last executing test programs: 24.285218059s ago: executing program 0 (id=2454): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c1fc83c053b1da4369fa407a35e225b000000001c0000000c0000000800000c0200000604000000050000009000000002000000fe"], &(0x7f0000000580)=""/249, 0x40, 0xf9, 0x1, 0x0, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x2, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000008020000000000000000000001050000018000000000000000010000850200000000000000010000000000000400000000da"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000380)='snd_soc_dapm_walk_done\x00', 0xffffffffffffffff, 0x0, 0xfff}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu '], 0x5) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000109500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xbb, &(0x7f0000000180)=""/187, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x267e, 0x0, 0x0, 0x0, 0x0, 0x10, 0x32bd, @void, @value}, 0x94) 19.383565571s ago: executing program 0 (id=2454): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c1fc83c053b1da4369fa407a35e225b000000001c0000000c0000000800000c0200000604000000050000009000000002000000fe"], &(0x7f0000000580)=""/249, 0x40, 0xf9, 0x1, 0x0, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x2, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000008020000000000000000000001050000018000000000000000010000850200000000000000010000000000000400000000da"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000380)='snd_soc_dapm_walk_done\x00', 0xffffffffffffffff, 0x0, 0xfff}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu '], 0x5) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000109500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xbb, &(0x7f0000000180)=""/187, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x267e, 0x0, 0x0, 0x0, 0x0, 0x10, 0x32bd, @void, @value}, 0x94) 14.333231384s ago: executing program 0 (id=2454): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c1fc83c053b1da4369fa407a35e225b000000001c0000000c0000000800000c0200000604000000050000009000000002000000fe"], &(0x7f0000000580)=""/249, 0x40, 0xf9, 0x1, 0x0, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x2, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000008020000000000000000000001050000018000000000000000010000850200000000000000010000000000000400000000da"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000380)='snd_soc_dapm_walk_done\x00', 0xffffffffffffffff, 0x0, 0xfff}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu '], 0x5) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000109500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xbb, &(0x7f0000000180)=""/187, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x267e, 0x0, 0x0, 0x0, 0x0, 0x10, 0x32bd, @void, @value}, 0x94) 9.912932255s ago: executing program 0 (id=2454): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c1fc83c053b1da4369fa407a35e225b000000001c0000000c0000000800000c0200000604000000050000009000000002000000fe"], &(0x7f0000000580)=""/249, 0x40, 0xf9, 0x1, 0x0, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x2, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000008020000000000000000000001050000018000000000000000010000850200000000000000010000000000000400000000da"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000380)='snd_soc_dapm_walk_done\x00', 0xffffffffffffffff, 0x0, 0xfff}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu '], 0x5) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000109500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xbb, &(0x7f0000000180)=""/187, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x267e, 0x0, 0x0, 0x0, 0x0, 0x10, 0x32bd, @void, @value}, 0x94) 7.938854594s ago: executing program 2 (id=2852): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000009000000000000000000000000f11d9187366c23626c0b4e767f084cc35b50a601fa972db6c2dc4fab53c43db9240215ce28392aeafe1527d605a2141c07e8b2b9fb52a37371d679cb", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeda) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r3}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000280)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_clone(0x8020000, &(0x7f0000000300)="515e0d4b072bef1e764f786d3a600db7439e84e3991170cc77bf1eb8def59bc45b41851ed44e80d927aa51db95d26ec734f58e4ed1836e2451b1e6e9ed1c80e787791afbd0d5cab23f5db57736366c1d79a2cc3680e1e7dd081dbc377119b272504c6c263cd2f44f3eb55720d2753ff31f8382b975103d4d295fcbd750564beb1362c7", 0x83, &(0x7f0000000080), &(0x7f0000000280), &(0x7f0000000680)="d3141ea91a826a2333da7a58efae4f2db30276f8f7720cee0cb3907ed26e0d234616a9566e81fea9a3564c2756f37234fe0c29ca623a13832fe59667042ba84f0e551eaa7549d3a8151e464f689f") bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7b3, 0x653}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={0xffffffffffffffff, r2, 0x4, r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 5.082029677s ago: executing program 1 (id=2864): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x67, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000a00)='syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\a\x00'/14], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_procs(r1, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000380), 0x12) 4.991713827s ago: executing program 1 (id=2866): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000380)={'wlan0\x00', 0x100}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000880)={&(0x7f0000000340)=@name={0x1e, 0x2, 0x1, {{0x43}}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000480)="a808f9da4b423b4e431368c7a7e2c2dcd4c7a5a2291f1bfbf7adefbdc20e5d7f85c277961eff9b86401a01af3fe2e0ce93924a4def1e69a66f8a9bf48855a00bf092d2ad98cd777e1a67b62307071d2900e5ca1c21851dfe8f22284898d1275cfcc193cd87aa8e2b56608b466d1033940813a19b80bc1e422c4881ed09b864cda4a55c46968e9a3b3cbaf503c85c6be8c83491aaf645123099f867a04fe520d822a477d6536d276f810d979a81ef21ed524e860c164a3ef9bac0c6ec9cca111c62ba4afe84fbc9e176b9f1726168cd44020e35566aceb9d8274c2001eeb9c1ee851729e9c4e2c7c7b17a191575035c4121bb270af0d24d1c", 0xf8}, {&(0x7f0000000580)="fbd329619614f1b1a509052cb848cd13932d4ed52cad1c5ec677ea9ee677872e937972f429c14368abd2fd07c90ae7904b8b942eb28da8b62903e171ef8857a22876417b47e3a009c4506f31a03527bc6beff02a85f6727d5b7758c9451f72a05cb76927363432df3fd95a887d7dad45ac1fadfb471dc7cd78a0007fb022f1eac4da21addde31d18d19d83b276bdc27005f8f2705bd53eaaec82f26b9aced917fd07734104088849c3e75b9f59106960c69bb30888b1beafac", 0xb9}, {&(0x7f0000000640)="adce1c6966179a99aa2c8bc8234391de74447172301edbf06152b8bef75562d2f424f4df8b00b4a1aa21db0e23b813edad5ebcbf13c40fedc9a2179156be633effdf49c7402c9f4a79d63c1d15b4e1a28d91289383465ec347dd3f762fbafcecab679f5abe8ab2c4586fd9d960d903fafc5eac6e044f304a761c1600127ed4ddeb2976907bb89b2d0d34868cf906487a76f70f66851a4d6c33dee646e5b7b30995b1104fd123", 0xa6}, {&(0x7f0000000780)="8ef04cc99eb2a60c588839473e7a45fbfedad4095ef5557f2a6c6a07ba7d2d800a945deb783b87bfcb23a02aa7baef406f2e6b07f0072a210159b7f85a99fd61eda8eb43bafa70860185fc1f04259d42ead2a56a4905592f7b39b1f898c3100549458b37569a71fc0e5a63d7774a2fa1bdcd2748df61d30bbcc55e7ce882a99406affe5586ef9e0eae1af8a7e76b9c69deb3850568cb4486a6c55d0ef8e5e70f6d19eee4c4e6d3bf0c76e4492f4d8c9cc85c48345ff2da5c4d58152f4d587b2502283efa2a83dd63655812bb2657f7c667a430", 0xd3}], 0x4}, 0x80080) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740), 0x4) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000008c0)='syz0\x00', 0x200002, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x32}, r3, 0x0, r1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xfffff004}]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x43, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf9100000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r6}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r8, 0x400454cd, 0x0) syz_clone(0x640c7006, 0x0, 0x0, 0x0, 0x0, 0x0) 4.693368728s ago: executing program 3 (id=2867): openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="628a1bf1e9fe3f69080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, &(0x7f0000000080)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001000)="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", 0x5a4}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000006060000000000000000000018110000f26dfb28e61acf64325db4b7bdf52b2a632bda88499fa3d60f56c7db4af7cbfa424285fcfdd9e37caa0dff35f275bb224df78ee62964f44ba473856ab1842963e03e5ca77f23df11b9ffd527563c00fd32c649bd88db6fe1cac5529e73f99f62f06805fe5f85590e63a884e20a978df1ff62b6069f7d90e4498ec304eb2bc05657f900000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000002636000000fa000100000000100a00", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595350b4fb90ff598"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f0000000c00)=ANY=[@ANYBLOB="9feb010018000000000000005700000057000000000000000500000000000002050000001000000000000002020000001000000000000006040000000f0000000000000b00000000010000000100000f030000000200000703000000010000008968500b000000000000070000000000002e0030300000af5a88a425ce37d4cc65fec6a3991d5f8d38004163fe1356009ddbe143a64808892fb175484c1a1df832ef63eb46403af9b12a391107a71266f241342937d5f066ca263ff55f34df5d6617e7a93b9e89bb2c6d91ad086f6e"], &(0x7f0000001480)=""/167, 0x77, 0xa7, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x54}]}, &(0x7f0000001e00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 4.158595331s ago: executing program 4 (id=2868): openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="628a1bf1e9fe3f69080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, &(0x7f0000000080)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001000)="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", 0x59e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000006060000000000000000000018110000f26dfb28e61acf64325db4b7bdf52b2a632bda88499fa3d60f56c7db4af7cbfa424285fcfdd9e37caa0dff35f275bb224df78ee62964f44ba473856ab1842963e03e5ca77f23df11b9ffd527563c00fd32c649bd88db6fe1cac5529e73f99f62f06805fe5f85590e63a884e20a978df1ff62b6069f7d90e4498ec304eb2bc05657f900000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000002636000000fa000100000000100a00", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595350b4fb90ff598"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f0000000c00)=ANY=[@ANYBLOB="9feb010018000000000000005700000057000000000000000500000000000002050000001000000000000002020000001000000000000006040000000f0000000000000b00000000010000000100000f030000000200000703000000010000008968500b000000000000070000000000002e0030300000af5a88a425ce37d4cc65fec6a3991d5f8d38004163fe1356009ddbe143a64808892fb175484c1a1df832ef63eb46403af9b12a391107a71266f241342937d5f066ca263ff55f34df5d6617e7a93b9e89bb2c6d91ad086f6e"], &(0x7f0000001480)=""/167, 0x77, 0xa7, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x54}]}, &(0x7f0000001e00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 3.897587632s ago: executing program 0 (id=2454): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c1fc83c053b1da4369fa407a35e225b000000001c0000000c0000000800000c0200000604000000050000009000000002000000fe"], &(0x7f0000000580)=""/249, 0x40, 0xf9, 0x1, 0x0, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x2, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000008020000000000000000000001050000018000000000000000010000850200000000000000010000000000000400000000da"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000380)='snd_soc_dapm_walk_done\x00', 0xffffffffffffffff, 0x0, 0xfff}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu '], 0x5) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000109500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xbb, &(0x7f0000000180)=""/187, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x267e, 0x0, 0x0, 0x0, 0x0, 0x10, 0x32bd, @void, @value}, 0x94) 1.687904373s ago: executing program 1 (id=2869): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sys_enter\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x401, 0x0}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x0, 0x0}, 0x30) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4205e74", 0xae, &(0x7f0000000280), &(0x7f00000003c0), &(0x7f00000004c0)="df2239a5abfe7f736463aa3ae5541525d85b9df771aae02a28043c0e57aead8f2a4b3a139507dd43ac6862d4dca5877e23f4111791863277a703b41bea7d69d3a8a7ca074f8c3f27cffde6d291cb265ddfc009e96d29") ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x20000010) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x20001400) 1.686991112s ago: executing program 2 (id=2870): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000480)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000280)='>', 0x1}], 0x1}, 0x3) close(r1) 1.685362743s ago: executing program 3 (id=2871): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sys_enter\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x401, 0x0}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x0, 0x0}, 0x30) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4205e74", 0xae, &(0x7f0000000280), &(0x7f00000003c0), &(0x7f00000004c0)="df2239a5abfe7f736463aa3ae5541525d85b9df771aae02a28043c0e57aead8f2a4b3a139507dd43ac6862d4dca5877e23f4111791863277a703b41bea7d69d3a8a7ca074f8c3f27cffde6d291cb265ddfc009e96d29") ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x20000010) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x20001400) 1.684411942s ago: executing program 4 (id=2872): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f00000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x7, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000085000000a000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.664116173s ago: executing program 2 (id=2873): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x2, 0x600, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000100)='!\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000000194d01556412789000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x56, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x5a, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700)=r5, 0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r6}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) 1.274641394s ago: executing program 4 (id=2874): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@map, 0x1, 0x1, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x18) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 1.271865714s ago: executing program 2 (id=2884): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f00000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x7, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000085000000a000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.081660735s ago: executing program 2 (id=2875): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sys_enter\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x2, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x401, 0x0}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x0, 0x0}, 0x30) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4205e74", 0xae, &(0x7f0000000280), &(0x7f00000003c0), &(0x7f00000004c0)="df2239a5abfe7f736463aa3ae5541525d85b9df771aae02a28043c0e57aead8f2a4b3a139507dd43ac6862d4dca5877e23f4111791863277a703b41bea7d69d3a8a7ca074f8c3f27cffde6d291cb265ddfc009e96d29") ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000000080)) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x20000010) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x20001400) 1.081120975s ago: executing program 4 (id=2876): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xfffffffffffffe4b, 0x0}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000780)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc0}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2, 0xf1}, {0x3, 0x3, 0x6, 0xa, 0xa}, {0x7, 0x1, 0x2, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 679.290447ms ago: executing program 3 (id=2877): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x51}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 594.973267ms ago: executing program 3 (id=2878): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="1802000000000000000000000000000062000000560000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0xa2, &(0x7f00000002c0)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x22) 572.438187ms ago: executing program 3 (id=2879): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xb, [@func_proto, @var={0x9, 0x0, 0x0, 0xe, 0x3}, @struct={0x0, 0x43}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000180)=""/167, 0x4b, 0xa7, 0x1, 0x0, 0x0, @void, @value}, 0x28) 569.151417ms ago: executing program 1 (id=2880): bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdir(0x0, 0x0) (async) gettid() (async) syz_clone(0x44044000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1008, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180400"/13, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 495.152118ms ago: executing program 3 (id=2881): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000009000000000000000000000000f11d9187366c23626c0b4e767f084cc35b50a601fa972db6c2dc4fab53c43db9240215ce28392aeafe1527d605a2141c07e8b2b9fb52a37371d679cb", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeda) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r3}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000280)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_clone(0x8020000, &(0x7f0000000300)="515e0d4b072bef1e764f786d3a600db7439e84e3991170cc77bf1eb8def59bc45b41851ed44e80d927aa51db95d26ec734f58e4ed1836e2451b1e6e9ed1c80e787791afbd0d5cab23f5db57736366c1d79a2cc3680e1e7dd081dbc377119b272504c6c263cd2f44f3eb55720d2753ff31f8382b975103d4d295fcbd750564beb1362c7", 0x83, &(0x7f0000000080), &(0x7f0000000280), &(0x7f0000000680)="d3141ea91a826a2333da7a58efae4f2db30276f8f7720cee0cb3907ed26e0d234616a9566e81fea9a3564c2756f37234fe0c29ca623a13832fe59667042ba84f0e551eaa7549d3a8151e464f689f") bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7b3, 0x653}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={0xffffffffffffffff, r2, 0x4, r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 429.999388ms ago: executing program 1 (id=2882): openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="628a1bf1e9fe3f69080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, &(0x7f0000000080)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001000)="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", 0x5a4}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f0000000540), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000006060000000000000000000018110000f26dfb28e61acf64325db4b7bdf52b2a632bda88499fa3d60f56c7db4af7cbfa424285fcfdd9e37caa0dff35f275bb224df78ee62964f44ba473856ab1842963e03e5ca77f23df11b9ffd527563c00fd32c649bd88db6fe1cac5529e73f99f62f06805fe5f85590e63a884e20a978df1ff62b6069f7d90e4498ec304eb2bc05657f900000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000002636000000fa000100000000100a00", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595350b4fb90ff598"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f0000000c00)=ANY=[@ANYBLOB="9feb010018000000000000005700000057000000000000000500000000000002050000001000000000000002020000001000000000000006040000000f0000000000000b00000000010000000100000f030000000200000703000000010000008968500b000000000000070000000000002e0030300000af5a88a425ce37d4cc65fec6a3991d5f8d38004163fe1356009ddbe143a64808892fb175484c1a1df832ef63eb46403af9b12a391107a71266f241342937d5f066ca263ff55f34df5d6617e7a93b9e89bb2c6d91ad086f6e"], &(0x7f0000001480)=""/167, 0x77, 0xa7, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x54}]}, &(0x7f0000001e00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 297.713099ms ago: executing program 4 (id=2883): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000480)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000280)='>', 0x1}], 0x1}, 0x3) close(r1) 236.793699ms ago: executing program 4 (id=2885): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000380)={'wlan0\x00', 0x100}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000880)={&(0x7f0000000340)=@name={0x1e, 0x2, 0x1, {{0x43}}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000480)="a808f9da4b423b4e431368c7a7e2c2dcd4c7a5a2291f1bfbf7adefbdc20e5d7f85c277961eff9b86401a01af3fe2e0ce93924a4def1e69a66f8a9bf48855a00bf092d2ad98cd777e1a67b62307071d2900e5ca1c21851dfe8f22284898d1275cfcc193cd87aa8e2b56608b466d1033940813a19b80bc1e422c4881ed09b864cda4a55c46968e9a3b3cbaf503c85c6be8c83491aaf645123099f867a04fe520d822a477d6536d276f810d979a81ef21ed524e860c164a3ef9bac0c6ec9cca111c62ba4afe84fbc9e176b9f1726168cd44020e35566aceb9d8274c2001eeb9c1ee851729e9c4e2c7c7b17a191575035c4121bb270af0d24d1c", 0xf8}, {&(0x7f0000000580)="fbd329619614f1b1a509052cb848cd13932d4ed52cad1c5ec677ea9ee677872e937972f429c14368abd2fd07c90ae7904b8b942eb28da8b62903e171ef8857a22876417b47e3a009c4506f31a03527bc6beff02a85f6727d5b7758c9451f72a05cb76927363432df3fd95a887d7dad45ac1fadfb471dc7cd78a0007fb022f1eac4da21addde31d18d19d83b276bdc27005f8f2705bd53eaaec82f26b9aced917fd07734104088849c3e75b9f59106960c69bb30888b1beafac", 0xb9}, {&(0x7f0000000640)="adce1c6966179a99aa2c8bc8234391de74447172301edbf06152b8bef75562d2f424f4df8b00b4a1aa21db0e23b813edad5ebcbf13c40fedc9a2179156be633effdf49c7402c9f4a79d63c1d15b4e1a28d91289383465ec347dd3f762fbafcecab679f5abe8ab2c4586fd9d960d903fafc5eac6e044f304a761c1600127ed4ddeb2976907bb89b2d0d34868cf906487a76f70f66851a4d6c33dee646e5b7b30995b1104fd123", 0xa6}, {&(0x7f0000000780)="8ef04cc99eb2a60c588839473e7a45fbfedad4095ef5557f2a6c6a07ba7d2d800a945deb783b87bfcb23a02aa7baef406f2e6b07f0072a210159b7f85a99fd61eda8eb43bafa70860185fc1f04259d42ead2a56a4905592f7b39b1f898c3100549458b37569a71fc0e5a63d7774a2fa1bdcd2748df61d30bbcc55e7ce882a99406affe5586ef9e0eae1af8a7e76b9c69deb3850568cb4486a6c55d0ef8e5e70f6d19eee4c4e6d3bf0c76e4492f4d8c9cc85c48345ff2da5c4d58152f4d587b2502283efa2a83dd63655812bb2657f7c667a430", 0xd3}], 0x4}, 0x80080) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740), 0x4) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000008c0)='syz0\x00', 0x200002, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x32}, r3, 0x0, r1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0xfffff004}]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x43, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf9100000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r6}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r8, 0x400454cd, 0x0) syz_clone(0x640c7006, 0x0, 0x0, 0x0, 0x0, 0x0) 30.85086ms ago: executing program 2 (id=2886): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000009000000000000000000000000f11d9187366c23626c0b4e767f084cc35b50a601fa972db6c2dc4fab53c43db9240215ce28392aeafe1527d605a2141c07e8b2b9fb52a37371d679cb", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x100, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeda) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000280)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) syz_clone(0x8020000, &(0x7f0000000300)="515e0d4b072bef1e764f786d3a600db7439e84e3991170cc77bf1eb8def59bc45b41851ed44e80d927aa51db95d26ec734f58e4ed1836e2451b1e6e9ed1c80e787791afbd0d5cab23f5db57736366c1d79a2cc3680e1e7dd081dbc377119b272504c6c263cd2f44f3eb55720d2753ff31f8382b975103d4d295fcbd750564beb1362c7b12a", 0x85, &(0x7f0000000080), &(0x7f0000000280), &(0x7f0000000680)="d3141ea91a826a2333da7a58efae4f2db30276f8f7720cee0cb3907ed26e0d234616a9566e81fea9a3564c2756f37234fe0c29ca623a13832fe59667042ba84f0e551eaa7549d3a8151e464f689f854790709f2ff0d786341f75cf4b9184780ff6d8a618599b3d08a6687e2cd73ef67cb2ef45d84f5cd45347ba835e5cd9521e42c81f0fe32fd94f4d6b127212887b581cc48a6685856f72d5ae58a2") bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7b3, 0x653}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 20.29423ms ago: executing program 1 (id=2887): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x2, 0x600, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000100)='!\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000000194d01556412789000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r3, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x56, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x5a, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700)=r5, 0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) close(0xffffffffffffffff) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r6}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) 0s ago: executing program 0 (id=2454): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000001c1fc83c053b1da4369fa407a35e225b000000001c0000000c0000000800000c0200000604000000050000009000000002000000fe"], &(0x7f0000000580)=""/249, 0x40, 0xf9, 0x1, 0x0, 0x0, @void, @value}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xa, 0x2, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000008020000000000000000000001050000018000000000000000010000850200000000000000010000000000000400000000da"], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000380)='snd_soc_dapm_walk_done\x00', 0xffffffffffffffff, 0x0, 0xfff}, 0x18) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB='+cpu '], 0x5) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000109500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xbb, &(0x7f0000000180)=""/187, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x267e, 0x0, 0x0, 0x0, 0x0, 0x10, 0x32bd, @void, @value}, 0x94) kernel console output (not intermixed with test programs): elper that may corrupt user memory! [ 275.147466][ T4603] device sit0 left promiscuous mode [ 277.492745][ T4623] syz.0.1399[4623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.492851][ T4623] syz.0.1399[4623] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.152739][ T4683] device wg2 entered promiscuous mode [ 281.236068][ T4683] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 283.261021][ T4721] device wg2 entered promiscuous mode [ 283.275115][ T4721] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 283.510300][ T4727] device syzkaller0 entered promiscuous mode [ 283.783355][ T30] audit: type=1400 audit(1732188661.123:146): avc: denied { tracepoint } for pid=4740 comm="syz.0.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 283.810172][ T4742] bridge0: port 3(veth0_to_batadv) entered blocking state [ 283.840402][ T4742] bridge0: port 3(veth0_to_batadv) entered disabled state [ 283.885303][ T4742] device veth0_to_batadv entered promiscuous mode [ 285.058943][ T4754] device macsec0 entered promiscuous mode [ 285.445815][ T4770] syz.3.1451[4770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.445936][ T4770] syz.3.1451[4770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.445519][ T4776] syz.0.1452[4776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.477942][ T4776] syz.0.1452[4776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.667408][ T4782] syz.1.1454[4782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.684151][ T4782] syz.1.1454[4782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.186232][ T4835] device syzkaller0 entered promiscuous mode [ 291.354875][ T4918] syz.4.1502[4918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.354985][ T4918] syz.4.1502[4918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.467178][ T30] audit: type=1400 audit(1732188669.813:147): avc: denied { create } for pid=4942 comm="syz.2.1511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 292.834003][ T30] audit: type=1400 audit(1732188669.933:148): avc: denied { append } for pid=4942 comm="syz.2.1511" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 293.173229][ T4964] syz.1.1517[4964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.173389][ T4964] syz.1.1517[4964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.108210][ T5006] syz.4.1530[5006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.252513][ T5006] syz.4.1530[5006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.558063][ T5058] syz.4.1546[5058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.672026][ T5058] syz.4.1546[5058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.457011][ T5094] syz.1.1560[5094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.547985][ T5094] syz.1.1560[5094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.735198][ T30] audit: type=1400 audit(1732188678.043:149): avc: denied { create } for pid=5119 comm="syz.3.1570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 301.160739][ T5145] FAULT_INJECTION: forcing a failure. [ 301.160739][ T5145] name failslab, interval 1, probability 0, space 0, times 0 [ 301.175129][ T5145] CPU: 0 PID: 5145 Comm: syz.3.1576 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 301.184949][ T5145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 301.194839][ T5145] Call Trace: [ 301.198013][ T5145] [ 301.200756][ T5145] dump_stack_lvl+0x151/0x1c0 [ 301.205385][ T5145] ? io_uring_drop_tctx_refs+0x190/0x190 [ 301.210851][ T5145] dump_stack+0x15/0x20 [ 301.214840][ T5145] should_fail+0x3c6/0x510 [ 301.219099][ T5145] __should_failslab+0xa4/0xe0 [ 301.223695][ T5145] should_failslab+0x9/0x20 [ 301.228122][ T5145] slab_pre_alloc_hook+0x37/0xd0 [ 301.232899][ T5145] __kmalloc+0x6d/0x270 [ 301.236888][ T5145] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 301.242188][ T5145] ? tun_device_event+0x4fe/0xf80 [ 301.247045][ T5145] tun_device_event+0x4fe/0xf80 [ 301.251729][ T5145] ? __kasan_check_read+0x11/0x20 [ 301.256592][ T5145] ? macsec_notify+0x101/0x4c0 [ 301.261190][ T5145] ? macsec_common_dellink+0x6d0/0x6d0 [ 301.266484][ T5145] ? sel_netif_netdev_notifier_handler+0x18e/0x2c0 [ 301.272827][ T5145] raw_notifier_call_chain+0x8c/0xf0 [ 301.277942][ T5145] dev_change_tx_queue_len+0x1d9/0x350 [ 301.283235][ T5145] ? dev_set_mtu+0x180/0x180 [ 301.287775][ T5145] dev_ifsioc+0x453/0x10c0 [ 301.292026][ T5145] ? dev_ioctl+0xe70/0xe70 [ 301.296275][ T5145] ? mutex_lock+0xb6/0x1e0 [ 301.300547][ T5145] ? wait_for_completion_killable_timeout+0x10/0x10 [ 301.306962][ T5145] dev_ioctl+0x54d/0xe70 [ 301.311036][ T5145] sock_do_ioctl+0x34f/0x5a0 [ 301.315473][ T5145] ? sock_show_fdinfo+0xa0/0xa0 [ 301.320154][ T5145] ? selinux_file_ioctl+0x3cc/0x540 [ 301.325183][ T5145] sock_ioctl+0x455/0x740 [ 301.329350][ T5145] ? sock_poll+0x400/0x400 [ 301.333602][ T5145] ? __fget_files+0x31e/0x380 [ 301.338116][ T5145] ? security_file_ioctl+0x84/0xb0 [ 301.343327][ T5145] ? sock_poll+0x400/0x400 [ 301.347575][ T5145] __se_sys_ioctl+0x114/0x190 [ 301.352088][ T5145] __x64_sys_ioctl+0x7b/0x90 [ 301.356517][ T5145] x64_sys_call+0x98/0x9a0 [ 301.360767][ T5145] do_syscall_64+0x3b/0xb0 [ 301.365026][ T5145] ? clear_bhb_loop+0x35/0x90 [ 301.369533][ T5145] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 301.375261][ T5145] RIP: 0033:0x7f9f74c08819 [ 301.379613][ T5145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 301.399053][ T5145] RSP: 002b:00007f9f73281038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.407304][ T5145] RAX: ffffffffffffffda RBX: 00007f9f74dbffa0 RCX: 00007f9f74c08819 [ 301.415116][ T5145] RDX: 0000000020000100 RSI: 0000000000008943 RDI: 0000000000000007 [ 301.423057][ T5145] RBP: 00007f9f73281090 R08: 0000000000000000 R09: 0000000000000000 [ 301.431649][ T5145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 301.439461][ T5145] R13: 0000000000000000 R14: 00007f9f74dbffa0 R15: 00007ffe46545838 [ 301.447364][ T5145] [ 301.450511][ T5145] syzkaller0: refused to change device tx_queue_len [ 301.853207][ T5153] device veth0_vlan left promiscuous mode [ 301.886814][ T5153] device veth0_vlan entered promiscuous mode [ 302.050590][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 302.095740][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 302.175306][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 302.732417][ T5166] syz.4.1584[5166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.732528][ T5166] syz.4.1584[5166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.164043][ T5171] syz.2.1586[5171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.300120][ T5171] syz.2.1586[5171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.585354][ T5234] syz.0.1606[5234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.719615][ T5234] syz.0.1606[5234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.049066][ T5280] device sit0 entered promiscuous mode [ 308.912550][ T5325] syz.2.1637[5325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.912661][ T5325] syz.2.1637[5325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.943588][ T5328] syz.1.1636[5328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.001124][ T5328] syz.1.1636[5328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.343102][ T5372] syz.4.1652[5372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.379221][ T5372] syz.4.1652[5372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.396228][ T5375] syz.0.1654[5375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.408422][ T5375] syz.0.1654[5375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.138726][ T5392] syz.3.1656[5392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.197759][ T5392] syz.3.1656[5392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.209976][ T5387] device sit0 entered promiscuous mode [ 314.813886][ T30] audit: type=1400 audit(1732188692.163:150): avc: denied { create } for pid=5442 comm="syz.1.1674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 315.324997][ T5454] device syzkaller0 entered promiscuous mode [ 315.339028][ T30] audit: type=1400 audit(1732188692.683:151): avc: denied { create } for pid=5463 comm="syz.4.1683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 316.394233][ T5491] bpf_get_probe_write_proto: 2 callbacks suppressed [ 316.394255][ T5491] syz.1.1692[5491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.441932][ T5491] syz.1.1692[5491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.604209][ T5535] syz.3.1705[5535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.652262][ T5535] syz.3.1705[5535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.491261][ T5573] syz.0.1728[5573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.585933][ T5573] syz.0.1728[5573] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.670301][ T5616] syz.1.1732[5616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.780169][ T5616] syz.1.1732[5616] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.717273][ T5642] syz.4.1742[5642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.728760][ T5642] syz.4.1742[5642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.953424][ T5661] syz.3.1749[5661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.966840][ T5661] syz.3.1749[5661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.763735][ T5695] device syzkaller0 entered promiscuous mode [ 327.380858][ T5746] bridge0: port 3(veth0_to_batadv) entered disabled state [ 327.389038][ T5746] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.397880][ T5746] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.463226][ T5746] device bridge0 left promiscuous mode [ 327.889034][ T5767] syz.4.1785[5767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.889145][ T5767] syz.4.1785[5767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.251884][ T5819] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.271233][ T5819] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.281150][ T5819] device bridge0 left promiscuous mode [ 330.387870][ T5826] device syzkaller0 entered promiscuous mode [ 330.396294][ T5824] syz.2.1805[5824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.396477][ T5824] syz.2.1805[5824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.683882][ T5902] syz.1.1830[5902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.696293][ T5902] syz.1.1830[5902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.202084][ T5972] syz.4.1855[5972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.316933][ T5972] syz.4.1855[5972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.342956][ T5975] device sit0 left promiscuous mode [ 335.481690][ T5977] device sit0 entered promiscuous mode [ 336.512558][ T5996] syz.3.1876[5996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.512668][ T5996] syz.3.1876[5996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.623909][ T6044] syz.3.1882[6044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.892292][ T6044] syz.3.1882[6044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.145126][ T6060] syz.4.1887[6060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.168113][ T6060] syz.4.1887[6060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.070492][ T6103] device pim6reg1 entered promiscuous mode [ 343.073536][ T6105] syz.0.1913[6105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.112318][ T6105] syz.0.1913[6105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.844036][ T6118] syz.2.1905[6118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.855570][ T6118] syz.2.1905[6118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.176908][ T6163] syz.4.1922[6163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.286531][ T6163] syz.4.1922[6163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.162251][ T6247] FAULT_INJECTION: forcing a failure. [ 350.162251][ T6247] name failslab, interval 1, probability 0, space 0, times 0 [ 350.322103][ T6247] CPU: 0 PID: 6247 Comm: syz.0.1949 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 350.331963][ T6247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 350.342029][ T6247] Call Trace: [ 350.345144][ T6247] [ 350.347924][ T6247] dump_stack_lvl+0x151/0x1c0 [ 350.352441][ T6247] ? io_uring_drop_tctx_refs+0x190/0x190 [ 350.357976][ T6247] ? mutex_unlock+0xb2/0x260 [ 350.362343][ T6247] dump_stack+0x15/0x20 [ 350.366327][ T6247] should_fail+0x3c6/0x510 [ 350.370591][ T6247] __should_failslab+0xa4/0xe0 [ 350.375178][ T6247] should_failslab+0x9/0x20 [ 350.379519][ T6247] slab_pre_alloc_hook+0x37/0xd0 [ 350.384296][ T6247] kmem_cache_alloc_trace+0x48/0x210 [ 350.389413][ T6247] ? pfifo_fast_change_tx_queue_len+0x14f/0xb90 [ 350.395491][ T6247] pfifo_fast_change_tx_queue_len+0x14f/0xb90 [ 350.401508][ T6247] ? pfifo_fast_reset+0xe22/0xf10 [ 350.406369][ T6247] ? __kasan_check_write+0x14/0x20 [ 350.411309][ T6247] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 350.416185][ T6247] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 350.421205][ T6247] ? pfifo_fast_destroy+0xd0/0xd0 [ 350.426067][ T6247] ? pfifo_fast_destroy+0xd0/0xd0 [ 350.430918][ T6247] dev_qdisc_change_tx_queue_len+0x39b/0x500 [ 350.436737][ T6247] ? dev_qdisc_change_real_num_tx+0xa0/0xa0 [ 350.442463][ T6247] ? ndisc_netdev_event+0xb0/0x400 [ 350.447411][ T6247] ? raw_notifier_call_chain+0xdf/0xf0 [ 350.452705][ T6247] dev_change_tx_queue_len+0x21f/0x350 [ 350.457999][ T6247] ? dev_set_mtu+0x180/0x180 [ 350.462438][ T6247] dev_ifsioc+0x453/0x10c0 [ 350.466685][ T6247] ? dev_ioctl+0xe70/0xe70 [ 350.470938][ T6247] ? mutex_lock+0x135/0x1e0 [ 350.475278][ T6247] ? wait_for_completion_killable_timeout+0x10/0x10 [ 350.481699][ T6247] dev_ioctl+0x54d/0xe70 [ 350.485774][ T6247] sock_do_ioctl+0x34f/0x5a0 [ 350.490202][ T6247] ? sock_show_fdinfo+0xa0/0xa0 [ 350.494891][ T6247] ? selinux_file_ioctl+0x3cc/0x540 [ 350.499922][ T6247] sock_ioctl+0x455/0x740 [ 350.504092][ T6247] ? sock_poll+0x400/0x400 [ 350.508344][ T6247] ? __fget_files+0x31e/0x380 [ 350.512855][ T6247] ? security_file_ioctl+0x84/0xb0 [ 350.517800][ T6247] ? sock_poll+0x400/0x400 [ 350.522053][ T6247] __se_sys_ioctl+0x114/0x190 [ 350.526704][ T6247] __x64_sys_ioctl+0x7b/0x90 [ 350.531130][ T6247] x64_sys_call+0x98/0x9a0 [ 350.535378][ T6247] do_syscall_64+0x3b/0xb0 [ 350.539741][ T6247] ? clear_bhb_loop+0x35/0x90 [ 350.544245][ T6247] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 350.549971][ T6247] RIP: 0033:0x7f6c6a075819 [ 350.554226][ T6247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 350.573666][ T6247] RSP: 002b:00007f6c686cd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 350.581911][ T6247] RAX: ffffffffffffffda RBX: 00007f6c6a22d080 RCX: 00007f6c6a075819 [ 350.589728][ T6247] RDX: 0000000020000100 RSI: 0000000000008943 RDI: 0000000000000007 [ 350.597536][ T6247] RBP: 00007f6c686cd090 R08: 0000000000000000 R09: 0000000000000000 [ 350.605346][ T6247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 350.613160][ T6247] R13: 0000000000000001 R14: 00007f6c6a22d080 R15: 00007fffca93d868 [ 350.621007][ T6247] [ 350.624262][ T6247] syzkaller0: refused to change device tx_queue_len [ 351.100667][ T6277] FAULT_INJECTION: forcing a failure. [ 351.100667][ T6277] name failslab, interval 1, probability 0, space 0, times 0 [ 351.123746][ T6277] CPU: 0 PID: 6277 Comm: syz.3.1962 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 351.133497][ T6277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 351.143477][ T6277] Call Trace: [ 351.146597][ T6277] [ 351.149373][ T6277] dump_stack_lvl+0x151/0x1c0 [ 351.153889][ T6277] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 351.159528][ T6277] ? io_uring_drop_tctx_refs+0x190/0x190 [ 351.164998][ T6277] ? __wake_up_klogd+0xd5/0x110 [ 351.169781][ T6277] dump_stack+0x15/0x20 [ 351.173764][ T6277] should_fail+0x3c6/0x510 [ 351.178019][ T6277] __should_failslab+0xa4/0xe0 [ 351.182615][ T6277] ? alloc_vmap_area+0x19e/0x1a80 [ 351.187475][ T6277] should_failslab+0x9/0x20 [ 351.191870][ T6277] slab_pre_alloc_hook+0x37/0xd0 [ 351.196589][ T6277] ? alloc_vmap_area+0x19e/0x1a80 [ 351.201534][ T6277] kmem_cache_alloc+0x44/0x200 [ 351.206149][ T6277] alloc_vmap_area+0x19e/0x1a80 [ 351.210826][ T6277] ? vm_map_ram+0xa90/0xa90 [ 351.215162][ T6277] ? __kasan_kmalloc+0x9/0x10 [ 351.219673][ T6277] ? kmem_cache_alloc_trace+0x115/0x210 [ 351.225059][ T6277] __get_vm_area_node+0x158/0x360 [ 351.229919][ T6277] __vmalloc_node_range+0xe2/0x8d0 [ 351.234869][ T6277] ? reuseport_array_alloc+0xc3/0x160 [ 351.240084][ T6277] ? cap_capable+0x1d2/0x270 [ 351.244501][ T6277] bpf_map_area_alloc+0xd9/0xf0 [ 351.249182][ T6277] ? reuseport_array_alloc+0xc3/0x160 [ 351.254566][ T6277] reuseport_array_alloc+0xc3/0x160 [ 351.259641][ T6277] map_create+0x411/0x2050 [ 351.263921][ T6277] __sys_bpf+0x296/0x760 [ 351.267935][ T6277] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 351.273143][ T6277] ? debug_smp_processor_id+0x17/0x20 [ 351.278346][ T6277] __x64_sys_bpf+0x7c/0x90 [ 351.282603][ T6277] x64_sys_call+0x87f/0x9a0 [ 351.286939][ T6277] do_syscall_64+0x3b/0xb0 [ 351.291195][ T6277] ? clear_bhb_loop+0x35/0x90 [ 351.295705][ T6277] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 351.301454][ T6277] RIP: 0033:0x7f9f74c08819 [ 351.305687][ T6277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 351.325131][ T6277] RSP: 002b:00007f9f73281038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 351.333374][ T6277] RAX: ffffffffffffffda RBX: 00007f9f74dbffa0 RCX: 00007f9f74c08819 [ 351.341191][ T6277] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000000 [ 351.348994][ T6277] RBP: 00007f9f73281090 R08: 0000000000000000 R09: 0000000000000000 [ 351.356867][ T6277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 351.364628][ T6277] R13: 0000000000000000 R14: 00007f9f74dbffa0 R15: 00007ffe46545838 [ 351.372438][ T6277] [ 351.383155][ T30] audit: type=1400 audit(1732188728.733:152): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 351.462630][ T6280] syz.1.1963[6280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.462736][ T6280] syz.1.1963[6280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.665833][ T6322] device pim6reg1 entered promiscuous mode [ 354.162322][ T6347] syz.0.1985[6347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.162433][ T6347] syz.0.1985[6347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.752310][ T6365] ------------[ cut here ]------------ [ 354.829178][ T6365] trace type BPF program uses run-time allocation [ 354.981191][ T6365] WARNING: CPU: 0 PID: 6365 at kernel/bpf/verifier.c:11698 check_map_prog_compatibility+0x6f1/0x890 [ 355.073013][ T6365] Modules linked in: [ 355.087164][ T6365] CPU: 0 PID: 6365 Comm: syz.2.1987 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 355.127685][ T6365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 355.259699][ T6365] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 355.290494][ T6365] Code: db e9 f9 fc ff ff e8 3e 31 ed ff 31 db e9 ed fc ff ff e8 32 31 ed ff c6 05 de 5e a3 05 01 48 c7 c7 c0 eb 87 85 e8 4f 7b be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 355.310968][ T6365] RSP: 0018:ffffc90000dd7328 EFLAGS: 00010246 [ 355.317798][ T6365] RAX: ddb8e1133a7cb300 RBX: 0000000000000001 RCX: 0000000000080000 [ 355.365462][ T6365] RDX: ffffc90002760000 RSI: 0000000000000c1b RDI: 0000000000000c1c [ 355.377311][ T6365] RBP: ffffc90000dd7370 R08: ffffffff81579195 R09: ffffed103ee065e8 [ 355.436324][ T6365] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 355.451945][ T6365] R13: ffff888115ac6800 R14: ffffc90000211000 R15: dffffc0000000000 [ 355.465983][ T6365] FS: 00007fdc83b086c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 355.518003][ T6365] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 355.551532][ T6365] CR2: 0000000000000000 CR3: 000000010ff12000 CR4: 00000000003506b0 [ 355.573022][ T6365] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 355.606331][ T6365] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 355.627071][ T6365] Call Trace: [ 355.630933][ T6365] [ 355.637524][ T6365] ? show_regs+0x58/0x60 [ 355.641755][ T6365] ? __warn+0x160/0x2f0 [ 355.646382][ T6365] ? check_map_prog_compatibility+0x6f1/0x890 [ 355.654327][ T6365] ? report_bug+0x3d9/0x5b0 [ 355.660976][ T6365] ? check_map_prog_compatibility+0x6f1/0x890 [ 355.667806][ T6365] ? handle_bug+0x41/0x70 [ 355.672435][ T6365] ? exc_invalid_op+0x1b/0x50 [ 355.677048][ T6365] ? asm_exc_invalid_op+0x1b/0x20 [ 355.682125][ T6365] ? __wake_up_klogd+0xd5/0x110 [ 355.686981][ T6365] ? check_map_prog_compatibility+0x6f1/0x890 [ 355.727815][ T6365] ? check_map_prog_compatibility+0x6f1/0x890 [ 355.755523][ T6365] resolve_pseudo_ldimm64+0x682/0x1240 [ 355.774382][ T6365] ? check_attach_btf_id+0xef0/0xef0 [ 355.794284][ T6365] ? __mark_reg_known+0x1b0/0x1b0 [ 355.813888][ T6365] ? security_capable+0x87/0xb0 [ 355.834867][ T6365] bpf_check+0x3174/0x12bf0 [ 355.847214][ T6365] ? bpf_prog_3b9dd6b9ec8089c9+0x1bc/0x84c [ 355.872162][ T6365] ? is_bpf_text_address+0x172/0x190 [ 355.890245][ T6365] ? stack_trace_save+0x1c0/0x1c0 [ 355.895266][ T6365] ? __kernel_text_address+0x9b/0x110 [ 355.903521][ T6365] ? unwind_get_return_address+0x4d/0x90 [ 355.909087][ T6365] ? bpf_get_btf_vmlinux+0x60/0x60 [ 355.914144][ T6365] ? arch_stack_walk+0xf3/0x140 [ 355.918900][ T6365] ? stack_trace_save+0x113/0x1c0 [ 355.923793][ T6365] ? stack_trace_snprint+0xf0/0xf0 [ 355.928885][ T6365] ? stack_trace_snprint+0xf0/0xf0 [ 355.990121][ T6365] ? __stack_depot_save+0x34/0x470 [ 355.995146][ T6365] ? ____kasan_kmalloc+0xed/0x110 [ 356.001856][ T6365] ? ____kasan_kmalloc+0xdb/0x110 [ 356.006891][ T6365] ? __kasan_kmalloc+0x9/0x10 [ 356.026821][ T6365] ? kmem_cache_alloc_trace+0x115/0x210 [ 356.042221][ T6365] ? selinux_bpf_prog_alloc+0x51/0x140 [ 356.087313][ T6365] ? security_bpf_prog_alloc+0x62/0x90 [ 356.133851][ T6365] ? bpf_prog_load+0x9ee/0x1b50 [ 356.144220][ T6365] ? __sys_bpf+0x4bc/0x760 [ 356.156477][ T6365] ? __x64_sys_bpf+0x7c/0x90 [ 356.164183][ T6365] ? x64_sys_call+0x87f/0x9a0 [ 356.192457][ T6365] ? do_syscall_64+0x3b/0xb0 [ 356.216635][ T6365] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 356.233994][ T6365] ? __kasan_kmalloc+0x9/0x10 [ 356.266295][ T6365] ? memset+0x35/0x40 [ 356.294124][ T6365] ? bpf_obj_name_cpy+0x196/0x1e0 [ 356.322569][ T6365] bpf_prog_load+0x12ac/0x1b50 [ 356.329565][ T6365] ? map_freeze+0x370/0x370 [ 356.334060][ T6365] ? selinux_bpf+0xcb/0x100 [ 356.338775][ T6365] ? security_bpf+0x82/0xb0 [ 356.343216][ T6365] __sys_bpf+0x4bc/0x760 [ 356.347209][ T6365] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 356.352630][ T6365] ? __kasan_check_write+0x14/0x20 [ 356.357582][ T6365] ? switch_fpu_return+0x15f/0x2e0 [ 356.362602][ T6365] __x64_sys_bpf+0x7c/0x90 [ 356.367192][ T6365] x64_sys_call+0x87f/0x9a0 [ 356.371549][ T6365] do_syscall_64+0x3b/0xb0 [ 356.377037][ T6365] ? clear_bhb_loop+0x35/0x90 [ 356.381569][ T6365] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 356.387502][ T6365] RIP: 0033:0x7fdc854b0819 [ 356.392057][ T6365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 356.411958][ T6365] RSP: 002b:00007fdc83b08038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 356.420303][ T6365] RAX: ffffffffffffffda RBX: 00007fdc85668080 RCX: 00007fdc854b0819 [ 356.429145][ T6365] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 356.437886][ T6365] RBP: 00007fdc8552375e R08: 0000000000000000 R09: 0000000000000000 [ 356.446060][ T6365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 356.454083][ T6365] R13: 0000000000000000 R14: 00007fdc85668080 R15: 00007fffb4f50228 [ 356.462138][ T6365] [ 356.465048][ T6365] ---[ end trace cb058f3c597a4df1 ]--- [ 356.552196][ T6417] syz.1.2010[6417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.552300][ T6417] syz.1.2010[6417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.054016][ T6438] syz.3.2016[6438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.168416][ T6438] syz.3.2016[6438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.446084][ T6542] syz.0.2056[6542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.477337][ T6542] syz.0.2056[6542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 361.396095][ T6578] device pim6reg1 entered promiscuous mode [ 362.706596][ T6625] device bridge_slave_1 left promiscuous mode [ 362.721889][ T6625] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.818496][ T6625] device bridge_slave_0 left promiscuous mode [ 362.873949][ T6625] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.393841][ T6646] syz.4.2096[6646] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.393924][ T6646] syz.4.2096[6646] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.399237][ T6658] device veth0_vlan left promiscuous mode [ 364.422758][ T6658] device veth0_vlan entered promiscuous mode [ 364.478693][ T5472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.507625][ T5472] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 364.519731][ T5472] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 365.595245][ T6722] syz.1.2126[6722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.595349][ T6722] syz.1.2126[6722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.639093][ T6723] syz.3.2125[6723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.213727][ T6723] syz.3.2125[6723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.962547][ T6754] device bridge_slave_1 left promiscuous mode [ 367.002449][ T6754] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.034006][ T6754] device bridge_slave_0 left promiscuous mode [ 367.054095][ T6754] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.174528][ T6760] device veth0_vlan left promiscuous mode [ 367.180775][ T6760] device veth0_vlan entered promiscuous mode [ 367.187977][ T5472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 367.206140][ T5472] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 367.239315][ T5472] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 367.432795][ T6771] syz.0.2144[6771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.432880][ T6771] syz.0.2144[6771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.739218][ T6875] FAULT_INJECTION: forcing a failure. [ 370.739218][ T6875] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 370.793471][ T6875] CPU: 1 PID: 6875 Comm: syz.0.2183 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 370.804603][ T6875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 370.814498][ T6875] Call Trace: [ 370.817623][ T6875] [ 370.820522][ T6875] dump_stack_lvl+0x151/0x1c0 [ 370.825035][ T6875] ? io_uring_drop_tctx_refs+0x190/0x190 [ 370.830494][ T6875] ? 0xffffffffa002ca08 [ 370.834491][ T6875] ? is_bpf_text_address+0x172/0x190 [ 370.839622][ T6875] dump_stack+0x15/0x20 [ 370.843609][ T6875] should_fail+0x3c6/0x510 [ 370.847851][ T6875] should_fail_alloc_page+0x5a/0x80 [ 370.852894][ T6875] prepare_alloc_pages+0x15c/0x700 [ 370.857850][ T6875] ? __alloc_pages+0x8f0/0x8f0 [ 370.862458][ T6875] ? __alloc_pages_bulk+0xe40/0xe40 [ 370.867473][ T6875] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 370.872937][ T6875] __alloc_pages+0x18c/0x8f0 [ 370.877368][ T6875] ? prep_new_page+0x110/0x110 [ 370.881961][ T6875] ? pcpu_chunk_relocate+0x20a/0x430 [ 370.887093][ T6875] pcpu_populate_chunk+0x18c/0xe30 [ 370.892034][ T6875] pcpu_alloc+0x984/0x13e0 [ 370.896405][ T6875] __alloc_percpu_gfp+0x27/0x30 [ 370.901078][ T6875] bpf_map_alloc_percpu+0xe6/0x160 [ 370.906025][ T6875] array_map_alloc+0x3a5/0x6d0 [ 370.910630][ T6875] map_create+0x411/0x2050 [ 370.914900][ T6875] __sys_bpf+0x296/0x760 [ 370.918956][ T6875] ? fput_many+0x160/0x1b0 [ 370.923209][ T6875] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 370.928421][ T6875] ? debug_smp_processor_id+0x17/0x20 [ 370.933630][ T6875] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 370.939530][ T6875] __x64_sys_bpf+0x7c/0x90 [ 370.943782][ T6875] x64_sys_call+0x87f/0x9a0 [ 370.948121][ T6875] do_syscall_64+0x3b/0xb0 [ 370.952375][ T6875] ? clear_bhb_loop+0x35/0x90 [ 370.956894][ T6875] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 370.962616][ T6875] RIP: 0033:0x7f6c6a075819 [ 370.966867][ T6875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.986308][ T6875] RSP: 002b:00007f6c686ee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 370.994551][ T6875] RAX: ffffffffffffffda RBX: 00007f6c6a22cfa0 RCX: 00007f6c6a075819 [ 371.002367][ T6875] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 371.010190][ T6875] RBP: 00007f6c686ee090 R08: 0000000000000000 R09: 0000000000000000 [ 371.017987][ T6875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 371.025798][ T6875] R13: 0000000000000000 R14: 00007f6c6a22cfa0 R15: 00007fffca93d868 [ 371.033619][ T6875] [ 371.933280][ T6898] device pim6reg1 entered promiscuous mode [ 372.084536][ T6911] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.092669][ T6911] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.111385][ T6911] device bridge0 left promiscuous mode [ 373.767624][ T6993] syz.2.2229[6993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.767729][ T6993] syz.2.2229[6993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.781504][ T7000] syz.0.2230[7000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.795193][ T7000] syz.0.2230[7000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 375.792206][ T7045] device pim6reg1 entered promiscuous mode [ 376.578767][ T7074] FAULT_INJECTION: forcing a failure. [ 376.578767][ T7074] name failslab, interval 1, probability 0, space 0, times 0 [ 376.591259][ T7074] CPU: 0 PID: 7074 Comm: syz.1.2258 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 376.602314][ T7074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 376.612217][ T7074] Call Trace: [ 376.615332][ T7074] [ 376.618109][ T7074] dump_stack_lvl+0x151/0x1c0 [ 376.622627][ T7074] ? io_uring_drop_tctx_refs+0x190/0x190 [ 376.628095][ T7074] dump_stack+0x15/0x20 [ 376.632098][ T7074] should_fail+0x3c6/0x510 [ 376.636337][ T7074] __should_failslab+0xa4/0xe0 [ 376.640952][ T7074] should_failslab+0x9/0x20 [ 376.645280][ T7074] slab_pre_alloc_hook+0x37/0xd0 [ 376.650052][ T7074] ? tipc_msg_reverse+0x22d/0x9b0 [ 376.654912][ T7074] __kmalloc_track_caller+0x6c/0x260 [ 376.660031][ T7074] ? tipc_msg_reverse+0x22d/0x9b0 [ 376.664901][ T7074] ? tipc_msg_reverse+0x22d/0x9b0 [ 376.669767][ T7074] __alloc_skb+0x10c/0x550 [ 376.674007][ T7074] tipc_msg_reverse+0x22d/0x9b0 [ 376.678701][ T7074] tipc_sk_filter_rcv+0x152b/0x3380 [ 376.683743][ T7074] ? tipc_sk_publish+0x4b0/0x4b0 [ 376.688504][ T7074] ? __kasan_check_write+0x14/0x20 [ 376.693449][ T7074] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 376.698317][ T7074] ? __tipc_sendstream+0x9c2/0x1310 [ 376.703343][ T7074] ? ____sys_sendmsg+0x59e/0x8f0 [ 376.708127][ T7074] tipc_sk_rcv+0x80c/0x1b50 [ 376.712465][ T7074] ? __skb_queue_purge+0x180/0x180 [ 376.717402][ T7074] ? copy_mc_pipe_to_iter+0x760/0x760 [ 376.722624][ T7074] ? __check_object_size+0x94/0x3d0 [ 376.727650][ T7074] tipc_node_xmit+0x34e/0xe40 [ 376.732250][ T7074] ? tipc_node_get_linkname+0x190/0x190 [ 376.737626][ T7074] ? tipc_msg_fragment+0x760/0x760 [ 376.742579][ T7074] __tipc_sendstream+0xb66/0x1310 [ 376.747529][ T7074] ? tsk_advance_rx_queue+0x260/0x260 [ 376.752729][ T7074] ? sock_init_data+0xc0/0xc0 [ 376.757250][ T7074] ? wait_woken+0x170/0x170 [ 376.761584][ T7074] ? kmem_cache_free+0x116/0x2e0 [ 376.766356][ T7074] ? kasan_set_track+0x5d/0x70 [ 376.770952][ T7074] ? kasan_set_track+0x4b/0x70 [ 376.775556][ T7074] tipc_sendstream+0x55/0x70 [ 376.779979][ T7074] ? tipc_getsockopt+0x790/0x790 [ 376.784755][ T7074] ____sys_sendmsg+0x59e/0x8f0 [ 376.789352][ T7074] ? __sys_sendmsg_sock+0x40/0x40 [ 376.794215][ T7074] ? import_iovec+0xe5/0x120 [ 376.798638][ T7074] ___sys_sendmsg+0x252/0x2e0 [ 376.803155][ T7074] ? __sys_sendmsg+0x260/0x260 [ 376.807765][ T7074] ? __fdget+0x1bc/0x240 [ 376.811833][ T7074] __se_sys_sendmsg+0x19a/0x260 [ 376.816519][ T7074] ? __x64_sys_sendmsg+0x90/0x90 [ 376.821291][ T7074] ? ksys_write+0x260/0x2c0 [ 376.825637][ T7074] ? debug_smp_processor_id+0x17/0x20 [ 376.830840][ T7074] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 376.836747][ T7074] __x64_sys_sendmsg+0x7b/0x90 [ 376.841343][ T7074] x64_sys_call+0x16a/0x9a0 [ 376.845679][ T7074] do_syscall_64+0x3b/0xb0 [ 376.849934][ T7074] ? clear_bhb_loop+0x35/0x90 [ 376.854448][ T7074] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 376.860175][ T7074] RIP: 0033:0x7fe8cf760819 [ 376.864431][ T7074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 376.883872][ T7074] RSP: 002b:00007fe8cddd9038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 376.892127][ T7074] RAX: ffffffffffffffda RBX: 00007fe8cf917fa0 RCX: 00007fe8cf760819 [ 376.899925][ T7074] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 0000000000000003 [ 376.907869][ T7074] RBP: 00007fe8cddd9090 R08: 0000000000000000 R09: 0000000000000000 [ 376.915777][ T7074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 376.923591][ T7074] R13: 0000000000000000 R14: 00007fe8cf917fa0 R15: 00007ffc03d54948 [ 376.931406][ T7074] [ 378.161294][ T7089] device pim6reg1 entered promiscuous mode [ 378.745402][ T7121] device sit0 left promiscuous mode [ 382.749140][ T7201] syz.4.2299[7201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.749263][ T7201] syz.4.2299[7201] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.594186][ T7226] syz.4.2308[7226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.662454][ T7226] syz.4.2308[7226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.880083][ T7243] device sit0 left promiscuous mode [ 385.078653][ T7261] syz.2.2319[7261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.078751][ T7261] syz.2.2319[7261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.544046][ T7299] syz.0.2331[7299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.592081][ T7299] syz.0.2331[7299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.955544][ T7408] device wg2 left promiscuous mode [ 392.777156][ T7459] device wg2 left promiscuous mode [ 393.202903][ T7468] device wg2 left promiscuous mode [ 398.242402][ T7636] syz.3.2451[7636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.242511][ T7636] syz.3.2451[7636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.653692][ T7645] syz.1.2455[7645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.669116][ T7645] syz.1.2455[7645] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.795714][ T7646] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.813936][ T7646] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.821368][ T7646] device bridge_slave_0 entered promiscuous mode [ 398.848385][ T7646] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.855417][ T7646] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.862956][ T7646] device bridge_slave_1 entered promiscuous mode [ 399.201218][ T406] device veth0_to_batadv left promiscuous mode [ 399.207344][ T406] bridge0: port 3(veth0_to_batadv) entered disabled state [ 399.214970][ T406] device bridge_slave_1 left promiscuous mode [ 399.221031][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.228289][ T406] device bridge_slave_0 left promiscuous mode [ 399.234277][ T406] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.975564][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 399.983135][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 399.993747][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 400.002272][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 400.011216][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.018116][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 400.053172][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 400.061294][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 400.070089][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 400.078432][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.085404][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 400.092783][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 400.100809][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 400.148278][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 400.161294][ T7646] device veth0_vlan entered promiscuous mode [ 400.168029][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 400.176639][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 400.185858][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 400.200527][ T7646] device veth1_macvtap entered promiscuous mode [ 400.222325][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 400.274882][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 400.353658][ T30] audit: type=1400 audit(1732188777.703:153): avc: denied { mounton } for pid=7646 comm="syz-executor" path="/root/syzkaller.Gmbreo/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 400.379437][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 400.406306][ T30] audit: type=1400 audit(1732188777.733:154): avc: denied { mount } for pid=7646 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 400.445749][ T30] audit: type=1400 audit(1732188777.743:155): avc: denied { mounton } for pid=7646 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 401.092912][ T7655] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.099893][ T7655] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.144213][ T7655] device bridge_slave_0 entered promiscuous mode [ 401.252186][ T7655] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.259056][ T7655] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.345165][ T7655] device bridge_slave_1 entered promiscuous mode [ 401.464234][ T8] device bridge_slave_1 left promiscuous mode [ 401.511327][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.560055][ T8] device bridge_slave_0 left promiscuous mode [ 401.591322][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.644574][ T8] device veth1_macvtap left promiscuous mode [ 401.684813][ T8] device veth0_vlan left promiscuous mode [ 402.170056][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 402.217347][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 402.328954][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 402.366007][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 402.374265][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 402.381147][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 402.396338][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 402.404934][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 402.433507][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 402.440517][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.465085][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.473297][ T7687] syz.2.2471[7687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.473403][ T7687] syz.2.2471[7687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.492908][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.512466][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 402.782477][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 402.789349][ T7696] syz.3.2473[7696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.790522][ T7696] syz.3.2473[7696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.791235][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 402.821180][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 402.829237][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 402.954984][ T7655] device veth0_vlan entered promiscuous mode [ 403.052761][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 403.064487][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 403.154048][ T7655] device veth1_macvtap entered promiscuous mode [ 403.332492][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 403.360345][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 403.424608][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 403.501890][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 403.511163][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 404.258790][ T7720] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.265905][ T7720] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.273682][ T7720] device bridge_slave_0 entered promiscuous mode [ 404.286130][ T7720] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.293091][ T7720] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.300356][ T7720] device bridge_slave_1 entered promiscuous mode [ 404.410388][ T7720] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.417309][ T7720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.424435][ T7720] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.431284][ T7720] bridge0: port 1(bridge_slave_0) entered forwarding state [ 404.465905][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 404.474611][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.482292][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.504721][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 404.513081][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.520031][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 404.528426][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 404.536719][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.543693][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 404.551620][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 404.572539][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 404.582679][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 404.599275][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 404.607308][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 404.614746][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 404.623189][ T7720] device veth0_vlan entered promiscuous mode [ 404.635381][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 404.645365][ T7720] device veth1_macvtap entered promiscuous mode [ 404.657057][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 404.676843][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 404.904067][ T8] device bridge_slave_1 left promiscuous mode [ 404.912674][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.951013][ T8] device bridge_slave_0 left promiscuous mode [ 405.042562][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.123960][ T8] device veth1_macvtap left promiscuous mode [ 405.129815][ T8] device veth0_vlan left promiscuous mode [ 405.929096][ T7742] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.003787][ T7742] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.057411][ T7742] device bridge_slave_0 entered promiscuous mode [ 406.133160][ T7742] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.154972][ T7742] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.217553][ T7742] device bridge_slave_1 entered promiscuous mode [ 407.037095][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 407.073774][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 407.134486][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 407.158574][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 407.188450][ T7794] syz.1.2514[7794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.188570][ T7794] syz.1.2514[7794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.202123][ T406] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.220097][ T406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 407.290148][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 407.298547][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 407.307022][ T406] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.313911][ T406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 407.321590][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 407.329626][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 407.337726][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 407.406558][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 407.415322][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 407.423678][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 407.437119][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 407.484304][ T7742] device veth0_vlan entered promiscuous mode [ 407.540938][ T7742] device veth1_macvtap entered promiscuous mode [ 407.553722][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 407.569466][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 407.577782][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 407.588680][ T8] device bridge_slave_1 left promiscuous mode [ 407.607776][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.682268][ T8] device bridge_slave_0 left promiscuous mode [ 407.735387][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.744460][ T8] device veth1_macvtap left promiscuous mode [ 407.750312][ T8] device veth0_vlan left promiscuous mode [ 408.107651][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 408.119694][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 408.128181][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 408.136430][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 409.231086][ T7832] syz.3.2518[7832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.231195][ T7832] syz.3.2518[7832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.317557][ T7827] syz.4.2519[7827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.405279][ T7827] syz.4.2519[7827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.498840][ T8] device bridge_slave_1 left promiscuous mode [ 409.578180][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.586786][ T8] device bridge_slave_0 left promiscuous mode [ 409.592941][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.601253][ T8] device veth1_macvtap left promiscuous mode [ 409.607537][ T8] device veth0_vlan left promiscuous mode [ 409.931344][ T7836] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.953103][ T7836] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.962246][ T7836] device bridge_slave_0 entered promiscuous mode [ 410.014402][ T7836] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.021269][ T7836] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.046950][ T7836] device bridge_slave_1 entered promiscuous mode [ 410.332621][ T7836] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.339523][ T7836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 410.346656][ T7836] bridge0: port 1(bridge_slave_0) entered blocking state [ 410.353529][ T7836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 410.449574][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 410.459031][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.466573][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 410.482521][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 410.593652][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 410.607112][ T406] bridge0: port 2(bridge_slave_1) entered blocking state [ 410.614015][ T406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 410.626110][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 410.642860][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 410.693554][ T7836] device veth0_vlan entered promiscuous mode [ 410.708058][ T7836] device veth1_macvtap entered promiscuous mode [ 410.792435][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 410.822722][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 410.882314][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 410.962478][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 411.011295][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 411.052696][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 411.124394][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 413.155179][ T7894] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.202074][ T7894] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.209461][ T7894] device bridge_slave_0 entered promiscuous mode [ 413.263418][ T7894] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.270305][ T7894] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.332445][ T7894] device bridge_slave_1 entered promiscuous mode [ 413.426578][ T7922] syz.2.2547[7922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.426688][ T7922] syz.2.2547[7922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.796982][ T8] device bridge_slave_1 left promiscuous mode [ 413.902249][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.978769][ T8] device bridge_slave_0 left promiscuous mode [ 414.038846][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.122299][ T8] device veth1_macvtap left promiscuous mode [ 414.154734][ T8] device veth0_vlan left promiscuous mode [ 414.620114][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 414.627555][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 414.636683][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 414.645034][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 414.653620][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.660503][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 414.667859][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 414.677413][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 414.685754][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 414.694003][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.700860][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 414.762388][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 414.773156][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 414.781624][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 414.792784][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 414.801160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 414.818835][ T7894] device veth0_vlan entered promiscuous mode [ 414.835335][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.870622][ T7894] device veth1_macvtap entered promiscuous mode [ 414.907339][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 414.916149][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.924076][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.993993][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 415.003656][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 415.074305][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 415.135155][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 416.570046][ T7983] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.616361][ T7983] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.659830][ T7983] device bridge_slave_0 entered promiscuous mode [ 416.704623][ T7983] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.743701][ T7983] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.781170][ T7983] device bridge_slave_1 entered promiscuous mode [ 417.007613][ T8] device bridge_slave_1 left promiscuous mode [ 417.016666][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.080292][ T8] device bridge_slave_0 left promiscuous mode [ 417.101520][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.119937][ T8] device veth1_macvtap left promiscuous mode [ 417.132068][ T8] device veth0_vlan left promiscuous mode [ 417.981078][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 417.996943][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 418.022237][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 418.041709][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 418.080820][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.087757][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 418.171954][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 418.181255][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 418.260406][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.267356][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 418.354324][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 418.486881][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 418.495863][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 418.517369][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 418.537408][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 418.573532][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 418.659192][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 418.758184][ T7983] device veth0_vlan entered promiscuous mode [ 418.779232][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 418.791052][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 418.806606][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 418.814217][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 418.943650][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 418.972583][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 419.045546][ T7983] device veth1_macvtap entered promiscuous mode [ 419.123315][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 419.131372][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 419.192277][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 419.255666][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 419.332384][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 420.404231][ T10] device bridge_slave_1 left promiscuous mode [ 420.410342][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.426076][ T10] device bridge_slave_0 left promiscuous mode [ 420.432400][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.440522][ T10] device veth1_macvtap left promiscuous mode [ 420.446951][ T10] device veth0_vlan left promiscuous mode [ 420.453201][ T8062] syz.4.2608[8062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.453311][ T8062] syz.4.2608[8062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.791975][ T8065] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.813001][ T8065] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.820454][ T8065] device bridge_slave_0 entered promiscuous mode [ 420.858673][ T8065] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.872235][ T8065] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.924101][ T8065] device bridge_slave_1 entered promiscuous mode [ 421.653881][ T8102] FAULT_INJECTION: forcing a failure. [ 421.653881][ T8102] name failslab, interval 1, probability 0, space 0, times 0 [ 421.666705][ T8102] CPU: 1 PID: 8102 Comm: syz.1.2613 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 421.677823][ T8102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 421.687718][ T8102] Call Trace: [ 421.690847][ T8102] [ 421.693619][ T8102] dump_stack_lvl+0x151/0x1c0 [ 421.698136][ T8102] ? io_uring_drop_tctx_refs+0x190/0x190 [ 421.703609][ T8102] dump_stack+0x15/0x20 [ 421.707591][ T8102] should_fail+0x3c6/0x510 [ 421.711846][ T8102] __should_failslab+0xa4/0xe0 [ 421.716441][ T8102] should_failslab+0x9/0x20 [ 421.720787][ T8102] slab_pre_alloc_hook+0x37/0xd0 [ 421.725565][ T8102] kmem_cache_alloc_trace+0x48/0x210 [ 421.730681][ T8102] ? pfifo_fast_change_tx_queue_len+0x14f/0xb90 [ 421.736757][ T8102] pfifo_fast_change_tx_queue_len+0x14f/0xb90 [ 421.742663][ T8102] ? pfifo_fast_reset+0xe22/0xf10 [ 421.747529][ T8102] ? pfifo_fast_destroy+0xd0/0xd0 [ 421.752384][ T8102] ? pfifo_fast_destroy+0xd0/0xd0 [ 421.757242][ T8102] dev_qdisc_change_tx_queue_len+0x39b/0x500 [ 421.763054][ T8102] ? dev_qdisc_change_real_num_tx+0xa0/0xa0 [ 421.768779][ T8102] ? ndisc_netdev_event+0xb0/0x400 [ 421.773732][ T8102] ? raw_notifier_call_chain+0xdf/0xf0 [ 421.779027][ T8102] dev_change_tx_queue_len+0x21f/0x350 [ 421.784327][ T8102] ? dev_set_mtu+0x180/0x180 [ 421.788747][ T8102] dev_ifsioc+0x453/0x10c0 [ 421.792999][ T8102] ? dev_ioctl+0xe70/0xe70 [ 421.797247][ T8102] ? mutex_lock+0x135/0x1e0 [ 421.801588][ T8102] ? wait_for_completion_killable_timeout+0x10/0x10 [ 421.808016][ T8102] dev_ioctl+0x54d/0xe70 [ 421.812094][ T8102] sock_do_ioctl+0x34f/0x5a0 [ 421.816525][ T8102] ? sock_show_fdinfo+0xa0/0xa0 [ 421.821204][ T8102] ? selinux_file_ioctl+0x3cc/0x540 [ 421.826234][ T8102] sock_ioctl+0x455/0x740 [ 421.830402][ T8102] ? sock_poll+0x400/0x400 [ 421.834653][ T8102] ? __fget_files+0x31e/0x380 [ 421.839168][ T8102] ? security_file_ioctl+0x84/0xb0 [ 421.844113][ T8102] ? sock_poll+0x400/0x400 [ 421.848365][ T8102] __se_sys_ioctl+0x114/0x190 [ 421.852878][ T8102] __x64_sys_ioctl+0x7b/0x90 [ 421.857309][ T8102] x64_sys_call+0x98/0x9a0 [ 421.861558][ T8102] do_syscall_64+0x3b/0xb0 [ 421.865813][ T8102] ? clear_bhb_loop+0x35/0x90 [ 421.870325][ T8102] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 421.876052][ T8102] RIP: 0033:0x7fe8cf760819 [ 421.880313][ T8102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 421.899747][ T8102] RSP: 002b:00007fe8cddd9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 421.907993][ T8102] RAX: ffffffffffffffda RBX: 00007fe8cf917fa0 RCX: 00007fe8cf760819 [ 421.915805][ T8102] RDX: 0000000020000100 RSI: 0000000000008943 RDI: 0000000000000007 [ 421.923612][ T8102] RBP: 00007fe8cddd9090 R08: 0000000000000000 R09: 0000000000000000 [ 421.931424][ T8102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 421.939236][ T8102] R13: 0000000000000000 R14: 00007fe8cf917fa0 R15: 00007ffc03d54948 [ 421.947063][ T8102] [ 421.951593][ T8102] syzkaller0: refused to change device tx_queue_len [ 422.053451][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 422.063349][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 422.116944][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 422.134254][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 422.152639][ T406] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.159537][ T406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.185907][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 422.243962][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 422.252551][ T406] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.259411][ T406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.267082][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 422.275167][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 422.283348][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 422.291313][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 422.299330][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 422.377208][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 422.386748][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 422.459345][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 422.476927][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.485328][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 422.492932][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.504479][ T8065] device veth0_vlan entered promiscuous mode [ 422.590210][ T8117] FAULT_INJECTION: forcing a failure. [ 422.590210][ T8117] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 422.663560][ T8117] CPU: 1 PID: 8117 Comm: syz.3.2619 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 422.674700][ T8117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 422.684848][ T8117] Call Trace: [ 422.687974][ T8117] [ 422.690745][ T8117] dump_stack_lvl+0x151/0x1c0 [ 422.695270][ T8117] ? io_uring_drop_tctx_refs+0x190/0x190 [ 422.700733][ T8117] ? irqentry_exit+0x30/0x40 [ 422.705156][ T8117] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 422.711235][ T8117] dump_stack+0x15/0x20 [ 422.715236][ T8117] should_fail+0x3c6/0x510 [ 422.719480][ T8117] should_fail_alloc_page+0x5a/0x80 [ 422.724514][ T8117] prepare_alloc_pages+0x15c/0x700 [ 422.729462][ T8117] ? __alloc_pages_bulk+0xe40/0xe40 [ 422.734494][ T8117] __alloc_pages+0x18c/0x8f0 [ 422.739008][ T8117] ? prep_new_page+0x110/0x110 [ 422.743606][ T8117] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 422.749596][ T8117] __get_free_pages+0x10/0x30 [ 422.754106][ T8117] kasan_populate_vmalloc_pte+0x39/0x130 [ 422.759569][ T8117] ? __apply_to_page_range+0x8ca/0xbe0 [ 422.764866][ T8117] __apply_to_page_range+0x8dd/0xbe0 [ 422.769987][ T8117] ? kasan_populate_vmalloc+0x70/0x70 [ 422.775197][ T8117] ? kasan_populate_vmalloc+0x70/0x70 [ 422.780399][ T8117] apply_to_page_range+0x3b/0x50 [ 422.785175][ T8117] kasan_populate_vmalloc+0x65/0x70 [ 422.790212][ T8117] alloc_vmap_area+0x192f/0x1a80 [ 422.794994][ T8117] ? vm_map_ram+0xa90/0xa90 [ 422.799330][ T8117] ? __kasan_kmalloc+0x9/0x10 [ 422.803838][ T8117] ? kmem_cache_alloc_trace+0x115/0x210 [ 422.809221][ T8117] __get_vm_area_node+0x158/0x360 [ 422.814081][ T8117] __vmalloc_node_range+0xe2/0x8d0 [ 422.819027][ T8117] ? reuseport_array_alloc+0xc3/0x160 [ 422.824233][ T8117] ? cap_capable+0x1d2/0x270 [ 422.828661][ T8117] bpf_map_area_alloc+0xd9/0xf0 [ 422.833347][ T8117] ? reuseport_array_alloc+0xc3/0x160 [ 422.838554][ T8117] reuseport_array_alloc+0xc3/0x160 [ 422.843588][ T8117] map_create+0x411/0x2050 [ 422.847851][ T8117] __sys_bpf+0x296/0x760 [ 422.851918][ T8117] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 422.857129][ T8117] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 422.863119][ T8117] __x64_sys_bpf+0x7c/0x90 [ 422.867372][ T8117] x64_sys_call+0x87f/0x9a0 [ 422.871708][ T8117] do_syscall_64+0x3b/0xb0 [ 422.875965][ T8117] ? clear_bhb_loop+0x35/0x90 [ 422.880474][ T8117] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 422.886206][ T8117] RIP: 0033:0x7f9f74c08819 [ 422.890465][ T8117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.909899][ T8117] RSP: 002b:00007f9f73281038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 422.918141][ T8117] RAX: ffffffffffffffda RBX: 00007f9f74dbffa0 RCX: 00007f9f74c08819 [ 422.925955][ T8117] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000000 [ 422.933768][ T8117] RBP: 00007f9f73281090 R08: 0000000000000000 R09: 0000000000000000 [ 422.941574][ T8117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 422.949389][ T8117] R13: 0000000000000000 R14: 00007f9f74dbffa0 R15: 00007ffe46545838 [ 422.957382][ T8117] [ 422.980904][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 422.990160][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 423.124685][ T8065] device veth1_macvtap entered promiscuous mode [ 423.259408][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 423.292933][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 423.354227][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 423.389290][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 424.672440][ T8139] syz.2.2624[8139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.672550][ T8139] syz.2.2624[8139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.686142][ T8144] device macsec0 left promiscuous mode [ 424.894227][ T10] device bridge_slave_1 left promiscuous mode [ 424.900590][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.908928][ T10] device bridge_slave_0 left promiscuous mode [ 424.915160][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.923423][ T10] device veth1_macvtap left promiscuous mode [ 424.929263][ T10] device veth0_vlan left promiscuous mode [ 425.040986][ T8140] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.072283][ T8140] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.085834][ T8140] device bridge_slave_0 entered promiscuous mode [ 425.094001][ T8140] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.100866][ T8140] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.108560][ T8140] device bridge_slave_1 entered promiscuous mode [ 425.142507][ T8161] syz.3.2632[8161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.142629][ T8161] syz.3.2632[8161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.207390][ T8166] syz.1.2633[8166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.224920][ T8166] syz.1.2633[8166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.737442][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 425.757887][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 425.828350][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 425.876999][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 425.932733][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.939635][ T7897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.063860][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 426.072239][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 426.080328][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.087226][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 426.111993][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 426.142680][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 426.214564][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 426.223647][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 426.377212][ T8140] device veth0_vlan entered promiscuous mode [ 426.468825][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 426.477313][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 426.485527][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 426.493808][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 426.502554][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 426.509990][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 426.546020][ T8191] device macsec0 left promiscuous mode [ 426.580852][ T8140] device veth1_macvtap entered promiscuous mode [ 426.631926][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 426.639966][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 426.648531][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 426.741840][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 426.750166][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 427.784393][ T10] device bridge_slave_1 left promiscuous mode [ 427.790375][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.862016][ T10] device bridge_slave_0 left promiscuous mode [ 427.868005][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.973737][ T10] device veth1_macvtap left promiscuous mode [ 427.979595][ T10] device veth0_vlan left promiscuous mode [ 429.112499][ T8203] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.119390][ T8203] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.177846][ T8203] device bridge_slave_0 entered promiscuous mode [ 429.327653][ T8203] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.336896][ T8203] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.344299][ T8203] device bridge_slave_1 entered promiscuous mode [ 429.883403][ T8215] device sit0 entered promiscuous mode [ 429.960740][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 429.968338][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 430.042909][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 430.051502][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 430.059965][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.066850][ T7897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.075323][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 430.083669][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 430.092507][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.099387][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.205166][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 430.231270][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 430.329760][ T8203] device veth0_vlan entered promiscuous mode [ 430.346410][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 430.357316][ T8234] syz.1.2654[8234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.357427][ T8234] syz.1.2654[8234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.393457][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 431.057105][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 431.065060][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 431.072975][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 431.179822][ T8244] syz.3.2657[8244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.179933][ T8244] syz.3.2657[8244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.188250][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 431.210588][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 431.221897][ T8203] device veth1_macvtap entered promiscuous mode [ 431.239773][ T8246] syz.2.2658[8246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.239884][ T8246] syz.2.2658[8246] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.264622][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 431.301085][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 431.309696][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 431.318647][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 431.327086][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 432.842984][ T8263] device macsec0 entered promiscuous mode [ 433.193863][ T8266] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.201704][ T8266] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.251461][ T8266] device bridge_slave_0 entered promiscuous mode [ 433.318596][ T8266] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.364835][ T8266] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.417921][ T8266] device bridge_slave_1 entered promiscuous mode [ 433.604275][ T8289] syz.2.2670[8289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.604385][ T8289] syz.2.2670[8289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.696331][ T10] device bridge_slave_1 left promiscuous mode [ 433.743303][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.754194][ T10] device bridge_slave_0 left promiscuous mode [ 433.760264][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.768489][ T10] device veth1_macvtap left promiscuous mode [ 433.774392][ T10] device veth0_vlan left promiscuous mode [ 433.797388][ T8295] syz.1.2672[8295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.797494][ T8295] syz.1.2672[8295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.356682][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 434.378200][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 434.414749][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 434.423491][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 434.431557][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.438444][ T7897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.505649][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 434.606606][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 434.657839][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.664754][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.848701][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 434.942345][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 435.062528][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 435.115596][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 435.170575][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 435.250034][ T8266] device veth0_vlan entered promiscuous mode [ 435.286885][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 435.308152][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 435.351512][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 435.359384][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 435.377350][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 435.389358][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 435.395839][ T8336] syz.1.2687[8336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.397257][ T8336] syz.1.2687[8336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.399952][ T8266] device veth1_macvtap entered promiscuous mode [ 435.435224][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 435.443544][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 435.470928][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 435.506595][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 435.528175][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 435.722744][ T8343] syz.4.2689[8343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.722858][ T8343] syz.4.2689[8343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.308441][ T10] device bridge_slave_1 left promiscuous mode [ 437.427128][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.489242][ T8364] syz.3.2696[8364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.489355][ T8364] syz.3.2696[8364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.490851][ T10] device bridge_slave_0 left promiscuous mode [ 437.561301][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.574164][ T10] device veth1_macvtap left promiscuous mode [ 437.581500][ T10] device veth0_vlan left promiscuous mode [ 437.608434][ T8374] syz.2.2699[8374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.608540][ T8374] syz.2.2699[8374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.133895][ T8383] syz.1.2702[8383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.154423][ T8383] syz.1.2702[8383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.509413][ T8365] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.528367][ T8365] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.536237][ T8365] device bridge_slave_0 entered promiscuous mode [ 438.598404][ T8365] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.605575][ T8365] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.613409][ T8365] device bridge_slave_1 entered promiscuous mode [ 439.302514][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 439.314380][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 439.393992][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 439.460128][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 439.538192][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.545134][ T7897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.692079][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 439.702461][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 439.710648][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.717656][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.742232][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 439.782257][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 439.792188][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 439.800235][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 439.808590][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 439.829185][ T8365] device veth0_vlan entered promiscuous mode [ 439.850350][ T8365] device veth1_macvtap entered promiscuous mode [ 439.857458][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 439.877210][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 439.885930][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 439.904806][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 439.924458][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 440.027304][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 440.034774][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 440.042601][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 440.050785][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 440.060488][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 440.068961][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 441.742823][ T10] device bridge_slave_1 left promiscuous mode [ 441.748795][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.756186][ T10] device bridge_slave_0 left promiscuous mode [ 441.762249][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.770336][ T10] device veth1_macvtap left promiscuous mode [ 441.776238][ T10] device veth0_vlan left promiscuous mode [ 441.873409][ T8452] bpf_get_probe_write_proto: 2 callbacks suppressed [ 441.873430][ T8452] syz.3.2723[8452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.897735][ T8452] syz.3.2723[8452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.909502][ T8454] syz.1.2721[8454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.939268][ T8454] syz.1.2721[8454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.215158][ T8462] syz.2.2726[8462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.353210][ T8462] syz.2.2726[8462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 442.511986][ T8458] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.530047][ T8458] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.537427][ T8458] device bridge_slave_0 entered promiscuous mode [ 442.592574][ T8458] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.599452][ T8458] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.606814][ T8458] device bridge_slave_1 entered promiscuous mode [ 443.009442][ T8458] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.016345][ T8458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.023490][ T8458] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.030346][ T8458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.418902][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 443.427121][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.435101][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 443.442716][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 443.450591][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 443.458891][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 443.467081][ T406] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.473965][ T406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.520803][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 443.528907][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 443.576304][ T8458] device veth0_vlan entered promiscuous mode [ 443.590556][ T8458] device veth1_macvtap entered promiscuous mode [ 443.601271][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 443.609514][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 443.619706][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 443.628124][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 443.636435][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 443.644584][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.652619][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 443.660856][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 443.669353][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 443.677353][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 443.684821][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 443.749199][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 443.839730][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 443.900626][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 443.961274][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 444.309516][ T8490] device macsec0 entered promiscuous mode [ 445.323743][ T10] device bridge_slave_1 left promiscuous mode [ 445.329738][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.392379][ T10] device bridge_slave_0 left promiscuous mode [ 445.450053][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.477036][ T10] device veth1_macvtap left promiscuous mode [ 445.482984][ T10] device veth0_vlan left promiscuous mode [ 446.012328][ T8509] syz.3.2742[8509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.012441][ T8509] syz.3.2742[8509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.159477][ T8516] device syzkaller0 entered promiscuous mode [ 446.226867][ T8519] device pim6reg1 entered promiscuous mode [ 446.409064][ T8515] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.485764][ T8515] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.506387][ T8515] device bridge_slave_0 entered promiscuous mode [ 446.547223][ T8515] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.554201][ T8515] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.555193][ T8536] syz.3.2750[8536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.561056][ T8536] syz.3.2750[8536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.561836][ T8515] device bridge_slave_1 entered promiscuous mode [ 446.939830][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 446.996317][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 447.061936][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 447.169016][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 447.209915][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.216839][ T7897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 447.224248][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 447.233335][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 447.241545][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 447.248440][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 447.267409][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 447.379803][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 447.492383][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 447.555696][ T8515] device veth0_vlan entered promiscuous mode [ 447.607607][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 447.636774][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 447.687306][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 447.735404][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 447.790982][ T8515] device veth1_macvtap entered promiscuous mode [ 447.839512][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 447.946543][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 447.960429][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 448.038418][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 448.055654][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 448.231173][ T8561] device syzkaller0 entered promiscuous mode [ 448.289226][ T8567] syz.2.2760[8567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.289337][ T8567] syz.2.2760[8567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.673392][ T10] device bridge_slave_1 left promiscuous mode [ 449.690538][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.697971][ T10] device bridge_slave_0 left promiscuous mode [ 449.704062][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.712811][ T10] device veth1_macvtap left promiscuous mode [ 449.718639][ T10] device veth0_vlan left promiscuous mode [ 450.157755][ T8579] syz.2.2762[8579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.157867][ T8579] syz.2.2762[8579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.199420][ T8578] syz.1.2761[8578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.246229][ T8578] syz.1.2761[8578] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.720560][ T8583] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.752739][ T8591] syz.4.2770[8591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.752848][ T8591] syz.4.2770[8591] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.764136][ T8583] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.782784][ T8583] device bridge_slave_0 entered promiscuous mode [ 450.789811][ T8583] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.797111][ T8583] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.804683][ T8583] device bridge_slave_1 entered promiscuous mode [ 451.832077][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 451.867185][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 451.934536][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 451.956180][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 451.964791][ T8618] syz.1.2786[8618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.964898][ T8618] syz.1.2786[8618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.965621][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.994162][ T7897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.002917][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 452.018487][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 452.026656][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.033559][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.205156][ T8617] device syzkaller0 entered promiscuous mode [ 452.254156][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 452.263217][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 452.271221][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 452.361297][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 452.392278][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 452.454991][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 452.492269][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.545450][ T8583] device veth0_vlan entered promiscuous mode [ 452.582144][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 452.623164][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 452.662531][ T8583] device veth1_macvtap entered promiscuous mode [ 452.745816][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 452.878500][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 452.886997][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 452.982263][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 453.041628][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 453.145672][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 453.282306][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 453.548794][ T8583] syz-executor (8583) used greatest stack depth: 19768 bytes left [ 454.662713][ T7897] device bridge_slave_1 left promiscuous mode [ 454.668654][ T7897] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.676079][ T7897] device bridge_slave_0 left promiscuous mode [ 454.682137][ T7897] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.690140][ T7897] device veth1_macvtap left promiscuous mode [ 454.696009][ T7897] device veth0_vlan left promiscuous mode [ 455.280139][ T8654] FAULT_INJECTION: forcing a failure. [ 455.280139][ T8654] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 455.297085][ T8654] CPU: 0 PID: 8654 Comm: syz.2.2785 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 455.308215][ T8654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 455.318132][ T8654] Call Trace: [ 455.321397][ T8654] [ 455.324175][ T8654] dump_stack_lvl+0x151/0x1c0 [ 455.328704][ T8654] ? io_uring_drop_tctx_refs+0x190/0x190 [ 455.334159][ T8654] ? 0xffffffffa0028a64 [ 455.338150][ T8654] ? is_bpf_text_address+0x172/0x190 [ 455.343272][ T8654] dump_stack+0x15/0x20 [ 455.347263][ T8654] should_fail+0x3c6/0x510 [ 455.351604][ T8654] should_fail_alloc_page+0x5a/0x80 [ 455.356637][ T8654] prepare_alloc_pages+0x15c/0x700 [ 455.361586][ T8654] ? __alloc_pages+0x8f0/0x8f0 [ 455.366184][ T8654] ? __alloc_pages_bulk+0xe40/0xe40 [ 455.371217][ T8654] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 455.376694][ T8654] __alloc_pages+0x18c/0x8f0 [ 455.381123][ T8654] ? prep_new_page+0x110/0x110 [ 455.385723][ T8654] ? pcpu_chunk_relocate+0x20a/0x430 [ 455.390836][ T8654] pcpu_populate_chunk+0x18c/0xe30 [ 455.395910][ T8654] pcpu_alloc+0x984/0x13e0 [ 455.400174][ T8654] __alloc_percpu_gfp+0x27/0x30 [ 455.404836][ T8654] bpf_map_alloc_percpu+0xe6/0x160 [ 455.409788][ T8654] array_map_alloc+0x3a5/0x6d0 [ 455.414395][ T8654] map_create+0x411/0x2050 [ 455.418639][ T8654] __sys_bpf+0x296/0x760 [ 455.422713][ T8654] ? fput_many+0x160/0x1b0 [ 455.426967][ T8654] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 455.432194][ T8654] ? debug_smp_processor_id+0x17/0x20 [ 455.437501][ T8654] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 455.443397][ T8654] __x64_sys_bpf+0x7c/0x90 [ 455.447652][ T8654] x64_sys_call+0x87f/0x9a0 [ 455.451991][ T8654] do_syscall_64+0x3b/0xb0 [ 455.456246][ T8654] ? clear_bhb_loop+0x35/0x90 [ 455.460759][ T8654] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 455.466485][ T8654] RIP: 0033:0x7fdc854b0819 [ 455.470732][ T8654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 455.490180][ T8654] RSP: 002b:00007fdc83b29038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 455.498421][ T8654] RAX: ffffffffffffffda RBX: 00007fdc85667fa0 RCX: 00007fdc854b0819 [ 455.506231][ T8654] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 455.514090][ T8654] RBP: 00007fdc83b29090 R08: 0000000000000000 R09: 0000000000000000 [ 455.521853][ T8654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 455.529665][ T8654] R13: 0000000000000000 R14: 00007fdc85667fa0 R15: 00007fffb4f50228 [ 455.537486][ T8654] [ 455.547341][ T8655] syz.3.2787[8655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.547454][ T8655] syz.3.2787[8655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.739922][ T8658] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.765283][ T8658] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.792814][ T8658] device bridge_slave_0 entered promiscuous mode [ 456.019828][ T8669] device syzkaller0 entered promiscuous mode [ 456.088338][ T8658] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.101817][ T8658] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.131261][ T8658] device bridge_slave_1 entered promiscuous mode [ 456.232030][ T8682] syz.1.2795[8682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.232135][ T8682] syz.1.2795[8682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.938457][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 457.019104][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 457.103812][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 457.163390][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 457.180438][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.187371][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 457.201207][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 457.271447][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 457.297208][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 457.307166][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.314073][ T7897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 457.365211][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 457.375908][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 457.384825][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 457.393196][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 457.482694][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 457.504093][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 457.541055][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 457.590556][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 457.651805][ T8658] device veth0_vlan entered promiscuous mode [ 457.691406][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 457.708889][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 457.794826][ T8658] device veth1_macvtap entered promiscuous mode [ 457.808433][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 457.817206][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 457.837490][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 458.235511][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 458.261555][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 458.282515][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 458.290753][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 458.338642][ T8718] syz.3.2806[8718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 458.338753][ T8718] syz.3.2806[8718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 458.680045][ T8720] syz.2.2807[8720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 458.795628][ T8720] syz.2.2807[8720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.072498][ T333] device bridge_slave_1 left promiscuous mode [ 460.089928][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.098098][ T333] device bridge_slave_0 left promiscuous mode [ 460.104079][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.111683][ T333] device veth1_macvtap left promiscuous mode [ 460.117563][ T333] device veth0_vlan left promiscuous mode [ 460.965859][ T8744] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.016929][ T8744] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.045999][ T8754] syz.2.2815[8754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.046113][ T8754] syz.2.2815[8754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.075489][ T8744] device bridge_slave_0 entered promiscuous mode [ 461.177537][ T8744] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.193244][ T8744] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.221495][ T8744] device bridge_slave_1 entered promiscuous mode [ 461.396222][ T8744] bridge0: port 2(bridge_slave_1) entered blocking state [ 461.403123][ T8744] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.410274][ T8744] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.417191][ T8744] bridge0: port 1(bridge_slave_0) entered forwarding state [ 461.452405][ T8772] syz.3.2820[8772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.452512][ T8772] syz.3.2820[8772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.483848][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 461.508752][ T8773] syz.2.2821[8773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.508862][ T8773] syz.2.2821[8773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.602906][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 461.768750][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.908407][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 461.942683][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 461.988726][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.995655][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 462.148260][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 462.162506][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 462.170791][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 462.177708][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 462.331519][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 462.352935][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 462.515399][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 462.534689][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 462.573283][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 462.584462][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 462.711711][ T8744] device veth0_vlan entered promiscuous mode [ 462.727482][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 462.735697][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 462.744248][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 462.751642][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 462.873548][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 462.924524][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 462.987738][ T8744] device veth1_macvtap entered promiscuous mode [ 463.066296][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 463.096671][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 463.210849][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 463.219167][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 464.862308][ T8] device bridge_slave_1 left promiscuous mode [ 464.868249][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.875655][ T8] device bridge_slave_0 left promiscuous mode [ 464.881586][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.889561][ T8] device veth1_macvtap left promiscuous mode [ 464.895539][ T8] device veth0_vlan left promiscuous mode [ 465.403882][ T8808] device sit0 entered promiscuous mode [ 465.692793][ T8813] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.699734][ T8813] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.700189][ T8822] syz.1.2837[8822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.707125][ T8822] syz.1.2837[8822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.707194][ T8813] device bridge_slave_0 entered promiscuous mode [ 465.737614][ T8813] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.744996][ T8813] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.752575][ T8813] device bridge_slave_1 entered promiscuous mode [ 466.519328][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 466.706601][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 466.737869][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 466.746696][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 466.754185][ T8837] FAULT_INJECTION: forcing a failure. [ 466.754185][ T8837] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 466.755305][ T333] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.774400][ T333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 466.783629][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 466.792456][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 466.800582][ T333] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.807570][ T333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 466.814798][ T8837] CPU: 1 PID: 8837 Comm: syz.2.2840 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 466.825908][ T8837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 466.835888][ T8837] Call Trace: [ 466.839005][ T8837] [ 466.841804][ T8837] dump_stack_lvl+0x151/0x1c0 [ 466.846303][ T8837] ? io_uring_drop_tctx_refs+0x190/0x190 [ 466.851770][ T8837] dump_stack+0x15/0x20 [ 466.855759][ T8837] should_fail+0x3c6/0x510 [ 466.860011][ T8837] should_fail_alloc_page+0x5a/0x80 [ 466.865042][ T8837] prepare_alloc_pages+0x15c/0x700 [ 466.869995][ T8837] ? __alloc_pages+0x8f0/0x8f0 [ 466.874594][ T8837] ? __alloc_pages_bulk+0xe40/0xe40 [ 466.879631][ T8837] __alloc_pages+0x18c/0x8f0 [ 466.884050][ T8837] ? _raw_write_unlock_bh+0x11/0x48 [ 466.889091][ T8837] ? prep_new_page+0x110/0x110 [ 466.893685][ T8837] ? __kasan_check_write+0x14/0x20 [ 466.898636][ T8837] __get_free_pages+0x10/0x30 [ 466.903147][ T8837] kasan_populate_vmalloc_pte+0x39/0x130 [ 466.908615][ T8837] ? __apply_to_page_range+0x8ca/0xbe0 [ 466.913909][ T8837] __apply_to_page_range+0x8dd/0xbe0 [ 466.919040][ T8837] ? kasan_populate_vmalloc+0x70/0x70 [ 466.924242][ T8837] ? kasan_populate_vmalloc+0x70/0x70 [ 466.929446][ T8837] apply_to_page_range+0x3b/0x50 [ 466.934221][ T8837] kasan_populate_vmalloc+0x65/0x70 [ 466.939253][ T8837] alloc_vmap_area+0x192f/0x1a80 [ 466.944037][ T8837] ? vm_map_ram+0xa90/0xa90 [ 466.948366][ T8837] ? __kasan_kmalloc+0x9/0x10 [ 466.952879][ T8837] ? kmem_cache_alloc_trace+0x115/0x210 [ 466.958267][ T8837] __get_vm_area_node+0x158/0x360 [ 466.963123][ T8837] __vmalloc_node_range+0xe2/0x8d0 [ 466.968069][ T8837] ? reuseport_array_alloc+0xc3/0x160 [ 466.973290][ T8837] ? cap_capable+0x1d2/0x270 [ 466.977707][ T8837] bpf_map_area_alloc+0xd9/0xf0 [ 466.982391][ T8837] ? reuseport_array_alloc+0xc3/0x160 [ 466.987610][ T8837] reuseport_array_alloc+0xc3/0x160 [ 466.992631][ T8837] map_create+0x411/0x2050 [ 466.996888][ T8837] __sys_bpf+0x296/0x760 [ 467.000965][ T8837] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 467.006175][ T8837] __x64_sys_bpf+0x7c/0x90 [ 467.010427][ T8837] x64_sys_call+0x87f/0x9a0 [ 467.014763][ T8837] do_syscall_64+0x3b/0xb0 [ 467.019016][ T8837] ? clear_bhb_loop+0x35/0x90 [ 467.023531][ T8837] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 467.029256][ T8837] RIP: 0033:0x7fdc854b0819 [ 467.033518][ T8837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 467.053068][ T8837] RSP: 002b:00007fdc83b29038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 467.061310][ T8837] RAX: ffffffffffffffda RBX: 00007fdc85667fa0 RCX: 00007fdc854b0819 [ 467.069127][ T8837] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000000 [ 467.076946][ T8837] RBP: 00007fdc83b29090 R08: 0000000000000000 R09: 0000000000000000 [ 467.084838][ T8837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 467.092649][ T8837] R13: 0000000000000000 R14: 00007fdc85667fa0 R15: 00007fffb4f50228 [ 467.100474][ T8837] [ 467.110218][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 467.145205][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 467.160192][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 467.181414][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 467.206550][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 467.280967][ T8841] syz.3.2842[8841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.281078][ T8841] syz.3.2842[8841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.298354][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 467.420811][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 467.438907][ T8813] device veth0_vlan entered promiscuous mode [ 467.451955][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 467.459937][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 467.468109][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 467.475616][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 467.518900][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 467.531720][ T333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 467.561254][ T8813] device veth1_macvtap entered promiscuous mode [ 467.613964][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 467.622561][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 467.631065][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 467.639889][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 467.653914][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 467.923388][ T8867] syz.1.2849[8867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.923510][ T8867] syz.1.2849[8867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.029583][ T8869] syz.3.2851[8869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.046169][ T8869] syz.3.2851[8869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.091081][ T8] device bridge_slave_1 left promiscuous mode [ 469.108263][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.116032][ T8] device bridge_slave_0 left promiscuous mode [ 469.122148][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.130222][ T8] device veth1_macvtap left promiscuous mode [ 469.136137][ T8] device veth0_vlan left promiscuous mode [ 470.016232][ T8874] syz.2.2852[8874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.016343][ T8874] syz.2.2852[8874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.845527][ T8877] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.962895][ T8877] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.970293][ T8877] device bridge_slave_0 entered promiscuous mode [ 471.117944][ T8877] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.125142][ T8877] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.167258][ T8877] device bridge_slave_1 entered promiscuous mode [ 472.100123][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 472.120671][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 472.188634][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 472.206333][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 472.240204][ T406] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.247135][ T406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.423035][ T8901] device sit0 left promiscuous mode [ 472.602215][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 472.631312][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 472.710196][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 472.719049][ T406] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.725968][ T406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.748518][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 472.757030][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 472.775272][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 472.827410][ T406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 472.865361][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 472.894240][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 472.946391][ T8877] device veth0_vlan entered promiscuous mode [ 472.981084][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 473.052300][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 473.100091][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 473.107839][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 473.146021][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 473.172923][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 473.293951][ T8877] device veth1_macvtap entered promiscuous mode [ 473.383461][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 473.436574][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 473.541289][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 473.657797][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 473.683753][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 475.583204][ T8] device bridge_slave_1 left promiscuous mode [ 475.589245][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.596782][ T8] device bridge_slave_0 left promiscuous mode [ 475.602933][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.610849][ T8] device veth1_macvtap left promiscuous mode [ 475.616833][ T8] device veth0_vlan left promiscuous mode [ 476.601268][ T8946] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.608937][ T8946] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.616405][ T8946] device bridge_slave_0 entered promiscuous mode [ 476.623776][ T8954] device sit0 entered promiscuous mode [ 476.636387][ T8946] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.644536][ T8946] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.658951][ T8946] device bridge_slave_1 entered promiscuous mode [ 476.832161][ T8946] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.839271][ T8946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 476.846402][ T8946] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.853298][ T8946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 476.922966][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.933053][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.062762][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 477.072240][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 477.088149][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 477.096966][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 477.105609][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.112523][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.120218][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 477.129119][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 477.137507][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.144502][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.171233][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 477.187299][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 477.203281][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 477.222290][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 477.237735][ T8946] device veth0_vlan entered promiscuous mode [ 477.251810][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 477.260319][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 477.328581][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 477.350161][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 477.382910][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 477.391016][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 477.417541][ T8946] device veth1_macvtap entered promiscuous mode [ 477.459572][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 477.492308][ T8974] syz.3.2881[8974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.492419][ T8974] syz.3.2881[8974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.516749][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 477.563758][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 477.576079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 477.590326][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 477.667416][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 477.694095][ T7897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=0 req=2454 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 478.125032][ T8986] syz.2.2886[8986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.125140][ T8986] syz.2.2886[8986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.782736][ T8] device bridge_slave_1 left promiscuous mode [ 478.800240][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.808325][ T8] device bridge_slave_0 left promiscuous mode [ 478.814545][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.823089][ T8] device veth1_macvtap left promiscuous mode [ 478.828939][ T8] device veth0_vlan left promiscuous mode [ 482.072649][ T8] device veth0_to_batadv left promiscuous mode [ 482.078681][ T8] bridge0: port 3(veth0_to_batadv) entered disabled state [ 482.086288][ T8] device bridge_slave_1 left promiscuous mode [ 482.092253][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.099355][ T8] device bridge_slave_0 left promiscuous mode [ 482.105350][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.632601][ T8] device bridge_slave_1 left promiscuous mode [ 483.638704][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.646001][ T8] device bridge_slave_0 left promiscuous mode [ 483.651986][ T8] bridge0: port 1(bridge_slave_0) entered disabled state