_proto: 2 callbacks suppressed [ 429.129437][T13411] syz.4.3685[13411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.136923][T13411] syz.4.3685[13411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.559175][T13429] device syzkaller0 entered promiscuous mode [ 429.661554][T13434] device syzkaller0 entered promiscuous mode [ 430.190244][T13439] device veth1_macvtap left promiscuous mode [ 430.215338][T13450] syz.3.3698[13450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.215422][T13450] syz.3.3698[13450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.224731][T13445] device erspan0 left promiscuous mode [ 430.244834][T13445] GPL: port 1(erspan0) entered disabled state [ 430.274689][T13439] device wg2 entered promiscuous mode [ 430.802375][T13495] syz.0.3709[13495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.802468][T13495] syz.0.3709[13495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.928576][T13508] device veth1_macvtap left promiscuous mode [ 431.002024][T13509] device veth1_macvtap entered promiscuous mode [ 431.020384][T13509] device macsec0 entered promiscuous mode [ 431.070674][T13520] device wg2 left promiscuous mode [ 431.119148][T13521] device pim6reg1 entered promiscuous mode [ 431.261459][T13525] device wg2 entered promiscuous mode [ 431.871336][T13541] syz.4.3723[13541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.871424][T13541] syz.4.3723[13541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.207369][T13557] device syzkaller0 entered promiscuous mode [ 432.477588][T13582] syz.3.3735[13582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.477667][T13582] syz.3.3735[13582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.730723][T13620] syz.0.3747[13620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.750496][T13620] syz.0.3747[13620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.454485][T13688] device veth0_vlan left promiscuous mode [ 436.511368][T13688] device veth0_vlan entered promiscuous mode [ 436.706460][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 436.752069][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 436.770791][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 436.931431][T13704] device pim6reg1 entered promiscuous mode [ 437.063139][T13711] device syzkaller0 entered promiscuous mode [ 437.498081][T13734] device sit0 left promiscuous mode [ 438.072556][T13742] device sit0 entered promiscuous mode [ 438.806430][T13781] device syzkaller0 entered promiscuous mode [ 439.369462][T13825] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 439.377074][T13825] syzkaller0: persist disabled [ 439.449584][T13827] ÿÿÿÿÿÿ: renamed from vlan1 [ 441.369920][T13879] device syzkaller0 entered promiscuous mode [ 441.996844][T13892] €Â0: renamed from pim6reg1 [ 443.234225][T13931] device pim6reg1 entered promiscuous mode [ 444.295332][T13953] tap0: tun_chr_ioctl cmd 35092 [ 445.246730][T14040] device syzkaller0 entered promiscuous mode [ 445.347261][T14049] device pim6reg1 entered promiscuous mode [ 446.148299][T14098] bond_slave_1: mtu less than device minimum [ 446.495823][T14116] device pim6reg1 entered promiscuous mode [ 447.192328][T14165] device pim6reg1 entered promiscuous mode [ 447.281902][T14168] device sit0 entered promiscuous mode [ 447.482003][T14176] device pim6reg1 entered promiscuous mode [ 449.067176][T14222] device syzkaller0 entered promiscuous mode [ 449.379129][T14228] device sit0 left promiscuous mode [ 449.489584][T14229] device sit0 entered promiscuous mode [ 450.801322][T14255] device sit0 left promiscuous mode [ 451.514345][T14274] device syzkaller0 entered promiscuous mode [ 452.718084][T14328] device syzkaller0 entered promiscuous mode [ 452.778298][T14328] syzkaller0: tun_net_xmit 1280 [ 452.784784][T14328] syzkaller0: create flow: hash 1947782136 index 1 [ 452.810881][T14327] syzkaller0: delete flow: hash 1947782136 index 1 [ 453.299612][T14395] device pim6reg1 entered promiscuous mode [ 453.320138][T14390] device pim6reg1 entered promiscuous mode [ 453.355884][T14388] device veth0_vlan left promiscuous mode [ 453.371499][T14388] device veth0_vlan entered promiscuous mode [ 453.399646][T14397] device pim6reg1 left promiscuous mode [ 453.601741][T14410] device wg2 left promiscuous mode [ 461.029826][T14466] device macsec0 entered promiscuous mode [ 461.639054][T14515] device veth1_macvtap left promiscuous mode [ 461.645973][T14515] device macsec0 entered promiscuous mode [ 463.023272][T14548] device veth1_to_team entered promiscuous mode [ 463.782762][T14572] device pim6reg1 entered promiscuous mode [ 463.843136][T14578] device macsec0 left promiscuous mode [ 463.893127][T14580] FAULT_INJECTION: forcing a failure. [ 463.893127][T14580] name failslab, interval 1, probability 0, space 0, times 1 [ 463.915692][T14580] CPU: 1 PID: 14580 Comm: syz.1.4025 Tainted: G W syzkaller #0 [ 463.924623][T14580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 463.934701][T14580] Call Trace: [ 463.937997][T14580] [ 463.940941][T14580] __dump_stack+0x21/0x30 [ 463.945291][T14580] dump_stack_lvl+0xee/0x150 [ 463.949907][T14580] ? show_regs_print_info+0x20/0x20 [ 463.955134][T14580] dump_stack+0x15/0x20 [ 463.959314][T14580] should_fail+0x3c1/0x510 [ 463.963767][T14580] __should_failslab+0xa4/0xe0 [ 463.968780][T14580] should_failslab+0x9/0x20 [ 463.973408][T14580] slab_pre_alloc_hook+0x3b/0xe0 [ 463.978361][T14580] kmem_cache_alloc_trace+0x48/0x270 [ 463.983684][T14580] ? htab_map_alloc+0x9a/0x14f0 [ 463.988555][T14580] htab_map_alloc+0x9a/0x14f0 [ 463.993247][T14580] ? security_capable+0x87/0xb0 [ 463.998137][T14580] ? capable+0x8a/0xe0 [ 464.002218][T14580] ? htab_map_alloc_check+0x3d8/0x4c0 [ 464.007603][T14580] map_create+0x455/0x21b0 [ 464.012032][T14580] __sys_bpf+0x2cf/0x730 [ 464.016277][T14580] ? bpf_link_show_fdinfo+0x310/0x310 [ 464.021667][T14580] ? debug_smp_processor_id+0x17/0x20 [ 464.027048][T14580] __x64_sys_bpf+0x7c/0x90 [ 464.031474][T14580] x64_sys_call+0x4b9/0x9a0 [ 464.036072][T14580] do_syscall_64+0x4c/0xa0 [ 464.040706][T14580] ? clear_bhb_loop+0x50/0xa0 [ 464.045580][T14580] ? clear_bhb_loop+0x50/0xa0 [ 464.050267][T14580] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 464.056171][T14580] RIP: 0033:0x7fb6fb2eaba9 [ 464.060593][T14580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 464.080202][T14580] RSP: 002b:00007fb6f9d53038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 464.088631][T14580] RAX: ffffffffffffffda RBX: 00007fb6fb531fa0 RCX: 00007fb6fb2eaba9 [ 464.096610][T14580] RDX: 0000000000000048 RSI: 0000200000000000 RDI: 0000000000000000 [ 464.104588][T14580] RBP: 00007fb6f9d53090 R08: 0000000000000000 R09: 0000000000000000 [ 464.112573][T14580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 464.120673][T14580] R13: 00007fb6fb532038 R14: 00007fb6fb531fa0 R15: 00007ffd58849828 [ 464.128680][T14580] [ 464.969353][T14634] FAULT_INJECTION: forcing a failure. [ 464.969353][T14634] name failslab, interval 1, probability 0, space 0, times 0 [ 465.030460][T14634] CPU: 1 PID: 14634 Comm: syz.1.4041 Tainted: G W syzkaller #0 [ 465.039369][T14634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 465.049450][T14634] Call Trace: [ 465.052756][T14634] [ 465.055710][T14634] __dump_stack+0x21/0x30 [ 465.060077][T14634] dump_stack_lvl+0xee/0x150 [ 465.064698][T14634] ? show_regs_print_info+0x20/0x20 [ 465.069933][T14634] dump_stack+0x15/0x20 [ 465.074124][T14634] should_fail+0x3c1/0x510 [ 465.078592][T14634] __should_failslab+0xa4/0xe0 [ 465.083457][T14634] should_failslab+0x9/0x20 [ 465.087968][T14634] slab_pre_alloc_hook+0x3b/0xe0 [ 465.093004][T14634] __kmalloc+0x6d/0x2c0 [ 465.097167][T14634] ? bpf_map_area_alloc+0x49/0xe0 [ 465.102200][T14634] bpf_map_area_alloc+0x49/0xe0 [ 465.107061][T14634] htab_map_alloc+0x3c0/0x14f0 [ 465.111839][T14634] ? security_capable+0x87/0xb0 [ 465.116710][T14634] ? capable+0x8a/0xe0 [ 465.120791][T14634] map_create+0x455/0x21b0 [ 465.125220][T14634] __sys_bpf+0x2cf/0x730 [ 465.129474][T14634] ? bpf_link_show_fdinfo+0x310/0x310 [ 465.134855][T14634] ? bpf_trace_run2+0xb5/0x1b0 [ 465.139807][T14634] ? debug_smp_processor_id+0x17/0x20 [ 465.145274][T14634] __x64_sys_bpf+0x7c/0x90 [ 465.149692][T14634] x64_sys_call+0x4b9/0x9a0 [ 465.154256][T14634] do_syscall_64+0x4c/0xa0 [ 465.158688][T14634] ? clear_bhb_loop+0x50/0xa0 [ 465.163371][T14634] ? clear_bhb_loop+0x50/0xa0 [ 465.168146][T14634] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 465.174335][T14634] RIP: 0033:0x7fb6fb2eaba9 [ 465.178772][T14634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 465.198397][T14634] RSP: 002b:00007fb6f9d53038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 465.206818][T14634] RAX: ffffffffffffffda RBX: 00007fb6fb531fa0 RCX: 00007fb6fb2eaba9 [ 465.214798][T14634] RDX: 0000000000000048 RSI: 0000200000000000 RDI: 0000000000000000 [ 465.222873][T14634] RBP: 00007fb6f9d53090 R08: 0000000000000000 R09: 0000000000000000 [ 465.230848][T14634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.238825][T14634] R13: 00007fb6fb532038 R14: 00007fb6fb531fa0 R15: 00007ffd58849828 [ 465.246843][T14634] [ 466.253299][T14691] FAULT_INJECTION: forcing a failure. [ 466.253299][T14691] name failslab, interval 1, probability 0, space 0, times 0 [ 466.266252][T14691] CPU: 0 PID: 14691 Comm: syz.1.4056 Tainted: G W syzkaller #0 [ 466.275147][T14691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 466.287878][T14691] Call Trace: [ 466.291285][T14691] [ 466.294249][T14691] __dump_stack+0x21/0x30 [ 466.298615][T14691] dump_stack_lvl+0xee/0x150 [ 466.303446][T14691] ? show_regs_print_info+0x20/0x20 [ 466.308686][T14691] dump_stack+0x15/0x20 [ 466.312877][T14691] should_fail+0x3c1/0x510 [ 466.317330][T14691] __should_failslab+0xa4/0xe0 [ 466.322122][T14691] should_failslab+0x9/0x20 [ 466.326647][T14691] slab_pre_alloc_hook+0x3b/0xe0 [ 466.331591][T14691] kmem_cache_alloc_trace+0x48/0x270 [ 466.336881][T14691] ? selinux_bpf_map_alloc+0x51/0x140 [ 466.342260][T14691] selinux_bpf_map_alloc+0x51/0x140 [ 466.347464][T14691] security_bpf_map_alloc+0x62/0x90 [ 466.352671][T14691] map_create+0x149f/0x21b0 [ 466.357185][T14691] __sys_bpf+0x2cf/0x730 [ 466.361437][T14691] ? bpf_link_show_fdinfo+0x310/0x310 [ 466.366902][T14691] ? debug_smp_processor_id+0x17/0x20 [ 466.372282][T14691] __x64_sys_bpf+0x7c/0x90 [ 466.376711][T14691] x64_sys_call+0x4b9/0x9a0 [ 466.381218][T14691] do_syscall_64+0x4c/0xa0 [ 466.385728][T14691] ? clear_bhb_loop+0x50/0xa0 [ 466.390436][T14691] ? clear_bhb_loop+0x50/0xa0 [ 466.396216][T14691] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 466.402710][T14691] RIP: 0033:0x7fb6fb2eaba9 [ 466.407146][T14691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 466.426759][T14691] RSP: 002b:00007fb6f9d53038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 466.435183][T14691] RAX: ffffffffffffffda RBX: 00007fb6fb531fa0 RCX: 00007fb6fb2eaba9 [ 466.443158][T14691] RDX: 0000000000000048 RSI: 0000200000000000 RDI: 0000000000000000 [ 466.451152][T14691] RBP: 00007fb6f9d53090 R08: 0000000000000000 R09: 0000000000000000 [ 466.459129][T14691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 466.467098][T14691] R13: 00007fb6fb532038 R14: 00007fb6fb531fa0 R15: 00007ffd58849828 [ 466.475083][T14691] [ 466.586971][T14703] ªªªªªª: renamed from vlan0 [ 467.786375][T14772] device veth0_vlan left promiscuous mode [ 467.794746][T14772] device veth0_vlan entered promiscuous mode [ 467.852435][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.871639][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 467.921884][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 468.154011][T14794] device veth0_vlan left promiscuous mode [ 468.199530][T14794] device veth0_vlan entered promiscuous mode [ 468.210167][T14799] syz.1.4085[14799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.211889][T14799] syz.1.4085[14799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.224046][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 468.245043][T14801] syz.0.4086[14801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.245125][T14801] syz.0.4086[14801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.487499][T14799] device syzkaller0 entered promiscuous mode [ 469.311391][T14839] syz.2.4097[14839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.311481][T14839] syz.2.4097[14839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.171652][T14877] device sit0 left promiscuous mode [ 473.218968][T14885] bond_slave_1: mtu less than device minimum [ 474.148411][T14894] device veth0_vlan left promiscuous mode [ 474.190064][T14894] device veth0_vlan entered promiscuous mode [ 474.214731][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 475.674309][T14948] kfree: port 1(veth1) entered blocking state [ 475.753338][T14948] kfree: port 1(veth1) entered disabled state [ 475.775793][T14948] device veth1 entered promiscuous mode [ 476.427815][T14978] device pim6reg1 entered promiscuous mode [ 481.783932][T15103] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.791294][T15103] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.507973][T15167] device pim6reg1 entered promiscuous mode [ 486.730612][T15216] bond_slave_1: mtu less than device minimum [ 486.987413][T15218] bond_slave_1: mtu less than device minimum [ 489.312019][T15321] device pim6reg1 entered promiscuous mode [ 489.530099][T15341] syz.4.4240[15341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 489.530178][T15341] syz.4.4240[15341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.080622][T15367] device veth0_vlan left promiscuous mode [ 490.171935][T15367] device veth0_vlan entered promiscuous mode [ 490.206910][T15367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 490.310539][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 490.318615][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 490.386655][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 490.682500][T15389] device veth0_vlan left promiscuous mode [ 490.700477][T15389] device veth0_vlan entered promiscuous mode [ 490.729318][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 490.761096][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 490.822221][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 491.699178][T15433] device veth0_vlan left promiscuous mode [ 491.803087][T15433] device veth0_vlan entered promiscuous mode [ 492.282254][T15439] ±ÿ: renamed from team_slave_1 [ 492.393987][T15455] device sit0 entered promiscuous mode [ 492.806803][T15465] device pim6reg1 entered promiscuous mode [ 492.908227][T15466] device veth0_vlan left promiscuous mode [ 492.931232][T15466] device veth0_vlan entered promiscuous mode [ 492.984425][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 492.995993][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 493.018670][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 493.634794][T15481] device wg2 left promiscuous mode [ 497.294203][T15569] device veth1_macvtap left promiscuous mode [ 497.334933][T15569] device macsec0 left promiscuous mode [ 497.430531][T15571] device veth1_macvtap entered promiscuous mode [ 497.447305][T15571] device macsec0 entered promiscuous mode [ 498.505699][T15597] device syzkaller0 entered promiscuous mode [ 500.058946][T15654] device veth0_vlan left promiscuous mode [ 500.178299][T15654] device veth0_vlan entered promiscuous mode [ 500.591469][T15663] device syzkaller0 entered promiscuous mode [ 502.935902][T15745] device syzkaller0 entered promiscuous mode [ 503.441179][T15759] device syzkaller0 entered promiscuous mode [ 506.966114][T15784] device veth0_vlan left promiscuous mode [ 506.978458][T15784] device veth0_vlan entered promiscuous mode [ 506.986656][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 506.995513][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 507.002994][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 508.551031][T15850] device syzkaller0 entered promiscuous mode [ 509.522782][T15887] device sit0 left promiscuous mode [ 509.806417][T15898] syz.4.4404[15898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.806504][T15898] syz.4.4404[15898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.006139][T15900] GPL: port 1(erspan0) entered blocking state [ 510.024407][T15900] GPL: port 1(erspan0) entered forwarding state [ 510.360532][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 510.501124][T15921] device sit0 left promiscuous mode [ 510.880897][T15934] syz.1.4415[15934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.880984][T15934] syz.1.4415[15934] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 511.804949][T15982] ip6_vti0: mtu less than device minimum [ 512.341762][T16004] device sit0 entered promiscuous mode [ 512.556599][T16006] device wg2 left promiscuous mode [ 512.683027][T16034] bond_slave_1: mtu less than device minimum [ 512.829776][T16048] device veth0_vlan left promiscuous mode [ 512.876118][T16048] device veth0_vlan entered promiscuous mode [ 512.999522][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 513.012248][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 513.026259][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 513.143438][T16072] device pim6reg1 entered promiscuous mode [ 513.569548][T16102] device syzkaller0 entered promiscuous mode [ 514.763355][T16139] device pim6reg1 entered promiscuous mode [ 515.152782][T16148] kfree: port 1(veth1) entered blocking state [ 515.175569][T16148] kfree: port 1(veth1) entered disabled state [ 515.219424][T16148] device veth1 entered promiscuous mode [ 515.452567][T16167] device syzkaller0 entered promiscuous mode [ 515.504956][T16171] device veth0_vlan left promiscuous mode [ 515.511600][T16171] device veth0_vlan entered promiscuous mode [ 515.520259][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 515.531324][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 515.539454][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 516.010569][T16214] sock: sock_set_timeout: `syz.2.4497' (pid 16214) tries to set negative timeout [ 516.048306][T16212] device syzkaller0 entered promiscuous mode [ 516.093749][T16221] syz.0.4499[16221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 516.093842][T16221] syz.0.4499[16221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 516.116610][T16188] device wg2 entered promiscuous mode [ 516.270574][T16229] device syzkaller0 entered promiscuous mode [ 516.942027][T16257] device sit0 left promiscuous mode [ 517.076545][T16257] device sit0 entered promiscuous mode [ 518.751603][T16350] device wg2 left promiscuous mode [ 518.819112][T16356] tun0: tun_chr_ioctl cmd 1074025681 [ 518.890976][T16361] tun0: tun_chr_ioctl cmd 1074025677 [ 518.931738][T16361] tun0: linktype set to 776 [ 518.939075][T16343] device wg2 entered promiscuous mode [ 520.094422][T16406] device syzkaller0 entered promiscuous mode [ 520.456520][T16417] bridge0: port 3(veth0) entered blocking state [ 520.484830][T16417] bridge0: port 3(veth0) entered disabled state [ 520.500838][T16417] device veth0 entered promiscuous mode [ 520.587793][T16418] device veth0 left promiscuous mode [ 520.600333][T16418] bridge0: port 3(veth0) entered disabled state [ 522.378049][T16461] syz.2.4566[16461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.378144][T16461] syz.2.4566[16461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.450186][T16462] device veth0_vlan left promiscuous mode [ 522.475928][T16462] device veth0_vlan entered promiscuous mode [ 522.546753][T14457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 522.577065][T14457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 522.650145][T14457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 522.886169][T16489] device sit0 entered promiscuous mode [ 523.207257][T16501] syz.2.4578[16501] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 523.207350][T16501] syz.2.4578[16501] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 523.968036][T16553] syz.0.4591[16553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.050518][T16553] syz.0.4591[16553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.486463][T16574] device syzkaller0 entered promiscuous mode [ 524.571729][T16576] syzkaller0: create flow: hash 3654256218 index 0 [ 524.842446][T16579] ÿÿÿÿÿÿ: renamed from vlan1 [ 524.861238][T16574] syzkaller0 (unregistered): delete flow: hash 3654256218 index 0 [ 525.442038][T16604] device pim6reg1 entered promiscuous mode [ 525.977430][T16635] device sit0 left promiscuous mode [ 526.074092][T16636] device sit0 entered promiscuous mode [ 527.444160][T16703] syz.1.4632[16703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.444247][T16703] syz.1.4632[16703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.684918][T16699] device syzkaller0 entered promiscuous mode [ 527.803962][T16710] device sit0 left promiscuous mode [ 527.848425][T16711] device sit0 entered promiscuous mode [ 528.211567][T16731] device wg2 entered promiscuous mode [ 528.361936][T16730] device syzkaller0 entered promiscuous mode [ 528.511827][T16749] -: renamed from syzkaller0 [ 528.615431][T16751] device wg2 left promiscuous mode [ 529.995163][T16788] device macsec0 left promiscuous mode [ 531.715951][T16858] device erspan0 entered promiscuous mode [ 531.753767][T16866] device pim6reg1 entered promiscuous mode [ 532.405645][T16883] device wg2 entered promiscuous mode [ 533.248986][T16971] device sit0 entered promiscuous mode [ 533.843115][T17010] device sit0 entered promiscuous mode [ 534.722582][T17061] device syzkaller0 entered promiscuous mode [ 534.794883][T17063] device veth0_vlan left promiscuous mode [ 534.998123][T17063] device veth0_vlan entered promiscuous mode [ 535.048648][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 535.071005][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 535.088574][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 535.131838][T17074] device pim6reg1 entered promiscuous mode [ 536.129216][T17114] device veth0_vlan left promiscuous mode [ 536.143572][T17114] device veth0_vlan entered promiscuous mode [ 536.192409][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 536.203062][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 536.214454][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 536.248087][T17116] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.255554][T17116] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.297281][T17120] device bridge_slave_1 left promiscuous mode [ 536.306220][T17120] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.322409][T17120] device bridge_slave_0 left promiscuous mode [ 536.330790][T17120] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.793688][T17137] device veth1_macvtap left promiscuous mode [ 536.799809][T17137] device macsec0 left promiscuous mode [ 538.856968][T17184] bridge0: port 1(bridge_slave_0) entered blocking state [ 538.864484][T17184] bridge0: port 1(bridge_slave_0) entered disabled state [ 538.879948][T17184] device bridge_slave_0 entered promiscuous mode [ 539.003237][T17200] syz.0.4768[17200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.003318][T17200] syz.0.4768[17200] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.033763][T17184] bridge0: port 2(bridge_slave_1) entered blocking state [ 539.090281][T17184] bridge0: port 2(bridge_slave_1) entered disabled state [ 539.105907][T17184] device bridge_slave_1 entered promiscuous mode [ 540.159569][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 540.171922][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 540.239390][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 540.258935][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 540.268901][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 540.276010][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 540.300466][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 540.310003][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 540.318600][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 540.325728][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 540.339359][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 540.413854][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 540.460545][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 540.496158][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 540.504770][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 540.513269][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 540.522589][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 540.543253][T17184] device veth0_vlan entered promiscuous mode [ 540.553919][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 540.567458][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 540.577204][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 540.585233][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 540.637373][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 540.678326][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 540.705529][T17184] device veth1_macvtap entered promiscuous mode [ 540.727866][T14457] GPL: port 1(erspan0) entered disabled state [ 540.740670][T14457] device erspan0 left promiscuous mode [ 540.746320][T14457] GPL: port 1(erspan0) entered disabled state [ 540.759834][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 540.768486][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 540.784248][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 540.815887][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 540.832291][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 541.937699][T17293] syz.1.4793[17293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.937779][T17293] syz.1.4793[17293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 542.792002][T17314] device syzkaller0 entered promiscuous mode [ 543.501378][T17367] bond_slave_1: mtu less than device minimum [ 543.920314][T17375] device sit0 left promiscuous mode [ 544.939075][T17400] device sit0 left promiscuous mode [ 544.987765][T17400] device sit0 entered promiscuous mode [ 545.963321][T17445] syz.0.4833[17445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.963537][T17445] syz.0.4833[17445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.407870][T17452] device syzkaller0 entered promiscuous mode [ 547.886655][T17493] bridge0: port 1(bridge_slave_0) entered blocking state [ 547.893773][T17493] bridge0: port 1(bridge_slave_0) entered disabled state [ 547.920645][T17493] device bridge_slave_0 entered promiscuous mode [ 547.927873][T17493] bridge0: port 2(bridge_slave_1) entered blocking state [ 547.940278][T17493] bridge0: port 2(bridge_slave_1) entered disabled state [ 547.947974][T17493] device bridge_slave_1 entered promiscuous mode [ 547.976951][T17524] device pim6reg1 entered promiscuous mode [ 548.865150][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 548.882871][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 548.914273][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 548.940774][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 548.973225][ T386] bridge0: port 1(bridge_slave_0) entered blocking state [ 548.980348][ T386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 549.007692][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 549.025313][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 549.042847][ T386] bridge0: port 2(bridge_slave_1) entered blocking state [ 549.050054][ T386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 549.112095][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 549.211116][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 549.277756][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 549.348377][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 549.370750][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 549.382543][T17568] device sit0 entered promiscuous mode [ 549.536851][T17493] device veth0_vlan entered promiscuous mode [ 549.576205][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 549.589988][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 549.598950][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 549.607092][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 549.669300][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 549.678805][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 549.688319][T17493] device veth1_macvtap entered promiscuous mode [ 549.793836][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 549.808589][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 549.839111][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 549.858174][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 549.875187][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 549.991502][T14457] device bridge_slave_1 left promiscuous mode [ 549.997708][T14457] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.010468][T14457] device bridge_slave_0 left promiscuous mode [ 550.016639][T14457] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.041078][T14457] device veth1_macvtap left promiscuous mode [ 550.641817][T17587] bridge0: port 1(bridge_slave_0) entered blocking state [ 550.649058][T17587] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.657062][T17587] device bridge_slave_0 entered promiscuous mode [ 550.664538][T17587] bridge0: port 2(bridge_slave_1) entered blocking state [ 550.671655][T17587] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.679196][T17587] device bridge_slave_1 entered promiscuous mode [ 551.433736][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 551.451883][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 551.502057][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 551.531571][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 551.550874][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 551.557999][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 551.585840][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 551.600676][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 551.609380][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 551.616485][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 551.670581][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 551.708836][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 551.737426][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 551.750625][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 551.769041][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 551.792602][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 551.811829][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 551.855363][T17587] device veth0_vlan entered promiscuous mode [ 551.887992][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 551.913650][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 551.978855][T17587] device veth1_macvtap entered promiscuous mode [ 552.100730][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 552.111043][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 552.121012][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 552.129327][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 552.138030][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 552.184799][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 552.200537][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 552.220447][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 552.230692][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 552.527554][T14457] device bridge_slave_1 left promiscuous mode [ 552.540619][T14457] bridge0: port 2(bridge_slave_1) entered disabled state [ 552.551007][T14457] device bridge_slave_0 left promiscuous mode [ 552.557182][T14457] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.637692][T14457] device veth1_macvtap left promiscuous mode [ 552.652346][T14457] device veth0_vlan left promiscuous mode [ 552.750947][T17670] syz.0.4893[17670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.751024][T17670] syz.0.4893[17670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.893079][T17676] device sit0 left promiscuous mode [ 553.036824][T17653] bridge0: port 1(bridge_slave_0) entered blocking state [ 553.045026][T17653] bridge0: port 1(bridge_slave_0) entered disabled state [ 553.060715][T17653] device bridge_slave_0 entered promiscuous mode [ 553.068154][T17653] bridge0: port 2(bridge_slave_1) entered blocking state [ 553.090251][T17653] bridge0: port 2(bridge_slave_1) entered disabled state [ 553.099679][T17653] device bridge_slave_1 entered promiscuous mode [ 553.106790][T17678] device sit0 left promiscuous mode [ 553.170677][T17685] device sit0 entered promiscuous mode [ 553.652160][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 553.659991][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 553.707936][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 553.717857][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 553.727853][ T336] bridge0: port 1(bridge_slave_0) entered blocking state [ 553.734962][ T336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 553.743485][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 553.752361][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 553.761244][ T336] bridge0: port 2(bridge_slave_1) entered blocking state [ 553.768322][ T336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 553.776230][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 553.883803][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 553.902948][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 554.021699][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 554.030122][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 554.078416][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 554.106323][T17653] device veth0_vlan entered promiscuous mode [ 554.122658][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 554.151696][T17722] device veth0 left promiscuous mode [ 554.158920][T17722] bridge0: port 3(veth0) entered disabled state [ 554.205391][T17722] device bridge_slave_1 left promiscuous mode [ 554.222470][T17722] bridge0: port 2(bridge_slave_1) entered disabled state [ 554.263280][T17722] device bridge_slave_0 left promiscuous mode [ 554.271117][T17722] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.380687][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 554.388463][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 554.399956][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 554.408396][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 554.432336][T17653] device veth1_macvtap entered promiscuous mode [ 554.483475][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 554.496590][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 554.511365][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 554.525711][T17715] bridge0: port 1(bridge_slave_0) entered blocking state [ 554.533708][T17715] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.541505][T17715] device bridge_slave_0 entered promiscuous mode [ 554.999325][T17726] device syzkaller0 entered promiscuous mode [ 555.028618][T17715] bridge0: port 2(bridge_slave_1) entered blocking state [ 555.050730][T17715] bridge0: port 2(bridge_slave_1) entered disabled state [ 555.058215][T17715] device bridge_slave_1 entered promiscuous mode [ 555.070825][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 555.085604][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 555.286468][T17762] syz.2.4919[17762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.306517][T17762] syz.2.4919[17762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.375793][T17715] bridge0: port 2(bridge_slave_1) entered blocking state [ 555.394370][T17715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 555.401706][T17715] bridge0: port 1(bridge_slave_0) entered blocking state [ 555.408856][T17715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 555.417037][ T386] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.424807][ T386] bridge0: port 2(bridge_slave_1) entered disabled state [ 555.441598][T14457] device bridge_slave_1 left promiscuous mode [ 555.447786][T14457] bridge0: port 2(bridge_slave_1) entered disabled state [ 555.455425][T14457] device bridge_slave_0 left promiscuous mode [ 555.461677][T14457] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.469703][T14457] device veth1_macvtap left promiscuous mode [ 555.475847][T14457] device veth0_vlan left promiscuous mode [ 555.570620][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 555.578598][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 555.588645][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 555.597162][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 555.605457][ T386] bridge0: port 1(bridge_slave_0) entered blocking state [ 555.612532][ T386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 555.622895][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 555.631397][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 555.639568][ T386] bridge0: port 2(bridge_slave_1) entered blocking state [ 555.646616][ T386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 555.659562][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 555.667888][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 555.678189][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 555.686653][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 555.700460][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 555.743806][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 555.777348][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 555.799010][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 555.866066][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 555.937932][ T386] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 555.951631][T17715] device veth0_vlan entered promiscuous mode [ 556.243387][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 556.252329][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 556.270519][T17715] device veth1_macvtap entered promiscuous mode [ 556.449206][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 556.460650][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 556.490473][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 556.594064][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 556.603337][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 556.670519][T17776] bridge0: port 1(bridge_slave_0) entered blocking state [ 556.677838][T17776] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.686238][T17776] device bridge_slave_0 entered promiscuous mode [ 556.693873][T17776] bridge0: port 2(bridge_slave_1) entered blocking state [ 556.701781][T17776] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.709423][T17776] device bridge_slave_1 entered promiscuous mode [ 557.546071][T17824] device syzkaller0 entered promiscuous mode [ 557.777131][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 557.799453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 557.816276][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 557.840783][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 557.854446][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 557.861571][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 557.927013][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 557.935473][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 557.944297][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 557.953531][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 557.960623][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 558.021195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 558.049739][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 558.070442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 558.097206][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 558.242473][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 558.251854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 558.293704][T17776] device veth0_vlan entered promiscuous mode [ 558.311534][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 558.319563][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 558.333493][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 558.341688][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 558.360914][T17866] GPL: port 1(erspan0) entered blocking state [ 558.391800][T17866] GPL: port 1(erspan0) entered disabled state [ 558.413437][T17866] device erspan0 entered promiscuous mode [ 560.473394][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 560.490780][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 560.570768][T14457] device bridge_slave_1 left promiscuous mode [ 560.576946][T14457] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.590761][T14457] device bridge_slave_0 left promiscuous mode [ 560.598488][T14457] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.610563][T14457] device veth1_macvtap left promiscuous mode [ 560.616658][T14457] device veth0_vlan left promiscuous mode [ 560.732490][T17776] device veth1_macvtap entered promiscuous mode [ 560.882679][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 560.902964][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 560.931968][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 560.940831][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 564.167649][T17918] bridge0: port 1(bridge_slave_0) entered blocking state [ 564.192541][T17918] bridge0: port 1(bridge_slave_0) entered disabled state [ 564.205526][T17918] device bridge_slave_0 entered promiscuous mode [ 564.217569][T17918] bridge0: port 2(bridge_slave_1) entered blocking state [ 564.224910][T17918] bridge0: port 2(bridge_slave_1) entered disabled state [ 564.234386][T17918] device bridge_slave_1 entered promiscuous mode [ 566.548763][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 566.612619][ T336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready