last executing test programs: 19.092448049s ago: executing program 4 (id=3268): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000195"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000fe27008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES8=r1, @ANYBLOB="0000000000000000b705000008000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x38, 0xfffffffffffffffe}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_type(r8, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000c40), 0x12) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) r10 = gettid() syz_open_procfs$namespace(r10, &(0x7f0000000080)='ns/net\x00') sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 15.900066228s ago: executing program 4 (id=3268): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000195"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000fe27008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES8=r1, @ANYBLOB="0000000000000000b705000008000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000022000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e0500009cb20d03e7564c35a8d36774d5e5003a14817ac61e4dd19699a13477bf7e060e3670ef0e789f65f105006704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a080600000002000000ff000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3957663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964ecbeba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c338615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c1c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982b951fb058fd3c7b6341c4580376b6c16bd94d2da66059de81abfa15eeeb88b6ae5882ad341032c73f1285e21fff5a1d138e061b1dc7bbda199b5fab8e0719e9cd69b47dcb52b0be6a3a73afdf328132e1d4f21065716be0c53a23940d07188b015fa341dbc92231c8b5e5717eac184f46c9f61b69f55cd2231bcf821052429a1f250e8b734be0605a15f25923d599544b319319ff0a32621019347df460a098119a6f47eb1bac47946d7a009cbc6ec74c19a93cc7c7138b28c95270116181fd5f553572548104d2ad0e10d3663488e664401453f22f0d76d2162635365258af61ae1f46f4a7862f302d91e3f7c2781f602220522e84602a939a8d5e4137ae31ccd397404dc72e06715a6503d4d865182803ee6725da7293b23daeebefd6fce7411c9624a7e8d5ba5a13e1c32adc4f32744a8c6882a72475e4280a4d9a47c003c6ed3071330c58145be813a10788a720a6b5a498ca2b42496c479a0a71e2f6f9bad8c84bc6be20281bde0b348cf2c60538a505ad4a0510eebb023e4954c9eb6cd70627f5c03d867dbf3ad5d1f1dc852064dd0efafc3df20ec8faf3d194db76127f88f284fa1b71ab964fdd2474471da76373e65e9a8bf844bdfdd348bc7d00c4c7e7afe8a1f8cde79b7a6c5aafe954b8ba37818e40c14b37c23f9f614576b689436fef2f27f8b1e756e00262e22bca49c43fd73e7e99b2fa44a8c1db99c2cf2735ad6c5fabf082e0df0f8ba7e24272165f2f5b28230c02b53d44bd84bf6770157e96bbb96b5e1f165c87e7ad68a3600b3d357fa9a7d53c281d88ebb175a4dbb82130e6970982947913110f091d21760d985afd3163f2e6880682432f9b3b97d57a9f980ede51116a3d04d58872a07d6a7e12db673acd2f7b8988d833e71943fe2c1c60100f36b955c56b55bfd3ecf0af694c71a03f2996c15b1ba971de1cb9c7e6a0000000000000014783ef54c51199317413f98dca8ff3d0bda50f6c0af58dbd6c031b1a5a7512c5896514adfa17d31429c68db50a93d88199defd3b4625fea426ff9293a28a544a6a9e2a79b55daa1b3c6b14c4ec6d164e902ce4913843d65d841973468729ea12bf6d3499036dbb66718f3497855c3baa6cc07c0fa388ec9df0617c1a28ef5a595ee267a76175b8a057e6efaf4fefe46def451f2858fe71a53e77b1a44e98843bb3a40102da3703dfb9f61bdcea2fb810b32d52e2157a150a63ea6135d1cf6f864c2e6887dd7245bc5d61dc5a114d10ffb22e76678bbfc1e3865d17d128306d1b81884a934cb00000000000000000098a4526e6468987dbc63bff7590eb388afaba43d811996333eef7e9f472bee293f0c40d434b8be07cbd52325296e22802493edb5c590ad208bac683a8b2d4c9d2d57ff846ae8c422e0b28546671f11d8157bb762c91f3fbc8b8e21589c92446ae65d408c0637ffcc2d44d715ce003dd1e12b085e186d069a55c2e96efbe5024d61a56a36d988c0f51a973a6c545b28211a92000000001501aed8972af0fcd540a9d4e293690c5e697b3a1480e46df5371bca1cfb28a57c1b3c956ec81397e81fbf870a67385fea04220423f52ad8178b9fd04bdc7e5fee4bd52db996e633792118efdb6b88023e80da74fdf723c7f05e96d738989f2c8b1e6b3a9716b6130a09e2698b12d8ae4d329f305fde3e8dec42eae3c69988ad568543a715755110c8dff124a6ba9ee1dc32ea7d17a35a420133c7df262a30cbff8790d80fd4def27ff1b268014daec1b0d1d2864bf010801f092efac0b349b86631d2a7455a72c0e7f43730b78e9beb255188acb12f3770fcc2223ba034181d9c3acef5b6d9ee77883ca12cfd68a5db88cc94c65a9fd1d070387a351905240b0b1920429109032ddc3cf9bf4ba32f594d45478bca432bdeb1a21fd5b5c2c416ed8eeabade9e2002b4e714dc3d7476fa52fedc0d0e6bed973e3aa468597810c13a8c40d9845bf0080850f309ec4dc5f88ef54b6674d8402f8ccd86d33edb1894e46b793641e9bf407b7c8b2b4b555f07467c96828163ce30fd4c24b108df352bc32eae5b1e3adecf6cf8d2bc3549f49c14a553683499b707a422e98082456c0dcf3f7155db062dfad1e92af9708dca9b70a77f4b88c06f8ee7a43df5f5ac21a6ed194102abaa0970000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x38, 0xfffffffffffffffe}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_type(r8, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000c40), 0x12) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) r10 = gettid() syz_open_procfs$namespace(r10, &(0x7f0000000080)='ns/net\x00') sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 12.561733737s ago: executing program 4 (id=3268): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000195"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000fe27008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES8=r1, @ANYBLOB="0000000000000000b705000008000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x38, 0xfffffffffffffffe}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_type(r8, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000c40), 0x12) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) r10 = gettid() syz_open_procfs$namespace(r10, &(0x7f0000000080)='ns/net\x00') sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 8.6738877s ago: executing program 4 (id=3268): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000195"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000fe27008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES8=r1, @ANYBLOB="0000000000000000b705000008000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000022000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e0500009cb20d03e7564c35a8d36774d5e5003a14817ac61e4dd19699a13477bf7e060e3670ef0e789f65f105006704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a080600000002000000ff000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3957663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964ecbeba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c338615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c1c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982b951fb058fd3c7b6341c4580376b6c16bd94d2da66059de81abfa15eeeb88b6ae5882ad341032c73f1285e21fff5a1d138e061b1dc7bbda199b5fab8e0719e9cd69b47dcb52b0be6a3a73afdf328132e1d4f21065716be0c53a23940d07188b015fa341dbc92231c8b5e5717eac184f46c9f61b69f55cd2231bcf821052429a1f250e8b734be0605a15f25923d599544b319319ff0a32621019347df460a098119a6f47eb1bac47946d7a009cbc6ec74c19a93cc7c7138b28c95270116181fd5f553572548104d2ad0e10d3663488e664401453f22f0d76d2162635365258af61ae1f46f4a7862f302d91e3f7c2781f602220522e84602a939a8d5e4137ae31ccd397404dc72e06715a6503d4d865182803ee6725da7293b23daeebefd6fce7411c9624a7e8d5ba5a13e1c32adc4f32744a8c6882a72475e4280a4d9a47c003c6ed3071330c58145be813a10788a720a6b5a498ca2b42496c479a0a71e2f6f9bad8c84bc6be20281bde0b348cf2c60538a505ad4a0510eebb023e4954c9eb6cd70627f5c03d867dbf3ad5d1f1dc852064dd0efafc3df20ec8faf3d194db76127f88f284fa1b71ab964fdd2474471da76373e65e9a8bf844bdfdd348bc7d00c4c7e7afe8a1f8cde79b7a6c5aafe954b8ba37818e40c14b37c23f9f614576b689436fef2f27f8b1e756e00262e22bca49c43fd73e7e99b2fa44a8c1db99c2cf2735ad6c5fabf082e0df0f8ba7e24272165f2f5b28230c02b53d44bd84bf6770157e96bbb96b5e1f165c87e7ad68a3600b3d357fa9a7d53c281d88ebb175a4dbb82130e6970982947913110f091d21760d985afd3163f2e6880682432f9b3b97d57a9f980ede51116a3d04d58872a07d6a7e12db673acd2f7b8988d833e71943fe2c1c60100f36b955c56b55bfd3ecf0af694c71a03f2996c15b1ba971de1cb9c7e6a0000000000000014783ef54c51199317413f98dca8ff3d0bda50f6c0af58dbd6c031b1a5a7512c5896514adfa17d31429c68db50a93d88199defd3b4625fea426ff9293a28a544a6a9e2a79b55daa1b3c6b14c4ec6d164e902ce4913843d65d841973468729ea12bf6d3499036dbb66718f3497855c3baa6cc07c0fa388ec9df0617c1a28ef5a595ee267a76175b8a057e6efaf4fefe46def451f2858fe71a53e77b1a44e98843bb3a40102da3703dfb9f61bdcea2fb810b32d52e2157a150a63ea6135d1cf6f864c2e6887dd7245bc5d61dc5a114d10ffb22e76678bbfc1e3865d17d128306d1b81884a934cb00000000000000000098a4526e6468987dbc63bff7590eb388afaba43d811996333eef7e9f472bee293f0c40d434b8be07cbd52325296e22802493edb5c590ad208bac683a8b2d4c9d2d57ff846ae8c422e0b28546671f11d8157bb762c91f3fbc8b8e21589c92446ae65d408c0637ffcc2d44d715ce003dd1e12b085e186d069a55c2e96efbe5024d61a56a36d988c0f51a973a6c545b28211a92000000001501aed8972af0fcd540a9d4e293690c5e697b3a1480e46df5371bca1cfb28a57c1b3c956ec81397e81fbf870a67385fea04220423f52ad8178b9fd04bdc7e5fee4bd52db996e633792118efdb6b88023e80da74fdf723c7f05e96d738989f2c8b1e6b3a9716b6130a09e2698b12d8ae4d329f305fde3e8dec42eae3c69988ad568543a715755110c8dff124a6ba9ee1dc32ea7d17a35a420133c7df262a30cbff8790d80fd4def27ff1b268014daec1b0d1d2864bf010801f092efac0b349b86631d2a7455a72c0e7f43730b78e9beb255188acb12f3770fcc2223ba034181d9c3acef5b6d9ee77883ca12cfd68a5db88cc94c65a9fd1d070387a351905240b0b1920429109032ddc3cf9bf4ba32f594d45478bca432bdeb1a21fd5b5c2c416ed8eeabade9e2002b4e714dc3d7476fa52fedc0d0e6bed973e3aa468597810c13a8c40d9845bf0080850f309ec4dc5f88ef54b6674d8402f8ccd86d33edb1894e46b793641e9bf407b7c8b2b4b555f07467c96828163ce30fd4c24b108df352bc32eae5b1e3adecf6cf8d2bc3549f49c14a553683499b707a422e98082456c0dcf3f7155db062dfad1e92af9708dca9b70a77f4b88c06f8ee7a43df5f5ac21a6ed194102abaa0970000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x38, 0xfffffffffffffffe}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_type(r8, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000c40), 0x12) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) r10 = gettid() syz_open_procfs$namespace(r10, &(0x7f0000000080)='ns/net\x00') sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 4.320816055s ago: executing program 2 (id=3811): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="19000000040000000800"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) sendmsg$unix(r2, &(0x7f0000000000)={&(0x7f00000057c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='sched_kthread_work_queue_work\x00', r6}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f00000002c0)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r4, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000400)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0x3e, &(0x7f0000000540)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x73, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x0, 0x9, 0x6, 0xb9d, 0x40, 0xffffffffffffffff, 0x0, '\x00', r9, 0xffffffffffffffff, 0x0, 0x5, 0x5, 0x0, @void, @value, @void, @value}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRESHEX=r2], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00072c00db5b6861589bcfe8875a06030000002300"/48], 0xfdef) ioctl$SIOCSIFHWADDR(r8, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) openat$tun(0xffffffffffffff9c, &(0x7f0000000880), 0x200100, 0x0) 4.289123265s ago: executing program 3 (id=3814): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x6, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)=r0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], 0x0, 0x800e0, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf1, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)=@o_path={&(0x7f00000006c0)='./file0\x00', 0x0, 0x4000, r0}, 0x18) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x7}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)=@generic={&(0x7f0000000780)='./file0\x00', 0x0, 0x4}, 0x18) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0xe, 0x4, 0x7, 0xffffffff, 0x458c2, 0xffffffffffffffff, 0xfffffff8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x1, 0x0, @void, @value, @void, @value}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0e000000040000000400000009"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0xc, &(0x7f00000009c0)=ANY=[@ANYBLOB="15000000000900000000000000ffffff85100000fcffffff18430000050000000000000000080000c59950000400000018120000a8163da27053ba8d2d07eaa4305c2b530977bc671549926c49ef332c97ea82bae7ac2e602c9e74f7a71725711915a1a20fadd3e296def930c7106a84444dbcf7efec34cfdc7bda9871cb4a1857175e5f10fa0f6bd594ec1dfe63dfdb44ab60f15b", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0xa4, &(0x7f0000000240)=""/164, 0x40f00, 0x1, '\x00', r2, 0x18, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x2, 0xd, 0x0, 0xfffffffc}, 0x10, 0x1c7e5, r0, 0x4, &(0x7f0000000880)=[r4, r5, r6, 0x1, r7, r8, r9], &(0x7f00000008c0)=[{0x7, 0x2, 0x3, 0xa}, {0x4, 0x2, 0x1, 0x8}, {0x5, 0x1, 0x6, 0xa}, {0x4, 0x3, 0x4}], 0x10, 0xfffffffe, @void, @value}, 0x94) 4.230476296s ago: executing program 3 (id=3815): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB, @ANYRES16=0x0, @ANYRES32, @ANYRESOCT=r1], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unlink(&(0x7f0000000200)='./cgroup\x00') r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000fcff000000000000000000850000002200000085000000070000009500000000000000e3b791f4a4a3972200e1d2acd44498f2cfbf4ae21867953463a9211404aa0e942d2460473901162b5db03303d2731c0e8ff5f76396f3a69ef52a00e8ae396de506de923c26c5bc87e3461c93cca3b186787c11d06d49d19896534d476fb6550cd031867572ce45503f6f46284b1ce64c582ae6c0e66319f800991ca2b186824cd560affec254ea32ac97873b303fdaa7cdbd52b2f1"], &(0x7f0000000080)='GPL\x00', 0x4, 0xcb, &(0x7f0000000340)=""/203, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002440)={{}, &(0x7f00000023c0), &(0x7f0000002400)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000140)='mlxsw_sp_acl_tcam_vregion_rehash_rollback_failed\x00', 0xffffffffffffffff, 0x0, 0x31}, 0x18) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000c80)=ANY=[@ANYRES8=r2], &(0x7f0000000200)=""/263, 0x26, 0xffffffffffffff1d, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000005000000fd0900008400000000000000", @ANYRES32, @ANYBLOB="feffffff0000000000f500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r4}, 0x38) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000400)='sched_switch\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xd56}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r4}, 0x38) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x7ff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 4.230194695s ago: executing program 4 (id=3268): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000195"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000fe27008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES8=r1, @ANYBLOB="0000000000000000b705000008000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x38, 0xfffffffffffffffe}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_type(r8, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000c40), 0x12) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) r10 = gettid() syz_open_procfs$namespace(r10, &(0x7f0000000080)='ns/net\x00') sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 2.143128518s ago: executing program 2 (id=3818): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d080", 0x2}], 0x1}, 0x20000801) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1f, 0x4, 0x0, &(0x7f0000000180)='GPL\x00', 0x2, 0xc6, &(0x7f0000000300)=""/198, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0xb, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x10, &(0x7f0000000b80)=ANY=[@ANYBLOB="18110000", @ANYRES32, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="000000000000000018120000", @ANYRES32=r5], &(0x7f0000000400)='syzkaller\x00', 0x1, 0xc8, &(0x7f0000000880)=""/200, 0x40f00, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x5, 0x7, 0x1, 0x400}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000800)=[{0x3, 0x3, 0x7, 0xc}, {0x1, 0x4, 0x10, 0x9}], 0x10, 0xd, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x8, 0x2000, 0xffffffffffffffff, 0x80000001, '\x00', r4, 0xffffffffffffffff, 0x1, 0x2, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r5}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0xf, &(0x7f0000000580)=@framed={{}, [@exit, @call={0x85, 0x0, 0x0, 0xc}, @alu={0x4, 0x1, 0xb, 0x3, 0x7, 0x80, 0x1}, @map_fd, @map_idx, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}]}, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x25, r2, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000940), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.142730897s ago: executing program 3 (id=3819): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06000000040000000300000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='net_prio.prioidx\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b0000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0, r6}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7f}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x2000141a) ioctl$TUNSETOFFLOAD(r7, 0x40047459, 0x2000000c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='mmap_lock_acquire_returned\x00', r8}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000000340020003400000002000000000000000000000d03000000000000000000000105002000800000000000000000000003000000000200000002"], &(0x7f0000000340)=""/142, 0x4e, 0xfeaf, 0x1, 0x0, 0x0, @void, @value}, 0x20) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 2.043533948s ago: executing program 0 (id=3820): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001280)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000008000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x2, 0x5, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@typedef={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x7f]}}, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r6, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000280)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0xe9, &(0x7f0000000380)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x8e, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="03000000040000000400001052000000723958d5", @ANYRES32=r7, @ANYBLOB='\x00'/20, @ANYRES32=r8, @ANYRES32, @ANYBLOB="050000000500"/28], 0x50) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000004c0)={0x8, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x18, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="1832890bc3a600"/16], &(0x7f0000000180)='GPL\x00', 0xffff, 0x6, &(0x7f0000000200)=""/6, 0x41000, 0x8, '\x00', r8, @fallback=0x5, r9, 0x8, &(0x7f00000003c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xb, 0x7, 0x2}, 0x10, r10, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[r0, 0x1], 0x0, 0x10, 0x3, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r3) 1.928792409s ago: executing program 3 (id=3822): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x22020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x7, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000040)=0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x22020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x7, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) (async) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) (async) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r3}, 0x10) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000040)=0x1) (async) 1.916213099s ago: executing program 0 (id=3823): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r6}, 0x8) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x4) 1.854142529s ago: executing program 1 (id=3824): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x4, 0x4, 0x1, 0x8e, 0x0, 0x5, 0x4400, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x8b2c}, 0x101, 0x5, 0x7, 0x6, 0xc4, 0x7, 0x0, 0x0, 0xb8, 0x0, 0x4}, 0x0, 0x9, 0xffffffffffffffff, 0x9) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x1e, &(0x7f0000000300)=@raw=[@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2d}}, @printk={@lx}, @map_fd={0x18, 0x2}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x44b5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000000)='GPL\x00', 0x3, 0x2a, &(0x7f0000000180)=""/42, 0x41000, 0x42, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x0, 0x81, 0x5}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000f80)=r4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0), 0x10, 0x0, r4, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_devices(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e030600f7ff980128846360864666702c1ffe80"], 0xffdd) 1.813234699s ago: executing program 3 (id=3825): mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000b1edde3e", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) 1.7998047s ago: executing program 0 (id=3826): r0 = gettid() r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0xf8, 0xa, 0x0, 0x7, 0x0, 0x0, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x4000, 0x8, 0x4, 0x0, 0x8, 0x9, 0x3, 0x0, 0x5, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x22, 0x0, 0x2, 0x5, 0x0, 0xd50, 0x6a000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xd0, 0x2, @perf_config_ext={0x4, 0x3}, 0x6450, 0xd49, 0xffff, 0x1, 0xa9a0, 0x69, 0x5, 0x0, 0xfff, 0x0, 0x3}, r0, 0xa, r1, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000001c0)={0x0, 0x80, 0xc3, 0x1, 0x3d, 0x1c, 0x0, 0x6, 0x48010, 0x12, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x8006, 0x2, 0xe1, 0x4, 0x744c4ae4, 0x160000, 0x3ff2, 0x0, 0xffffffff, 0x0, 0xd}) r5 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x67, 0x3, 0xd, 0x9, 0x0, 0x10000, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xd, 0x2, @perf_config_ext={0x6, 0x2}, 0x100000, 0x6, 0xfffffff7, 0x8, 0x3, 0x7, 0x101, 0x0, 0xfffff928, 0x0, 0x9}, 0x0, 0xa, r1, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f00000002c0)=0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r3, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0], 0x0, 0xba, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xc7, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', r6, 0xffffffffffffffff, 0x1, 0x2, 0x5, 0x0, @void, @value, @void, @value}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000700)='syz1\x00', 0x1ff) r10 = openat$cgroup_ro(r8, &(0x7f0000000740)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000780)=0xfffffffffffffffa, 0x12) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000007c0)={'vxcan1\x00', 0x1000}) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000840)={0x1, 0x80, 0x1, 0xe, 0x4, 0xa5, 0x0, 0x8000, 0x29904, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1e9b80, 0x4, @perf_bp={&(0x7f0000000800), 0x4}, 0x8000, 0x7, 0x1, 0x9, 0x2, 0xde, 0x5, 0x0, 0xfffffff9, 0x0, 0x100000000}, r11, 0x9, r1, 0xb) sendmsg$tipc(r10, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000900)="45906c9b56ec1fa5b22567be9ad8b49f3aca52d3287cb8e9e6c2d2c12f191f12e5c762", 0x23}, {&(0x7f0000000940)="7252f43b9ca327cb315e86461b1b66892f26b9d61abadc60d5825a07a7d9f985de13ad889d7c93d5d06982410b5bbf874f9bc59a39508361aba51d0f5686a9ffc4b90dcad276673699389566458a201375f37ff56f435306831f8fbf0daf877af62be074886d00ea6751c278df90a4074e25497b50fe626b614875e9e96b3a80b4f934864405696076", 0x89}, {&(0x7f0000000a00)="2f89a60162ff2e981186d29db6fc672f217b9cd153c1ace9c3fc439af2b2b14e575f6835050b6b20d0daaceea8e0d6b363077feab54a5b98db706be5d72e4d2dc5c5932a50448a0698a38fb1ff706c946182d1371681f0c1b76ca0f27fa4936a9051aedeb3b8fdee186629aa6d7646895bd290bcfb5bada929f93c26c9ddcd150c9da66f80e5b8668f6d8fe204db16b10e2f04e50242a14ee3ffedee6cd452d8d85de4dba25d4a3d94d1226c2ec8cc2ce39a3f8a8e824648d8c6a871721fac02f54c3a3cb5569ee17a7376a4c9ec937a668ad7e0", 0xd4}, {&(0x7f0000000b00)="e6f4851d9ac3ec2f2110b715a3b7bc95d4", 0x11}, {&(0x7f0000000b40)="4fe49e9312cd5d7015b00856c59e3cd74a45c6c3a4cae001e844b6927176abacbb770f776729ed92f1e1ccfbe1f7e23ec5d475819bad7cf7a7178c66507e4f68a1421dc729420de965783e85718fe67d0a412fe1890804872b4498cd1d5947", 0x5f}, {&(0x7f0000000bc0)="a76c07a288640ffd9914456e3c3905ea663c908d94", 0x15}], 0x6, 0x0, 0x0, 0x81}, 0x80) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000cc0)={'erspan0\x00', 0x1000}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001000)={r10, 0x0, 0xc6, 0xd9, &(0x7f0000000d00)="f54294c826faaa37970511b164be732f4903815482b1fb2fa9d70c68921eff0c16f7747545180908dfc88457e60ece0cd5ac8fa9913a84a23fa7034f32ae96cc14070715842ca1d1e5f21d1ef4d6fb0a3df3b6654532504f7930b967e09f6d8de5c0b076a38f15219d82f062d61a2a74dfc5a2518165e8dde145f40d75bdf1490108e560c16b254ae8c2e464348e4b35f6edd2f801efbe7f3ad0f30496a7b9e615378ac2bad66ff252de53b618caf542843c24791f1223c2a8705bf67b9c90488ac60e2c3125", &(0x7f0000000e00)=""/217, 0xad6, 0x0, 0x67, 0x6d, &(0x7f0000000f00)="5780a8764ddee43c8ae5868c73d8caad56444808f00a49a56b8c74c30edc5242c167f909d4ef3430f913374a176463088f15ea62b63b130ef24ca052a2fe0bc3848add674b2916a9a51cf40f210efdbc7e429a1824da174d52f2eef18fc91252211e6f12462ea8", &(0x7f0000000f80)="f2ab757c5692470f20a814844383190140de9ab21649a864672c8fbf52c66ff6cd34e0e5df5001a2da0473bba8f88693c439ad177343f7be7b55bd9310a19c65cb6665b0951b4032fcd95e82aa318787dc48c92a5db5f747b6f142e5acaf1386444660d9aeaa67ccbd931dcf1f", 0x4, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r10, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)=r10}, 0x20) r13 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001540)={0x6, 0x16, &(0x7f0000001380)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @jmp={0x5, 0x1, 0x2, 0x8, 0xa, 0x14, 0x10}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @generic={0x80, 0xf, 0x0, 0x4, 0x6}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x6}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @map_fd={0x18, 0x0, 0x1, 0x0, r10}], &(0x7f0000001440)='syzkaller\x00', 0x678f, 0x0, 0x0, 0x41000, 0xc, '\x00', r6, 0x25, r10, 0x8, &(0x7f0000001480)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000014c0)={0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001500)=[r10], 0x0, 0x10, 0x2, @void, @value}, 0x94) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001600)={0xffffffffffffffff, 0x9}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001700)={0x17, 0x16, &(0x7f0000001140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x34e2, 0x0, 0x0, 0x0, 0x101}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r12}}, @exit, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x9, 0x2, 0x0, r8, 0x0, 0x0, 0x0, 0x1ff}]}, &(0x7f0000001200)='GPL\x00', 0x5e, 0xd5, &(0x7f0000001240)=""/213, 0x41100, 0x10, '\x00', r6, @cgroup_sysctl, 0xffffffffffffffff, 0x8, &(0x7f0000001340)={0x9, 0x2}, 0x8, 0x10, 0x0, 0x0, r7, r13, 0x5, &(0x7f0000001640)=[r10, r14, r10, r8, r10, 0xffffffffffffffff, r8, r9], &(0x7f0000001680)=[{0x0, 0x5, 0x5, 0x9}, {0x4, 0x3, 0x5, 0xb}, {0x3, 0x3, 0x5, 0x7}, {0x5, 0x5, 0xc, 0xb}, {0x0, 0x1, 0xd, 0x5}], 0x10, 0xee, @void, @value}, 0x94) write$cgroup_subtree(r10, &(0x7f00000017c0)={[{0x2d, 'rdma'}, {0x2b, 'io'}, {0x2d, 'hugetlb'}, {0x2b, 'cpu'}, {0x2d, 'net_cls'}, {0x2b, 'rlimit'}]}, 0x29) perf_event_open(&(0x7f0000001800)={0x1, 0x80, 0x1a, 0x6, 0x0, 0x4, 0x0, 0x7, 0x50000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x80000000, 0x401}, 0x240, 0x1000, 0x100, 0x2, 0x0, 0x3, 0xa, 0x0, 0xbc20, 0x0, 0xb}, r0, 0xffffffffffffffff, r2, 0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000001880), 0x400, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001900)=@o_path={&(0x7f00000018c0)='./file0\x00', r8, 0x4000, r4}, 0x18) socketpair(0xa, 0x1, 0x3, &(0x7f0000001940)) 1.75595356s ago: executing program 3 (id=3827): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000070000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff22, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x80409, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0xfffffffffffffffd}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xc, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) 1.64359433s ago: executing program 0 (id=3828): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) write$cgroup_int(r3, &(0x7f00000001c0)=0x8200000000000000, 0xfffffdef) 1.570344291s ago: executing program 1 (id=3829): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x40000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xaf) gettid() perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="850000002e000000350000000000ba008500000008000000950000000000000064f1c09faf5d68082295e8a8e206f8a1572b41a141d524581835d80532cb457f454698162ffba66e5fc6dd8442230e35230163cf094949fc8b0a9114f43d1b6538f5976be4adc07e8c97d76b1895c322a1ef1f83dd6c1023158a1086f7d0f9dce435554bc34e6bdea4217cfaa9a1f8ad1087c697acd9a7ab696922c9e35f0aee6156c599c7b297de0019b27d67bfb3fe241454a04080bf7f8ce021879c820f9b80fe04be5b11cc7bf16c8a029df573db051357c71be1f5e8ce8db0f96ee1d8a312e9671e652bd6f32c7a458f129a8d8bc9a5d905441c0785d333135a04001bb4cd5b295b9add7a0247cada056be3a9e29f9d4b57ddd4130ccbbbcd6e000000000000004102d74c391acc0880312cc8a8c51c7bddd3698f620a69f46984c2a2e742fadecf0e18c91f1715450ff0e09b7e52fd66a7c81b7e62ca8c3572c3dc46dc7579c100010000000000001af7d2149c8ab5ef187087f74b65a6c7da154852894437ffcb5cc3a2b13759c42b350b09a639a8f257d81204e7e61b7f7230db061fabbdc611df1129695265a3426e02f9b24ebc243a8b7ab50e4279be8594af30231a567d1f0ac5297daa6e9e82eb90c602adffc6a3de64b1db82ac547a6a4b78a323aebbf4917450e54b989c6065aeafe708ed91d86ee0aebd842815a9bad226f1eda090456f50863060f074c046f3123688aa8c9fb82752e4aacbf6ab830391cdb628b5f371ce3b1431b2726cbd8b933f3ce2d452d46d563b254fc3bef447d869a8cc49e160581b4a23e881264d498b4b6e7c2f9bc962da260e699aa50d2da32c555047ca"], &(0x7f0000001040)='GPL\x00', 0x0, 0x6b, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d}, 0x28) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) 1.361010022s ago: executing program 1 (id=3830): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000c00000009"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000200000000000001811000093500d38687c95c0ae8438419a92575c7c96cf08020e85c33d08884aae7a03e842e644b51b1e9dd764c38fa98cc62db3ac7bc043d2fa5f32fbe7e7d2f6031f889a4da48b654d81146056212743fc78a0c32ca38874fba4ebf16a3970b66da29f50dace1687b1527a2cc2d1ec85ed53e34679362e4383979ca8824ed1189725929ee2bb748a04a5af404697cffb21fb7aec72da84431210a2f6576a", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r0}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.169448823s ago: executing program 2 (id=3831): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r1, &(0x7f0000000340)="5ef71cb381a0f74eec2eb7caca06876c6a72a3020b1e6721f11c85192197bb9281f822f788cb33601d6b4d556a54d5a5e951c9f39d530060cdcb65f270fa864ac45bddeaf5", &(0x7f0000000580)=""/162}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="346ab2c012208ee8c664184a71"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth0_to_hsr\x00', 0x2}) 925.065415ms ago: executing program 1 (id=3832): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="cfe5c1911e4a00b100"/25], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={0xffffffffffffffff, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000600)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xea, &(0x7f00000006c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x62, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_lsm={0x1d, 0x12, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0xc}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@exit, @exit, @generic={0xb, 0x2, 0x7, 0x2, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000500)='syzkaller\x00', 0xfffffffd, 0x1a, &(0x7f0000000540)=""/26, 0x41100, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x3, 0x1, 0x8, 0x1000}, 0x10, r1, 0x0, 0x6, &(0x7f0000000980)=[r0, r0, r0, r0, r0], &(0x7f00000009c0)=[{0x2, 0x4, 0x3, 0x6}, {0x3, 0x2, 0x1, 0x1}, {0x1, 0x4, 0x6}, {0x3, 0x4, 0x4, 0x9}, {0x3, 0x5, 0xc, 0x2}, {0x3, 0x4, 0x5, 0x7}], 0x10, 0x7ff, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%-010d \x00'}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum={0x0, 0x0, 0x0, 0x10}, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4, [{0x20000000, 0x2, 0xfffffffc}]}]}}, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r2, @ANYBLOB="7f6cc8fa9900"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000040000000100"/28], 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x3, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x5, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r3, &(0x7f0000000140), &(0x7f0000000000)=""/48}, 0x20) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r4, 0x0) close(r4) socketpair(0x2c, 0x5, 0x8, &(0x7f0000000b00)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000040)={{0x1}, &(0x7f0000000000), 0xfffffffffffffffc}, 0x20) 870.803065ms ago: executing program 1 (id=3833): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x3, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) (async) syz_open_procfs$namespace(0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)='%pB \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r1}, 0x4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 717.709316ms ago: executing program 1 (id=3834): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000540)=ANY=[], 0xfdef) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0xd3, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r4}, &(0x7f0000001d80), &(0x7f0000001d40)=r3}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000005c0)={r4, &(0x7f0000000440)="7e97000e53f8f675d165337e33ba", &(0x7f0000000500)=""/186}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r7, r8, 0x5, 0x0, 0x0, @void, @value}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r7}, &(0x7f00000006c0), &(0x7f0000000700)=r6}, 0x20) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x2d, 'net'}, {0x2d, 'net_cls'}]}, 0xe) sendmsg$inet(r5, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0xb, 0x42, 0x40, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340)="f25f4af207f45c9f0a0073a2e133585d0b05aba757e60a25f1f968f80190937c00b46c4add7a033184592a589ca69235ea3f3ad66788b3f648b647b2274b80e4bdbb7bd3cfa8252c57e977b4e97d90de66a52818a326e3e2", &(0x7f0000001080), 0x20101, r9}, 0x38) syz_clone(0x20000400, &(0x7f0000000780)="64b1407e12d57442bce47fbae1e9cbc31f1d27e653a5d1a91aab6bb775d83f2d78a9bf910f584dcc71c6a49c08e808acaedab477cfee210c43ad82f92401e6f8aa7b3590b66459c95ea1a35060b0dcc347c881c316a4cb0bd3721357ebc9869d4d95d8312e1c2708a690988776a6716a8078c17e14aaff2ef891a23c29df4f0b10ea1267", 0x84, &(0x7f00000002c0), &(0x7f00000004c0), &(0x7f0000000840)="e8a28d01f5c0c2bb577e93425991be5d55dd75971d2dd98ff47d2bd839e379318b471a1a97b6bc92261ca31dc54183e98f4c11c73b3c337dddd4edcb0f6acae886a6ef256d065c3e8c9aab21c0e134e32eca9c8df69637cf69ffbba5f94f039d7d2684f7ded7654b6f36a554e7e906772745676c377d8f302812361be6") bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r9, &(0x7f00000004c0)}, 0x20) socketpair(0x1a, 0x2, 0x3, 0x0) 713.337816ms ago: executing program 0 (id=3835): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="00000000000000400000000000000000000000c09620661600c3f93a79fcd977aee2767d1590bc45e8324c394b1c2f9958066c7ff76c4ace38accec4b0a51f0fa0439a2f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000400"/20, @ANYRES32, @ANYBLOB="ff7f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r4, 0x0, 0x73, 0xa4, &(0x7f0000000680)="be867c8bf621c8f6430f2edb26d63689328fc80849a3f50af93ba6ac893080afec961e203c2ba2cc38b394487680a06ca50582bcfdb3c456a1c79cda14a7173e1bf322682bd2d200a0f6cb42ab63045e6f8232bc07a8712bcdf9a9395edbebf4116fb0e76cf85cc79c48cc6f323006d5f7afe0", &(0x7f0000000700)=""/164, 0x1, 0x0, 0x9c, 0xae, &(0x7f00000007c0)="525b509178175f1e8ddae7399ed9a46ba48ecbcab02264979172f2fa3b397dc0e2fb3c21eb2fcb9368b139ce445cec5784dafa8ee1aa6c86f213c333573cc61429ccd9694bfeab7c2ccb355d689e4d7ac7571349d2718e611a9e6473044996560a17f9da02190c5d54f3e6465d52a439b50aa1f6fcd727c687e644b98919a149873b377a89dd2c9dda78baafe6ec50be01fe9bb3275ac587d9d99583", &(0x7f0000000880)="6bd4d52008f4be097b70e814d3ac7322ea3d323b687ba1159511aa0baa9f0e6bdf8e5b82c0b8eabb056e78e96be72a91b77d97c5c4f05c73c5296900167720a431dc42620ecbe225fa969e98ac00c298b0f0ea81348955a6117c2ee2b8a0ba40b2f30f01448bbcb53783e9d18b466ecc916888bc86ecdc316862fa47954fa7e1f90ea21c99347904d9b68f6aa5e9d3abd60025b29e75acef7c6978fa217215f8a7065c2bc2e6a64745e3e5bf9798", 0x7}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40000000) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000280)={0x8}, 0x8) write$cgroup_subtree(r7, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r8}, 0xc) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xff, '\x00', 0x0, r7, 0x2, 0x1, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001b80)={&(0x7f0000000b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x8, [@enum64={0x1, 0x5, 0x0, 0x13, 0x0, 0xf, [{0x1, 0x200, 0x9}, {0xf, 0xce66, 0x8}, {0x2, 0xb9}, {0xb, 0xfc, 0xffffffff}, {0xf72, 0x2, 0xf7b}]}]}, {0x0, [0x2e, 0x61, 0x5f, 0x61, 0x61, 0x2e]}}, &(0x7f0000000b80)=""/4096, 0x68, 0x1000, 0x1, 0x2, 0x10000, @value=r7}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001bc0)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0xac06, '\x00', 0x0, r9, 0x1, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50) 590.568626ms ago: executing program 0 (id=3836): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r2}, 0x38) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000002380)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x400, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r2, &(0x7f0000000280)='v', &(0x7f0000000300)=""/76}, 0x20) 311.080678ms ago: executing program 2 (id=3837): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'caif0\x00', 0x2}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r3, &(0x7f0000000080), 0x9) r5 = ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$TUNSETTXFILTER(r5, 0xb701, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r8}, 0x10) r10 = openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x2, 0x43, 0xd, 0xb7, 0x0, 0x8, 0x88000, 0x6, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x5}, 0x0, 0xfc, 0x0, 0x9, 0x5, 0x628, 0x4, 0x0, 0x1, 0x0, 0x100000000}, r10, 0x1, r9, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 113.37605ms ago: executing program 2 (id=3838): mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000b1edde3e", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) 10.05582ms ago: executing program 4 (id=3268): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000195"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000fe27008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES8=r1, @ANYBLOB="0000000000000000b705000008000000850000007300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x38, 0xfffffffffffffffe}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_type(r8, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000c40), 0x12) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) r10 = gettid() syz_open_procfs$namespace(r10, &(0x7f0000000080)='ns/net\x00') sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 0s ago: executing program 2 (id=3839): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0x3) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000080000000000000002451000000000000000000"], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x1f2f, 0x241, 0x3253, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYRESOCT=r3], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r6}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) kernel console output (not intermixed with test programs): 305] device pim6reg1 entered promiscuous mode [ 278.186501][ T7528] bond_slave_1: mtu less than device minimum [ 280.020331][ T7567] device veth0_vlan left promiscuous mode [ 280.059964][ T7567] device veth0_vlan entered promiscuous mode [ 280.153960][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.162319][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 280.170135][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.341269][ T7576] bond_slave_1: mtu less than device minimum [ 280.347336][ T7575] bond_slave_1: mtu less than device minimum [ 281.897838][ T7611] device pim6reg1 entered promiscuous mode [ 283.511184][ T7635] syz.2.2122 (7635) used greatest stack depth: 20000 bytes left [ 285.322814][ T7683] device pim6reg1 entered promiscuous mode [ 285.610889][ T7707] device pim6reg1 entered promiscuous mode [ 286.374329][ T7738] device syzkaller0 entered promiscuous mode [ 288.325261][ T7796] tap0: tun_chr_ioctl cmd 1074025677 [ 288.332554][ T7796] tap0: linktype set to 512 [ 288.372054][ T7799] device syzkaller0 entered promiscuous mode [ 288.780796][ T7814] device syzkaller0 entered promiscuous mode [ 288.809660][ T7815] device sit0 left promiscuous mode [ 288.961111][ T7828] -: renamed from syzkaller0 [ 289.233323][ T7838] device syzkaller0 entered promiscuous mode [ 291.269971][ T7890] -: renamed from syzkaller0 [ 291.322232][ T7894] syz.0.2211[7894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.322309][ T7894] syz.0.2211[7894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.348274][ T7894] device pim6reg1 entered promiscuous mode [ 291.889010][ T7910] device pim6reg1 entered promiscuous mode [ 292.322400][ T7931] -: renamed from syzkaller0 [ 293.721972][ T7980] device sit0 left promiscuous mode [ 293.911190][ T7980] device sit0 entered promiscuous mode [ 294.317114][ T7995] device wg2 left promiscuous mode [ 294.573334][ T8009] device sit0 left promiscuous mode [ 295.105508][ T30] audit: type=1400 audit(1732148679.857:168): avc: denied { create } for pid=8018 comm="syz.3.2243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 295.765689][ T8039] device sit0 entered promiscuous mode [ 297.213491][ T8104] device sit0 entered promiscuous mode [ 297.602778][ T8128] device pim6reg1 entered promiscuous mode [ 298.806713][ T8178] ªªªªªª: renamed from vlan0 [ 300.084952][ T8208] device pim6reg1 entered promiscuous mode [ 300.244943][ T8221] syz.2.2304[8221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.245028][ T8221] syz.2.2304[8221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.256746][ T8220] syz.2.2304[8220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.272584][ T8222] syz.2.2304[8222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.454882][ T8232] device syzkaller0 entered promiscuous mode [ 300.793359][ T8259] device syzkaller0 entered promiscuous mode [ 302.853994][ T8328] device sit0 left promiscuous mode [ 303.873352][ T8349] device pim6reg1 entered promiscuous mode [ 303.948628][ T30] audit: type=1400 audit(1732148688.707:169): avc: denied { attach_queue } for pid=8348 comm="syz.0.2340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 304.289114][ T8363] veth1_macvtap: mtu greater than device maximum [ 308.241527][ T8435] device pim6reg1 entered promiscuous mode [ 311.405423][ T8542] device veth0_vlan left promiscuous mode [ 311.449234][ T8542] device veth0_vlan entered promiscuous mode [ 311.546362][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.584715][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 312.905815][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.616686][ T8586] device sit0 entered promiscuous mode [ 315.094941][ T8607] device veth0_vlan left promiscuous mode [ 315.164327][ T8607] device veth0_vlan entered promiscuous mode [ 315.384244][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.402588][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.456296][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 315.992116][ T8644] syz.1.2431[8644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.992195][ T8644] syz.1.2431[8644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.015403][ T8640] device sit0 entered promiscuous mode [ 316.418624][ T8652] device wg2 entered promiscuous mode [ 316.486762][ T8651] device wg2 left promiscuous mode [ 317.812453][ T8686] syz.4.2443[8686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.812530][ T8686] syz.4.2443[8686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.018442][ T8686] device veth1_macvtap left promiscuous mode [ 318.787565][ T8700] device veth0_vlan left promiscuous mode [ 318.794058][ T8700] device veth0_vlan entered promiscuous mode [ 319.296672][ T8716] FAULT_INJECTION: forcing a failure. [ 319.296672][ T8716] name failslab, interval 1, probability 0, space 0, times 1 [ 319.399523][ T8716] CPU: 1 PID: 8716 Comm: syz.2.2452 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 319.410644][ T8716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 319.420548][ T8716] Call Trace: [ 319.423675][ T8716] [ 319.426444][ T8716] dump_stack_lvl+0x151/0x1c0 [ 319.430957][ T8716] ? io_uring_drop_tctx_refs+0x190/0x190 [ 319.436428][ T8716] dump_stack+0x15/0x20 [ 319.440414][ T8716] should_fail+0x3c6/0x510 [ 319.444667][ T8716] __should_failslab+0xa4/0xe0 [ 319.449263][ T8716] should_failslab+0x9/0x20 [ 319.453605][ T8716] slab_pre_alloc_hook+0x37/0xd0 [ 319.458379][ T8716] __kmalloc+0x6d/0x270 [ 319.462368][ T8716] ? kvmalloc_node+0x1f0/0x4d0 [ 319.466972][ T8716] kvmalloc_node+0x1f0/0x4d0 [ 319.471399][ T8716] ? vm_mmap+0xb0/0xb0 [ 319.475328][ T8716] vmemdup_user+0x26/0xe0 [ 319.479469][ T8716] map_get_next_key+0x21c/0x4e0 [ 319.484155][ T8716] __sys_bpf+0x389/0x760 [ 319.488237][ T8716] ? bpf_ringbuf_output+0x19a/0x1f0 [ 319.493270][ T8716] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 319.498485][ T8716] __x64_sys_bpf+0x7c/0x90 [ 319.502730][ T8716] x64_sys_call+0x87f/0x9a0 [ 319.507069][ T8716] do_syscall_64+0x3b/0xb0 [ 319.511317][ T8716] ? clear_bhb_loop+0x35/0x90 [ 319.515841][ T8716] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 319.521563][ T8716] RIP: 0033:0x7fbd8807e819 [ 319.525814][ T8716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 319.545258][ T8716] RSP: 002b:00007fbd866f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 319.553501][ T8716] RAX: ffffffffffffffda RBX: 00007fbd88235fa0 RCX: 00007fbd8807e819 [ 319.561310][ T8716] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000004 [ 319.569123][ T8716] RBP: 00007fbd866f7090 R08: 0000000000000000 R09: 0000000000000000 [ 319.576935][ T8716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.584744][ T8716] R13: 0000000000000000 R14: 00007fbd88235fa0 R15: 00007ffc105a8388 [ 319.592565][ T8716] [ 319.963883][ T8738] device syzkaller0 entered promiscuous mode [ 320.431259][ T8761] FAULT_INJECTION: forcing a failure. [ 320.431259][ T8761] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 320.463814][ T8761] CPU: 1 PID: 8761 Comm: syz.4.2466 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 320.474943][ T8761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 320.484838][ T8761] Call Trace: [ 320.487961][ T8761] [ 320.490737][ T8761] dump_stack_lvl+0x151/0x1c0 [ 320.495254][ T8761] ? io_uring_drop_tctx_refs+0x190/0x190 [ 320.500715][ T8761] ? __kmalloc+0x13a/0x270 [ 320.504967][ T8761] ? kvmalloc_node+0x1f0/0x4d0 [ 320.509568][ T8761] dump_stack+0x15/0x20 [ 320.513557][ T8761] should_fail+0x3c6/0x510 [ 320.517812][ T8761] should_fail_usercopy+0x1a/0x20 [ 320.522672][ T8761] _copy_from_user+0x20/0xd0 [ 320.527098][ T8761] vmemdup_user+0x63/0xe0 [ 320.531267][ T8761] map_get_next_key+0x21c/0x4e0 [ 320.535952][ T8761] ? __sanitizer_cov_trace_switch+0xf/0xe0 [ 320.541593][ T8761] __sys_bpf+0x389/0x760 [ 320.545672][ T8761] ? fput_many+0x160/0x1b0 [ 320.549924][ T8761] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 320.555137][ T8761] ? debug_smp_processor_id+0x17/0x20 [ 320.560340][ T8761] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 320.566244][ T8761] __x64_sys_bpf+0x7c/0x90 [ 320.570499][ T8761] x64_sys_call+0x87f/0x9a0 [ 320.574839][ T8761] do_syscall_64+0x3b/0xb0 [ 320.579087][ T8761] ? clear_bhb_loop+0x35/0x90 [ 320.583603][ T8761] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 320.589328][ T8761] RIP: 0033:0x7fd17e8e7819 [ 320.593584][ T8761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.613023][ T8761] RSP: 002b:00007fd17cf60038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 320.621270][ T8761] RAX: ffffffffffffffda RBX: 00007fd17ea9efa0 RCX: 00007fd17e8e7819 [ 320.629080][ T8761] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000004 [ 320.636891][ T8761] RBP: 00007fd17cf60090 R08: 0000000000000000 R09: 0000000000000000 [ 320.644703][ T8761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.652515][ T8761] R13: 0000000000000000 R14: 00007fd17ea9efa0 R15: 00007ffd12d3fc28 [ 320.660333][ T8761] [ 320.744184][ T8771] device pim6reg1 entered promiscuous mode [ 320.951890][ T8786] device wg2 left promiscuous mode [ 320.999682][ T8786] device wg2 entered promiscuous mode [ 321.007604][ T8786] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 321.057199][ T8800] FAULT_INJECTION: forcing a failure. [ 321.057199][ T8800] name failslab, interval 1, probability 0, space 0, times 0 [ 321.104558][ T8800] CPU: 1 PID: 8800 Comm: syz.3.2479 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 321.115682][ T8800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 321.125581][ T8800] Call Trace: [ 321.128701][ T8800] [ 321.131480][ T8800] dump_stack_lvl+0x151/0x1c0 [ 321.135993][ T8800] ? io_uring_drop_tctx_refs+0x190/0x190 [ 321.141468][ T8800] dump_stack+0x15/0x20 [ 321.145457][ T8800] should_fail+0x3c6/0x510 [ 321.149708][ T8800] __should_failslab+0xa4/0xe0 [ 321.154311][ T8800] should_failslab+0x9/0x20 [ 321.158647][ T8800] slab_pre_alloc_hook+0x37/0xd0 [ 321.163421][ T8800] __kmalloc+0x6d/0x270 [ 321.167413][ T8800] ? kvmalloc_node+0x1f0/0x4d0 [ 321.172012][ T8800] kvmalloc_node+0x1f0/0x4d0 [ 321.176443][ T8800] ? vm_mmap+0xb0/0xb0 [ 321.180341][ T8800] ? __kasan_check_write+0x14/0x20 [ 321.185286][ T8800] ? _copy_from_user+0x96/0xd0 [ 321.189894][ T8800] map_get_next_key+0x295/0x4e0 [ 321.194587][ T8800] __sys_bpf+0x389/0x760 [ 321.198664][ T8800] ? fput_many+0x160/0x1b0 [ 321.202915][ T8800] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 321.208128][ T8800] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 321.214107][ T8800] __x64_sys_bpf+0x7c/0x90 [ 321.218367][ T8800] x64_sys_call+0x87f/0x9a0 [ 321.222698][ T8800] do_syscall_64+0x3b/0xb0 [ 321.226948][ T8800] ? clear_bhb_loop+0x35/0x90 [ 321.231552][ T8800] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 321.237276][ T8800] RIP: 0033:0x7fca271b7819 [ 321.241533][ T8800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 321.260972][ T8800] RSP: 002b:00007fca25830038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 321.269311][ T8800] RAX: ffffffffffffffda RBX: 00007fca2736efa0 RCX: 00007fca271b7819 [ 321.277113][ T8800] RDX: 0000000000000020 RSI: 00000000200001c0 RDI: 0000000000000004 [ 321.284925][ T8800] RBP: 00007fca25830090 R08: 0000000000000000 R09: 0000000000000000 [ 321.292739][ T8800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 321.300551][ T8800] R13: 0000000000000000 R14: 00007fca2736efa0 R15: 00007ffc7db0bbf8 [ 321.308370][ T8800] [ 321.603087][ T8852] syz.1.2493[8852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.603169][ T8852] syz.1.2493[8852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.626659][ T8848] device veth0_vlan left promiscuous mode [ 321.671679][ T8848] device veth0_vlan entered promiscuous mode [ 321.734409][ T8846] device veth0_vlan left promiscuous mode [ 321.793115][ T8846] device veth0_vlan entered promiscuous mode [ 324.189195][ T8923] device sit0 left promiscuous mode [ 324.468750][ T8926] device sit0 entered promiscuous mode [ 324.657944][ T8936] device pim6reg1 entered promiscuous mode [ 326.047547][ T8968] device veth0_vlan left promiscuous mode [ 326.090884][ T8968] device veth0_vlan entered promiscuous mode [ 327.708176][ T9020] device sit0 left promiscuous mode [ 327.739418][ T9020] device sit0 entered promiscuous mode [ 327.807932][ T9027] device pim6reg1 entered promiscuous mode [ 327.960370][ T9039] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 328.046463][ T9039] device syzkaller0 entered promiscuous mode [ 328.445430][ T9065] device pim6reg1 entered promiscuous mode [ 328.726260][ T9082] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.733517][ T9082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.741846][ T9082] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.748860][ T9082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.759851][ T9082] device bridge0 entered promiscuous mode [ 328.907634][ T9084] device pim6reg1 entered promiscuous mode [ 329.307529][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 330.007403][ T9108] device syzkaller0 entered promiscuous mode [ 330.429232][ T9127] device pim6reg1 entered promiscuous mode [ 330.501137][ T9129] device pim6reg1 entered promiscuous mode [ 331.256377][ T9159] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 331.267866][ T9159] device syzkaller0 entered promiscuous mode [ 332.561499][ T9224] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.990510][ T9234] device sit0 left promiscuous mode [ 333.024968][ T9236] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 333.090597][ T9236] device syzkaller0 entered promiscuous mode [ 333.431926][ T9274] device pim6reg1 entered promiscuous mode [ 334.303673][ T9311] device pim6reg1 entered promiscuous mode [ 336.353022][ T9416] device macsec0 left promiscuous mode [ 336.483549][ T9428] device pim6reg1 entered promiscuous mode [ 336.694293][ T9446] FAULT_INJECTION: forcing a failure. [ 336.694293][ T9446] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 336.709200][ T9446] CPU: 0 PID: 9446 Comm: syz.0.2662 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 336.720308][ T9446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 336.730204][ T9446] Call Trace: [ 336.733325][ T9446] [ 336.736104][ T9446] dump_stack_lvl+0x151/0x1c0 [ 336.740619][ T9446] ? io_uring_drop_tctx_refs+0x190/0x190 [ 336.746088][ T9446] ? ioctl_has_perm+0x3f5/0x560 [ 336.750775][ T9446] dump_stack+0x15/0x20 [ 336.754768][ T9446] should_fail+0x3c6/0x510 [ 336.759019][ T9446] should_fail_usercopy+0x1a/0x20 [ 336.763876][ T9446] _copy_from_user+0x20/0xd0 [ 336.768303][ T9446] __tun_chr_ioctl+0x26e/0x2290 [ 336.772995][ T9446] ? tun_flow_create+0x320/0x320 [ 336.777767][ T9446] ? __fget_files+0x31e/0x380 [ 336.782280][ T9446] tun_chr_ioctl+0x2a/0x40 [ 336.786530][ T9446] ? tun_chr_poll+0x6d0/0x6d0 [ 336.791046][ T9446] __se_sys_ioctl+0x114/0x190 [ 336.795556][ T9446] __x64_sys_ioctl+0x7b/0x90 [ 336.799982][ T9446] x64_sys_call+0x98/0x9a0 [ 336.804240][ T9446] do_syscall_64+0x3b/0xb0 [ 336.808489][ T9446] ? clear_bhb_loop+0x35/0x90 [ 336.812999][ T9446] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 336.818729][ T9446] RIP: 0033:0x7f30590fd819 [ 336.822985][ T9446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.842529][ T9446] RSP: 002b:00007f3057776038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 336.850772][ T9446] RAX: ffffffffffffffda RBX: 00007f30592b4fa0 RCX: 00007f30590fd819 [ 336.858587][ T9446] RDX: 00000000200007c0 RSI: 00000000400454ca RDI: 0000000000000003 [ 336.866397][ T9446] RBP: 00007f3057776090 R08: 0000000000000000 R09: 0000000000000000 [ 336.874209][ T9446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.882021][ T9446] R13: 0000000000000000 R14: 00007f30592b4fa0 R15: 00007ffdca4ca2b8 [ 336.889842][ T9446] [ 338.375677][ T9546] bridge0: port 3(veth0_to_batadv) entered blocking state [ 338.398908][ T9546] bridge0: port 3(veth0_to_batadv) entered disabled state [ 338.449754][ T9546] device veth0_to_batadv entered promiscuous mode [ 338.458081][ T9546] bridge0: port 3(veth0_to_batadv) entered blocking state [ 338.465129][ T9546] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 338.492981][ T9556] device veth0_to_batadv left promiscuous mode [ 338.527874][ T9556] bridge0: port 3(veth0_to_batadv) entered disabled state [ 339.313425][ T9597] device veth1_macvtap entered promiscuous mode [ 339.335062][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 339.716505][ T9599] device syzkaller0 entered promiscuous mode [ 339.771746][ T9611] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 342.403806][ T9658] device sit0 left promiscuous mode [ 342.433000][ T9658] device sit0 entered promiscuous mode [ 343.992038][ T9741] device sit0 entered promiscuous mode [ 344.696623][ T9773] device pim6reg1 entered promiscuous mode [ 345.019276][ T9788] device macsec0 left promiscuous mode [ 345.202333][ T9794] device syzkaller0 entered promiscuous mode [ 345.357827][ T9807] tap1: tun_chr_ioctl cmd 21731 [ 345.460856][ T9807] device syzkaller0 entered promiscuous mode [ 345.550029][ T9822] device veth0_vlan left promiscuous mode [ 345.555901][ T9822] device veth0_vlan entered promiscuous mode [ 345.583140][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 345.591521][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 345.599084][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.933088][ T9893] bond_slave_1: mtu less than device minimum [ 346.963770][ T9897] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.971787][ T9897] device bridge0 left promiscuous mode [ 346.990281][ T9897] device bridge_slave_1 left promiscuous mode [ 346.996341][ T9897] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.004000][ T9897] device bridge_slave_0 left promiscuous mode [ 347.013211][ T9897] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.706081][ T30] audit: type=1400 audit(1732148732.457:170): avc: denied { create } for pid=9954 comm="syz.1.2810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 348.062290][ T9959] device pim6reg1 entered promiscuous mode [ 348.447435][ T9979] device pim6reg1 entered promiscuous mode [ 348.560191][ T9983] syz.3.2817[9983] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.560276][ T9983] syz.3.2817[9983] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.627928][T10008] device syzkaller0 entered promiscuous mode [ 349.813789][T10007] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 350.571126][ T2118] syzkaller0: tun_net_xmit 48 [ 352.371863][T10106] device pim6reg1 entered promiscuous mode [ 352.770528][T10122] device syzkaller0 entered promiscuous mode [ 352.901472][T10125] device syzkaller0 entered promiscuous mode [ 353.262532][T10155] syz.0.2866[10155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.262611][T10155] syz.0.2866[10155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.491126][T10190] device sit0 left promiscuous mode [ 354.756447][T10204] device sit0 left promiscuous mode [ 354.966009][T10222] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 355.033260][T10222] device syzkaller0 entered promiscuous mode [ 355.509536][T10246] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.530804][T10246] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.551412][T10246] device bridge_slave_0 entered promiscuous mode [ 355.559843][T10246] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.566775][T10246] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.574242][T10246] device bridge_slave_1 entered promiscuous mode [ 355.652922][T10246] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.659896][T10246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.666982][T10246] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.673773][T10246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.705752][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.714791][ T5493] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.723253][ T5493] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.740007][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.748253][ T5493] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.755116][ T5493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.763009][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 355.772155][ T5493] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.779055][ T5493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.802776][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 355.810745][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.835107][T10246] device veth0_vlan entered promiscuous mode [ 355.848926][T10246] device veth1_macvtap entered promiscuous mode [ 355.856157][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 355.865153][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.873258][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 355.881940][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 355.889664][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 355.906478][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 355.915208][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 355.931315][ T30] audit: type=1400 audit(1732148740.687:171): avc: denied { mounton } for pid=10246 comm="syz-executor" path="/root/syzkaller.aQeBE5/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 355.959786][ T30] audit: type=1400 audit(1732148740.687:172): avc: denied { mount } for pid=10246 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 355.995813][ T30] audit: type=1400 audit(1732148740.717:173): avc: denied { mounton } for pid=10246 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 356.420523][ T8] device ip6gretap0 left promiscuous mode [ 356.454200][ T8] Ÿë: port 1(ip6gretap0) entered disabled state [ 356.694163][T10277] device syzkaller0 entered promiscuous mode [ 356.987498][T10286] device sit0 left promiscuous mode [ 357.053710][T10278] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.067782][T10278] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.080262][T10278] device bridge_slave_0 entered promiscuous mode [ 357.116080][T10278] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.134999][T10278] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.142772][T10278] device bridge_slave_1 entered promiscuous mode [ 357.161225][T10318] device veth0_vlan left promiscuous mode [ 357.177437][T10318] device veth0_vlan entered promiscuous mode [ 357.404962][T10331] syz.1.2913[10331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.405039][T10331] syz.1.2913[10331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.699347][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.719412][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.728383][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 357.735720][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 357.744878][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.753324][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.764956][ T5493] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.771840][ T5493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.779279][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.787380][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.795434][ T5493] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.802329][ T5493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.809496][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.988208][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 358.024690][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 358.033528][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 358.043184][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 358.051683][T10278] device veth0_vlan entered promiscuous mode [ 358.117734][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 358.159677][T10278] device veth1_macvtap entered promiscuous mode [ 358.194192][ T8] device veth1_macvtap left promiscuous mode [ 358.209682][ T8] device veth0_vlan left promiscuous mode [ 358.386627][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 358.394945][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 358.403563][T10381] device veth0_vlan left promiscuous mode [ 358.411485][T10381] device veth0_vlan entered promiscuous mode [ 358.418871][T10382] device pim6reg1 entered promiscuous mode [ 358.433646][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 358.447287][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 358.455249][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 359.054697][T10411] device pim6reg1 entered promiscuous mode [ 359.072610][T10417] device syzkaller0 entered promiscuous mode [ 359.351080][T10422] device pim6reg1 entered promiscuous mode [ 359.852972][ T8] device veth0_vlan left promiscuous mode [ 360.247282][T10449] device pim6reg1 entered promiscuous mode [ 360.622947][T10468] device veth0_vlan left promiscuous mode [ 360.630016][T10468] device veth0_vlan entered promiscuous mode [ 361.321508][T10475] device pim6reg1 entered promiscuous mode [ 361.368807][T10480] device syzkaller0 entered promiscuous mode [ 361.752568][T10501] device syzkaller0 entered promiscuous mode [ 361.869862][T10507] device veth0_vlan left promiscuous mode [ 361.921868][T10507] device veth0_vlan entered promiscuous mode [ 362.112807][T10508] device pim6reg1 entered promiscuous mode [ 362.457163][T10526] device pim6reg1 entered promiscuous mode [ 362.749776][T10532] device sit0 entered promiscuous mode [ 362.983363][T10539] bond_slave_1: mtu less than device minimum [ 364.615813][T10606] device veth1_macvtap left promiscuous mode [ 364.707441][T10606] device veth1_macvtap entered promiscuous mode [ 364.715029][T10606] device macsec0 entered promiscuous mode [ 365.056707][T10648] device pim6reg1 entered promiscuous mode [ 365.210004][T10651] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.216888][T10651] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.296613][T10651] device bridge_slave_0 entered promiscuous mode [ 365.366483][T10660] Â: renamed from pim6reg1 [ 365.392961][T10651] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.410538][T10651] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.426869][T10651] device bridge_slave_1 entered promiscuous mode [ 365.455530][T10664] device veth0_vlan left promiscuous mode [ 365.503305][T10664] device veth0_vlan entered promiscuous mode [ 366.024184][T10656] device pim6reg1 entered promiscuous mode [ 366.041853][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 366.049589][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 366.059264][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 366.067707][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 366.075766][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.082672][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.092370][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 366.115728][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 366.130632][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 366.158635][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.165518][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.203210][T10651] device veth0_vlan entered promiscuous mode [ 366.236242][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 366.248803][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 366.266692][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 366.274362][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 366.284132][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 366.297119][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 366.320292][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 366.349437][T10651] device veth1_macvtap entered promiscuous mode [ 366.395505][T10681] device pim6reg1 entered promiscuous mode [ 366.409127][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 366.440043][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 366.458163][T10694] device syzkaller0 entered promiscuous mode [ 366.495049][T10702] device veth0_vlan left promiscuous mode [ 366.510395][T10702] device veth0_vlan entered promiscuous mode [ 368.646786][T10810] device veth0_vlan left promiscuous mode [ 368.752464][T10810] device veth0_vlan entered promiscuous mode [ 369.546789][T10856] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.562710][T10856] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.570606][T10856] device bridge_slave_0 entered promiscuous mode [ 369.612823][T10856] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.632010][T10856] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.640243][T10856] device bridge_slave_1 entered promiscuous mode [ 369.939859][T10899] bridge0: port 3(veth0_to_batadv) entered blocking state [ 369.948764][T10899] bridge0: port 3(veth0_to_batadv) entered disabled state [ 369.980215][T10899] device veth0_to_batadv entered promiscuous mode [ 369.998569][T10899] bridge0: port 3(veth0_to_batadv) entered blocking state [ 370.005760][T10899] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 370.039913][T10902] device veth0_to_batadv left promiscuous mode [ 370.048024][T10902] bridge0: port 3(veth0_to_batadv) entered disabled state [ 370.395534][T10914] €Â0: renamed from pim6reg1 [ 370.498720][T10930] device pim6reg1 entered promiscuous mode [ 370.554399][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 370.565013][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 370.583393][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 370.591954][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 370.603850][ T1800] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.610727][ T1800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.618432][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 370.626562][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 370.634846][ T1800] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.641713][ T1800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.649131][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 370.681626][T10937] device syzkaller0 entered promiscuous mode [ 370.719708][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 370.727912][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 370.735943][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 370.750381][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 370.820564][T10949] device pim6reg1 entered promiscuous mode [ 370.837897][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 370.854890][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 370.910334][T10856] device veth0_vlan entered promiscuous mode [ 370.937114][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 370.949686][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 370.965362][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 370.981501][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 371.025066][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 371.043120][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 371.064127][T10856] device veth1_macvtap entered promiscuous mode [ 371.174780][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 371.190994][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 371.201822][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 371.240213][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 371.266735][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 371.620498][ T8] device veth0_vlan left promiscuous mode [ 371.840948][T11010] device veth0_vlan left promiscuous mode [ 371.860236][T11010] device veth0_vlan entered promiscuous mode [ 371.919629][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 371.948446][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 371.964569][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 372.285353][T11014] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.367589][T11014] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.374984][T11014] device bridge_slave_0 entered promiscuous mode [ 372.394703][T11014] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.407427][T11014] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.424915][T11014] device bridge_slave_1 entered promiscuous mode [ 372.659170][T11058] device pim6reg1 entered promiscuous mode [ 372.774418][T11066] device syzkaller0 entered promiscuous mode [ 372.797362][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 372.818062][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 372.871194][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 372.906247][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 372.931272][ T5493] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.938185][ T5493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.960890][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 372.991770][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 373.011001][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.038262][ T5493] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.045163][ T5493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.079833][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 373.089084][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 373.105939][T11014] device veth0_vlan entered promiscuous mode [ 373.113494][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 373.122084][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.130978][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.138837][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 373.170923][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 373.188752][T11014] device veth1_macvtap entered promiscuous mode [ 373.216639][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 373.270356][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 373.600970][T11089] device sit0 entered promiscuous mode [ 373.752522][T11095] device pim6reg1 entered promiscuous mode [ 373.759238][T11097] bond_slave_1: mtu less than device minimum [ 373.950464][T11132] device wg2 entered promiscuous mode [ 374.175175][T11147] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.185305][T11147] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.690511][T11241] bond_slave_1: mtu less than device minimum [ 377.671844][T11258] device pim6reg1 entered promiscuous mode [ 378.744825][T11328] device pim6reg1 entered promiscuous mode [ 379.861833][T11388] bridge0: port 3(veth0_to_batadv) entered blocking state [ 379.877826][T11388] bridge0: port 3(veth0_to_batadv) entered disabled state [ 379.954948][T11388] device veth0_to_batadv entered promiscuous mode [ 379.962577][T11388] bridge0: port 3(veth0_to_batadv) entered blocking state [ 379.969665][T11388] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 382.122453][ T30] audit: type=1400 audit(1732148766.877:174): avc: denied { create } for pid=11436 comm="syz.3.3217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 386.309975][T11550] device pim6reg1 entered promiscuous mode [ 386.488617][ T30] audit: type=1400 audit(1732148771.247:175): avc: denied { setattr } for pid=11556 comm="syz.0.3253" path="/dev/ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 386.519716][T11560] aaaaaaaaaaaaa: renamed from ipvlan1 [ 387.681901][T11587] device pim6reg1 entered promiscuous mode [ 387.869386][T11613] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.876247][T11613] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.925392][T11613] device bridge_slave_0 entered promiscuous mode [ 387.945753][T11613] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.961384][T11613] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.006373][T11613] device bridge_slave_1 entered promiscuous mode [ 388.196933][T11613] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.203979][T11613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.211084][T11613] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.217932][T11613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.287504][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 388.294920][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.302554][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.329125][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 388.337317][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.344184][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.351927][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.360320][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.367182][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.378177][T11631] ÿÿÿÿÿÿ: renamed from vlan1 [ 388.386026][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.404587][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.420248][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 388.432958][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.441759][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.454233][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.466797][T11613] device veth0_vlan entered promiscuous mode [ 388.524882][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 388.540350][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 388.579140][T11613] device veth1_macvtap entered promiscuous mode [ 388.587847][T11643] bond_slave_1: mtu less than device minimum [ 388.623278][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 388.636581][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 388.674074][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 388.902704][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 388.940021][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 389.154334][T11659] Â: renamed from pim6reg1 [ 389.273966][ T8] device bridge_slave_1 left promiscuous mode [ 389.282142][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.300377][ T8] device bridge_slave_0 left promiscuous mode [ 389.307542][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.335398][ T8] device veth1_macvtap left promiscuous mode [ 389.341436][ T8] device veth0_vlan left promiscuous mode [ 389.567981][T11676] device wg2 entered promiscuous mode [ 390.285582][T11709] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.351018][T11709] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.416215][T11709] device bridge_slave_0 entered promiscuous mode [ 390.459653][T11709] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.490381][T11709] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.506783][T11709] device bridge_slave_1 entered promiscuous mode [ 390.598569][T11731] syz.1.3303[11731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.598657][T11731] syz.1.3303[11731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.696802][T11709] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.714862][T11709] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.721994][T11709] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.728765][T11709] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.835067][ T5493] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.842987][ T5493] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.959943][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 390.987802][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 391.056686][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 391.075298][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 391.095258][ T5493] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.102129][ T5493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.117531][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 391.135875][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 391.144144][ T5493] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.151012][ T5493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.168818][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 391.176804][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 391.187769][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 391.236932][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 391.266114][T11709] device veth0_vlan entered promiscuous mode [ 391.335363][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 391.355785][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 391.390818][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 391.398764][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 391.417105][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 391.427971][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 391.448097][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 391.456418][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 391.483346][T11709] device veth1_macvtap entered promiscuous mode [ 391.513381][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 391.521571][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 391.531007][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 391.557772][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 391.568515][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 391.571872][T11775] ref_ctr_offset mismatch. inode: 0xd4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 391.699876][ T8] device bridge_slave_1 left promiscuous mode [ 391.712514][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.759247][ T8] device bridge_slave_0 left promiscuous mode [ 391.768917][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.790331][ T8] device veth1_macvtap left promiscuous mode [ 391.803837][ T8] device veth0_vlan left promiscuous mode [ 392.064223][T11794] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.099448][T11794] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.137358][T11794] device bridge_slave_0 entered promiscuous mode [ 392.177870][T11794] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.219370][T11794] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.257129][T11794] device bridge_slave_1 entered promiscuous mode [ 393.924134][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 393.937116][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 393.982995][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 393.998310][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 394.008739][ T5493] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.015607][ T5493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.024970][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 394.050045][T11823] device syzkaller0 entered promiscuous mode [ 394.064471][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 394.075057][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 394.083936][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.090797][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.122796][T11825] device syzkaller0 entered promiscuous mode [ 394.136629][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 394.145586][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 394.153670][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 394.167960][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 394.334368][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 394.358802][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 394.374641][T11835] device pim6reg1 entered promiscuous mode [ 394.384318][T11794] device veth0_vlan entered promiscuous mode [ 394.414894][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 394.427296][T11837] syz.2.3334[11837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.428231][T11837] syz.2.3334[11837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.443112][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 394.463008][T11837] syz.2.3334[11837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.463080][T11837] syz.2.3334[11837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.475148][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 394.517006][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 394.601338][T11794] device veth1_macvtap entered promiscuous mode [ 394.683703][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 394.712280][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 394.766963][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 394.807758][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 395.030924][ T8] device bridge_slave_1 left promiscuous mode [ 395.036892][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.046741][ T8] device bridge_slave_0 left promiscuous mode [ 395.053048][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.061432][ T8] device veth1_macvtap left promiscuous mode [ 395.067291][ T8] device veth0_vlan left promiscuous mode [ 395.751339][T11864] device pim6reg1 entered promiscuous mode [ 396.004933][T11870] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.046549][T11870] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.068962][T11870] device bridge_slave_0 entered promiscuous mode [ 396.127442][T11870] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.156906][T11870] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.164889][T11870] device bridge_slave_1 entered promiscuous mode [ 396.209533][T11919] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.209823][T11928] FAULT_INJECTION: forcing a failure. [ 396.209823][T11928] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 396.217646][T11919] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.229847][T11928] CPU: 1 PID: 11928 Comm: syz.2.3363 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 396.229877][T11928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 396.229890][T11928] Call Trace: [ 396.229896][T11928] [ 396.229904][T11928] dump_stack_lvl+0x151/0x1c0 [ 396.268409][T11928] ? io_uring_drop_tctx_refs+0x190/0x190 [ 396.273879][T11928] dump_stack+0x15/0x20 [ 396.277868][T11928] should_fail+0x3c6/0x510 [ 396.282118][T11928] should_fail_usercopy+0x1a/0x20 [ 396.286983][T11928] _copy_from_user+0x20/0xd0 [ 396.290641][T11919] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.291399][T11928] __sys_bpf+0x1e9/0x760 [ 396.291425][T11928] ? fput_many+0x160/0x1b0 [ 396.291448][T11928] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 396.298348][T11919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.302342][T11928] ? debug_smp_processor_id+0x17/0x20 [ 396.302369][T11928] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 396.302396][T11928] __x64_sys_bpf+0x7c/0x90 [ 396.302419][T11928] x64_sys_call+0x87f/0x9a0 [ 396.307310][T11919] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.311795][T11928] do_syscall_64+0x3b/0xb0 [ 396.311817][T11928] ? clear_bhb_loop+0x35/0x90 [ 396.311838][T11928] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 396.311858][T11928] RIP: 0033:0x7f8f50d19819 [ 396.311877][T11928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 396.311896][T11928] RSP: 002b:00007f8f4f392038 EFLAGS: 00000246 [ 396.318910][T11919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.324033][T11928] ORIG_RAX: 0000000000000141 [ 396.324044][T11928] RAX: ffffffffffffffda RBX: 00007f8f50ed0fa0 RCX: 00007f8f50d19819 [ 396.324060][T11928] RDX: 000000000000000c RSI: 00000000200004c0 RDI: 000000000000000a [ 396.324074][T11928] RBP: 00007f8f4f392090 R08: 0000000000000000 R09: 0000000000000000 [ 396.324087][T11928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 396.324100][T11928] R13: 0000000000000000 R14: 00007f8f50ed0fa0 R15: 00007ffdbfc82028 [ 396.324122][T11928] [ 396.461694][T11919] device bridge0 entered promiscuous mode [ 396.741581][T11870] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.748494][T11870] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.755577][T11870] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.762469][T11870] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.905194][T11965] device syzkaller0 entered promiscuous mode [ 398.039814][T11973] FAULT_INJECTION: forcing a failure. [ 398.039814][T11973] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 398.067963][T11973] CPU: 1 PID: 11973 Comm: syz.0.3375 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 398.079195][T11973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 398.089071][T11973] Call Trace: [ 398.092191][T11973] [ 398.094968][T11973] dump_stack_lvl+0x151/0x1c0 [ 398.099482][T11973] ? io_uring_drop_tctx_refs+0x190/0x190 [ 398.104954][T11973] ? migrate_enable+0x1c1/0x2a0 [ 398.109638][T11973] dump_stack+0x15/0x20 [ 398.113630][T11973] should_fail+0x3c6/0x510 [ 398.117887][T11973] should_fail_usercopy+0x1a/0x20 [ 398.122743][T11973] _copy_to_user+0x20/0x90 [ 398.127119][T11973] bpf_prog_test_run_syscall+0x38a/0x550 [ 398.132583][T11973] ? __fget_files+0x31e/0x380 [ 398.137118][T11973] ? sock_gen_cookie+0x60/0x60 [ 398.141697][T11973] ? __kasan_check_write+0x14/0x20 [ 398.146642][T11973] ? fput_many+0x160/0x1b0 [ 398.150895][T11973] ? sock_gen_cookie+0x60/0x60 [ 398.155505][T11973] bpf_prog_test_run+0x3b0/0x630 [ 398.160268][T11973] ? bpf_prog_query+0x220/0x220 [ 398.164952][T11973] ? selinux_bpf+0xd2/0x100 [ 398.169294][T11973] ? security_bpf+0x82/0xb0 [ 398.173632][T11973] __sys_bpf+0x525/0x760 [ 398.177712][T11973] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 398.182919][T11973] ? bpf_trace_run2+0xf1/0x210 [ 398.187527][T11973] ? __bpf_trace_sys_enter+0x62/0x70 [ 398.192765][T11973] __x64_sys_bpf+0x7c/0x90 [ 398.197015][T11973] x64_sys_call+0x87f/0x9a0 [ 398.201351][T11973] do_syscall_64+0x3b/0xb0 [ 398.205602][T11973] ? clear_bhb_loop+0x35/0x90 [ 398.210120][T11973] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 398.215845][T11973] RIP: 0033:0x7f7744fcd819 [ 398.220103][T11973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 398.239542][T11973] RSP: 002b:00007f7743646038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 398.247783][T11973] RAX: ffffffffffffffda RBX: 00007f7745184fa0 RCX: 00007f7744fcd819 [ 398.255594][T11973] RDX: 000000000000000c RSI: 00000000200004c0 RDI: 000000000000000a [ 398.263405][T11973] RBP: 00007f7743646090 R08: 0000000000000000 R09: 0000000000000000 [ 398.271255][T11973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 398.279028][T11973] R13: 0000000000000000 R14: 00007f7745184fa0 R15: 00007ffe6ff0e788 [ 398.286848][T11973] [ 398.296113][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.305781][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.340077][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 398.357866][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 398.382968][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 398.397998][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 398.417547][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.424417][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.431830][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 398.447772][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 398.461967][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.468835][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.495311][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 398.503945][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 398.511929][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 398.522215][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 398.549723][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 398.559496][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 398.577322][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 398.597851][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 398.610233][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 398.630345][ T30] audit: type=1400 audit(1732148783.387:176): avc: denied { create } for pid=11993 comm="syz.3.3381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 398.637816][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 398.672612][T11870] device veth0_vlan entered promiscuous mode [ 398.686862][ T8] device bridge_slave_1 left promiscuous mode [ 398.694123][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.705152][ T8] device bridge_slave_0 left promiscuous mode [ 398.716437][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.731734][ T8] device veth1_macvtap left promiscuous mode [ 398.761329][ T8] device veth0_vlan left promiscuous mode [ 398.815776][T12009] FAULT_INJECTION: forcing a failure. [ 398.815776][T12009] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 398.841298][T12009] CPU: 0 PID: 12009 Comm: syz.0.3387 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 398.852596][T12009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 398.862511][T12009] Call Trace: [ 398.865617][T12009] [ 398.868392][T12009] dump_stack_lvl+0x151/0x1c0 [ 398.872909][T12009] ? io_uring_drop_tctx_refs+0x190/0x190 [ 398.878377][T12009] dump_stack+0x15/0x20 [ 398.882367][T12009] should_fail+0x3c6/0x510 [ 398.886618][T12009] should_fail_usercopy+0x1a/0x20 [ 398.891480][T12009] _copy_to_user+0x20/0x90 [ 398.895821][T12009] simple_read_from_buffer+0xc7/0x150 [ 398.901033][T12009] proc_fail_nth_read+0x1a3/0x210 [ 398.905889][T12009] ? proc_fault_inject_write+0x390/0x390 [ 398.911349][T12009] ? fsnotify_perm+0x269/0x5b0 [ 398.915952][T12009] ? security_file_permission+0x86/0xb0 [ 398.921331][T12009] ? proc_fault_inject_write+0x390/0x390 [ 398.926805][T12009] vfs_read+0x27d/0xd40 [ 398.930798][T12009] ? kernel_read+0x1f0/0x1f0 [ 398.935222][T12009] ? __kasan_check_write+0x14/0x20 [ 398.940166][T12009] ? mutex_lock+0xb6/0x1e0 [ 398.944421][T12009] ? wait_for_completion_killable_timeout+0x10/0x10 [ 398.950852][T12009] ? __fdget_pos+0x2e7/0x3a0 [ 398.955267][T12009] ? ksys_read+0x77/0x2c0 [ 398.959438][T12009] ksys_read+0x199/0x2c0 [ 398.963515][T12009] ? vfs_write+0x1110/0x1110 [ 398.967942][T12009] ? debug_smp_processor_id+0x17/0x20 [ 398.973146][T12009] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 398.979048][T12009] __x64_sys_read+0x7b/0x90 [ 398.983390][T12009] x64_sys_call+0x28/0x9a0 [ 398.987730][T12009] do_syscall_64+0x3b/0xb0 [ 398.991978][T12009] ? clear_bhb_loop+0x35/0x90 [ 398.996495][T12009] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 399.002220][T12009] RIP: 0033:0x7f7744fcc25c [ 399.006474][T12009] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 399.025920][T12009] RSP: 002b:00007f7743646030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 399.034162][T12009] RAX: ffffffffffffffda RBX: 00007f7745184fa0 RCX: 00007f7744fcc25c [ 399.041970][T12009] RDX: 000000000000000f RSI: 00007f77436460a0 RDI: 0000000000000006 [ 399.049780][T12009] RBP: 00007f7743646090 R08: 0000000000000000 R09: 0000000000000000 [ 399.057595][T12009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 399.065404][T12009] R13: 0000000000000000 R14: 00007f7745184fa0 R15: 00007ffe6ff0e788 [ 399.073226][T12009] [ 399.229952][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 399.240386][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 399.254072][T12000] device pim6reg1 entered promiscuous mode [ 399.276034][T12011] device veth1_macvtap left promiscuous mode [ 399.285333][T12011] device macsec0 entered promiscuous mode [ 399.461379][T11870] device veth1_macvtap entered promiscuous mode [ 399.512314][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 399.527001][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 399.559581][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 399.591618][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 399.786328][T12033] syz.1.3393[12033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.786406][T12033] syz.1.3393[12033] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.717357][T12060] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.740390][T12060] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.756083][T12060] device bridge_slave_0 entered promiscuous mode [ 400.805558][T12060] bridge0: port 2(bridge_slave_1) entered blocking state [ 400.836562][T12060] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.844296][T12060] device bridge_slave_1 entered promiscuous mode [ 401.375194][ T8] device bridge_slave_1 left promiscuous mode [ 401.381376][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.389545][ T8] device bridge_slave_0 left promiscuous mode [ 401.395465][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.403328][ T8] device veth1_macvtap left promiscuous mode [ 401.409155][ T8] device veth0_vlan left promiscuous mode [ 401.834738][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 401.842232][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 401.856833][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 401.870988][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 401.879499][ T1800] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.886364][ T1800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.898085][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 401.906390][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 401.915050][ T1800] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.921938][ T1800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 402.004521][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 402.013114][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 402.020916][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 402.029539][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 402.054388][T12060] device veth0_vlan entered promiscuous mode [ 402.068476][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 402.088250][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 402.095672][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 403.301583][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 403.314288][T12060] device veth1_macvtap entered promiscuous mode [ 403.401769][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 403.414169][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 403.460353][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 403.520859][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 403.587786][T12139] device syzkaller0 entered promiscuous mode [ 403.623825][T12148] bond_slave_1: mtu less than device minimum [ 404.351507][T12161] device sit0 entered promiscuous mode [ 404.660877][T12167] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.669436][T12167] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.307794][T12180] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.330567][T12180] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.370060][T12180] device bridge_slave_0 entered promiscuous mode [ 405.429042][T12180] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.479250][T12180] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.486887][T12180] device bridge_slave_1 entered promiscuous mode [ 406.134032][ T8] device bridge_slave_1 left promiscuous mode [ 406.144582][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.215680][ T8] device bridge_slave_0 left promiscuous mode [ 406.250946][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.264428][ T8] device veth1_macvtap left promiscuous mode [ 406.270395][ T8] device veth0_vlan left promiscuous mode [ 406.539133][T12225] device pim6reg1 entered promiscuous mode [ 406.570474][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 406.580268][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 406.590808][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 406.606937][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 406.617107][ T1800] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.624083][ T1800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.638943][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 406.647805][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 406.656386][ T1800] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.663438][ T1800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.670871][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 406.685792][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 406.694173][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 406.702199][T12248] device pim6reg1 entered promiscuous mode [ 406.717656][T12250] device syzkaller0 entered promiscuous mode [ 406.747297][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 406.755586][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 406.773561][T12180] device veth0_vlan entered promiscuous mode [ 406.780165][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 406.789143][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 406.816823][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 406.839638][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 406.887809][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 406.947685][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 406.998739][T12180] device veth1_macvtap entered promiscuous mode [ 407.009952][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 407.018061][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 407.026252][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 407.045373][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 407.097910][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 407.130415][T12268] device pim6reg1 entered promiscuous mode [ 407.899292][ T8] device bridge_slave_1 left promiscuous mode [ 407.905251][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.912809][ T8] device bridge_slave_0 left promiscuous mode [ 407.918847][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.926802][ T8] device veth1_macvtap left promiscuous mode [ 407.932673][ T8] device veth0_vlan left promiscuous mode [ 408.089175][T12284] device macsec0 left promiscuous mode [ 408.353298][T12297] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.360921][T12297] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.368815][T12297] device bridge_slave_0 entered promiscuous mode [ 408.401267][T12297] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.408162][T12297] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.415990][T12297] device bridge_slave_1 entered promiscuous mode [ 408.517757][T12315] bridge0: port 3(veth0_to_batadv) entered disabled state [ 408.525157][T12315] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.533051][T12315] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.601799][T12315] device veth0_to_batadv left promiscuous mode [ 408.608897][T12315] bridge0: port 3(veth0_to_batadv) entered disabled state [ 408.619344][T12315] device bridge_slave_1 left promiscuous mode [ 408.626032][T12315] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.638076][T12315] device bridge_slave_0 left promiscuous mode [ 408.644959][T12315] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.124573][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 409.148048][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 409.201197][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 409.240725][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 409.267751][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.274658][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 409.282689][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 409.290976][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 409.299607][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.306465][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 409.322840][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 409.376081][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 409.404621][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 409.413423][ T30] audit: type=1400 audit(1732148794.167:177): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 409.470360][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 409.490153][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 409.507195][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 409.515866][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 409.526941][T12297] device veth0_vlan entered promiscuous mode [ 409.541312][T12297] device veth1_macvtap entered promiscuous mode [ 409.556377][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 412.053985][T12356] device pim6reg1 entered promiscuous mode [ 412.089158][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 412.108047][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 412.123816][ T1800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 413.188486][ T8] device bridge_slave_1 left promiscuous mode [ 413.194470][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.257964][ T8] device bridge_slave_0 left promiscuous mode [ 413.273542][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.282199][ T8] device veth1_macvtap left promiscuous mode [ 413.296279][ T8] device veth0_vlan left promiscuous mode [ 413.604314][T12405] device syzkaller0 entered promiscuous mode [ 413.824706][T12408] bond_slave_1: mtu less than device minimum [ 414.073562][T12399] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.086520][T12399] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.097984][T12399] device bridge_slave_0 entered promiscuous mode [ 414.105018][T12399] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.112042][T12399] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.119471][T12399] device bridge_slave_1 entered promiscuous mode [ 414.531774][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 414.553716][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 414.571798][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 414.580245][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 414.588603][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.595475][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 414.604025][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 414.616337][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 414.624706][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.631581][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 414.650105][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 414.660168][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 414.669652][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 414.688469][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 414.711234][T12399] device veth0_vlan entered promiscuous mode [ 414.724801][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.741145][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.757354][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.817199][T12399] device veth1_macvtap entered promiscuous mode [ 414.830946][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 414.871165][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 414.920119][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 415.628282][ T8] device bridge_slave_1 left promiscuous mode [ 415.634420][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.642259][ T8] device bridge_slave_0 left promiscuous mode [ 415.648316][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.656390][ T8] device veth1_macvtap left promiscuous mode [ 415.662556][ T8] device veth0_vlan left promiscuous mode [ 416.468355][T12489] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.475216][T12489] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.519676][T12489] device bridge_slave_0 entered promiscuous mode [ 416.595546][T12489] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.643896][T12489] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.704139][T12489] device bridge_slave_1 entered promiscuous mode [ 416.895262][T12517] device syzkaller0 entered promiscuous mode [ 417.171405][T12524] device veth1_macvtap left promiscuous mode [ 417.238708][T12526] device veth1_macvtap entered promiscuous mode [ 417.244811][T12526] device macsec0 entered promiscuous mode [ 417.673335][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 417.680787][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 417.688433][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 417.696665][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 417.705082][ T5493] bridge0: port 1(bridge_slave_0) entered blocking state [ 417.711955][ T5493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 417.720325][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 417.756332][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 417.765696][ T5493] bridge0: port 2(bridge_slave_1) entered blocking state [ 417.772590][ T5493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 417.780459][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 417.961737][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 417.979752][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 418.003116][T12544] Â: renamed from pim6reg1 [ 418.061278][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 418.148041][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 418.179570][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 418.237938][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 418.275332][T12489] device veth0_vlan entered promiscuous mode [ 418.392267][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 418.426290][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 418.489425][T12489] device veth1_macvtap entered promiscuous mode [ 418.555869][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 418.563708][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 418.579553][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 418.604496][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 418.624027][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 418.713053][T12569] device veth1_macvtap entered promiscuous mode [ 418.720524][T12569] device macsec0 entered promiscuous mode [ 418.747303][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 419.898831][ T8] device bridge_slave_1 left promiscuous mode [ 419.904758][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.912175][ T8] device bridge_slave_0 left promiscuous mode [ 419.918190][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.925981][ T8] device veth1_macvtap left promiscuous mode [ 419.931817][ T8] device veth0_vlan left promiscuous mode [ 420.139430][T12603] device sit0 left promiscuous mode [ 420.183866][T12613] syz.1.3558[12613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.183934][T12613] syz.1.3558[12613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.250806][T12613] syz.1.3558[12613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.269796][T12613] syz.1.3558[12613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.302318][T12606] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.439892][T12606] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.467748][T12606] device bridge_slave_0 entered promiscuous mode [ 420.507683][T12625] Â: renamed from pim6reg1 [ 420.544719][T12606] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.559310][T12606] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.568042][T12606] device bridge_slave_1 entered promiscuous mode [ 421.185988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 421.209488][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 421.279510][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 421.356795][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.366010][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.373003][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.382799][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 421.391529][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.400520][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.407393][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.415649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.425179][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 421.447712][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 421.532406][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 421.541604][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 421.549704][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 421.557036][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 421.574785][T12606] device veth0_vlan entered promiscuous mode [ 421.593354][T12652] device syzkaller0 entered promiscuous mode [ 421.604134][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 421.613400][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 421.623027][T12606] device veth1_macvtap entered promiscuous mode [ 421.648228][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 421.655960][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 421.664514][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 421.687145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 421.706440][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 422.938321][ T45] device bridge_slave_1 left promiscuous mode [ 422.944281][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.972063][ T45] device bridge_slave_0 left promiscuous mode [ 422.995585][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.011863][ T45] device veth1_macvtap left promiscuous mode [ 423.020581][ T45] device veth0_vlan left promiscuous mode [ 423.209168][T12681] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.216096][T12681] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.223905][T12681] device bridge_slave_0 entered promiscuous mode [ 423.236315][T12681] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.243221][T12681] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.251223][T12681] device bridge_slave_1 entered promiscuous mode [ 423.969415][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 423.976778][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 424.051586][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 424.075166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 424.094158][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.101051][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.108970][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 424.117247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 424.132161][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.139056][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.146536][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 424.154895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 424.162829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 424.179456][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 424.190701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 424.199908][T12725] device veth0_vlan left promiscuous mode [ 424.206949][T12725] device veth0_vlan entered promiscuous mode [ 424.235253][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 424.244641][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 424.252107][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 424.277910][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 424.286122][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 424.294713][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 424.303094][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 424.313567][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 424.321743][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 424.329937][T12681] device veth0_vlan entered promiscuous mode [ 424.343654][T12681] device veth1_macvtap entered promiscuous mode [ 424.365549][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 424.386638][T12754] syz.0.3600[12754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.386712][T12754] syz.0.3600[12754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.485210][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 424.597913][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 424.663834][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 424.718055][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 425.608338][ T8] device bridge_slave_1 left promiscuous mode [ 425.614261][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.621657][ T8] device bridge_slave_0 left promiscuous mode [ 425.627656][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.635237][ T8] device veth1_macvtap left promiscuous mode [ 425.641090][ T8] device veth0_vlan left promiscuous mode [ 426.844381][T12795] device veth0_vlan left promiscuous mode [ 426.850482][T12795] device veth0_vlan entered promiscuous mode [ 426.859366][T12779] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.866224][T12779] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.873819][T12779] device bridge_slave_0 entered promiscuous mode [ 426.882378][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 426.898705][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 426.908162][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 426.945556][T12779] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.952893][T12779] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.960464][T12779] device bridge_slave_1 entered promiscuous mode [ 427.177079][T12805] device syzkaller0 entered promiscuous mode [ 427.490270][T12812] syz.1.3616[12812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.490349][T12812] syz.1.3616[12812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.569938][T12779] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.588012][T12779] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.635933][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.655082][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 427.663737][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 427.689363][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 427.706897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 427.747773][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 427.754637][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 427.827140][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 427.845911][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.852822][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.869911][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 427.933247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 427.962950][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 427.981394][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 428.008935][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 428.017861][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 428.026776][T12779] device veth0_vlan entered promiscuous mode [ 428.034502][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 428.055310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 428.075261][T12779] device veth1_macvtap entered promiscuous mode [ 428.106835][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 428.115768][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 428.123843][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 428.181930][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 428.190727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 428.201239][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 428.209674][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 431.642960][T12871] device syzkaller0 entered promiscuous mode [ 432.938524][ T45] device bridge_slave_1 left promiscuous mode [ 432.944450][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.951862][ T45] device bridge_slave_0 left promiscuous mode [ 432.957792][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.965365][ T45] device veth1_macvtap left promiscuous mode [ 432.971201][ T45] device veth0_vlan left promiscuous mode [ 433.493016][T12946] device syzkaller0 entered promiscuous mode [ 433.500519][T12940] bridge0: port 3(veth0_to_batadv) entered blocking state [ 433.517487][T12940] bridge0: port 3(veth0_to_batadv) entered disabled state [ 433.539753][T12940] device veth0_to_batadv entered promiscuous mode [ 433.857172][T12931] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.906019][T12931] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.932500][T12931] device bridge_slave_0 entered promiscuous mode [ 433.990246][T12966] device syzkaller0 entered promiscuous mode [ 434.004244][T12931] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.011596][T12931] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.021426][T12931] device bridge_slave_1 entered promiscuous mode [ 434.324570][T12979] device pim6reg1 entered promiscuous mode [ 434.416050][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 434.423687][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 434.495722][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 434.527771][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 434.535779][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.542637][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.557777][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 434.572765][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 434.584957][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.591820][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.622116][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 434.629777][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 434.637948][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 434.657624][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 434.672847][T12931] device veth0_vlan entered promiscuous mode [ 434.680711][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 434.689641][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 434.698193][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 434.712941][T12931] device veth1_macvtap entered promiscuous mode [ 434.724237][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 434.742799][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 434.751420][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 434.825703][T13013] FAULT_INJECTION: forcing a failure. [ 434.825703][T13013] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 434.838991][T13013] CPU: 1 PID: 13013 Comm: syz.3.3667 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 434.850186][T13013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 434.860082][T13013] Call Trace: [ 434.863238][T13013] [ 434.865980][T13013] dump_stack_lvl+0x151/0x1c0 [ 434.870495][T13013] ? io_uring_drop_tctx_refs+0x190/0x190 [ 434.875964][T13013] dump_stack+0x15/0x20 [ 434.880040][T13013] should_fail+0x3c6/0x510 [ 434.884294][T13013] should_fail_usercopy+0x1a/0x20 [ 434.889155][T13013] _copy_from_user+0x20/0xd0 [ 434.893582][T13013] __sys_bpf+0x1e9/0x760 [ 434.897661][T13013] ? fput_many+0x160/0x1b0 [ 434.901911][T13013] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 434.907123][T13013] ? debug_smp_processor_id+0x17/0x20 [ 434.912412][T13013] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 434.918316][T13013] __x64_sys_bpf+0x7c/0x90 [ 434.922570][T13013] x64_sys_call+0x87f/0x9a0 [ 434.926906][T13013] do_syscall_64+0x3b/0xb0 [ 434.931160][T13013] ? clear_bhb_loop+0x35/0x90 [ 434.935672][T13013] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 434.941401][T13013] RIP: 0033:0x7f93370aa819 [ 434.945657][T13013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 434.965095][T13013] RSP: 002b:00007f9335723038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 434.973340][T13013] RAX: ffffffffffffffda RBX: 00007f9337261fa0 RCX: 00007f93370aa819 [ 434.981153][T13013] RDX: 000000000000000c RSI: 00000000200004c0 RDI: 000000000000000a [ 434.989049][T13013] RBP: 00007f9335723090 R08: 0000000000000000 R09: 0000000000000000 [ 434.996863][T13013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 435.004674][T13013] R13: 0000000000000000 R14: 00007f9337261fa0 R15: 00007ffece0e9c98 [ 435.012493][T13013] [ 435.658941][ T5493] device bridge_slave_1 left promiscuous mode [ 435.664863][ T5493] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.672218][ T5493] device bridge_slave_0 left promiscuous mode [ 435.678253][ T5493] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.686010][ T5493] device veth1_macvtap left promiscuous mode [ 435.691884][ T5493] device veth0_vlan left promiscuous mode [ 436.759165][T13027] bridge0: port 3(veth0_to_batadv) entered blocking state [ 436.776563][T13027] bridge0: port 3(veth0_to_batadv) entered disabled state [ 436.847857][T13027] device veth0_to_batadv entered promiscuous mode [ 436.856224][T13027] bridge0: port 3(veth0_to_batadv) entered blocking state [ 436.864012][T13027] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 436.972471][T13047] device syzkaller0 entered promiscuous mode [ 437.190591][T13037] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.253483][T13037] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.306201][T13037] device bridge_slave_0 entered promiscuous mode [ 437.384563][T13037] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.399874][T13037] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.443969][T13037] device bridge_slave_1 entered promiscuous mode [ 437.731576][T13069] FAULT_INJECTION: forcing a failure. [ 437.731576][T13069] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 437.766208][T13069] CPU: 1 PID: 13069 Comm: syz.3.3684 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 437.777505][T13069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 437.787388][T13069] Call Trace: [ 437.790513][T13069] [ 437.793303][T13069] dump_stack_lvl+0x151/0x1c0 [ 437.797807][T13069] ? io_uring_drop_tctx_refs+0x190/0x190 [ 437.803274][T13069] ? migrate_enable+0x1c1/0x2a0 [ 437.807959][T13069] dump_stack+0x15/0x20 [ 437.811949][T13069] should_fail+0x3c6/0x510 [ 437.816208][T13069] should_fail_usercopy+0x1a/0x20 [ 437.821063][T13069] _copy_to_user+0x20/0x90 [ 437.825316][T13069] bpf_prog_test_run_syscall+0x38a/0x550 [ 437.830784][T13069] ? __fget_files+0x31e/0x380 [ 437.835301][T13069] ? sock_gen_cookie+0x60/0x60 [ 437.839903][T13069] ? __kasan_check_write+0x14/0x20 [ 437.844843][T13069] ? fput_many+0x160/0x1b0 [ 437.849095][T13069] ? sock_gen_cookie+0x60/0x60 [ 437.853706][T13069] bpf_prog_test_run+0x3b0/0x630 [ 437.858474][T13069] ? bpf_prog_query+0x220/0x220 [ 437.863157][T13069] ? selinux_bpf+0xd2/0x100 [ 437.867497][T13069] ? security_bpf+0x82/0xb0 [ 437.871840][T13069] __sys_bpf+0x525/0x760 [ 437.875916][T13069] ? fput_many+0x160/0x1b0 [ 437.880171][T13069] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 437.885382][T13069] ? debug_smp_processor_id+0x17/0x20 [ 437.890585][T13069] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 437.896485][T13069] __x64_sys_bpf+0x7c/0x90 [ 437.900737][T13069] x64_sys_call+0x87f/0x9a0 [ 437.905079][T13069] do_syscall_64+0x3b/0xb0 [ 437.909330][T13069] ? clear_bhb_loop+0x35/0x90 [ 437.913845][T13069] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 437.919570][T13069] RIP: 0033:0x7f93370aa819 [ 437.923824][T13069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 437.943268][T13069] RSP: 002b:00007f9335723038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 437.951513][T13069] RAX: ffffffffffffffda RBX: 00007f9337261fa0 RCX: 00007f93370aa819 [ 437.959321][T13069] RDX: 000000000000000c RSI: 00000000200004c0 RDI: 000000000000000a [ 437.967133][T13069] RBP: 00007f9335723090 R08: 0000000000000000 R09: 0000000000000000 [ 437.975032][T13069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 437.982850][T13069] R13: 0000000000000000 R14: 00007f9337261fa0 R15: 00007ffece0e9c98 [ 437.990666][T13069] [ 438.097766][T13037] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.104988][T13037] bridge0: port 2(bridge_slave_1) entered forwarding state [ 438.112157][T13037] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.119017][T13037] bridge0: port 1(bridge_slave_0) entered forwarding state [ 438.232367][ T5493] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.247328][T13081] FAULT_INJECTION: forcing a failure. [ 438.247328][T13081] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 438.266970][ T5493] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.289358][T13081] CPU: 0 PID: 13081 Comm: syz.1.3698 Tainted: G W 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 438.300584][T13081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 438.310464][T13081] Call Trace: [ 438.313596][T13081] [ 438.316401][T13081] dump_stack_lvl+0x151/0x1c0 [ 438.320878][T13081] ? io_uring_drop_tctx_refs+0x190/0x190 [ 438.326344][T13081] ? kstrtouint_from_user+0x20a/0x2a0 [ 438.331555][T13081] dump_stack+0x15/0x20 [ 438.335546][T13081] should_fail+0x3c6/0x510 [ 438.339797][T13081] should_fail_usercopy+0x1a/0x20 [ 438.344654][T13081] _copy_to_user+0x20/0x90 [ 438.348912][T13081] simple_read_from_buffer+0xc7/0x150 [ 438.354117][T13081] proc_fail_nth_read+0x1a3/0x210 [ 438.358978][T13081] ? proc_fault_inject_write+0x390/0x390 [ 438.364441][T13081] ? fsnotify_perm+0x269/0x5b0 [ 438.369043][T13081] ? security_file_permission+0x86/0xb0 [ 438.374424][T13081] ? proc_fault_inject_write+0x390/0x390 [ 438.379980][T13081] vfs_read+0x27d/0xd40 [ 438.383975][T13081] ? kernel_read+0x1f0/0x1f0 [ 438.388415][T13081] ? __kasan_check_write+0x14/0x20 [ 438.393346][T13081] ? mutex_lock+0xb6/0x1e0 [ 438.397598][T13081] ? wait_for_completion_killable_timeout+0x10/0x10 [ 438.404022][T13081] ? __fdget_pos+0x2e7/0x3a0 [ 438.408449][T13081] ? ksys_read+0x77/0x2c0 [ 438.412614][T13081] ksys_read+0x199/0x2c0 [ 438.416693][T13081] ? vfs_write+0x1110/0x1110 [ 438.421119][T13081] ? debug_smp_processor_id+0x17/0x20 [ 438.426323][T13081] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 438.432229][T13081] __x64_sys_read+0x7b/0x90 [ 438.436566][T13081] x64_sys_call+0x28/0x9a0 [ 438.440821][T13081] do_syscall_64+0x3b/0xb0 [ 438.445074][T13081] ? clear_bhb_loop+0x35/0x90 [ 438.449589][T13081] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 438.455314][T13081] RIP: 0033:0x7ff9e01de25c [ 438.459570][T13081] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 438.479010][T13081] RSP: 002b:00007ff9de858030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 438.487252][T13081] RAX: ffffffffffffffda RBX: 00007ff9e0396fa0 RCX: 00007ff9e01de25c [ 438.495152][T13081] RDX: 000000000000000f RSI: 00007ff9de8580a0 RDI: 0000000000000005 [ 438.502964][T13081] RBP: 00007ff9de858090 R08: 0000000000000000 R09: 0000000000000000 [ 438.510861][T13081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 438.518689][T13081] R13: 0000000000000000 R14: 00007ff9e0396fa0 R15: 00007ffd5f89f368 [ 438.526497][T13081] [ 438.663930][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 438.678707][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 438.727730][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 438.739589][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 438.753921][ T5493] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.760898][ T5493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 438.783273][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 438.808518][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 438.857352][ T5493] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.864269][ T5493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 438.977643][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 439.001275][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 439.012154][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 439.031400][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 439.059766][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 439.080523][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 439.139896][T13037] device veth0_vlan entered promiscuous mode [ 439.155797][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 439.166805][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 439.242931][T13037] device veth1_macvtap entered promiscuous mode [ 439.269941][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 439.278097][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 439.302766][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 439.330907][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 439.357718][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 439.463379][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 439.488348][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 439.526313][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 439.565446][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 440.668126][ T5493] device bridge_slave_1 left promiscuous mode [ 440.674088][ T5493] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.681644][ T5493] device bridge_slave_0 left promiscuous mode [ 440.687689][ T5493] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.695546][ T5493] device veth1_macvtap left promiscuous mode [ 440.701464][ T5493] device veth0_vlan left promiscuous mode [ 441.537732][T13140] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.544654][T13140] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.557263][T13140] device bridge_slave_0 entered promiscuous mode [ 441.571043][T13140] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.578626][T13140] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.588637][T13140] device bridge_slave_1 entered promiscuous mode [ 441.748380][T13155] device syzkaller0 entered promiscuous mode [ 441.849037][T13140] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.855931][T13140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.863036][T13140] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.869815][T13140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.931346][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 441.948527][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.960523][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.011254][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 442.019485][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.026326][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.033575][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 442.042157][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.049039][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.130369][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 442.139477][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 442.177678][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 442.201292][T13140] device veth0_vlan entered promiscuous mode [ 442.217950][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 442.235321][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 442.249187][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 442.274867][T13140] device veth1_macvtap entered promiscuous mode [ 442.328069][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 442.368322][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 442.407233][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 443.028115][ T5493] device bridge_slave_1 left promiscuous mode [ 443.034103][ T5493] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.041470][ T5493] device bridge_slave_0 left promiscuous mode [ 443.047456][ T5493] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.055193][ T5493] device veth1_macvtap left promiscuous mode [ 443.061051][ T5493] device veth0_vlan left promiscuous mode [ 444.144106][T13197] device veth0_vlan left promiscuous mode [ 444.154217][T13197] device veth0_vlan entered promiscuous mode [ 444.170354][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 444.191120][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 444.231705][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 444.272987][T13193] device pim6reg1 entered promiscuous mode [ 444.287783][T13193] device pim6reg1 left promiscuous mode [ 444.427505][T13201] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.434400][T13201] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.443559][T13201] device bridge_slave_0 entered promiscuous mode [ 444.450766][T13213] device pim6reg1 entered promiscuous mode [ 444.525220][T13201] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.532243][T13201] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.539974][T13201] device bridge_slave_1 entered promiscuous mode [ 444.985301][T13201] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.992209][T13201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 445.076776][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.094499][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 445.195245][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 445.241362][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 445.254509][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 445.279140][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.286129][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 445.294439][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 445.303770][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.310661][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 445.318310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 445.339140][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 445.352816][T13201] device veth0_vlan entered promiscuous mode [ 445.361209][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 445.370568][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 445.378671][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 445.386645][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 445.404916][T13201] device veth1_macvtap entered promiscuous mode [ 445.411724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 445.420451][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 445.429258][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 445.458480][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 445.468439][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 445.478788][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 445.486968][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 445.531330][T13242] device veth0_vlan left promiscuous mode [ 445.555763][T13242] device veth0_vlan entered promiscuous mode [ 445.673128][T13244] bond_slave_1: mtu less than device minimum [ 445.707277][T13250] device syzkaller0 entered promiscuous mode [ 446.948236][ T5493] device bridge_slave_1 left promiscuous mode [ 446.954170][ T5493] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.961520][ T5493] device bridge_slave_0 left promiscuous mode [ 446.967543][ T5493] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.975175][ T5493] device veth1_macvtap left promiscuous mode [ 446.981051][ T5493] device veth0_vlan left promiscuous mode [ 447.452058][T13264] bond_slave_1: mtu less than device minimum [ 447.477578][T13261] device pim6reg1 entered promiscuous mode [ 447.802016][T13277] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.836715][T13277] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.844460][T13277] device bridge_slave_0 entered promiscuous mode [ 447.925457][T13277] bridge0: port 2(bridge_slave_1) entered blocking state [ 448.013916][T13277] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.107227][T13277] device bridge_slave_1 entered promiscuous mode [ 448.301290][T13277] bridge0: port 2(bridge_slave_1) entered blocking state [ 448.308295][T13277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 448.315376][T13277] bridge0: port 1(bridge_slave_0) entered blocking state [ 448.322166][T13277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 448.389593][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 448.397922][ T5493] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.405795][ T5493] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.439868][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 448.448400][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 448.456505][ T5493] bridge0: port 1(bridge_slave_0) entered blocking state [ 448.463396][ T5493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 448.471553][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 448.480998][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 448.489423][ T5493] bridge0: port 2(bridge_slave_1) entered blocking state [ 448.496295][ T5493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 448.503955][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 448.512306][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 448.520836][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 448.529046][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 448.547104][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 448.555373][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 448.568889][T13277] device veth0_vlan entered promiscuous mode [ 448.575056][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 448.589228][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 448.604171][T13277] device veth1_macvtap entered promiscuous mode [ 448.613543][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 448.621410][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 448.642923][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 448.653773][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 448.661917][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 448.698657][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 448.723567][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 448.732125][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 448.740682][ T5493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 448.828713][T13307] device bridge0 entered promiscuous mode [ 450.218567][ T8] device bridge_slave_1 left promiscuous mode [ 450.224520][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.231901][ T8] device bridge_slave_0 left promiscuous mode [ 450.237921][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.245558][ T8] device veth1_macvtap left promiscuous mode [ 450.251455][ T8] device veth0_vlan left promiscuous mode [ 451.087363][T13332] bridge0: port 3(veth0_to_batadv) entered blocking state [ 451.095197][T13332] bridge0: port 3(veth0_to_batadv) entered disabled state [ 451.108007][T13332] device veth0_to_batadv entered promiscuous mode [ 451.115085][T13332] bridge0: port 3(veth0_to_batadv) entered blocking state [ 451.122208][T13332] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 451.529320][T13343] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.549889][T13343] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.578023][T13343] device bridge_slave_0 entered promiscuous mode [ 451.689245][T13343] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.707141][T13343] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.714628][T13343] device bridge_slave_1 entered promiscuous mode [ 452.109393][T13343] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.116278][T13343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.216517][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.242907][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 452.288004][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 452.324424][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 452.365281][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 452.407895][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.414773][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.432841][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 452.478481][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.485366][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.514433][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 452.549731][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 452.603400][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 452.620574][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 452.653613][T13343] device veth0_vlan entered promiscuous mode [ 452.659823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 452.668543][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.689337][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 452.696747][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 452.709830][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 452.718493][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 452.728606][T13343] device veth1_macvtap entered promiscuous mode [ 452.740624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 452.748868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 452.757032][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 452.779453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 452.789307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 453.348292][ T8] device bridge_slave_1 left promiscuous mode [ 453.354360][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.362732][ T8] device bridge_slave_0 left promiscuous mode [ 453.370505][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.379590][ T8] device veth1_macvtap left promiscuous mode [ 453.385497][ T8] device veth0_vlan left promiscuous mode [ 455.258811][T13437] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.284189][T13437] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.358917][T13437] device bridge_slave_0 entered promiscuous mode [ 455.415099][T13437] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.488364][T13437] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.554744][T13437] device bridge_slave_1 entered promiscuous mode [ 456.137441][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 456.145101][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 456.258609][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 456.269096][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 456.277208][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.284080][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.311925][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 456.321992][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 456.331086][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.337954][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.355431][T13466] aaaaaaaaaaaaa: renamed from ipvlan1 [ 456.425160][ T30] audit: type=1400 audit(1732148841.177:178): avc: denied { setattr } for pid=13467 comm="syz.2.3797" path="/dev/net/tun" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 456.450105][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 456.457968][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 456.465961][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 456.474087][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 456.503626][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 456.526964][T13478] device veth0_vlan left promiscuous mode [ 456.557270][T13478] device veth0_vlan entered promiscuous mode [ 456.654219][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 456.679430][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 456.696094][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 456.770835][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 456.804776][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 456.872274][T13437] device veth0_vlan entered promiscuous mode [ 456.916237][T13486] device syzkaller0 entered promiscuous mode [ 456.922595][T13491] syz.3.3804[13491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.922686][T13491] syz.3.3804[13491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 456.941075][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 456.986660][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 457.031649][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 457.044299][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 457.054798][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 457.069655][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 457.078900][T13437] device veth1_macvtap entered promiscuous mode [ 457.104880][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 457.114858][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 457.141089][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 457.171562][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 457.233917][T13509] ªªªªªª: renamed from vlan0 [ 457.363055][T13520] aaaaaaaaaaaaa: renamed from ipvlan1 [ 457.978172][ T5493] device bridge_slave_1 left promiscuous mode [ 457.984100][ T5493] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.991454][ T5493] device bridge_slave_0 left promiscuous mode [ 457.997514][ T5493] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.005217][ T5493] device veth1_macvtap left promiscuous mode [ 458.011080][ T5493] device veth0_vlan left promiscuous mode [ 459.592678][T13539] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.605319][T13539] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.620039][T13539] device bridge_slave_0 entered promiscuous mode [ 459.644227][T13548] device wg2 left promiscuous mode [ 459.669407][T13548] device wg2 entered promiscuous mode [ 459.685202][T13539] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.707406][T13539] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.721694][T13539] device bridge_slave_1 entered promiscuous mode [ 459.779327][T13550] device syzkaller0 entered promiscuous mode [ 460.128240][T13539] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.135123][T13539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.142416][T13539] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.149374][T13539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.256110][T13566] device pim6reg1 entered promiscuous mode [ 460.304113][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 460.320639][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.351991][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.460297][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 460.477986][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.484848][ T356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.512520][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 460.532942][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.539828][ T356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.640959][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 460.652382][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 460.660837][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 460.669315][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 460.739493][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 460.752276][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 460.804705][T13539] device veth0_vlan entered promiscuous mode [ 460.829838][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 460.851987][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 460.880183][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 460.908229][ T356] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 460.978216][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 461.068003][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 461.123565][T13539] device veth1_macvtap entered promiscuous mode [ 461.179017][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 461.186859][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 461.232442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 461.292761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 461.319085][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=3268 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 461.940487][T13595] device pim6reg1 entered promiscuous mode [ 462.359544][ T8] device bridge_slave_1 left promiscuous mode [ 462.365507][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 462.417591][ T8] device bridge_slave_0 left promiscuous mode [ 462.423559][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 462.449636][ T8] device veth1_macvtap left promiscuous mode [ 462.467465][ T8] device veth0_vlan left promiscuous mode [ 464.009538][ T8] device veth0_to_batadv left promiscuous mode [ 464.015549][ T8] bridge0: port 3(veth0_to_batadv) entered disabled state [ 464.022961][ T8] device bridge_slave_1 left promiscuous mode [ 464.028916][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.036117][ T8] device bridge_slave_0 left promiscuous mode [ 464.042098][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.049734][ T8] device veth0_to_batadv left promiscuous mode [ 464.055730][ T8] bridge0: port 3(veth0_to_batadv) entered disabled state [ 464.063074][ T8] device bridge_slave_1 left promiscuous mode [ 464.069021][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.076253][ T8] device bridge_slave_0 left promiscuous mode [ 464.082304][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.090113][ T8] device veth0_to_batadv left promiscuous mode [ 464.096109][ T8] bridge0: port 3(veth0_to_batadv) entered disabled state [ 464.103627][ T8] device bridge_slave_1 left promiscuous mode [ 464.109583][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.116743][ T8] device bridge_slave_0 left promiscuous mode [ 464.122747][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.131177][ T8] device veth1_macvtap left promiscuous mode [ 464.137004][ T8] device veth0_vlan left promiscuous mode [ 464.142767][ T8] device veth1_macvtap left promiscuous mode [ 464.148594][ T8] device veth0_vlan left promiscuous mode [ 464.154410][ T8] device veth1_macvtap left promiscuous mode [ 464.160643][ T8] device veth1_macvtap left promiscuous mode [ 464.166447][ T8] device veth0_vlan left promiscuous mode