last executing test programs: 24.375830009s ago: executing program 2 (id=1652): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000001245dc1b90a6ba964c3db1d84b32aad28d55c1b1f7452b00a7f9e8be4472647389e12af52856f51bb403aa1a89afe904ecd53b209f4fc2f63d8711e7f65e4ac6f35de11fc5073e6eb9f3e581a8d3741216c38198bfd18e7cd32ae16b6a9700e51e8ba63ed710df526db2e85183e2803b355fab132dceff3d9a800995cafc06a2418e3228c2f4dc3c34f04680a0c0f11e06cdd44e51ff4d591cead5bef76672e8aec631b10cbfa2861eff211d284a09417dbf8c9952cc090d3cf7fd1179a19d9d000000000000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000038c0)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kmem_cache_free\x00'}, 0x18) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000c2080000000000007b8af8ff00000000bfa200000000040007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f00000004c0)="23d460f883db35ecb495236840aadf80736837ede6d8c6e9ece132fb5a76073da0cc9c949400c486c20a89851525c8f541b9fb213f6b04bb045fb967b942b2791cde9b5edb1d9aaafe9de54f64802bcfaa478ae6d829cac21651c835307519068d1208188f37b657e75cdc222301e9fffd164a820152a626c4b24bd276310818f24bd98e25ae90db058791ae8164152c164058c916fee41affb60ef5f10d2dc33f428cc61e7e3e438f870295b1cc8f43", &(0x7f0000000b00)=""/210}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)='%pi6 \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="000000000071123313000000000000000000000000000000000000000000000052f828da4356ac2aa9f5b7484cee2b91b3f3ba5ee2de4af9d239dd773a7b"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 20.795496553s ago: executing program 2 (id=1652): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000001245dc1b90a6ba964c3db1d84b32aad28d55c1b1f7452b00a7f9e8be4472647389e12af52856f51bb403aa1a89afe904ecd53b209f4fc2f63d8711e7f65e4ac6f35de11fc5073e6eb9f3e581a8d3741216c38198bfd18e7cd32ae16b6a9700e51e8ba63ed710df526db2e85183e2803b355fab132dceff3d9a800995cafc06a2418e3228c2f4dc3c34f04680a0c0f11e06cdd44e51ff4d591cead5bef76672e8aec631b10cbfa2861eff211d284a09417dbf8c9952cc090d3cf7fd1179a19d9d000000000000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000038c0)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kmem_cache_free\x00'}, 0x18) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000c2080000000000007b8af8ff00000000bfa200000000040007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f00000004c0)="23d460f883db35ecb495236840aadf80736837ede6d8c6e9ece132fb5a76073da0cc9c949400c486c20a89851525c8f541b9fb213f6b04bb045fb967b942b2791cde9b5edb1d9aaafe9de54f64802bcfaa478ae6d829cac21651c835307519068d1208188f37b657e75cdc222301e9fffd164a820152a626c4b24bd276310818f24bd98e25ae90db058791ae8164152c164058c916fee41affb60ef5f10d2dc33f428cc61e7e3e438f870295b1cc8f43", &(0x7f0000000b00)=""/210}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)='%pi6 \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="000000000071123313000000000000000000000000000000000000000000000052f828da4356ac2aa9f5b7484cee2b91b3f3ba5ee2de4af9d239dd773a7b"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 16.251510573s ago: executing program 2 (id=1652): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000001245dc1b90a6ba964c3db1d84b32aad28d55c1b1f7452b00a7f9e8be4472647389e12af52856f51bb403aa1a89afe904ecd53b209f4fc2f63d8711e7f65e4ac6f35de11fc5073e6eb9f3e581a8d3741216c38198bfd18e7cd32ae16b6a9700e51e8ba63ed710df526db2e85183e2803b355fab132dceff3d9a800995cafc06a2418e3228c2f4dc3c34f04680a0c0f11e06cdd44e51ff4d591cead5bef76672e8aec631b10cbfa2861eff211d284a09417dbf8c9952cc090d3cf7fd1179a19d9d000000000000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000038c0)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kmem_cache_free\x00'}, 0x18) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000c2080000000000007b8af8ff00000000bfa200000000040007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f00000004c0)="23d460f883db35ecb495236840aadf80736837ede6d8c6e9ece132fb5a76073da0cc9c949400c486c20a89851525c8f541b9fb213f6b04bb045fb967b942b2791cde9b5edb1d9aaafe9de54f64802bcfaa478ae6d829cac21651c835307519068d1208188f37b657e75cdc222301e9fffd164a820152a626c4b24bd276310818f24bd98e25ae90db058791ae8164152c164058c916fee41affb60ef5f10d2dc33f428cc61e7e3e438f870295b1cc8f43", &(0x7f0000000b00)=""/210}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)='%pi6 \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="000000000071123313000000000000000000000000000000000000000000000052f828da4356ac2aa9f5b7484cee2b91b3f3ba5ee2de4af9d239dd773a7b"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 13.464668461s ago: executing program 2 (id=1652): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000001245dc1b90a6ba964c3db1d84b32aad28d55c1b1f7452b00a7f9e8be4472647389e12af52856f51bb403aa1a89afe904ecd53b209f4fc2f63d8711e7f65e4ac6f35de11fc5073e6eb9f3e581a8d3741216c38198bfd18e7cd32ae16b6a9700e51e8ba63ed710df526db2e85183e2803b355fab132dceff3d9a800995cafc06a2418e3228c2f4dc3c34f04680a0c0f11e06cdd44e51ff4d591cead5bef76672e8aec631b10cbfa2861eff211d284a09417dbf8c9952cc090d3cf7fd1179a19d9d000000000000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000038c0)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kmem_cache_free\x00'}, 0x18) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000c2080000000000007b8af8ff00000000bfa200000000040007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f00000004c0)="23d460f883db35ecb495236840aadf80736837ede6d8c6e9ece132fb5a76073da0cc9c949400c486c20a89851525c8f541b9fb213f6b04bb045fb967b942b2791cde9b5edb1d9aaafe9de54f64802bcfaa478ae6d829cac21651c835307519068d1208188f37b657e75cdc222301e9fffd164a820152a626c4b24bd276310818f24bd98e25ae90db058791ae8164152c164058c916fee41affb60ef5f10d2dc33f428cc61e7e3e438f870295b1cc8f43", &(0x7f0000000b00)=""/210}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)='%pi6 \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="000000000071123313000000000000000000000000000000000000000000000052f828da4356ac2aa9f5b7484cee2b91b3f3ba5ee2de4af9d239dd773a7b"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6.678673636s ago: executing program 0 (id=2141): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000340), &(0x7f00000003c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x520, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000005c0)="2f03", 0x2}], 0x1, 0x0, 0x0, 0x8c1}, 0x20004011) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0xfc, 0xa, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000200), 0x4) socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) 6.452790777s ago: executing program 0 (id=2145): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x5}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff0000000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x4, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@ldst={0x3, 0x0, 0x6, 0x2, 0x2, 0x0, 0xf1}]}, &(0x7f0000000200)='syzkaller\x00', 0x3, 0x82, &(0x7f0000000240)=""/130}, 0x80) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x87, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xaa, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0xd, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0x8, 0x1, 0x0, r0}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000100)='syzkaller\x00', 0x60000000, 0xd3, &(0x7f0000000140)=""/211, 0x41000, 0x9, '\x00', r4, 0x0, r6, 0x8, &(0x7f0000000540)={0x7, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000580)=[{0x2, 0x1, 0x7, 0x7}, {0x0, 0x1, 0x3, 0x1}, {0x1, 0x2, 0x10, 0x1}, {0x2, 0x4, 0xf, 0x9}, {0x1, 0x1, 0x5, 0x7}], 0x10, 0x6}, 0x94) 5.251736285s ago: executing program 2 (id=1652): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000001245dc1b90a6ba964c3db1d84b32aad28d55c1b1f7452b00a7f9e8be4472647389e12af52856f51bb403aa1a89afe904ecd53b209f4fc2f63d8711e7f65e4ac6f35de11fc5073e6eb9f3e581a8d3741216c38198bfd18e7cd32ae16b6a9700e51e8ba63ed710df526db2e85183e2803b355fab132dceff3d9a800995cafc06a2418e3228c2f4dc3c34f04680a0c0f11e06cdd44e51ff4d591cead5bef76672e8aec631b10cbfa2861eff211d284a09417dbf8c9952cc090d3cf7fd1179a19d9d000000000000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000038c0)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kmem_cache_free\x00'}, 0x18) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000c2080000000000007b8af8ff00000000bfa200000000040007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f00000004c0)="23d460f883db35ecb495236840aadf80736837ede6d8c6e9ece132fb5a76073da0cc9c949400c486c20a89851525c8f541b9fb213f6b04bb045fb967b942b2791cde9b5edb1d9aaafe9de54f64802bcfaa478ae6d829cac21651c835307519068d1208188f37b657e75cdc222301e9fffd164a820152a626c4b24bd276310818f24bd98e25ae90db058791ae8164152c164058c916fee41affb60ef5f10d2dc33f428cc61e7e3e438f870295b1cc8f43", &(0x7f0000000b00)=""/210}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)='%pi6 \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="000000000071123313000000000000000000000000000000000000000000000052f828da4356ac2aa9f5b7484cee2b91b3f3ba5ee2de4af9d239dd773a7b"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.111574529s ago: executing program 0 (id=2154): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="00b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b70400000000000085000000570000009500000000000000"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(0xffffffffffffffff, 0x0, 0x12040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={&(0x7f0000000780)="8ec22c8479b431e3c067c281ae4c813d49cdaffbdfe74a662d841ba41422b6bc859728366cc79e02cd2a23d1a0ac5d086bd9038501e274828100f43fb554f147f397bb1162758ea9902547bd1c4d637ae036596806c656e61b5357c715b5c0588eefe4922936ed86ff77dcf0d894791161adc041c61e72f249114b082eca0407dd545806f33578fce114701a61652208903d17dfb4dce7d73dd599df44612f910ed1a661709a8c0e29b2ef126f09b13e87a3a8bd2397e8e560badaf072169926eb06991936cf94312f9c59f58a66a3ed0a13f28b5e7fe5870b26a0b40555460326dfcde85e8c67a50260da64c069fe3e883dbc90", &(0x7f0000000880)=""/235, &(0x7f0000000200)="5a9ca6bfacc04aabaeadbf6459907b3d6568aa69988ac67a226959777e964b20239f6f21", &(0x7f0000000280)="ce58d5406190946bea10055cbc0128a7cdbc1283ade56c10dcf71868a207f0d39df05edd279ea2cf0e1d8b559c5caf90c3429c9d12fbf7e9233ec306b530d358bdedc4535656e6970bb2a41bfe3bcb41469b2694da756b399289fb65e4ce70593c1ae235359b8c136a41dd2ac307bf2923ab9995c686dfdd4c75a34aeb9900182a0bd321a5f84efd27534ca8a548491433bbc8beeb7d59f9a6f4a6bb2964e2a2dd", 0x7f, r5}, 0x38) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500d7f800000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 2.889682221s ago: executing program 4 (id=2161): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x2) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) close(r2) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) write$cgroup_type(r3, &(0x7f0000000280), 0x9) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc0189436, 0xf0ff1f00000000) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) unlink(&(0x7f0000000000)='./file0\x00') perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) close(r7) close(r8) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') 2.659652812s ago: executing program 0 (id=2164): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2008e7c00000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x54, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES32=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r2}, 0x10) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='\x00', 0x102) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000003000), 0x201, 0x0) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r8}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x287883438bf90fc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000001000)}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r3, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100)='THAWED\x00', 0x7) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) syz_clone(0x1340200, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000021c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002540)={r11, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000002280)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000022c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002300), 0x0, 0x3b, &(0x7f0000002400), 0x0, 0x10, &(0x7f0000002380), &(0x7f00000023c0), 0x8, 0x13, 0x8, 0x8, &(0x7f0000002700)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000002600)={0x1, 0x6, &(0x7f0000001140)=ANY=[@ANYRES8=r0, @ANYRES16=r9, @ANYBLOB="000000000d00000085200000100000009500001000000000"], &(0x7f0000001180)='GPL\x00', 0x4, 0x1000, &(0x7f00000011c0)=""/4096, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x35, r12, 0x8, &(0x7f0000002200)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000002240)={0x2, 0xd, 0x0, 0xfffffffe}, 0x10, r13, r2, 0x2, &(0x7f0000002580)=[r4, r7, r7], &(0x7f00000025c0)=[{0x5, 0x5, 0xf, 0xa}, {0x2, 0x2, 0x9, 0x2}], 0x10, 0x3}, 0x94) r14 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002340)={@cgroup=r5, 0x2f, 0x0, 0x44, &(0x7f0000001100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000001040)=[0x0], &(0x7f0000001080)=[0x0, 0x0], &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x6, 0x3, 0xfffffffffffffffc, 0x31b}, r14, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.613538493s ago: executing program 1 (id=2166): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000002240)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000004000000040000000a"], 0x50) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x2, &(0x7f0000000380)=@raw=[@map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x5}], 0x0, 0x8, 0xb0, &(0x7f0000000580)=""/176, 0x0, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000840)=[{0x4, 0x4, 0x8, 0x9}], 0x10, 0x3}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000004c0), &(0x7f00000004c0), 0x1000, r1, 0x0, 0x2000000}, 0x38) 2.156826535s ago: executing program 0 (id=2168): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYRESOCT=r1], &(0x7f0000000080)='GPL\x00', 0x200, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000000000000000f7f7e922ef96f73f00000000", @ANYRES32=0x0, @ANYRESHEX=r2, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0700000004000000080200002100000000000000639563c390d9608fe831259c2279b8bf7d8c58a8f6e70704511a347fa3d0d016956c35dbf6e00a57db68edb96a82750b100e390b73e85f5d6f85e84dced3f1513736220d56cbe5f718124d6479f119cc21eac68be2be51005f0dc08100000000000000eb15f961ed1aebb2bf4d84bbdd74109ade1e5d0d1f365be48f34a051a9b5c8e357958ce23e7efaf0ce5abf32ffaf86f0153675ca445843b49cffa662999d3408b9e4066dfea7ccd27720bee5754b360094ec01e57e4a55922d26372f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000000079104c000000000005000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)=0x9, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb9d00180000000000000028060000280000000200000001"], 0x0, 0x42}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='xprtrdma_err_unrecognized\x00', r2}, 0x18) close(r0) syz_clone(0x23180, 0x0, 0x0, 0x0, 0x0, 0x0) close(r1) 2.115835466s ago: executing program 4 (id=2170): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r1, &(0x7f0000000100), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x2, 0x9, 0x1, 0xa8}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="13000000100000000200"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="13cc29c4ddbf15000000000000f3a03974852476fe00"/33], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x20, 0x10, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x11, 0x7, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@map_fd={0x18, 0x0, 0x1, 0x0, r3}, @ldst={0x3, 0x1, 0x6, 0x0, 0x9, 0xffffffffffffffc0}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xea, &(0x7f0000000340)=""/234, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffda}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x9, 0x1, 0x7fe2, 0x1}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r6, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) 2.115104856s ago: executing program 3 (id=2171): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file0\x00', r0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)=r0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x9, 0x1, 0x20, 0x100a, r1, 0x8, '\x00', r3, 0xffffffffffffffff, 0x1, 0x2, 0x4, 0x9}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf2, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x98, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r4, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)='%+9llu \x00'}, 0x20) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)={0x1b, 0x0, 0x0, 0x5, 0x0, r1, 0x8, '\x00', r3, 0xffffffffffffffff, 0x0, 0x5, 0x2}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x13, 0x2, &(0x7f00000002c0)=@raw=[@map_idx_val={0x18, 0x8, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0xbd2c}], &(0x7f0000000300)='GPL\x00', 0xf878, 0xe4, &(0x7f0000000340)=""/228, 0x40f00, 0x52, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0x9, 0x6, 0x9}, 0x10, r6, r0, 0x4, &(0x7f0000000940)=[0x1, r7, r8, r1], &(0x7f0000000980)=[{0x5, 0x2, 0xd, 0xa}, {0x1, 0x4, 0x8, 0xa}, {0x3, 0x4, 0xa, 0xb}, {0x2, 0x1, 0x5, 0x7}], 0x10, 0x100}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a80)={r4, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000b00)='btrfs_cow_block\x00', r9, 0x0, 0x1}, 0x18) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d40)='pids.current\x00', 0x0, 0x0) r14 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000e00)={0x2, 0x4, 0x8, 0x1, 0x80, r10, 0x1, '\x00', r5, 0xffffffffffffffff, 0x1, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x11, 0x14, &(0x7f0000000b80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}}, @ldst={0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffffffffffff8, 0xfffffffffffffff0}, @map_val={0x18, 0x9, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xfffffffb}, @ldst={0x1, 0x2, 0x6, 0x4, 0x1, 0xffffffffffffffff, 0xfffffffffffffffc}]}, &(0x7f0000000c40)='syzkaller\x00', 0x10, 0xb2, &(0x7f0000000c80)=""/178, 0x41100, 0x35, '\x00', 0x0, 0x0, r13, 0x8, &(0x7f0000000d80)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000dc0)={0x2, 0xa, 0x5, 0x3}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000e80)=[r7, r1, r8, r8, r8, r14, r8, r8], &(0x7f0000000ec0)=[{0x0, 0x5, 0x9}, {0x5, 0x1, 0xd, 0x1}, {0x4, 0x3, 0x2, 0x2}, {0x0, 0x4, 0x7, 0xc}, {0x1, 0x3, 0x3, 0x3}, {0x3, 0x4, 0x5, 0x4}, {0x3, 0x4, 0xe, 0x3}, {0x4, 0x1, 0x5}], 0x10, 0x4d48}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001080)={{r7, 0xffffffffffffffff}, &(0x7f0000001000), &(0x7f0000001040)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001240)={0x6, 0xf, &(0x7f00000010c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x202a}}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x5}], &(0x7f0000001140)='GPL\x00', 0x10, 0x0, 0x0, 0x40f00, 0x2, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000011c0)={0x0, 0xb, 0x1, 0x3}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001200)=[{0x4, 0x5, 0x0, 0x9}], 0x10, 0x81}, 0x94) r16 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001300)={r2, 0x80000000, 0x18}, 0xc) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001380)={0x4, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001340)={@cgroup=r13, r9, 0x16, 0x2034, 0x0, @void, @void, @value=r17}, 0x20) socketpair(0x21, 0x1, 0x2, &(0x7f00000013c0)) r18 = bpf$PROG_LOAD(0x5, &(0x7f0000001700)={0x13, 0x2b, &(0x7f0000001400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@exit, @ldst={0x1, 0x3, 0x4, 0x4, 0x4, 0x18, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, @alu={0x4, 0x1, 0xc, 0x6, 0xc, 0xffffffffffffffff, 0x1}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x5, 0x2, 0x0, r14, 0x0, 0x0, 0x0, 0x1000}, @jmp={0x5, 0x0, 0x2, 0x2, 0x3, 0xfffffffffffffffc, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001580)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x42, '\x00', r5, @fallback, r13, 0x8, 0x0, 0x0, 0x10, &(0x7f00000015c0)={0x4, 0xa, 0x6, 0xc}, 0x10, r6, r16, 0xa, &(0x7f0000001600)=[r8, r1], &(0x7f0000001640)=[{0x5, 0x4, 0xa, 0x2}, {0x5, 0x4, 0x9, 0x6}, {0x5, 0x3, 0xe, 0x4}, {0x1, 0x4, 0x4, 0x7}, {0x2, 0x3, 0x10}, {0x2, 0x3, 0x5}, {0x1, 0x2, 0x2, 0x2}, {0x0, 0x4, 0xd, 0xb}, {0x5, 0x3, 0xb}, {0x0, 0x3, 0xb, 0x2}], 0x10, 0x5}, 0x94) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f00000017c0)=r18, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001840)=@o_path={&(0x7f0000001800)='./file0\x00', 0xffffffffffffffff, 0x4000, r1}, 0x18) r19 = bpf$ITER_CREATE(0x21, &(0x7f0000001880)={r13}, 0x8) r20 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001ac0)={0x6, 0x15, &(0x7f0000001900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x967, 0x0, 0x0, 0x0, 0x9}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r15}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x1}, @ldst={0x1, 0x0, 0x4, 0x9, 0x4, 0x1, 0xffffffffffffffff}]}, &(0x7f00000019c0)='syzkaller\x00', 0x3, 0x45, &(0x7f0000001a00)=""/69, 0x40f00, 0x5, '\x00', r3, 0x25, r19, 0x8, &(0x7f0000001a80)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xa}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000018c0)={@fallback=r16, 0xffffffffffffffff, 0x20, 0x0, 0x0, @void, @value=r20}, 0x20) r21 = bpf$ITER_CREATE(0x21, &(0x7f0000001c00)={r12}, 0x8) perf_event_open$cgroup(&(0x7f0000001b80)={0x1, 0x80, 0x9, 0x6, 0x5, 0xe7, 0x0, 0x40000000, 0x8200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x200, 0x2, @perf_config_ext={0x0, 0x8}, 0x0, 0x6, 0x8f7, 0x6, 0x0, 0x3, 0xff83, 0x0, 0x2000, 0x0, 0x401}, r21, 0xe, 0xffffffffffffffff, 0xf) bpf$PROG_LOAD(0x5, &(0x7f0000001e40)={0x4, 0xe, &(0x7f0000001c40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}, @alu={0x4, 0x1, 0xa, 0x0, 0x4, 0x30, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r19}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xac0}}]}, &(0x7f0000001cc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r3, @fallback=0x1f, r21, 0x8, &(0x7f0000001d00)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000001d40)={0x3, 0x8, 0x3, 0x18400000}, 0x10, r6, 0xffffffffffffffff, 0x2, &(0x7f0000001dc0)=[0xffffffffffffffff, r7], &(0x7f0000001e00)=[{0x5, 0x1, 0xd, 0xa}, {0x2, 0x5, 0x7, 0xc}], 0x10, 0xeefa}, 0x94) 1.807989197s ago: executing program 3 (id=2172): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x87}}, @call={0x85, 0x0, 0x0, 0x9e}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc786b409ac930c90ff90f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d858952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09e3187a10d905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367638cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a2d4f12e8e717eaaa2a6d14fee0c15f36c203dbc7c06128bec84231d43e152ef19ce027436fb4ebb9fce431b913f4817597a6f53d1626f9d1cb7b36fb18ac19547a8b20ede70c81a75686cea85dcd34408128da7cab045541bc6b9a0a79f63f2e7646356e04b977c9f47467537015240b974184be9c54b7c628ae4d97ebdb06070344468994afbaac71e5ffac2c61d9af66f9de2760a38e968a781528531c1c936a02065be48f1eee77be878873206d65bd0b1241fab9139abd7f40febe81fed3684e6b59273da01f1743c6a5df300ec59c65e8174fc2d95a62ca7b937289ad14107333007eab833a5849eb19f18ae41743dfb949377e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x60000019, &(0x7f0000000100)="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", 0x0, 0x0, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000600)="d792921e20846169c93a4961aab71a4ca64508000000000002009c6fa22027bf810c17f9007786e52553b344b310c9ba7b1d83"}, 0x2c) 1.770605398s ago: executing program 1 (id=2173): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0xb) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000000)={&(0x7f00000057c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003a80)=ANY=[@ANYRES64=r0], &(0x7f0000000100)='GPL\x00'}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x118800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xe, 0x0, 0x0, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x2) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r4, @ANYRES16=r2, @ANYBLOB="0000000000000000b702000014000000b7030000004000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000400), 0x4) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r5}, 0x10) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) 1.733498328s ago: executing program 1 (id=2174): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x50}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x18) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x4, 0x10}, 0xc) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) write$cgroup_type(r5, &(0x7f0000000180), 0x9) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x17) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000400)={r9, &(0x7f0000000380), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x7, 0x378, 0xd, 0x8180, 0x1, 0x8, '\x00', r7, r8, 0x1, 0x4, 0x4, 0xf}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="08000000810000007fffffff070000008c490000", @ANYRES32=0x1, @ANYBLOB="01803abc7a409bb1e72d06ede6a3b0a6000000000000000003f86a2200", @ANYRES32=r7, @ANYRES32=r6, @ANYBLOB="04000000000000000500"/28], 0x50) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x0, 0x0, r5, 0x5, '\x00', r7, r10, 0x0, 0x1, 0x4}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x9, '\x00', r7, r0, 0x5, 0x1, 0x4}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r11}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) 1.646458929s ago: executing program 4 (id=2175): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="00b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b70400000000000085000000570000009500000000000000"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(0xffffffffffffffff, 0x0, 0x12040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={&(0x7f0000000780)="8ec22c8479b431e3c067c281ae4c813d49cdaffbdfe74a662d841ba41422b6bc859728366cc79e02cd2a23d1a0ac5d086bd9038501e274828100f43fb554f147f397bb1162758ea9902547bd1c4d637ae036596806c656e61b5357c715b5c0588eefe4922936ed86ff77dcf0d894791161adc041c61e72f249114b082eca0407dd545806f33578fce114701a61652208903d17dfb4dce7d73dd599df44612f910ed1a661709a8c0e29b2ef126f09b13e87a3a8bd2397e8e560badaf072169926eb06991936cf94312f9c59f58a66a3ed0a13f28b5e7fe5870b26a0b40555460326dfcde85e8c67a50260da64c069fe3e883dbc90", &(0x7f0000000880)=""/235, &(0x7f0000000200)="5a9ca6bfacc04aabaeadbf6459907b3d6568aa69988ac67a226959777e964b20239f6f21", &(0x7f0000000280)="ce58d5406190946bea10055cbc0128a7cdbc1283ade56c10dcf71868a207f0d39df05edd279ea2cf0e1d8b559c5caf90c3429c9d12fbf7e9233ec306b530d358bdedc4535656e6970bb2a41bfe3bcb41469b2694da756b399289fb65e4ce70593c1ae235359b8c136a41dd2ac307bf2923ab9995c686dfdd4c75a34aeb9900182a0bd321a5f84efd27534ca8a548491433bbc8beeb7d59f9a6f4a6bb2964e2a2dd", 0x7f, r5}, 0x38) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500d7f800000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f00000000c0)='%d\xf1\xfa\xbc$j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x19\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 U\xaaC\xc388\x13\xc6H\x0f \x03\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdfN\x8e\xd7m\xee\xb8N\x98\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') 1.644585559s ago: executing program 3 (id=2185): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x3, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x87}}, @call={0x85, 0x0, 0x0, 0x9e}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x60000019, &(0x7f0000000100)="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", 0x0, 0x0, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000600)="d792921e20846169c93a4961aab71a4ca64508000000000000029c6fa22027bf810c17f9007786e52553b344b310c9ba7b1d83"}, 0x2c) 1.429255901s ago: executing program 3 (id=2176): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000000000000000000008000000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000380)='sched_switch\x00', r3}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000400), 0x2}, 0x20) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x48021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x13240, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x3, 0x44, 0x1, 0x0, 0x0, 0x4, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0xfff}, 0x8000, 0x98, 0xfffffff9, 0x4, 0x4, 0x0, 0x200, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xf, r4, 0x2) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYRES64=r2], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r7, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)=r6}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r8, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000180)=r5}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000a80)={r9, &(0x7f0000000700), 0x0}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200), 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'ipvlan1\x00', 0x20}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socketpair(0x1, 0x4, 0x69, 0x0) syz_clone(0x2a020600, &(0x7f00000001c0)="95f2d95d16aed71a000000835598b7dc84b27699f973d38360ca04c9b27afe4e858900000000", 0x26, &(0x7f0000000280), &(0x7f00000003c0), 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000d80)=ANY=[@ANYBLOB="18000000ff7f000000000000060000008500000018000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000005c0)={'virt_wifi0\x00', 0x2}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00ed00000000000000000000801d1ca24055621dc2ccccd679e1fb4c8d7cb615a62f922eb1f394a9adca065df08e4cd5b9e7a608c8d6968e11d1e29ee388375a2a767d875173fff0da3619a51d8929e43bc4e18626ed9d0b93d9529a271fe817e537c395291aab0a270a5d0ca2d0c1397be696a2a30d80ab0886e0"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001c80)=ANY=[@ANYBLOB="9feb010018000000000000004000000040000000020000000000000000000003000000000200000002000000000000000000000000000081"], 0x0, 0x5a}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) close(0xffffffffffffffff) 1.226894862s ago: executing program 4 (id=2177): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb01001800000000000000ac000000ac000000070000000400000000000009050000000d0000000000000903000000030000000000000100000000020003040b000000000000110300000001000000000000000000000300000000030000000200000008000000000000000400000d000000000b0000000000000003000000050000000b0b0000000000000700000000060000000000000a0100000001000000000000090100000008000000000000120100000000003061003000"], &(0x7f0000000000)=""/43, 0xcb, 0x2b, 0x1, 0x200}, 0x28) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="0000000000000000b75f0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x14, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="18000006f7ffffff00000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000085000000050000009500000000000000a325a992405e1cd14345568855f9b5b36833b8cb46ceb39e609ac229051f1b60040eba3305f60ed378594f4b7147c706c76759d9a385a089c30a9521fea8e3f176a2936ada45f4261a7361b7e4a6a5311581c2be30cd139f6efac969ac37640bc7fce59cf868add51dd9555e26b3b61b9531002a08ec3d3771618f7099ce824390ad95fcc6a8"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r3, &(0x7f0000000100), 0x0}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000400000008000000"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x6, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r7, 0xc0189436, &(0x7f0000000000)={'bond_slave_0\x00', @random='\\\x00\x00 \x00'}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@map, 0x31, 0x0, 0x800, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000880)=ANY=[@ANYRESOCT, @ANYRES64, @ANYRESOCT=r5, @ANYBLOB="d0eefaf655a593433e9107835d950e17cdfd99affe63be66372e799d6f810fb7fbe6eb0417e3f1f4bbd0b4eed1fac8b0d855f3000202540a306c5d9d681913b8c9811c1a9bb03b8e99555bc97b24c250221da949bad701022f44b8a484211c8271213a234a764e4f4909110af7385ba501d70c73aaf1497b6866c38680592e18"], 0x20) r8 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r8, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) 1.070992532s ago: executing program 3 (id=2178): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r1, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000004c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0], 0x0, 0x6e, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x89, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1d, 0xa, &(0x7f0000000280)=@raw=[@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd113}], &(0x7f0000000300)='GPL\x00', 0x800, 0x0, 0x0, 0x41000, 0x53, '\x00', r5, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x0, 0x5, 0xd}, 0x10, 0x0, r1, 0x2, &(0x7f0000000940)=[r0, r0], &(0x7f0000000ac0)=[{0x3, 0x1, 0x5, 0xc}, {0x4, 0x5, 0xc, 0x3}], 0x10, 0x8000}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r7, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0f0000000400000004000000120000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 1.045853003s ago: executing program 4 (id=2179): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000897b3dbb687205f2dee61d67590cbcf94562d41f6edcb5000000000000000000000000000000b3"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="00001f0000000300000000e500f30000001b00000cc0164c7ea90b65db8e570c7100b7000000050024034c67d41d02715ce85aca8076aac6ca53ac55de0a8e1da9cba17538f3b9d903e62ad5394a90849cd4606576acaba31fa43b4bf116c606adfef3ff31122066fc2d50ce55166e676565987b0cee34d9b39e6fbac05aa3501ba001c94f2b9941719876b8159b993158c8114b7162e0ca79f71f763ac15e96c139ff3aca3812b218bd7452f609f33efd43fb2b8961d1a1a29861a901ae78383840ef90841dce361668ecfc3cf9deb959c11cc9631dbe6490faeea5293b5c91786941e5eb2a"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='rss_stat\x00', r7}, 0x18) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) 779.833644ms ago: executing program 1 (id=2180): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2008e7c00000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x54, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES32=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r2}, 0x10) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='\x00', 0x102) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000003000), 0x201, 0x0) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r8}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x287883438bf90fc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000001000)}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, r3, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100)='THAWED\x00', 0x7) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) syz_clone(0x1340200, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000021c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002540)={r11, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000002280)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000022c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002300), 0x0, 0x3b, &(0x7f0000002400), 0x0, 0x10, &(0x7f0000002380), &(0x7f00000023c0), 0x8, 0x13, 0x8, 0x8, &(0x7f0000002700)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000002600)={0x1, 0x6, &(0x7f0000001140)=ANY=[@ANYRES8=r0, @ANYRES16=r9, @ANYBLOB="000000000d00000085200000100000009500001000000000"], &(0x7f0000001180)='GPL\x00', 0x4, 0x1000, &(0x7f00000011c0)=""/4096, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x35, r12, 0x8, &(0x7f0000002200)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000002240)={0x2, 0xd, 0x0, 0xfffffffe}, 0x10, r13, r2, 0x2, &(0x7f0000002580)=[r4, r7, r7], &(0x7f00000025c0)=[{0x5, 0x5, 0xf, 0xa}, {0x2, 0x2, 0x9, 0x2}], 0x10, 0x3}, 0x94) r14 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002340)={@cgroup=r5, 0x2f, 0x0, 0x44, &(0x7f0000001100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000001040)=[0x0], &(0x7f0000001080)=[0x0, 0x0], &(0x7f00000010c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x6, 0x3, 0xfffffffffffffffc, 0x31b}, r14, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 773.077345ms ago: executing program 0 (id=2191): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000410000005000000", @ANYBLOB, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000e413636200e3bc98ae38a661ed9ed4d26b00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000010000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000006000000080000000c"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0x1fe}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r1}, &(0x7f0000000300), &(0x7f0000000340)='%-010d \x00'}, 0x20) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x80, 0x7, 0x5, 0x40, 0x0, 0x3, 0x810, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x1, 0x8000}, 0x100000, 0xfffffffffffff2b2, 0x0, 0x9, 0x4, 0xb, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xe, r6, 0x3) close(r5) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0x1}, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0xa, 0x3, 0x4, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071122d00000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) 276.929678ms ago: executing program 1 (id=2181): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000000)='./file0\x00', r0}, 0x18) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0xffff, 0x0, 0xffffffffffffffff, 0xffff9ec2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x20, &(0x7f00000003c0)={&(0x7f00000002c0)=""/187, 0xbb, 0x0, &(0x7f0000000380)=""/51, 0x33}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0x19, &(0x7f0000000440)=@raw=[@map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x52}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x2}, @generic={0x9, 0xb, 0x7, 0x2aeb, 0x7}, @ringbuf_query, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @jmp={0x5, 0x0, 0xa, 0xa, 0x4, 0x18}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x6}], &(0x7f0000000540)='syzkaller\x00', 0xc9f, 0xf8, &(0x7f0000000580)=""/248, 0x41100, 0x58, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000006c0)={0x2, 0xc, 0x9, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x6, &(0x7f0000000700)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000740)=[{0x5, 0x3, 0x2, 0x3}, {0x0, 0x5, 0x6, 0x2}, {0x4, 0x4, 0x0, 0x3}, {0x4, 0x3, 0xc, 0x6}, {0xff, 0x2, 0xd, 0xb}, {0x1, 0x4, 0x6, 0xb}], 0x10, 0x8}, 0x94) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000880)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x50) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7d3c21db, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000980)={0x1, 0xffffffffffffffff}, 0x4) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)=@o_path={&(0x7f00000009c0)='./file0\x00', 0x0, 0x4000, r0}, 0x18) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={0xffffffffffffffff, 0x0, 0x10}, 0xc) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x10, 0x10, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0xfab6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x5e7967b6625801e4}}}, &(0x7f00000001c0)='GPL\x00', 0x7, 0x2f, &(0x7f0000000200)=""/47, 0x41000, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0x7, 0x401, 0x200}, 0x10, r2, r3, 0x0, &(0x7f0000000a80)=[r4, r5, 0xffffffffffffffff, r6, r7, r8], 0x0, 0x10, 0x7ff}, 0x94) close(r8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000c80)={@ifindex=0x0, 0x1f, 0x0, 0x40, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0], &(0x7f0000000c40)}, 0x40) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d00)=@o_path={&(0x7f0000000cc0)='./file0\x00', 0x0, 0x8, r0}, 0x18) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000f40)=r2, 0x4) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=@base={0x15, 0x8000, 0xfff, 0xa, 0x10018, r1, 0x4, '\x00', r10, 0xffffffffffffffff, 0x3, 0x2, 0x2}, 0x50) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001000)={0x1b, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x5f19, '\x00', r10, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x50) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=@bloom_filter={0x1e, 0xe3, 0x0, 0xe, 0x8000, 0xffffffffffffffff, 0x8, '\x00', r10, 0xffffffffffffffff, 0x2, 0x0, 0x3, 0xf}, 0x50) r16 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001140)=@bpf_lsm={0x1d, 0x13, &(0x7f0000000d40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8c, 0x0, 0x0, 0x0, 0x22c0}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5b21}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000e00)='syzkaller\x00', 0x100, 0xfa, &(0x7f0000000e40)=""/250, 0x0, 0x0, '\x00', r10, 0x1b, r12, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, 0x0, 0x0, &(0x7f0000001100)=[r8, r5, r8, r13, r14, r7, r7, r15], 0x0, 0x10, 0x81}, 0x94) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001480)={&(0x7f0000001200)="13064f824cceda7cfb84df65b3b2826ce7eda1cf4b2f8a90d0d85517311e8ea7a14457eef9f2860169b3e682294968180068f71586387c882bc2baf04526501596f406430e434b1ee7074afd85dec87e3d2b4d", &(0x7f0000001280)=""/133, &(0x7f0000001340)="02cbeb6430b1fd85ee77fb284e2c4bdef7c383933e4cd521efbfa8d745788031e792b69328465517dcc2d5ac17bd3f2dd096900c62f642515b816259cc67963311750c490f25d215de8867bf401159023019b4efe4d6be7dd0f0d80c09fda0c207e8c1f41b47f61d0521353b8739cd4c859ff3d14a3cce30c5347708f4b3bec89e460c77b763070c876d52e8d4aecd103539a11567bf5b2d373a9d1440fdc8cde476b682e045e9ceb045df6d8809cfdfaf0a640f86edff0ec70fc49fd0dc8cda75e44e32819f48592ca8d66014b1ce5477fa2cda4f18", &(0x7f0000001440)='2', 0x8, r1, 0x4}, 0x38) bpf$PROG_BIND_MAP(0x23, &(0x7f00000014c0)={r3}, 0xc) r17 = openat$tun(0xffffffffffffff9c, &(0x7f0000001500), 0x420200, 0x0) ioctl$SIOCSIFHWADDR(r17, 0x8924, &(0x7f0000001540)={'syzkaller0\x00'}) r18 = perf_event_open$cgroup(&(0x7f0000001640)={0x5, 0x80, 0xe, 0x1, 0xc, 0x33, 0x0, 0x7, 0x20, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000001600)}, 0x100010, 0x7, 0x7, 0x6, 0x2, 0x9, 0x5, 0x0, 0x3, 0x0, 0x101}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000001580)={0x3, 0x80, 0x0, 0x6, 0x0, 0x3, 0x0, 0x4, 0x81000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x4, @perf_config_ext={0x9, 0x3}, 0x100000, 0x4, 0xffffcfd6, 0x8, 0x2, 0x7, 0x6, 0x0, 0xa, 0x0, 0xa4}, 0xffffffffffffffff, 0x4, r18, 0x1) setsockopt$sock_attach_bpf(r14, 0x1, 0x32, &(0x7f00000016c0)=r9, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b40)={r16, 0xe0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001880)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa, &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe4, &(0x7f0000001940)=[{}, {}], 0x10, 0x10, &(0x7f0000001980), &(0x7f00000019c0), 0x8, 0x59, 0x8, 0x8, &(0x7f0000001a00)}}, 0x10) r20 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001c80)={&(0x7f0000001b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0x7, [@var={0x2, 0x0, 0x0, 0xe, 0x4, 0x1}, @type_tag={0xa, 0x0, 0x0, 0x12, 0x1}, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0x2, 0x5}, {0x2, 0x3}, {0x8, 0x3}, {0x4, 0x5}, {0xd, 0x1}, {0x10}, {0x7}]}, @ptr={0x7, 0x0, 0x0, 0x2, 0x2}]}, {0x0, [0x2e, 0x61, 0x30, 0x0, 0x30]}}, &(0x7f0000001c40)=""/21, 0x93, 0x15, 0x1, 0x3, 0x10000}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d80)={0x11, 0xe, &(0x7f0000001700)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0xbb4e}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r15}}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @generic={0x1, 0x3, 0x7, 0x5, 0x2}, @map_val={0x18, 0x1, 0x2, 0x0, r13, 0x0, 0x0, 0x0, 0x9}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000001780)='GPL\x00', 0x49b, 0x86, &(0x7f00000017c0)=""/134, 0x61880, 0x50, '\x00', r19, 0x0, r20, 0x8, &(0x7f0000001cc0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000001d00)={0x4, 0x4, 0x4a, 0x6}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001d40)=[{0x1, 0x4, 0x5, 0x1}], 0x10, 0xc6}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001fc0)={0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001e80)=""/126, 0x7e}, {&(0x7f0000001f00)=""/14, 0xe}], 0x2, &(0x7f0000001f80)=[@cred={{0x1c}}], 0x20}, 0x1222) 223.383788ms ago: executing program 4 (id=2182): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x94, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0x2}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) (async) r2 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$TOKEN_CREATE(0x24, &(0x7f00000003c0)={0x0, r2}, 0x8) (async) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xb, 0x5, 0x10001, 0xa, 0x1, 0xffffffffffffffff, 0x3}, 0x50) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) (async) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="34cbf9c55466da0eadc249236ab3cbf316717306be4c08c8c7da1f1ee04ab4b4eac14995ebdf620ff778a4e3452587e42a3c6aa1bd35dfd99f23b525893bc3b5f9f3bed1986bf8d0dddd7c5cdada611f9bf641e421ed71a842d84fa289a542f941d6e06b2b14e2a706ce30acf7d82f224f3e30cadd9d15f3dddbb29dbeb9f68fb68bedb91e0b1ef48832778fe36699c7ebf101659a8f476c4a065eac71d6d1e7fafc6f25ec2c9a8f431fe347a2d30e912c5b2397613ce784637ec71e37566eb0548b461f71028459c6f137c18737d58b56949d022bf1eaf486692bb76836a233c7879d740ad0beaf5159d3380442824f536a41bb22d08fe53952b9c6fed2605d53311c71b455655f96ea6a87e41e9211e90170b0a2b1a2098175ebcd33d517085d224122264cddadd82a3d11bc4a33ce66108b22b1abc6243d306d8f6b8a2ddb5373c190d8f859a3174a200936b079f85edcac7fc03fb993ec0ff8b83f1fd3f1b888d192d99c7ede5d381784d25410cccf1b0bf26a54f065e1e3ec59cc5704fb658fc980a0ac4287ef884ee82007554be3f1e163c81468d0c26c95e3e12393776e32800bb4f086f19080c4fca3d72e8569a5627ce98f2ae0bdb3ec42c23847d47e10b1c58da7e9cea990da842d96e3a51ed7d892f7b28a10486424a69a9109ebd4d7d5a3768400ac000a6d7556ca192e5cd45efb82001ac7b53e03036b6019a07ffb545cd3853e077f08a015f6232488c1139a9409c95ed005261e36b307406ba5714ef395129345866109341feb6c7c458ce08c147a983b46375ddb3621cee0312ba1a434bcd6081e1a8ae8b6d518988b9965faf9aff86df8173b93342cceaec357a100e59b4d66553633626b0b12e9622b8f8fdfe26545b87c57f8ce8609fb8e19b0f6d1cd64e8de85c7327f543b2f38cf3086b57f85e1aaa4add723e4bc4e3ea2c27acec1e545ae3fc870bd42422f6eaf17a1f82699c9cadf224ea1e5d1705b49118d91cc3731aeed60e41bf15a9613aeda8e63a29bc7a95b2d993d23269a310b91f69d16a71243c0f4080d3359f5ddd63c7032bef14ab25eb7df4b28b2132bcbf94a281c8f5de79885a6d679f145fca292b599bb09a1864726d86b65d4781408320b968e2224c23ce7a56d8892970043737ae47f071aaeb219716bc21e3304e301eb5cd32aea951a70621eb870214a72e6c474c3a20f5bd8e089ba16326cc9a80a1a4f5f0e8f58629e20b1c73eb8af330744b187a5cfdb410466378313700ca44eb6dcbc8f3d70f58e134202546f0b1a3b61a298f2a1184b1533bdad308fa2f960087e0f239d2ccbaee3889ddc1a2bea2183b98854d255a6f708909134fab83f42f13e7604f602e264f4a3b2b2a08c673c7ce2813218159b472d3b20ecbf26dd2f7b3ba5298a4ff7444ea0936e098c126f590b05e7697ed8a3d52ba1abc7285de2f160b9b081cb775a5ab77aad1bb98d47e3da53fc4c11d4db47de1e4e6f56ad671f5d8389b33260cc546e4f0bf34fec9b2abd209e6b89e6e381367774676ed6e6eaffe42b07241c276f3c84f17a0762de83eb769bdf28991ddbc23758f01c9ecfba4ab2ca2118fcedd7adde9ff47f643c13e3ad2f13b576985128f233e329fe269d5745cd2b30e5762452a4ff58fdec30623175f8d575ced1c43411e2869aadbe6f1e79a010bca334cb08d545bc2808f359b7777d1bb5675ee210574b9f72cdeb071e07eeaa0988086213a37a972647cf21d3a3bcbd7359da327bacad41b93c5e0e494669109dddcec781774f248f5663e4fac187d42ffccf68335de2adac4f8d3e1bf04b95a9464960186ed019773ffeda18f9827a61edc5fc4088eb0965cb1bd8af1185aa3972b8f73839b4611e303bcbc1f84a330f60fa0a7795ea3cffe0e338406533e12c7deef0b5906c513eab4619a8f02fdd65dcfb7297ef971c4601ad079f7ad38278ae3ff455b37d5492af546975535450693fd4593c8157b3fdb16fd3a106d2f1509d1c06dabb8933269d790a1c5e5f7bdd4a57e1e670d7043cfed88c365b5f8eefe530ef7da5322df981723332c088fce89c2ceee23b420f64332243b9c606d67d538810a94e0ffbd37a119d8fc4d6caec0def40e62613873c74feabde63e12cb2016c1d35cf1bb95bf59e01a63be8825cb3118b74b106f21eef5ee2f41e5fb39fdde058050f780d98ced247c66fc3a03ba04edaf14d698859ba303d511cf0845dc5e269aef2287770a247fd5ae1299b45819ff41725f9da3e4dab7770eb83992b53ae9a9de69e764f6e3aee3e27cfb1bacf531a91605894ae209da6d25872fb54bf36b2ed450b51aa8ee4875b9bc7e55753f61e12a323d301faceb2ecff0686b1359343a94774a6a098dc2df440725cd8331f527d4e22f8090d8879ef4765849705b99465d7ebdf661b81c303d13b87270dc1f227d5954fcbc93bbce6fde2a1f8d573d9cd8130c173a14706f1e9dabc4d16a5b003dd3239faf91769e25cf007b0623141e4e57f11746cd62f20d73956fa84c6a12e1756b6671a64bd7a474ba425907e1a61ba6d2ffa1149165a713a141bfec0f1af51afebdb84d5f14eb51acc284403627d6ce48fd028dc04e00ed963de37f85d155c33e2b4ceb09044c4f1c7791348216b674a8831a232a638f8bfb396fabbe1f880944bc5dcac55df8abc78f804306c88617acfd4adfbb5a055d3d3e91abb763ad84e701cc5679498e04600570f4b2e57c70542043dc590ab363215e6ab3f0bd89383748783d01c9227229edac723d4e2eaa061a44f2630691f25ca6093775183fdf432e01322203dd654b336670116a6a52a27ff2032b1103a4e4be0cc2fb05b24352d72e374e90cc3db2a5a691c7f6b8d1058d7730433c742d8ce52074318b1bce9bb104cf90c8b7f65293c2b74434661444f38d94d977e03433440517f6155a3cad2621c5502dd6148b867a40e6a40be4c8265ec2164b5257f06da1784e98991f42003ced4ba67c23b8c654b542d2d31168fd853cf56cc2c464d7a8a9fbcd2715968788f8527c597ab5f917753c1f1708d2c19972373c5a22af71847de22b9f1e9d38a04ea4dd291da3099cb836a696350bf1263c3c275c27b8b82f604625451a24490b0b5367c2fd05e699546ddf17709d2e2c2710f4361d9dd6e2de2b4353b7f4f8141f6f989dc1a798a974565978e4f9ec0c59a7dbc04bcab072c8513b9ca782c22cdd31fb116c10081740fd8f7d0cbd5c54f1069297f20b45d79bb9ace8e851a655fedf47b2dc76fd30b9ba9f09c9b50d6910ffcdec7078c36fe1e9b19dbb110197496349560a43c0ab42b4ce286643e73a92246ecb71e95ce0d54114772f8477c7d5604c1a52d2f680c5868cf08a2688dd9fef492a01836112cec824483e77da93d104a9e18d06bddf9a4007740a0537ac1a5e09900acc65d52680212a15b68b0ef887228e06f533c1ca95b8f9d81b9fc6608cb5bacf4b867922999c69d46048ec3f408866789f49fcb176fc99ed9d3e6c357ed2e3ce2665925773e5d86c2ceaf8f18519a00d9d2e19e9a6b16af0a53fd7df6974f5db00494460e7f3de6ff6b642859335e020513bb525adddabf0d7d6ae85e7e56e32ca8acc07fe86b7b445358966ba3914c1dfa7b814d9e846ff02a6a8c8f5713a0f727024b5d1ea7e4ce7c64f9b24dd3337a3df33714c5404403b0304b25a66fe3ac85083965877117b3d721e7922f0ac7e278feeb8dc09f58cbcfbb81b11d4699737f37ac240a24b9c4b2b587e68974f7ca5561856f32e389d32056f7d58e4de24c11bd5c5afaa441120370d0c48341e1b8146a6bbca8c15f23c155d2533e97a8e6496bc00533ec83be8488d020708d97385a03bcbf57cadc2c1e575e1ac134cdb5047f3f88eae0230751626cea1c85da9b74ddace668afebb2dc66d302ddf3c5f8f21ac0c0535d00839457e7cac9282a8e49d018b077e38ea512cf28eacff5d98e880abfb5af2e7c039d2e1f1edaad2642963ef29d715f754e2715caa6af046a298b285e3582d903be726b608619332e1a82be48b0f5adf6838f41ff776e5290de8269794bce8fb971267d036bd6bd30e42df918125d573ced78263251bcae2b7b40f1ba855b4f2472312ea8752c4a0e09468bd25615a6c00a9b44c484c5507b8400537f20890e9499ec94ed2b6aeff21e57c6e8a93d80097f85ac9316b03a5f768721bf7d041bb9a6a03eabd615e3c4d74f56c429d53b8fec4b5e86c5b311a6cd4a86f03e04dab25ad65b68a8b8d9053993fd2440ff2b81768213084c831d31a0f8c646aff9090b5463cbee452abd6318340ec41b50f1deba7ffb60b326751de3f6dbf9b17714299233d5c43071367ece2e53212e7f4e084fea60850d4d16908d9bbbb531fbf72143fdb62d1b40afde3d0b2ac2c94c32e456bbef62f8d677e332aec8ccc8eedbac61e7b89b32d57157a39ad5c456258d9c36db0edc82c2baead990ee78007ed89c8f450e92d5e209cc25f7c13f5909ca404fddbdbeff89cc42350c91e9f1fdf9753c6e95f71257f8cbb97838684461cd1244c938b9939a4e9c7727902b6f1a5434e0a06d3fc221771dd87572ae801c5ce6886122f0c91dae57440ffc7ace4e8e0041a1d245103aaadbfc2ecff622228daed2b0cd30f7f59b2617f6f0571ee4403d84e652d78b8e64d5450b6483ef70582dcda9351f2dddd3a4ac84f514f708d3af6242501bd041beae78e6b29b517b534148ea91ef85653fec824d6ddb0c0fa2555ab2564ba29227b1046b48a11ee0e6aafda9d0b80b0f05a8d057cbeb16264cb579aea3ba2b2000052d03c77844ab7c", 0xd4d}], 0x1}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) (async) close(0xffffffffffffffff) (async) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x40047451, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000a00)='fib_table_lookup\x00', r1}, 0x18) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 169.277599ms ago: executing program 1 (id=2183): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r12 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000900)=ANY=[@ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r11}, &(0x7f00000006c0), &(0x7f0000000700)=r10}, 0x20) sendmsg$inet(r9, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x4000086) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) sendmsg$inet(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r13, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 163.791559ms ago: executing program 3 (id=2184): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f00000004c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x2142, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) (async) close(r6) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair(0x1d, 0x0, 0xffffff74, &(0x7f0000000400)) close(r7) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SIOCSIFHWADDR(r7, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) (async) ioctl$SIOCSIFHWADDR(r7, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r10}, 0x8) 0s ago: executing program 2 (id=1652): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000001245dc1b90a6ba964c3db1d84b32aad28d55c1b1f7452b00a7f9e8be4472647389e12af52856f51bb403aa1a89afe904ecd53b209f4fc2f63d8711e7f65e4ac6f35de11fc5073e6eb9f3e581a8d3741216c38198bfd18e7cd32ae16b6a9700e51e8ba63ed710df526db2e85183e2803b355fab132dceff3d9a800995cafc06a2418e3228c2f4dc3c34f04680a0c0f11e06cdd44e51ff4d591cead5bef76672e8aec631b10cbfa2861eff211d284a09417dbf8c9952cc090d3cf7fd1179a19d9d000000000000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000038c0)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='kmem_cache_free\x00'}, 0x18) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000c2080000000000007b8af8ff00000000bfa200000000040007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f00000004c0)="23d460f883db35ecb495236840aadf80736837ede6d8c6e9ece132fb5a76073da0cc9c949400c486c20a89851525c8f541b9fb213f6b04bb045fb967b942b2791cde9b5edb1d9aaafe9de54f64802bcfaa478ae6d829cac21651c835307519068d1208188f37b657e75cdc222301e9fffd164a820152a626c4b24bd276310818f24bd98e25ae90db058791ae8164152c164058c916fee41affb60ef5f10d2dc33f428cc61e7e3e438f870295b1cc8f43", &(0x7f0000000b00)=""/210}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) openat$cgroup(r2, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)='%pi6 \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="000000000071123313000000000000000000000000000000000000000000000052f828da4356ac2aa9f5b7484cee2b91b3f3ba5ee2de4af9d239dd773a7b"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) kernel console output (not intermixed with test programs): cuous mode [ 49.899372][ T30] audit: type=1400 audit(1762381460.897:127): avc: denied { create } for pid=812 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 50.548598][ T833] syz.3.134 (833) used greatest stack depth: 22336 bytes left [ 50.626785][ T30] audit: type=1400 audit(1762381461.627:128): avc: denied { tracepoint } for pid=835 comm="syz.3.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 51.811041][ T858] device veth0_vlan left promiscuous mode [ 51.823105][ T858] device veth0_vlan entered promiscuous mode [ 52.026937][ T851] device syzkaller0 entered promiscuous mode [ 52.912211][ T883] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 53.095978][ T903] device syzkaller0 entered promiscuous mode [ 53.189491][ T30] audit: type=1400 audit(1762381464.187:129): avc: denied { create } for pid=906 comm="syz.3.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 56.706589][ T956] device syzkaller0 entered promiscuous mode [ 56.998406][ T966] device syzkaller0 entered promiscuous mode [ 57.252739][ T981] device sit0 left promiscuous mode [ 57.412051][ T989] device sit0 entered promiscuous mode [ 58.024880][ T995] device sit0 entered promiscuous mode [ 58.429656][ T30] audit: type=1400 audit(1762381469.417:130): avc: denied { create } for pid=1000 comm="syz.3.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 59.272873][ T1012] device syzkaller0 entered promiscuous mode [ 59.372156][ T1013] GPL: port 1(erspan0) entered blocking state [ 59.385033][ T1013] GPL: port 1(erspan0) entered disabled state [ 59.392150][ T1013] device erspan0 entered promiscuous mode [ 59.414555][ T1019] GPL: port 1(erspan0) entered blocking state [ 59.420763][ T1019] GPL: port 1(erspan0) entered forwarding state [ 59.916470][ T1034] syz.3.188[1034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.916539][ T1034] syz.3.188[1034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.533754][ T30] audit: type=1400 audit(1762381471.527:131): avc: denied { create } for pid=1036 comm="syz.4.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 61.571471][ T1069] GPL: port 1(erspan0) entered blocking state [ 61.675586][ T1069] GPL: port 1(erspan0) entered disabled state [ 61.754809][ T1069] device erspan0 entered promiscuous mode [ 61.761364][ T30] audit: type=1400 audit(1762381472.757:132): avc: denied { create } for pid=1071 comm="syz.3.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 61.785549][ T1064] GPL: port 1(erspan0) entered blocking state [ 61.792357][ T1064] GPL: port 1(erspan0) entered forwarding state [ 64.439617][ T1120] GPL: port 1(erspan0) entered blocking state [ 64.448060][ T1120] GPL: port 1(erspan0) entered disabled state [ 64.457057][ T1120] device erspan0 entered promiscuous mode [ 64.464355][ T1119] GPL: port 1(erspan0) entered blocking state [ 64.470538][ T1119] GPL: port 1(erspan0) entered forwarding state [ 64.669123][ T30] audit: type=1400 audit(1762381475.667:133): avc: denied { create } for pid=1139 comm="syz.4.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 65.043599][ T1159] bond_slave_1: mtu less than device minimum [ 65.098729][ T1155] device sit0 entered promiscuous mode [ 65.723870][ T30] audit: type=1400 audit(1762381476.727:134): avc: denied { create } for pid=1172 comm="syz.3.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 65.764391][ T1163] device syzkaller0 entered promiscuous mode [ 66.105234][ T1182] veth0_macvtap: mtu greater than device maximum [ 67.132921][ T1207] device pim6reg1 entered promiscuous mode [ 69.824193][ T1265] bond_slave_1: mtu less than device minimum [ 71.768504][ T1316] device sit0 entered promiscuous mode [ 72.430663][ T1317] device pim6reg1 entered promiscuous mode [ 72.956085][ T1360] device veth1_macvtap left promiscuous mode [ 73.058447][ T1360] device macsec0 entered promiscuous mode [ 73.364602][ T1373] device veth0_vlan left promiscuous mode [ 73.424911][ T1373] device veth0_vlan entered promiscuous mode [ 74.441532][ T1420] device veth1_macvtap left promiscuous mode [ 74.456387][ T1420] device macsec0 entered promiscuous mode [ 74.791868][ T1432] device veth1_macvtap left promiscuous mode [ 74.956093][ T1443] device wg2 entered promiscuous mode [ 75.855008][ T1466] device macsec0 entered promiscuous mode [ 76.265677][ T1472] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 76.952036][ T30] audit: type=1400 audit(1762381487.947:135): avc: denied { create } for pid=1488 comm="syz.4.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 78.016576][ T1526] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.023849][ T1526] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.444840][ T30] audit: type=1400 audit(1762381489.447:136): avc: denied { create } for pid=1532 comm="syz.1.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 78.602054][ T30] audit: type=1400 audit(1762381489.597:137): avc: denied { create } for pid=1547 comm="syz.1.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 79.667107][ T1571] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 79.754927][ T1571] device syzkaller0 entered promiscuous mode [ 80.084629][ T1584] device syzkaller0 entered promiscuous mode [ 80.200476][ T1583] device veth0_vlan left promiscuous mode [ 80.352496][ T1583] device veth0_vlan entered promiscuous mode [ 80.565430][ T1597] device veth1_to_bond entered promiscuous mode [ 80.807685][ T1608] device sit0 left promiscuous mode [ 81.049432][ T1608] device sit0 entered promiscuous mode [ 81.149055][ T1588] syz.3.339 (1588) used greatest stack depth: 22280 bytes left [ 82.700031][ T1664] device sit0 left promiscuous mode [ 82.842101][ T1664] device sit0 entered promiscuous mode [ 83.872499][ T1712] device sit0 left promiscuous mode [ 83.951894][ T1712] device sit0 entered promiscuous mode [ 84.172682][ T30] audit: type=1400 audit(1762381495.167:138): avc: denied { create } for pid=1725 comm="syz.0.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 84.635567][ T1734] bridge0: port 3(veth0) entered blocking state [ 84.643568][ T1734] bridge0: port 3(veth0) entered disabled state [ 84.654375][ T1734] device veth0 entered promiscuous mode [ 84.668114][ T1734] bridge0: port 3(veth0) entered blocking state [ 84.674464][ T1734] bridge0: port 3(veth0) entered forwarding state [ 86.455366][ T1789] device veth0_vlan left promiscuous mode [ 86.461381][ T1789] device veth0_vlan entered promiscuous mode [ 86.526355][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.534777][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 86.552426][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 86.913075][ T1791] tap0: tun_chr_ioctl cmd 35092 [ 90.004448][ T1909] bond_slave_1: mtu less than device minimum [ 90.757928][ T1931] device sit0 left promiscuous mode [ 90.923533][ T1937] device sit0 entered promiscuous mode [ 90.938787][ T30] audit: type=1400 audit(1762381501.937:139): avc: denied { create } for pid=1934 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 92.773829][ T30] audit: type=1400 audit(1762381503.777:140): avc: denied { write } for pid=1964 comm="syz.1.441" name="cgroup.subtree_control" dev="cgroup2" ino=187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 92.958230][ T30] audit: type=1400 audit(1762381503.777:141): avc: denied { open } for pid=1964 comm="syz.1.441" path="" dev="cgroup2" ino=187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 92.983314][ T30] audit: type=1400 audit(1762381503.787:142): avc: denied { ioctl } for pid=1964 comm="syz.1.441" path="" dev="cgroup2" ino=187 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 94.253257][ T2034] device wg2 entered promiscuous mode [ 94.413821][ T30] audit: type=1400 audit(1762381505.417:143): avc: denied { create } for pid=2043 comm="syz.4.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 95.398544][ T2074] device sit0 left promiscuous mode [ 95.570241][ T2077] device sit0 entered promiscuous mode [ 96.222281][ T2076] device sit0 left promiscuous mode [ 99.550812][ T2121] : renamed from veth0_vlan [ 100.193131][ T2143] device pim6reg1 entered promiscuous mode [ 102.384507][ T2162] device syzkaller0 entered promiscuous mode [ 102.966744][ T30] audit: type=1400 audit(1762381513.947:144): avc: denied { create } for pid=2184 comm="syz.0.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 104.097687][ T2213] device syzkaller0 entered promiscuous mode [ 108.625238][ T2270] syz.2.520[2270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.625309][ T2270] syz.2.520[2270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.327126][ T2278] device syzkaller0 entered promiscuous mode [ 110.058436][ T2311] device wg2 left promiscuous mode [ 110.070585][ T2311] device wg2 entered promiscuous mode [ 110.269531][ T2332] device syzkaller0 entered promiscuous mode [ 111.385071][ T2370] device veth1_macvtap entered promiscuous mode [ 111.431638][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 111.458103][ T30] audit: type=1400 audit(1762381522.457:145): avc: denied { ioctl } for pid=2377 comm="syz.2.554" path="socket:[22728]" dev="sockfs" ino=22728 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 112.081793][ T2409] bond_slave_1: mtu less than device minimum [ 112.416372][ T2415] device pim6reg1 entered promiscuous mode [ 113.225558][ T2439] device sit0 left promiscuous mode [ 113.672291][ T2455] device vlan0 entered promiscuous mode [ 113.985897][ T2460] €Â0: renamed from pim6reg1 [ 115.558480][ T2483] device syzkaller0 entered promiscuous mode [ 115.905855][ T2496] device syzkaller0 entered promiscuous mode [ 117.131626][ T2518] device syzkaller0 entered promiscuous mode [ 117.202743][ T2524] device sit0 left promiscuous mode [ 117.990769][ T2524] device sit0 entered promiscuous mode [ 118.573476][ T2570] device veth1_macvtap left promiscuous mode [ 118.580033][ T2570] device macsec0 left promiscuous mode [ 118.648714][ T2570] device veth1_macvtap entered promiscuous mode [ 118.655498][ T2570] device macsec0 entered promiscuous mode [ 118.708192][ T2573] device sit0 left promiscuous mode [ 118.776741][ T2576] device sit0 entered promiscuous mode [ 119.115320][ T2592] device wg2 left promiscuous mode [ 122.617297][ T2632] device wg2 left promiscuous mode [ 122.626266][ T2635] device wg2 entered promiscuous mode [ 123.556915][ T30] audit: type=1400 audit(1762381534.557:146): avc: denied { create } for pid=2655 comm="syz.4.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 124.272765][ T2673] device syzkaller0 entered promiscuous mode [ 125.612966][ T2726] syz.4.650[2726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.613058][ T2726] syz.4.650[2726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.839772][ T30] audit: type=1400 audit(1762381536.837:147): avc: denied { create } for pid=2732 comm="syz.2.662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 125.926023][ T2726] syz.4.650[2726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.940025][ T2726] syz.4.650[2726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.869238][ T2753] device syzkaller0 entered promiscuous mode [ 127.346045][ T2779] device syzkaller0 entered promiscuous mode [ 127.646804][ T30] audit: type=1400 audit(1762381538.647:148): avc: denied { read } for pid=2806 comm="syz.3.675" dev="nsfs" ino=4026532286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 127.772651][ T30] audit: type=1400 audit(1762381538.697:149): avc: denied { open } for pid=2806 comm="syz.3.675" path="pid:[4026532286]" dev="nsfs" ino=4026532286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 128.516588][ T2849] device sit0 left promiscuous mode [ 128.636548][ T2846] device syzkaller0 entered promiscuous mode [ 128.756106][ T2849] device sit0 entered promiscuous mode [ 129.118711][ T2876] device macsec0 left promiscuous mode [ 129.292468][ T2896] device wg2 entered promiscuous mode [ 129.583758][ T2910] device wg2 entered promiscuous mode [ 129.621605][ T2911] device sit0 left promiscuous mode [ 129.771021][ T2923] device syzkaller0 entered promiscuous mode [ 129.886297][ T2929] device syzkaller0 entered promiscuous mode [ 130.613324][ T2960] bond_slave_1: mtu less than device minimum [ 130.777171][ T2966] device sit0 left promiscuous mode [ 130.854693][ T2981] device sit0 entered promiscuous mode [ 131.617451][ T3013] device ip6tnl0 entered promiscuous mode [ 131.939553][ T3035] bond_slave_1: mtu less than device minimum [ 131.976140][ T3039] device veth1_macvtap left promiscuous mode [ 131.984507][ T3036] device sit0 entered promiscuous mode [ 133.629023][ T3087] device sit0 left promiscuous mode [ 133.662566][ T3088] device sit0 entered promiscuous mode [ 134.220961][ T3103] device sit0 left promiscuous mode [ 134.323824][ T3103] device sit0 entered promiscuous mode [ 134.897969][ T8] bridge0: port 3(veth0) entered disabled state [ 136.482258][ T3160] device sit0 left promiscuous mode [ 136.865206][ T3163] device sit0 entered promiscuous mode [ 138.249708][ T3203] device syzkaller0 entered promiscuous mode [ 138.638846][ T3227] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.646065][ T3227] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.729867][ T3226] device bridge_slave_1 left promiscuous mode [ 138.759023][ T3226] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.907014][ T3226] device bridge_slave_0 left promiscuous mode [ 139.001342][ T3226] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.325015][ T30] audit: type=1400 audit(1762381550.327:150): avc: denied { create } for pid=3253 comm="syz.3.800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 139.343077][ T3245] device lo entered promiscuous mode [ 140.015201][ T3272] device syzkaller0 entered promiscuous mode [ 140.331004][ T3296] syz.0.814 uses obsolete (PF_INET,SOCK_PACKET) [ 140.811022][ T3338] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 140.976452][ T3352] device veth1_macvtap entered promiscuous mode [ 140.992994][ T3352] device macsec0 entered promiscuous mode [ 141.035090][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 141.862516][ T3414] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.869736][ T3414] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.917706][ T3416] device bridge_slave_1 left promiscuous mode [ 141.924831][ T3416] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.936782][ T3416] device bridge_slave_0 left promiscuous mode [ 141.943202][ T3416] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.124203][ T30] audit: type=1400 audit(1762381553.127:151): avc: denied { append } for pid=3428 comm="syz.4.849" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 142.213647][ T3435] GPL: port 1(erspan0) entered blocking state [ 142.376065][ T3435] GPL: port 1(erspan0) entered disabled state [ 142.433799][ T3435] device erspan0 entered promiscuous mode [ 142.934649][ T3444] device wg2 left promiscuous mode [ 143.209884][ T3449] device erspan0 left promiscuous mode [ 143.227715][ T3449] GPL: port 1(erspan0) entered disabled state [ 143.756125][ T3473] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.765040][ T3473] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.933596][ T3489] device veth0 left promiscuous mode [ 143.942211][ T3489] bridge0: port 3(veth0) entered disabled state [ 143.949624][ T3489] device bridge_slave_1 left promiscuous mode [ 143.955883][ T3489] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.963845][ T3489] device bridge_slave_0 left promiscuous mode [ 143.973068][ T3489] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.068905][ T3490] device veth1_macvtap entered promiscuous mode [ 144.075645][ T3490] device macsec0 entered promiscuous mode [ 144.082037][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 145.136226][ T3518] ------------[ cut here ]------------ [ 145.191047][ T3518] trace type BPF program uses run-time allocation [ 145.300014][ T3518] WARNING: CPU: 1 PID: 3518 at kernel/bpf/verifier.c:11722 check_map_prog_compatibility+0x6cd/0x870 [ 145.722475][ T3518] Modules linked in: [ 145.726427][ T3518] CPU: 1 PID: 3518 Comm: syz.0.871 Not tainted syzkaller #0 [ 145.892635][ T3518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 146.065826][ T3518] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 146.291404][ T3518] Code: ee ff 48 c7 c6 80 f5 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 46 4b ee ff c6 05 54 99 6b 05 01 48 c7 c7 e0 f1 47 85 e8 73 69 25 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 146.513915][ T3518] RSP: 0018:ffffc90000b97428 EFLAGS: 00010246 [ 146.520028][ T3518] RAX: 0517f3ece7319300 RBX: 0000000000000001 RCX: 0000000000080000 [ 146.738112][ T3518] RDX: ffffc9000171c000 RSI: 00000000000039c1 RDI: 00000000000039c2 [ 147.329674][ T3518] RBP: ffffc90000b97470 R08: dffffc0000000000 R09: ffffed103ee265e8 [ 147.452808][ T3518] R10: ffffed103ee265e8 R11: 1ffff1103ee265e7 R12: ffff888126e40000 [ 147.642408][ T3518] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810f7a7800 [ 147.650422][ T3518] FS: 00007ffb02af06c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 147.684538][ T3518] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 147.691163][ T3518] CR2: 00007fbbf39cff91 CR3: 000000013ce47000 CR4: 00000000003506b0 [ 147.833518][ T3518] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 147.841518][ T3518] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 148.077514][ T3518] Call Trace: [ 148.153437][ T3518] [ 148.156400][ T3518] resolve_pseudo_ldimm64+0x685/0x11d0 [ 148.161867][ T3518] ? check_attach_btf_id+0xde0/0xde0 [ 148.239919][ T3518] ? __mark_reg_known+0x1b0/0x1b0 [ 148.245284][ T3518] ? security_capable+0x87/0xb0 [ 148.250200][ T3518] bpf_check+0x2c25/0xf280 [ 148.254760][ T3518] ? 0xffffffffa0018000 [ 148.259101][ T3518] ? is_bpf_text_address+0x177/0x190 [ 148.265222][ T3518] ? bpf_get_btf_vmlinux+0x60/0x60 [ 148.270649][ T3518] ? unwind_get_return_address+0x4d/0x90 [ 148.354774][ T3518] ? stack_trace_save+0xe0/0xe0 [ 148.448741][ T3518] ? arch_stack_walk+0xee/0x140 [ 148.523684][ T3518] ? stack_trace_save+0x98/0xe0 [ 148.560248][ T3518] ? __stack_depot_save+0x34/0x480 [ 148.654006][ T3518] ? __kasan_slab_alloc+0x69/0xf0 [ 148.659083][ T3518] ? __kasan_kmalloc+0xec/0x110 [ 148.802736][ T3518] ? __kasan_kmalloc+0xda/0x110 [ 148.807629][ T3518] ? kmem_cache_alloc_trace+0x119/0x270 [ 148.872565][ T3518] ? selinux_bpf_prog_alloc+0x51/0x140 [ 148.878064][ T3518] ? security_bpf_prog_alloc+0x62/0x90 [ 148.972385][ T3518] ? bpf_prog_load+0x97c/0x1550 [ 148.977277][ T3518] ? __sys_bpf+0x4c3/0x730 [ 148.981691][ T3518] ? __x64_sys_bpf+0x7c/0x90 [ 149.103301][ T3518] ? x64_sys_call+0x4b9/0x9a0 [ 149.108014][ T3518] ? do_syscall_64+0x4c/0xa0 [ 149.182371][ T3518] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 149.188493][ T3518] ? check_stack_object+0x81/0x140 [ 149.292849][ T3518] ? memset+0x35/0x40 [ 149.345127][ T3518] ? bpf_obj_name_cpy+0x193/0x1e0 [ 149.395289][ T3518] bpf_prog_load+0x1042/0x1550 [ 149.400092][ T3518] ? map_freeze+0x360/0x360 [ 149.479530][ T3518] ? selinux_bpf+0xc7/0xf0 [ 149.484192][ T3518] ? security_bpf+0x82/0xa0 [ 149.488723][ T3518] __sys_bpf+0x4c3/0x730 [ 149.493142][ T3518] ? bpf_link_show_fdinfo+0x310/0x310 [ 149.499163][ T3518] ? __kasan_check_write+0x14/0x20 [ 149.505269][ T3518] ? switch_fpu_return+0x15d/0x2c0 [ 149.510419][ T3518] __x64_sys_bpf+0x7c/0x90 [ 149.515134][ T3518] x64_sys_call+0x4b9/0x9a0 [ 149.519665][ T3518] do_syscall_64+0x4c/0xa0 [ 149.645335][ T3518] ? clear_bhb_loop+0x50/0xa0 [ 149.650076][ T3518] ? clear_bhb_loop+0x50/0xa0 [ 149.694106][ T3518] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 149.700045][ T3518] RIP: 0033:0x7ffb040886c9 [ 149.725730][ T3549] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.732936][ T3549] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.741043][ T3518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.808712][ T3549] device bridge_slave_1 left promiscuous mode [ 149.821169][ T3518] RSP: 002b:00007ffb02af0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 149.832517][ T3549] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.839633][ T3518] RAX: ffffffffffffffda RBX: 00007ffb042defa0 RCX: 00007ffb040886c9 [ 149.847847][ T3518] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 149.855929][ T3518] RBP: 00007ffb0410af91 R08: 0000000000000000 R09: 0000000000000000 [ 149.864722][ T3518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 149.872788][ T3518] R13: 00007ffb042df038 R14: 00007ffb042defa0 R15: 00007fff9dcf45a8 [ 149.880871][ T3518] [ 149.886083][ T3549] device bridge_slave_0 left promiscuous mode [ 149.892635][ T3518] ---[ end trace 9ab2d6b1cdf375b1 ]--- [ 149.898244][ T3549] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.160365][ T3573] device veth1_macvtap left promiscuous mode [ 150.436413][ T3576] device veth0_vlan left promiscuous mode [ 150.453929][ T3576] device veth0_vlan entered promiscuous mode [ 150.471262][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.479345][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.487310][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.142245][ T3611] syz.2.899[3611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.142316][ T3611] syz.2.899[3611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.245444][ T3607] device pim6reg1 entered promiscuous mode [ 152.392319][ T3635] device erspan0 left promiscuous mode [ 152.401976][ T3635] GPL: port 1(erspan0) entered disabled state [ 155.015947][ T3665] device syzkaller0 entered promiscuous mode [ 157.652145][ T3727] Â: renamed from pim6reg1 [ 157.744995][ T30] audit: type=1400 audit(1762381568.657:152): avc: denied { create } for pid=3729 comm="syz.4.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 157.805027][ T3739] device sit0 left promiscuous mode [ 158.001305][ T3750] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 158.170926][ T3755] device macsec0 left promiscuous mode [ 158.414736][ T3765] syz.0.943[3765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.414798][ T3765] syz.0.943[3765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.994070][ T3806] device macsec0 left promiscuous mode [ 160.726945][ T3851] device veth1_macvtap left promiscuous mode [ 160.754636][ T3851] device macsec0 left promiscuous mode [ 160.858961][ T3867] €Â0: renamed from pim6reg1 [ 161.190395][ T3888] device sit0 entered promiscuous mode [ 161.467208][ T3905] device veth1_macvtap entered promiscuous mode [ 161.506984][ T3905] device macsec0 entered promiscuous mode [ 161.878256][ T3948] device syzkaller0 entered promiscuous mode [ 162.039164][ T3952] device wg2 left promiscuous mode [ 163.617742][ T3983] device veth1_macvtap left promiscuous mode [ 163.642597][ T3983] device macsec0 left promiscuous mode [ 164.638750][ T4036] device syzkaller0 entered promiscuous mode [ 164.949140][ T4045] device veth1_macvtap entered promiscuous mode [ 164.968003][ T4045] device macsec0 entered promiscuous mode [ 165.012863][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 166.265314][ T4072] ip6_vti0: mtu greater than device maximum [ 166.403012][ T4085] device sit0 left promiscuous mode [ 166.730301][ T4089] device sit0 entered promiscuous mode [ 167.245656][ T4098] device veth1_macvtap left promiscuous mode [ 167.251688][ T4098] device macsec0 left promiscuous mode [ 167.269245][ T4099] device veth1_macvtap entered promiscuous mode [ 167.285092][ T4099] device macsec0 entered promiscuous mode [ 167.319825][ T4108] device sit0 left promiscuous mode [ 167.728050][ T4114] device sit0 entered promiscuous mode [ 168.015493][ T4135] device veth1_macvtap left promiscuous mode [ 168.029169][ T4135] device macsec0 left promiscuous mode [ 168.122650][ T4135] device veth1_macvtap entered promiscuous mode [ 168.128996][ T4135] device macsec0 entered promiscuous mode [ 168.320475][ T4152] device sit0 left promiscuous mode [ 168.481382][ T4156] device veth1_macvtap left promiscuous mode [ 168.492482][ T4156] device macsec0 left promiscuous mode [ 168.500994][ T4151] device sit0 left promiscuous mode [ 168.523260][ T4141] device pim6reg1 entered promiscuous mode [ 168.540218][ T4158] device veth1_macvtap entered promiscuous mode [ 168.546657][ T4158] device macsec0 entered promiscuous mode [ 168.553270][ T4157] device sit0 entered promiscuous mode [ 168.609760][ T4159] device sit0 entered promiscuous mode [ 170.202640][ T4200] device veth1_macvtap entered promiscuous mode [ 170.270992][ T4200] device macsec0 entered promiscuous mode [ 170.332869][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 171.417859][ T4243] device veth1_macvtap left promiscuous mode [ 171.432540][ T4243] device macsec0 left promiscuous mode [ 172.488647][ T4302] device veth1_macvtap entered promiscuous mode [ 172.512710][ T4302] device macsec0 entered promiscuous mode [ 172.644023][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 173.128332][ T4326] ªªªªªªþ€: renamed from vlan0 [ 173.192433][ T4324] bond_slave_1: mtu less than device minimum [ 173.802878][ T4355] ?µ¤: renamed from bond_slave_0 [ 174.473143][ T4377] device syzkaller0 entered promiscuous mode [ 175.211933][ T4409] device veth0_vlan left promiscuous mode [ 175.283654][ T4409] device veth0_vlan entered promiscuous mode [ 175.418657][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.490405][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.569205][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.456326][ T30] audit: type=1400 audit(1762381587.457:153): avc: denied { ioctl } for pid=4418 comm="syz.0.1118" path="net:[4026532648]" dev="nsfs" ino=4026532648 ioctlcmd=0x5460 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 178.202992][ T4476] device wg2 entered promiscuous mode [ 178.982327][ T4502] tap0: tun_chr_ioctl cmd 1074025688 [ 180.050722][ T4480] syz.3.1132 (4480) used greatest stack depth: 22224 bytes left [ 180.213477][ T4573] device sit0 left promiscuous mode [ 180.964471][ T4573] device sit0 entered promiscuous mode [ 182.307094][ T4644] device sit0 left promiscuous mode [ 182.333944][ T4651] device sit0 entered promiscuous mode [ 184.492759][ T4713] device pim6reg1 entered promiscuous mode [ 185.376564][ T4733] device wg2 entered promiscuous mode [ 185.664818][ T4739] device pim6reg1 entered promiscuous mode [ 185.753525][ T4741] device veth1_macvtap entered promiscuous mode [ 185.806107][ T4741] device macsec0 entered promiscuous mode [ 185.840842][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 185.867185][ T4747] device syzkaller0 entered promiscuous mode [ 188.086841][ T30] audit: type=1400 audit(1762381599.087:154): avc: denied { create } for pid=4783 comm="syz.3.1219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 188.222794][ T4788] ªªªªªª: renamed from vlan0 [ 188.234313][ T4784] device pim6reg1 entered promiscuous mode [ 189.570788][ T4836] device pim6reg1 entered promiscuous mode [ 189.913130][ T4849] ip6_vti0: mtu greater than device maximum [ 191.834616][ T4881] syz.0.1244[4881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.834690][ T4881] syz.0.1244[4881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.391704][ T4935] syz.3.1258[4935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.574813][ T4935] syz.3.1258[4935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.807157][ T4950] device pim6reg1 entered promiscuous mode [ 196.975342][ T4955] device pim6reg1 entered promiscuous mode [ 197.078630][ T4962] ip6_vti0: mtu greater than device maximum [ 198.049006][ T4995] syz.4.1275[4995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.049090][ T4995] syz.4.1275[4995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.416750][ T5013] bond_slave_1: mtu less than device minimum [ 202.081468][ T5061] device wg2 left promiscuous mode [ 202.305409][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.316289][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 202.331712][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.805304][ T5107] device wg2 left promiscuous mode [ 206.387533][ T5153] device pim6reg1 entered promiscuous mode [ 206.615921][ T5172] device pim6reg1 entered promiscuous mode [ 207.902933][ T5197] device veth1_macvtap left promiscuous mode [ 208.034564][ T5197] device macsec0 left promiscuous mode [ 208.073057][ T5197] device veth1_macvtap entered promiscuous mode [ 208.079434][ T5197] device macsec0 entered promiscuous mode [ 208.960168][ T5242] device veth1_macvtap entered promiscuous mode [ 209.003314][ T5242] device macsec0 entered promiscuous mode [ 209.024485][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.615700][ T5285] device wg2 entered promiscuous mode [ 211.309360][ T5362] device veth1_macvtap left promiscuous mode [ 211.315561][ T5362] device macsec0 left promiscuous mode [ 211.346789][ T5362] device veth1_macvtap entered promiscuous mode [ 211.353165][ T5362] device macsec0 entered promiscuous mode [ 213.105251][ T5426] device veth1_macvtap left promiscuous mode [ 213.111306][ T5426] device macsec0 left promiscuous mode [ 213.122236][ T5426] device veth1_macvtap entered promiscuous mode [ 213.128872][ T5426] device macsec0 entered promiscuous mode [ 213.160946][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 213.640684][ T5433] device veth0_vlan left promiscuous mode [ 213.728481][ T5433] device veth0_vlan entered promiscuous mode [ 213.872979][ T5451] device wg2 left promiscuous mode [ 213.936057][ T5451] device wg2 entered promiscuous mode [ 216.346336][ T5542] device sit0 left promiscuous mode [ 216.910471][ T5548] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 216.994273][ T5548] device syzkaller0 entered promiscuous mode [ 218.194825][ T5615] syz.4.1448[5615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.194900][ T5615] syz.4.1448[5615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.382320][ T5688] device veth0_vlan left promiscuous mode [ 221.500586][ T5688] device veth0_vlan entered promiscuous mode [ 221.620589][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.656401][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.816184][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.227129][ T30] audit: type=1400 audit(1762381633.227:155): avc: denied { create } for pid=5708 comm="syz.0.1475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 222.412915][ T30] audit: type=1400 audit(1762381633.247:156): avc: denied { create } for pid=5708 comm="syz.0.1475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 225.196444][ T5779] device sit0 left promiscuous mode [ 228.286382][ T5835] device pim6reg1 entered promiscuous mode [ 230.133971][ T30] audit: type=1400 audit(1762381641.127:157): avc: denied { setattr } for pid=5857 comm="syz.2.1514" path="pipe:[519]" dev="pipefs" ino=519 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 230.148547][ T5858] device veth0_vlan left promiscuous mode [ 230.236445][ T5858] device veth0_vlan entered promiscuous mode [ 230.417547][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.431046][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªªþ€: link becomes ready [ 230.439121][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.714353][ T30] audit: type=1400 audit(1762381641.717:158): avc: denied { create } for pid=5879 comm="syz.2.1520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 230.790265][ T5885] syz.2.1522[5885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.790360][ T5885] syz.2.1522[5885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.942238][ T5921] device veth0_vlan left promiscuous mode [ 232.053841][ T5921] device veth0_vlan entered promiscuous mode [ 232.117015][ T5926] device team_slave_1 entered promiscuous mode [ 232.144008][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 232.162738][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 232.923959][ T5959] syz.3.1540[5959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.924051][ T5959] syz.3.1540[5959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.698275][ T30] audit: type=1400 audit(1762381644.697:159): avc: denied { create } for pid=5970 comm="syz.4.1545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 235.781722][ T6026] syz.4.1558[6026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.781821][ T6026] syz.4.1558[6026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.797542][ T6024] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 236.220633][ T6038] syz.0.1561[6038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.220706][ T6038] syz.0.1561[6038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.328468][ T6055] device syzkaller0 entered promiscuous mode [ 242.357063][ T6053] device veth0_vlan left promiscuous mode [ 242.372147][ T6053] device veth0_vlan entered promiscuous mode [ 242.531012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.561232][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.573116][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.601887][ T6084] GPL: port 1(vlan1) entered blocking state [ 242.610139][ T6084] GPL: port 1(vlan1) entered disabled state [ 242.649949][ T6084] device vlan1 entered promiscuous mode [ 242.682128][ T30] audit: type=1400 audit(1762381653.677:160): avc: denied { create } for pid=6086 comm="syz.2.1578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 242.830165][ T6091] device sit0 left promiscuous mode [ 242.838717][ T6094] device sit0 entered promiscuous mode [ 243.096424][ T6084] device sit0 entered promiscuous mode [ 243.203636][ T6101] syz.1.1581[6101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.203733][ T6101] syz.1.1581[6101] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.655824][ T30] audit: type=1400 audit(1762381654.657:161): avc: denied { create } for pid=6122 comm="syz.2.1590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 244.206506][ T6134] device sit0 entered promiscuous mode [ 247.014015][ T6176] GPL: port 2(vlan1) entered blocking state [ 247.128758][ T6176] GPL: port 2(vlan1) entered disabled state [ 247.150822][ T6176] device vlan1 entered promiscuous mode [ 247.159451][ T6176] GPL: port 2(vlan1) entered blocking state [ 247.166024][ T6176] GPL: port 2(vlan1) entered forwarding state [ 247.332030][ T6177] device sit0 left promiscuous mode [ 247.398760][ T6177] device sit0 entered promiscuous mode [ 251.860059][ T6281] device sit0 entered promiscuous mode [ 252.317834][ T6304] GPL: port 2(vlan1) entered disabled state [ 252.323856][ T6304] GPL: port 1(erspan0) entered disabled state [ 252.485182][ T6307] device syzkaller0 entered promiscuous mode [ 253.070335][ T30] audit: type=1400 audit(1762381664.067:162): avc: denied { create } for pid=6325 comm="syz.0.1647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 253.256384][ T6336] device syzkaller0 entered promiscuous mode [ 253.348985][ T284] syz-executor (284) used greatest stack depth: 21792 bytes left [ 254.553268][ T6345] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.604430][ T6345] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.613120][ T6345] device bridge_slave_0 entered promiscuous mode [ 254.620097][ T6345] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.627847][ T6345] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.635930][ T6345] device bridge_slave_1 entered promiscuous mode [ 255.304118][ T403] device bridge_slave_1 left promiscuous mode [ 255.310324][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.692570][ T403] device bridge_slave_0 left promiscuous mode [ 255.698765][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.053471][ T403] device veth1_macvtap left promiscuous mode [ 256.059511][ T403] device veth0_vlan left promiscuous mode [ 256.869688][ T30] audit: type=1400 audit(1762381667.867:163): avc: denied { create } for pid=6345 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 257.272859][ T30] audit: type=1400 audit(1762381667.867:164): avc: denied { write } for pid=6345 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 257.722755][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.730553][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.801117][ T30] audit: type=1400 audit(1762381667.867:165): avc: denied { read } for pid=6345 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 257.854242][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.865013][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.874006][ T403] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.881052][ T403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.019120][ T6384] device pim6reg1 entered promiscuous mode [ 258.063453][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 258.076323][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 258.084974][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.093348][ T403] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.100397][ T403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.236386][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 258.245282][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.253518][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 258.261816][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.369187][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 258.416472][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 258.497346][ T6345] device veth0_vlan entered promiscuous mode [ 258.616370][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 258.624513][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.779435][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.787152][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.940217][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 258.962739][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 258.974043][ T6408] device pim6reg1 entered promiscuous mode [ 258.993897][ T6345] device veth1_macvtap entered promiscuous mode [ 259.167511][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 259.175341][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 259.183855][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 259.291991][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 259.301674][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 260.877157][ T6422] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.884307][ T6422] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.891748][ T6422] device bridge_slave_0 entered promiscuous mode [ 260.899338][ T6422] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.909261][ T6422] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.916890][ T6422] device bridge_slave_1 entered promiscuous mode [ 262.518147][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.556331][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.610399][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.636384][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.645008][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.652055][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.680228][ T6422] device veth0_vlan entered promiscuous mode [ 262.693128][ T6422] device veth1_macvtap entered promiscuous mode [ 262.724554][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 262.733648][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.741700][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.749425][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.757232][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 262.765616][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.773471][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.781806][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.790663][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.797711][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.805648][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 262.817024][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.825240][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.833433][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.842164][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.852709][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.860946][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.874071][ T403] device bridge_slave_1 left promiscuous mode [ 262.880227][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.887893][ T403] device bridge_slave_0 left promiscuous mode [ 262.895032][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.903360][ T403] device veth1_macvtap left promiscuous mode [ 262.909371][ T403] device veth0_vlan left promiscuous mode [ 263.237338][ T6449] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.244559][ T6449] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.252050][ T6449] device bridge_slave_0 entered promiscuous mode [ 263.259334][ T6449] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.266546][ T6449] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.274230][ T6449] device bridge_slave_1 entered promiscuous mode [ 263.558018][ T6463] device sit0 left promiscuous mode [ 263.588185][ T6466] device sit0 entered promiscuous mode [ 263.664714][ T6449] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.671819][ T6449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.679171][ T6449] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.686313][ T6449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.844545][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 263.872098][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.951147][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.378670][ T6494] device syzkaller0 entered promiscuous mode [ 264.388450][ T6492] device pim6reg1 entered promiscuous mode [ 264.399197][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.407626][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.414750][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.422302][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.430509][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.437557][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.445203][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 264.453215][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 264.533614][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 264.545158][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 264.631246][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 264.643356][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.651677][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.659531][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.899173][ T6449] device veth0_vlan entered promiscuous mode [ 265.206644][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 265.215887][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.226024][ T6449] device veth1_macvtap entered promiscuous mode [ 265.253564][ T6523] device syzkaller0 entered promiscuous mode [ 265.261846][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.269624][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.279363][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.288448][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 265.296889][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 265.517257][ T403] device bridge_slave_1 left promiscuous mode [ 265.523450][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.530947][ T403] device bridge_slave_0 left promiscuous mode [ 265.537412][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.545696][ T403] device veth1_macvtap left promiscuous mode [ 265.551700][ T403] device veth0_vlan left promiscuous mode [ 265.932295][ T6579] device syzkaller0 entered promiscuous mode [ 266.052788][ T6583] device syzkaller0 entered promiscuous mode [ 266.537973][ T6586] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.545220][ T6586] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.553008][ T6586] device bridge_slave_0 entered promiscuous mode [ 266.693203][ T6586] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.713331][ T6586] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.798542][ T6586] device bridge_slave_1 entered promiscuous mode [ 267.345608][ T6616] device syzkaller0 entered promiscuous mode [ 267.614143][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.621635][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.683837][ T403] device bridge_slave_1 left promiscuous mode [ 267.690093][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.697912][ T403] device bridge_slave_0 left promiscuous mode [ 267.704328][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.714864][ T403] device veth1_macvtap left promiscuous mode [ 267.720874][ T403] device veth0_vlan left promiscuous mode [ 267.826140][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.886388][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.908162][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.915242][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.047514][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.059571][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.098528][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.128717][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.135794][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.188264][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.213484][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.362798][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.445922][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.500450][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 268.515222][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.527483][ T6586] device veth0_vlan entered promiscuous mode [ 268.571591][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 268.579717][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.588114][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.595815][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.729025][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 268.740422][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 268.756273][ T6672] device syzkaller0 entered promiscuous mode [ 268.828899][ T6586] device veth1_macvtap entered promiscuous mode [ 268.864297][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 268.871889][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 268.880230][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 268.889786][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 268.898838][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 270.125491][ T6695] device syzkaller0 entered promiscuous mode [ 270.516981][ T6702] device sit0 left promiscuous mode [ 271.676417][ T6699] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.896420][ T6699] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.012852][ T6699] device bridge_slave_0 entered promiscuous mode [ 272.044638][ T6699] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.106350][ T6699] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.198463][ T6699] device bridge_slave_1 entered promiscuous mode [ 272.816166][ T403] device bridge_slave_1 left promiscuous mode [ 272.823466][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.838662][ T403] device bridge_slave_0 left promiscuous mode [ 272.851359][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.868874][ T403] device veth1_macvtap left promiscuous mode [ 272.881570][ T403] device veth0_vlan left promiscuous mode [ 273.189170][ T6766] device pim6reg1 entered promiscuous mode [ 273.364991][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.425002][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.523382][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 273.662843][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.729968][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.737058][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.744754][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 273.769206][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.780180][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.787253][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.905599][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 273.913567][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 273.921851][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 273.929955][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 273.938217][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.024691][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 274.130666][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.256171][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 274.349320][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.455792][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.550630][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.647639][ T6699] device veth0_vlan entered promiscuous mode [ 274.672620][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 274.698694][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.723456][ T6699] device veth1_macvtap entered promiscuous mode [ 274.738860][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 274.750716][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 274.760096][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 274.768683][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 274.777065][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 275.991327][ T6803] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.999726][ T6803] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.024416][ T6803] device bridge_slave_0 entered promiscuous mode [ 276.034498][ T6803] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.041569][ T6803] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.049617][ T6803] device bridge_slave_1 entered promiscuous mode [ 276.360404][ T403] device bridge_slave_1 left promiscuous mode [ 276.380522][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.450439][ T403] device bridge_slave_0 left promiscuous mode [ 276.461790][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.605496][ T403] device veth1_macvtap left promiscuous mode [ 276.611534][ T403] device veth0_vlan left promiscuous mode [ 277.583366][ T6879] device sit0 left promiscuous mode [ 277.676645][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.684432][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.707698][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.734622][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.743576][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.750695][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.758422][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.767090][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.775782][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.782832][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.790455][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 277.799111][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.807436][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 277.815767][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.853785][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 277.902782][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 278.013120][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 278.124391][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 278.193437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 278.296474][ T6803] device veth0_vlan entered promiscuous mode [ 278.314652][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 278.394258][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 278.449092][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 278.632896][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 278.667541][ T6803] device veth1_macvtap entered promiscuous mode [ 278.849061][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 278.862798][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 278.871188][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 278.958134][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 278.983158][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 279.020798][ T6923] device pim6reg1 entered promiscuous mode [ 280.157370][ T6938] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.233061][ T6938] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.268694][ T6938] device bridge_slave_0 entered promiscuous mode [ 280.288284][ T6938] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.306185][ T6938] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.325404][ T6938] device bridge_slave_1 entered promiscuous mode [ 280.513283][ T403] device bridge_slave_1 left promiscuous mode [ 280.520603][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.560840][ T403] device bridge_slave_0 left promiscuous mode [ 280.588203][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.621619][ T403] device veth1_macvtap left promiscuous mode [ 280.647937][ T403] device veth0_vlan left promiscuous mode [ 280.895926][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.904362][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.937271][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.959205][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.976924][ T651] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.984020][ T651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.092303][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.103643][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.111956][ T651] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.119014][ T651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.178566][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.187322][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 281.195018][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.203142][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.228366][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.238675][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.247173][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.255831][ T6938] device veth0_vlan entered promiscuous mode [ 281.384816][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.406405][ T6938] device veth1_macvtap entered promiscuous mode [ 281.456024][ T7035] device veth1_macvtap left promiscuous mode [ 281.462060][ T7035] device macsec0 left promiscuous mode [ 281.539138][ T7029] device veth1_macvtap entered promiscuous mode [ 281.546820][ T7029] device macsec0 entered promiscuous mode [ 281.657407][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.684847][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.697895][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.706508][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 283.330029][ T7069] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.339937][ T7069] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.347909][ T7069] device bridge_slave_0 entered promiscuous mode [ 283.421920][ T7069] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.429215][ T7069] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.455904][ T7069] device bridge_slave_1 entered promiscuous mode [ 283.721980][ T403] device bridge_slave_1 left promiscuous mode [ 283.729192][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.779884][ T403] device bridge_slave_0 left promiscuous mode [ 283.812718][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.823596][ T403] device veth1_macvtap left promiscuous mode [ 283.829589][ T403] device veth0_vlan left promiscuous mode [ 284.757341][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.793332][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.907953][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.952751][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.961052][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.968110][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.989489][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.123831][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.262798][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.292117][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.299183][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.372572][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.463874][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.520594][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.528774][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.657811][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 285.824996][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.901540][ T7069] device veth0_vlan entered promiscuous mode [ 285.926895][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.984516][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.142563][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.202415][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.261846][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 286.310609][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 286.383814][ T7069] device veth1_macvtap entered promiscuous mode [ 286.625113][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.672989][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.832681][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.996893][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 287.087302][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 287.349225][ T7151] device syzkaller0 entered promiscuous mode [ 288.729533][ T7168] device syzkaller0 entered promiscuous mode [ 288.893359][ T7170] device syzkaller0 entered promiscuous mode [ 288.937206][ T7173] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.944451][ T7173] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.951875][ T7173] device bridge_slave_0 entered promiscuous mode [ 288.976822][ T7173] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.983950][ T7173] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.991456][ T7173] device bridge_slave_1 entered promiscuous mode [ 289.567433][ T7195] device syzkaller0 entered promiscuous mode [ 289.680435][ T403] device bridge_slave_1 left promiscuous mode [ 289.686921][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.695104][ T403] device bridge_slave_0 left promiscuous mode [ 289.701382][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.713072][ T403] device veth1_macvtap left promiscuous mode [ 289.719489][ T403] device veth0_vlan left promiscuous mode [ 290.041656][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.049319][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.202215][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.223145][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.248832][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.255913][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.278853][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.303018][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.316115][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.324828][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.331876][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.422833][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.431296][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.439913][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.451802][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.668739][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.793948][ T7173] device veth0_vlan entered promiscuous mode [ 290.811558][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 290.837216][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 290.846924][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.855426][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.863920][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.871251][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 290.881506][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.897417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.916967][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.930655][ T7173] device veth1_macvtap entered promiscuous mode [ 290.977981][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 290.986465][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.996649][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 291.033648][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 291.042286][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 291.051454][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 291.060417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 291.139135][ T7255] device sit0 left promiscuous mode [ 291.145347][ T7253] syz.0.1885[7253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.145414][ T7253] syz.0.1885[7253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.988759][ T7277] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.031343][ T7277] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.039290][ T7277] device bridge_slave_0 entered promiscuous mode [ 293.135097][ T7277] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.145388][ T7277] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.162787][ T7277] device bridge_slave_1 entered promiscuous mode [ 293.554126][ T7319] device syzkaller0 entered promiscuous mode [ 293.699324][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.707339][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.716228][ T403] device bridge_slave_1 left promiscuous mode [ 293.722562][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.729979][ T403] device bridge_slave_0 left promiscuous mode [ 293.736231][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.744220][ T403] device veth1_macvtap left promiscuous mode [ 293.750250][ T403] device veth0_vlan left promiscuous mode [ 293.823201][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.831557][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.839824][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.846866][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.854828][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.863232][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.871713][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.878763][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.886229][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.906588][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.977663][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.179876][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.430131][ T7277] device veth0_vlan entered promiscuous mode [ 294.459974][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.490453][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.541739][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.809194][ T7352] device syzkaller0 entered promiscuous mode [ 294.815983][ T7355] device syzkaller0 entered promiscuous mode [ 294.824722][ T7277] device veth1_macvtap entered promiscuous mode [ 294.840700][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 294.848904][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.857622][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 294.942635][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 294.962870][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.972764][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.985563][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 295.012548][ T7277] syz-executor (7277) used greatest stack depth: 21560 bytes left [ 296.908995][ T7362] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.916276][ T7362] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.925561][ T7362] device bridge_slave_0 entered promiscuous mode [ 296.932783][ T7362] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.939807][ T7362] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.947451][ T7362] device bridge_slave_1 entered promiscuous mode [ 297.546166][ T403] device bridge_slave_1 left promiscuous mode [ 297.560033][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.659852][ T403] device bridge_slave_0 left promiscuous mode [ 297.685750][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.694421][ T403] device veth1_macvtap left promiscuous mode [ 297.700478][ T403] device veth0_vlan left promiscuous mode [ 297.984489][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 297.992139][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.016970][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 298.031393][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.055187][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.062276][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.079655][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 298.102881][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.116209][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.123296][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.149650][ T7362] device veth0_vlan entered promiscuous mode [ 298.161205][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 298.171771][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.180192][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.191495][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.199469][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 298.207347][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.218515][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 298.239623][ T7404] device syzkaller0 entered promiscuous mode [ 298.251888][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 298.281084][ T7362] device veth1_macvtap entered promiscuous mode [ 298.307353][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 298.325176][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 298.404519][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 298.414161][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 298.844688][ T7426] device sit0 left promiscuous mode [ 298.886766][ T7428] device sit0 entered promiscuous mode [ 300.168935][ T7450] device syzkaller0 entered promiscuous mode [ 300.255632][ T403] device bridge_slave_1 left promiscuous mode [ 300.264135][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.291669][ T403] device bridge_slave_0 left promiscuous mode [ 300.350946][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.358824][ T403] device veth1_macvtap left promiscuous mode [ 300.365112][ T403] device veth0_vlan left promiscuous mode [ 301.107481][ T7465] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.119986][ T7465] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.134072][ T7465] device bridge_slave_0 entered promiscuous mode [ 301.148024][ T7465] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.155173][ T7465] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.164852][ T7465] device bridge_slave_1 entered promiscuous mode [ 301.240324][ T30] audit: type=1400 audit(1762381712.237:166): avc: denied { create } for pid=7517 comm="syz.3.1950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 301.294829][ T7465] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.301880][ T7465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.309198][ T7465] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.316241][ T7465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.342970][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.350226][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.358650][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 301.366212][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.375565][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.383919][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.390959][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.433722][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.472520][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.479562][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.487277][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.532618][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 301.545614][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.561068][ T7465] device veth0_vlan entered promiscuous mode [ 301.574088][ T7465] device veth1_macvtap entered promiscuous mode [ 301.593221][ T30] audit: type=1400 audit(1762381712.597:167): avc: denied { unmount } for pid=7465 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 301.625052][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 301.642866][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 301.651623][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 301.678138][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.686499][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.694350][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 303.235470][ T403] device bridge_slave_1 left promiscuous mode [ 303.312322][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.394244][ T30] audit: type=1400 audit(1762381714.397:168): avc: denied { mounton } for pid=7611 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 303.425112][ T403] device bridge_slave_0 left promiscuous mode [ 303.431268][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.441713][ T403] device veth1_macvtap left promiscuous mode [ 303.447978][ T403] device veth0_vlan left promiscuous mode [ 304.077682][ T7611] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.084830][ T7611] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.094939][ T7611] device bridge_slave_0 entered promiscuous mode [ 304.184170][ T7611] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.191511][ T7611] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.202958][ T7611] device bridge_slave_1 entered promiscuous mode [ 304.856857][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.867239][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.875773][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.885684][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 304.894868][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.902757][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.911203][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.919874][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.926929][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.934990][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.943584][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.951897][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.958953][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.971726][ T7611] device veth0_vlan entered promiscuous mode [ 305.219203][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.227786][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.235742][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.252747][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 305.327599][ T7694] device sit0 left promiscuous mode [ 305.366997][ T7692] device syzkaller0 entered promiscuous mode [ 305.520285][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 305.557762][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 305.755666][ T7611] device veth1_macvtap entered promiscuous mode [ 306.035826][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 306.056628][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 306.111168][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 306.242425][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 306.255183][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 307.933518][ T7731] syz.3.1994[7731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.933583][ T7731] syz.3.1994[7731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.995816][ T7728] device syzkaller0 entered promiscuous mode [ 308.023461][ T7739] FAULT_INJECTION: forcing a failure. [ 308.023461][ T7739] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 308.037096][ T7739] CPU: 0 PID: 7739 Comm: syz.4.1997 Tainted: G W syzkaller #0 [ 308.045923][ T7739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 308.056007][ T7739] Call Trace: [ 308.059281][ T7739] [ 308.062202][ T7739] __dump_stack+0x21/0x30 [ 308.066535][ T7739] dump_stack_lvl+0xee/0x150 [ 308.071121][ T7739] ? show_regs_print_info+0x20/0x20 [ 308.076322][ T7739] ? vfs_write+0xc17/0xf70 [ 308.080735][ T7739] dump_stack+0x15/0x20 [ 308.084883][ T7739] should_fail+0x3c1/0x510 [ 308.089300][ T7739] should_fail_usercopy+0x1a/0x20 [ 308.094313][ T7739] _copy_from_user+0x20/0xd0 [ 308.098908][ T7739] __sys_bpf+0x233/0x730 [ 308.103148][ T7739] ? bpf_link_show_fdinfo+0x310/0x310 [ 308.108512][ T7739] ? debug_smp_processor_id+0x17/0x20 [ 308.113874][ T7739] __x64_sys_bpf+0x7c/0x90 [ 308.118293][ T7739] x64_sys_call+0x4b9/0x9a0 [ 308.122796][ T7739] do_syscall_64+0x4c/0xa0 [ 308.127209][ T7739] ? clear_bhb_loop+0x50/0xa0 [ 308.131874][ T7739] ? clear_bhb_loop+0x50/0xa0 [ 308.136541][ T7739] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 308.142425][ T7739] RIP: 0033:0x7fed73a666c9 [ 308.146828][ T7739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 308.166425][ T7739] RSP: 002b:00007fed724ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 308.174835][ T7739] RAX: ffffffffffffffda RBX: 00007fed73cbcfa0 RCX: 00007fed73a666c9 [ 308.182802][ T7739] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 308.190763][ T7739] RBP: 00007fed724ce090 R08: 0000000000000000 R09: 0000000000000000 [ 308.198727][ T7739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.206687][ T7739] R13: 00007fed73cbd038 R14: 00007fed73cbcfa0 R15: 00007fff1e8b41a8 [ 308.214657][ T7739] [ 308.279899][ T7732] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.287161][ T7732] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.295066][ T7732] device bridge_slave_0 entered promiscuous mode [ 308.413779][ T7732] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.420840][ T7732] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.661863][ T7732] device bridge_slave_1 entered promiscuous mode [ 308.730208][ T403] device bridge_slave_1 left promiscuous mode [ 308.740092][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.775141][ T403] device bridge_slave_0 left promiscuous mode [ 308.799948][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.841919][ T403] device veth1_macvtap left promiscuous mode [ 308.848817][ T403] device veth0_vlan left promiscuous mode [ 308.958668][ T7768] device syzkaller0 entered promiscuous mode [ 309.481697][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 309.492862][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.544310][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 309.565549][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.574514][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.581549][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.590091][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 309.599018][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.607597][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.614651][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.622093][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 309.630942][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.639199][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 309.665695][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 309.681366][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.706784][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 309.718481][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 309.736338][ T7732] device veth0_vlan entered promiscuous mode [ 309.751802][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 309.769736][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.798093][ T7732] device veth1_macvtap entered promiscuous mode [ 309.823026][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.836918][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 309.849631][ T7811] FAULT_INJECTION: forcing a failure. [ 309.849631][ T7811] name failslab, interval 1, probability 0, space 0, times 1 [ 309.864581][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 309.872801][ T7811] CPU: 0 PID: 7811 Comm: syz.0.2010 Tainted: G W syzkaller #0 [ 309.881563][ T7811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 309.891597][ T7811] Call Trace: [ 309.894855][ T7811] [ 309.897770][ T7811] __dump_stack+0x21/0x30 [ 309.902092][ T7811] dump_stack_lvl+0xee/0x150 [ 309.906678][ T7811] ? show_regs_print_info+0x20/0x20 [ 309.911865][ T7811] ? kasan_set_track+0x5b/0x70 [ 309.916611][ T7811] ? kasan_set_free_info+0x23/0x40 [ 309.921715][ T7811] ? ____kasan_slab_free+0x125/0x160 [ 309.927005][ T7811] ? __kasan_slab_free+0x11/0x20 [ 309.931931][ T7811] ? slab_free_freelist_hook+0xc2/0x190 [ 309.937476][ T7811] dump_stack+0x15/0x20 [ 309.941614][ T7811] should_fail+0x3c1/0x510 [ 309.946015][ T7811] __should_failslab+0xa4/0xe0 [ 309.950762][ T7811] should_failslab+0x9/0x20 [ 309.955248][ T7811] slab_pre_alloc_hook+0x3b/0xe0 [ 309.960167][ T7811] __kmalloc+0x6d/0x2c0 [ 309.964300][ T7811] ? bpf_test_init+0x100/0x1c0 [ 309.969044][ T7811] bpf_test_init+0x100/0x1c0 [ 309.973615][ T7811] bpf_prog_test_run_skb+0x193/0x1150 [ 309.978972][ T7811] ? __kasan_check_write+0x14/0x20 [ 309.984063][ T7811] ? fput_many+0x15a/0x1a0 [ 309.988461][ T7811] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 309.994337][ T7811] bpf_prog_test_run+0x3d5/0x620 [ 309.999254][ T7811] ? bpf_prog_query+0x230/0x230 [ 310.004168][ T7811] ? selinux_bpf+0xce/0xf0 [ 310.008567][ T7811] ? security_bpf+0x82/0xa0 [ 310.013052][ T7811] __sys_bpf+0x52c/0x730 [ 310.017273][ T7811] ? bpf_link_show_fdinfo+0x310/0x310 [ 310.022621][ T7811] ? bpf_trace_run2+0xb5/0x1b0 [ 310.027364][ T7811] ? __bpf_trace_sys_enter+0x62/0x70 [ 310.032629][ T7811] __x64_sys_bpf+0x7c/0x90 [ 310.037039][ T7811] x64_sys_call+0x4b9/0x9a0 [ 310.041519][ T7811] do_syscall_64+0x4c/0xa0 [ 310.045920][ T7811] ? clear_bhb_loop+0x50/0xa0 [ 310.050574][ T7811] ? clear_bhb_loop+0x50/0xa0 [ 310.055229][ T7811] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 310.061101][ T7811] RIP: 0033:0x7ffb040886c9 [ 310.065499][ T7811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.085085][ T7811] RSP: 002b:00007ffb02af0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 310.093481][ T7811] RAX: ffffffffffffffda RBX: 00007ffb042defa0 RCX: 00007ffb040886c9 [ 310.101431][ T7811] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 310.109379][ T7811] RBP: 00007ffb02af0090 R08: 0000000000000000 R09: 0000000000000000 [ 310.117329][ T7811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 310.125279][ T7811] R13: 00007ffb042df038 R14: 00007ffb042defa0 R15: 00007fff9dcf45a8 [ 310.133235][ T7811] [ 310.150334][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 310.163914][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 310.186595][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 310.195447][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 310.209507][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 310.218078][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 310.263125][ T7827] FAULT_INJECTION: forcing a failure. [ 310.263125][ T7827] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 310.276685][ T7827] CPU: 0 PID: 7827 Comm: syz.0.2025 Tainted: G W syzkaller #0 [ 310.285464][ T7827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 310.295687][ T7827] Call Trace: [ 310.298968][ T7827] [ 310.301886][ T7827] __dump_stack+0x21/0x30 [ 310.306212][ T7827] dump_stack_lvl+0xee/0x150 [ 310.310795][ T7827] ? show_regs_print_info+0x20/0x20 [ 310.315990][ T7827] dump_stack+0x15/0x20 [ 310.320137][ T7827] should_fail+0x3c1/0x510 [ 310.324542][ T7827] should_fail_usercopy+0x1a/0x20 [ 310.329558][ T7827] _copy_from_user+0x20/0xd0 [ 310.334138][ T7827] bpf_test_init+0x13d/0x1c0 [ 310.338727][ T7827] bpf_prog_test_run_skb+0x193/0x1150 [ 310.344095][ T7827] ? __kasan_check_write+0x14/0x20 [ 310.349196][ T7827] ? fput_many+0x15a/0x1a0 [ 310.353605][ T7827] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 310.359494][ T7827] bpf_prog_test_run+0x3d5/0x620 [ 310.364435][ T7827] ? bpf_prog_query+0x230/0x230 [ 310.369273][ T7827] ? selinux_bpf+0xce/0xf0 [ 310.373679][ T7827] ? security_bpf+0x82/0xa0 [ 310.378174][ T7827] __sys_bpf+0x52c/0x730 [ 310.382408][ T7827] ? bpf_link_show_fdinfo+0x310/0x310 [ 310.387952][ T7827] ? bpf_trace_run2+0xb5/0x1b0 [ 310.392814][ T7827] ? __bpf_trace_sys_enter+0x62/0x70 [ 310.398116][ T7827] __x64_sys_bpf+0x7c/0x90 [ 310.402532][ T7827] x64_sys_call+0x4b9/0x9a0 [ 310.407040][ T7827] do_syscall_64+0x4c/0xa0 [ 310.411455][ T7827] ? clear_bhb_loop+0x50/0xa0 [ 310.416123][ T7827] ? clear_bhb_loop+0x50/0xa0 [ 310.420791][ T7827] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 310.426683][ T7827] RIP: 0033:0x7ffb040886c9 [ 310.431087][ T7827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.450723][ T7827] RSP: 002b:00007ffb02af0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 310.459139][ T7827] RAX: ffffffffffffffda RBX: 00007ffb042defa0 RCX: 00007ffb040886c9 [ 310.467109][ T7827] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 310.475073][ T7827] RBP: 00007ffb02af0090 R08: 0000000000000000 R09: 0000000000000000 [ 310.483036][ T7827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 310.490998][ T7827] R13: 00007ffb042df038 R14: 00007ffb042defa0 R15: 00007fff9dcf45a8 [ 310.498972][ T7827] [ 310.632244][ T7825] device syzkaller0 entered promiscuous mode [ 311.913260][ T403] device bridge_slave_1 left promiscuous mode [ 311.919364][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.926848][ T403] device bridge_slave_0 left promiscuous mode [ 311.933049][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.940753][ T403] device veth1_macvtap left promiscuous mode [ 311.946790][ T403] device veth0_vlan left promiscuous mode [ 312.083821][ T7839] syz.4.2019[7839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.083912][ T7839] syz.4.2019[7839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.806468][ T7850] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.825147][ T7850] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.832921][ T7850] device bridge_slave_0 entered promiscuous mode [ 312.841223][ T7850] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.848298][ T7850] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.855915][ T7850] device bridge_slave_1 entered promiscuous mode [ 313.154907][ T7878] FAULT_INJECTION: forcing a failure. [ 313.154907][ T7878] name failslab, interval 1, probability 0, space 0, times 0 [ 313.179719][ T7850] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.186813][ T7850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.194152][ T7850] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.201197][ T7850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.222601][ T7878] CPU: 1 PID: 7878 Comm: syz.1.2027 Tainted: G W syzkaller #0 [ 313.231389][ T7878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 313.241439][ T7878] Call Trace: [ 313.244719][ T7878] [ 313.247634][ T7878] __dump_stack+0x21/0x30 [ 313.251953][ T7878] dump_stack_lvl+0xee/0x150 [ 313.256528][ T7878] ? show_regs_print_info+0x20/0x20 [ 313.261711][ T7878] dump_stack+0x15/0x20 [ 313.265848][ T7878] should_fail+0x3c1/0x510 [ 313.270247][ T7878] __should_failslab+0xa4/0xe0 [ 313.274992][ T7878] should_failslab+0x9/0x20 [ 313.279477][ T7878] slab_pre_alloc_hook+0x3b/0xe0 [ 313.284408][ T7878] __kmalloc+0x6d/0x2c0 [ 313.288557][ T7878] ? sk_prot_alloc+0xed/0x320 [ 313.293212][ T7878] ? check_stack_object+0x81/0x140 [ 313.298311][ T7878] sk_prot_alloc+0xed/0x320 [ 313.302793][ T7878] sk_alloc+0x38/0x430 [ 313.306847][ T7878] bpf_prog_test_run_skb+0x24b/0x1150 [ 313.312287][ T7878] ? __kasan_check_write+0x14/0x20 [ 313.317380][ T7878] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 313.323252][ T7878] bpf_prog_test_run+0x3d5/0x620 [ 313.328170][ T7878] ? bpf_prog_query+0x230/0x230 [ 313.332998][ T7878] ? selinux_bpf+0xce/0xf0 [ 313.337392][ T7878] ? security_bpf+0x82/0xa0 [ 313.341874][ T7878] __sys_bpf+0x52c/0x730 [ 313.346191][ T7878] ? bpf_link_show_fdinfo+0x310/0x310 [ 313.351548][ T7878] ? debug_smp_processor_id+0x17/0x20 [ 313.356902][ T7878] __x64_sys_bpf+0x7c/0x90 [ 313.361310][ T7878] x64_sys_call+0x4b9/0x9a0 [ 313.365794][ T7878] do_syscall_64+0x4c/0xa0 [ 313.370218][ T7878] ? clear_bhb_loop+0x50/0xa0 [ 313.374882][ T7878] ? clear_bhb_loop+0x50/0xa0 [ 313.379538][ T7878] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 313.385423][ T7878] RIP: 0033:0x7f58192036c9 [ 313.389820][ T7878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 313.409417][ T7878] RSP: 002b:00007f5817c6b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 313.417813][ T7878] RAX: ffffffffffffffda RBX: 00007f5819459fa0 RCX: 00007f58192036c9 [ 313.425847][ T7878] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 313.433952][ T7878] RBP: 00007f5817c6b090 R08: 0000000000000000 R09: 0000000000000000 [ 313.441907][ T7878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 313.449871][ T7878] R13: 00007f581945a038 R14: 00007f5819459fa0 R15: 00007ffc04e231e8 [ 313.457829][ T7878] [ 313.468077][ T7887] device pim6reg1 entered promiscuous mode [ 313.861339][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.871133][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.879263][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.887086][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.921988][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.934609][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.943392][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.950438][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.959825][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 313.968269][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.033872][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 314.043996][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.055104][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 314.063686][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.072094][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 314.080378][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.089225][ T7850] device veth0_vlan entered promiscuous mode [ 314.111437][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.128097][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.172664][ T7850] device veth1_macvtap entered promiscuous mode [ 314.188019][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 314.199660][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 314.244443][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 314.294198][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 314.325098][ T7932] FAULT_INJECTION: forcing a failure. [ 314.325098][ T7932] name failslab, interval 1, probability 0, space 0, times 0 [ 314.340223][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 314.350401][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 314.358471][ T7932] CPU: 0 PID: 7932 Comm: syz.0.2041 Tainted: G W syzkaller #0 [ 314.367241][ T7932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 314.377285][ T7932] Call Trace: [ 314.380550][ T7932] [ 314.383464][ T7932] __dump_stack+0x21/0x30 [ 314.387789][ T7932] dump_stack_lvl+0xee/0x150 [ 314.392361][ T7932] ? show_regs_print_info+0x20/0x20 [ 314.397543][ T7932] dump_stack+0x15/0x20 [ 314.401677][ T7932] should_fail+0x3c1/0x510 [ 314.406075][ T7932] __should_failslab+0xa4/0xe0 [ 314.410818][ T7932] should_failslab+0x9/0x20 [ 314.415300][ T7932] slab_pre_alloc_hook+0x3b/0xe0 [ 314.420220][ T7932] kmem_cache_alloc_trace+0x48/0x270 [ 314.425488][ T7932] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 314.431188][ T7932] selinux_sk_alloc_security+0x7e/0x1a0 [ 314.436715][ T7932] security_sk_alloc+0x72/0xa0 [ 314.441458][ T7932] sk_prot_alloc+0x108/0x320 [ 314.446035][ T7932] sk_alloc+0x38/0x430 [ 314.450085][ T7932] bpf_prog_test_run_skb+0x24b/0x1150 [ 314.455441][ T7932] ? __kasan_check_write+0x14/0x20 [ 314.460538][ T7932] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 314.466411][ T7932] bpf_prog_test_run+0x3d5/0x620 [ 314.471362][ T7932] ? bpf_prog_query+0x230/0x230 [ 314.476192][ T7932] ? selinux_bpf+0xce/0xf0 [ 314.480595][ T7932] ? security_bpf+0x82/0xa0 [ 314.485078][ T7932] __sys_bpf+0x52c/0x730 [ 314.489301][ T7932] ? bpf_link_show_fdinfo+0x310/0x310 [ 314.494653][ T7932] ? debug_smp_processor_id+0x17/0x20 [ 314.500014][ T7932] __x64_sys_bpf+0x7c/0x90 [ 314.504407][ T7932] x64_sys_call+0x4b9/0x9a0 [ 314.508896][ T7932] do_syscall_64+0x4c/0xa0 [ 314.513295][ T7932] ? clear_bhb_loop+0x50/0xa0 [ 314.517960][ T7932] ? clear_bhb_loop+0x50/0xa0 [ 314.522613][ T7932] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 314.528492][ T7932] RIP: 0033:0x7ffb040886c9 [ 314.532894][ T7932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 314.552569][ T7932] RSP: 002b:00007ffb02af0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 314.560960][ T7932] RAX: ffffffffffffffda RBX: 00007ffb042defa0 RCX: 00007ffb040886c9 [ 314.568912][ T7932] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 314.576947][ T7932] RBP: 00007ffb02af0090 R08: 0000000000000000 R09: 0000000000000000 [ 314.584897][ T7932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 314.592860][ T7932] R13: 00007ffb042df038 R14: 00007ffb042defa0 R15: 00007fff9dcf45a8 [ 314.600820][ T7932] [ 314.609320][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 314.746677][ T7907] device syzkaller0 entered promiscuous mode [ 314.795649][ T7950] device veth1_macvtap left promiscuous mode [ 314.801807][ T7950] device macsec0 left promiscuous mode [ 314.906055][ T7952] device veth1_macvtap entered promiscuous mode [ 314.914815][ T7952] device macsec0 entered promiscuous mode [ 314.923179][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 316.033001][ T651] device bridge_slave_1 left promiscuous mode [ 316.039141][ T651] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.047215][ T651] device bridge_slave_0 left promiscuous mode [ 316.053410][ T651] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.061703][ T651] device veth1_macvtap left promiscuous mode [ 316.067761][ T651] device veth0_vlan left promiscuous mode [ 316.540013][ T7969] FAULT_INJECTION: forcing a failure. [ 316.540013][ T7969] name failslab, interval 1, probability 0, space 0, times 0 [ 316.582550][ T7971] device veth0_vlan left promiscuous mode [ 316.590210][ T7971] device veth0_vlan entered promiscuous mode [ 316.605040][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 316.613526][ T7969] CPU: 0 PID: 7969 Comm: syz.4.2053 Tainted: G W syzkaller #0 [ 316.622309][ T7969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 316.632532][ T7969] Call Trace: [ 316.635813][ T7969] [ 316.638822][ T7969] __dump_stack+0x21/0x30 [ 316.643159][ T7969] dump_stack_lvl+0xee/0x150 [ 316.647751][ T7969] ? show_regs_print_info+0x20/0x20 [ 316.652960][ T7969] dump_stack+0x15/0x20 [ 316.654791][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 316.657213][ T7969] should_fail+0x3c1/0x510 [ 316.657236][ T7969] __should_failslab+0xa4/0xe0 [ 316.673531][ T7969] should_failslab+0x9/0x20 [ 316.678042][ T7969] slab_pre_alloc_hook+0x3b/0xe0 [ 316.682983][ T7969] ? __build_skb+0x2d/0x310 [ 316.687490][ T7969] kmem_cache_alloc+0x44/0x260 [ 316.692305][ T7969] __build_skb+0x2d/0x310 [ 316.695796][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 316.696634][ T7969] ? __kasan_check_write+0x14/0x20 [ 316.708912][ T7969] build_skb+0x24/0x200 [ 316.713068][ T7969] bpf_prog_test_run_skb+0x279/0x1150 [ 316.718456][ T7969] ? __kasan_check_write+0x14/0x20 [ 316.723575][ T7969] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 316.729471][ T7969] bpf_prog_test_run+0x3d5/0x620 [ 316.734401][ T7969] ? bpf_prog_query+0x230/0x230 [ 316.739238][ T7969] ? selinux_bpf+0xce/0xf0 [ 316.743635][ T7969] ? security_bpf+0x82/0xa0 [ 316.748118][ T7969] __sys_bpf+0x52c/0x730 [ 316.752359][ T7969] ? bpf_link_show_fdinfo+0x310/0x310 [ 316.757710][ T7969] ? debug_smp_processor_id+0x17/0x20 [ 316.763061][ T7969] __x64_sys_bpf+0x7c/0x90 [ 316.767461][ T7969] x64_sys_call+0x4b9/0x9a0 [ 316.771950][ T7969] do_syscall_64+0x4c/0xa0 [ 316.776349][ T7969] ? clear_bhb_loop+0x50/0xa0 [ 316.781014][ T7969] ? clear_bhb_loop+0x50/0xa0 [ 316.785667][ T7969] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 316.791544][ T7969] RIP: 0033:0x7fed73a666c9 [ 316.795944][ T7969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 316.815583][ T7969] RSP: 002b:00007fed724ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 316.824068][ T7969] RAX: ffffffffffffffda RBX: 00007fed73cbcfa0 RCX: 00007fed73a666c9 [ 316.832019][ T7969] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 316.839971][ T7969] RBP: 00007fed724ce090 R08: 0000000000000000 R09: 0000000000000000 [ 316.847922][ T7969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 316.855870][ T7969] R13: 00007fed73cbd038 R14: 00007fed73cbcfa0 R15: 00007fff1e8b41a8 [ 316.863829][ T7969] [ 316.920054][ T7972] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.927297][ T7972] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.934831][ T7972] device bridge_slave_0 entered promiscuous mode [ 316.942026][ T7972] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.949100][ T7972] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.970735][ T7972] device bridge_slave_1 entered promiscuous mode [ 317.537428][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 317.601024][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 317.754336][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 317.764524][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 317.773245][ T403] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.780276][ T403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.787705][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 317.802479][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.810768][ T403] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.817808][ T403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.828718][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 317.840364][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 317.849659][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.870577][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 317.885937][ T7972] device veth0_vlan entered promiscuous mode [ 317.895490][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.904359][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.911993][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 317.934900][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 317.956061][ T7972] device veth1_macvtap entered promiscuous mode [ 317.968367][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.976742][ T8031] FAULT_INJECTION: forcing a failure. [ 317.976742][ T8031] name failslab, interval 1, probability 0, space 0, times 0 [ 317.989821][ T8031] CPU: 0 PID: 8031 Comm: syz.0.2066 Tainted: G W syzkaller #0 [ 317.998590][ T8031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 318.008634][ T8031] Call Trace: [ 318.011904][ T8031] [ 318.014819][ T8031] __dump_stack+0x21/0x30 [ 318.019140][ T8031] dump_stack_lvl+0xee/0x150 [ 318.023716][ T8031] ? show_regs_print_info+0x20/0x20 [ 318.028987][ T8031] dump_stack+0x15/0x20 [ 318.033128][ T8031] should_fail+0x3c1/0x510 [ 318.037530][ T8031] __should_failslab+0xa4/0xe0 [ 318.042281][ T8031] should_failslab+0x9/0x20 [ 318.046770][ T8031] slab_pre_alloc_hook+0x3b/0xe0 [ 318.051783][ T8031] ? skb_clone+0x1cf/0x360 [ 318.056187][ T8031] kmem_cache_alloc+0x44/0x260 [ 318.060938][ T8031] ? stack_trace_save+0xe0/0xe0 [ 318.065776][ T8031] skb_clone+0x1cf/0x360 [ 318.070007][ T8031] bpf_clone_redirect+0xa7/0x380 [ 318.074932][ T8031] ? stack_trace_save+0x98/0xe0 [ 318.079829][ T8031] bpf_prog_6893982b85ceadf7+0x56/0x2a8 [ 318.085359][ T8031] ? __kasan_slab_alloc+0xcf/0xf0 [ 318.090369][ T8031] ? __kasan_slab_alloc+0xbd/0xf0 [ 318.095378][ T8031] ? slab_post_alloc_hook+0x4f/0x2b0 [ 318.100650][ T8031] ? kmem_cache_alloc+0xf7/0x260 [ 318.105574][ T8031] ? __build_skb+0x2d/0x310 [ 318.110063][ T8031] ? build_skb+0x24/0x200 [ 318.114385][ T8031] ? bpf_prog_test_run_skb+0x279/0x1150 [ 318.119923][ T8031] ? bpf_prog_test_run+0x3d5/0x620 [ 318.125018][ T8031] ? __sys_bpf+0x52c/0x730 [ 318.129418][ T8031] ? __x64_sys_bpf+0x7c/0x90 [ 318.133990][ T8031] ? x64_sys_call+0x4b9/0x9a0 [ 318.138652][ T8031] ? do_syscall_64+0x4c/0xa0 [ 318.143239][ T8031] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 318.149388][ T8031] ? ktime_get+0x12f/0x160 [ 318.153792][ T8031] bpf_test_run+0x33d/0x8d0 [ 318.158286][ T8031] ? convert___skb_to_skb+0x4f0/0x4f0 [ 318.163643][ T8031] ? eth_get_headlen+0x1f0/0x1f0 [ 318.168569][ T8031] ? convert___skb_to_skb+0x41/0x4f0 [ 318.173837][ T8031] bpf_prog_test_run_skb+0x9ec/0x1150 [ 318.179200][ T8031] ? __bpf_prog_test_run_raw_tp+0x2b0/0x2b0 [ 318.185082][ T8031] bpf_prog_test_run+0x3d5/0x620 [ 318.190003][ T8031] ? bpf_prog_query+0x230/0x230 [ 318.194851][ T8031] ? selinux_bpf+0xce/0xf0 [ 318.199252][ T8031] ? security_bpf+0x82/0xa0 [ 318.203741][ T8031] __sys_bpf+0x52c/0x730 [ 318.207973][ T8031] ? bpf_link_show_fdinfo+0x310/0x310 [ 318.213334][ T8031] ? debug_smp_processor_id+0x17/0x20 [ 318.218692][ T8031] __x64_sys_bpf+0x7c/0x90 [ 318.223094][ T8031] x64_sys_call+0x4b9/0x9a0 [ 318.227584][ T8031] do_syscall_64+0x4c/0xa0 [ 318.231986][ T8031] ? clear_bhb_loop+0x50/0xa0 [ 318.236645][ T8031] ? clear_bhb_loop+0x50/0xa0 [ 318.241308][ T8031] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 318.247189][ T8031] RIP: 0033:0x7ffb040886c9 [ 318.251595][ T8031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.271186][ T8031] RSP: 002b:00007ffb02af0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 318.279588][ T8031] RAX: ffffffffffffffda RBX: 00007ffb042defa0 RCX: 00007ffb040886c9 [ 318.287547][ T8031] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 318.295505][ T8031] RBP: 00007ffb02af0090 R08: 0000000000000000 R09: 0000000000000000 [ 318.303462][ T8031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.311416][ T8031] R13: 00007ffb042df038 R14: 00007ffb042defa0 R15: 00007fff9dcf45a8 [ 318.319466][ T8031] [ 318.325722][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 318.371798][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 318.380446][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 319.273453][ T651] device bridge_slave_1 left promiscuous mode [ 319.279582][ T651] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.287004][ T651] device bridge_slave_0 left promiscuous mode [ 319.293186][ T651] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.300801][ T651] device veth1_macvtap left promiscuous mode [ 319.306827][ T651] device veth0_vlan left promiscuous mode [ 321.171852][ T8079] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.222410][ T8079] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.230594][ T8079] device bridge_slave_0 entered promiscuous mode [ 321.333225][ T8079] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.343648][ T8079] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.428623][ T8079] device bridge_slave_1 entered promiscuous mode [ 321.695076][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.702829][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.750611][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.759777][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.815106][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.822173][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.829708][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.838407][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.869328][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.876414][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.905435][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.963182][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 321.973319][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.001445][ T403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 322.069315][ T8079] device veth0_vlan entered promiscuous mode [ 322.124274][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.133125][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.145602][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.304366][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 322.378165][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.434546][ T8136] device wg2 left promiscuous mode [ 322.514390][ T8079] device veth1_macvtap entered promiscuous mode [ 322.713491][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 322.721559][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 322.763081][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.831465][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 322.874602][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 324.712977][ T651] device bridge_slave_1 left promiscuous mode [ 324.719174][ T651] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.726650][ T651] device bridge_slave_0 left promiscuous mode [ 324.732821][ T651] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.740501][ T651] device veth1_macvtap left promiscuous mode [ 324.746519][ T651] device veth0_vlan left promiscuous mode [ 324.868312][ T8155] device bridge_slave_1 entered promiscuous mode [ 325.152139][ T8166] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.159439][ T8166] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.171993][ T8166] device bridge_slave_0 entered promiscuous mode [ 325.179251][ T8166] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.186489][ T8166] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.195463][ T8166] device bridge_slave_1 entered promiscuous mode [ 325.356800][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 325.364488][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 325.383076][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 325.397587][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 325.405787][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.412831][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.420473][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 325.428867][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 325.437063][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.444104][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.451445][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 325.459713][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 325.467759][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 325.571234][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 325.586996][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 325.595472][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 325.603762][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 325.612014][ T8166] device veth0_vlan entered promiscuous mode [ 325.625923][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 325.636284][ T8166] device veth1_macvtap entered promiscuous mode [ 325.647463][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 325.661536][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 325.805264][ T8215] syz.3.2118[8215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.805336][ T8215] syz.3.2118[8215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.873633][ T651] device bridge_slave_1 left promiscuous mode [ 326.891198][ T651] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.898728][ T651] device bridge_slave_0 left promiscuous mode [ 326.905056][ T651] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.913163][ T651] device veth1_macvtap left promiscuous mode [ 326.919146][ T651] device veth0_vlan left promiscuous mode [ 331.150299][ T8229] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.164084][ T8229] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.179822][ T8229] device bridge_slave_0 entered promiscuous mode [ 331.239539][ T8229] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.271300][ T8229] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.289682][ T8229] device bridge_slave_1 entered promiscuous mode [ 331.381050][ T8266] device sit0 entered promiscuous mode [ 331.471837][ T8271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.487523][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.533120][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.540403][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.118917][ T8229] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.125987][ T8229] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.133314][ T8229] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.140338][ T8229] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.188579][ T651] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.207494][ T651] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.268697][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.284174][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.338211][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.379509][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.408008][ T651] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.415108][ T651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.444481][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.461606][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.478602][ T651] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.485686][ T651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.592990][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.603384][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.644744][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.706950][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.780369][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 332.862736][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 332.964155][ T8229] device veth0_vlan entered promiscuous mode [ 332.985498][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 333.090403][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.206833][ T8229] device veth1_macvtap entered promiscuous mode [ 333.243090][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.261934][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.347485][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 333.398638][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.442581][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 333.494789][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 333.503160][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 333.673248][ T8321] device syzkaller0 entered promiscuous mode [ 333.810909][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 333.839309][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 335.753324][ T10] device bridge_slave_1 left promiscuous mode [ 335.759502][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.767043][ T10] device bridge_slave_0 left promiscuous mode [ 335.773234][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.780969][ T10] device veth1_macvtap left promiscuous mode [ 335.787073][ T10] device veth0_vlan left promiscuous mode [ 336.599528][ T8386] syz.3.2165[8386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.599579][ T8386] syz.3.2165[8386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.671443][ T8358] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.782788][ T8358] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.821650][ T8358] device bridge_slave_0 entered promiscuous mode [ 337.055350][ T8358] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.064398][ T8358] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.077332][ T8358] device bridge_slave_1 entered promiscuous mode [ 337.275153][ T30] audit: type=1400 audit(1762381748.277:169): avc: denied { create } for pid=8402 comm="syz.3.2171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 338.035221][ T8432] syz.4.2177[8432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.035296][ T8432] syz.4.2177[8432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.101654][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 338.121152][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.180228][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.234141][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.252641][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.259713][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.267181][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.275872][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.287017][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.294083][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.302745][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 338.320965][ T8358] device veth0_vlan entered promiscuous mode [ 338.345040][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 338.374202][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.403223][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.443388][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.472738][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 338.511207][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.943518][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 338.982258][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 339.031574][ T8456] device veth1_macvtap left promiscuous mode [ 339.068038][ T8456] device macsec0 left promiscuous mode [ 339.105913][ T8358] device veth1_macvtap entered promiscuous mode [ 339.116749][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 339.124764][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 339.134209][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 339.163546][ T8460] device pim6reg1 entered promiscuous mode [ 339.191225][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 339.200451][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=1652 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 339.292391][ T30] audit: type=1400 audit(1762381750.287:170): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14812]" dev="pipefs" ino=14812 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 339.622491][ T281] syz-executor (281) used greatest stack depth: 21056 bytes left [ 340.468080][ T10] device erspan0 left promiscuous mode [ 340.477456][ T10] GPL: port 1(erspan0) entered disabled state [ 340.733399][ T10] device vlan1 left promiscuous mode [ 340.738929][ T10] GPL: port 2(vlan1) entered disabled state [ 340.753593][ T10] device vlan1 left promiscuous mode [ 340.759000][ T10] GPL: port 1(vlan1) entered disabled state [ 340.783753][ T10] device bridge_slave_1 left promiscuous mode [ 340.789896][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.812825][ T10] device bridge_slave_0 left promiscuous mode [ 340.818981][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.839734][ T10] device veth1_macvtap left promiscuous mode [ 340.852599][ T10] device veth0_vlan left promiscuous mode [ 340.872782][ T10] device veth1_macvtap left promiscuous mode [ 340.878808][ T10] device veth0_vlan left promiscuous mode [ 342.983972][ T10] GPL: port 1(erspan0) entered disabled state [ 342.990782][ T10] device erspan0 left promiscuous mode [ 342.996473][ T10] GPL: port 1(erspan0) entered disabled state [ 343.353600][ T10] device veth1_macvtap left promiscuous mode [ 344.713067][ T10] GPL: port 1(erspan0) entered disabled state [ 344.719834][ T10] device erspan0 left promiscuous mode [ 344.725327][ T10] GPL: port 1(erspan0) entered disabled state [ 345.073537][ T10] device veth1_macvtap left promiscuous mode