last executing test programs: 3m2.551121339s ago: executing program 4 (id=518): bpf$MAP_CREATE(0x600000000000000, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r3, 0xf, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 3m2.4555983s ago: executing program 4 (id=520): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x103442, 0x0) (rerun: 64) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f0000000140)={'batadv0\x00'}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'pimreg0\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='module_request\x00', r2}, 0x18) (async) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000280)='host1x_cdma_push_wide\x00', r2, 0x0, 0x2000000}, 0x18) (async) r3 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7fffc, 0x0, @perf_config_ext={0x2, 0x5}, 0x0, 0xc8, 0x0, 0x9, 0x0, 0x7, 0x0, 0x0, 0x1000, 0x0, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) close(r5) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, 0x0, 0xffffff78) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) (rerun: 32) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000700)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r9, &(0x7f0000000940)=ANY=[@ANYBLOB="4aa42ae2f68348e78bf0bd6ceebfa7f588d439a0f364fcdd30e88a8ec95d17229ba54818a3f350e80faeacbb17d576a7c2795cbb8d782cc649110004c7e81391b33436052cc790a7d1b90c94b01d17fb73742bbff12a5de4bce896196e1726375a9d2244d3cd40f3be5d74b4ff86015932850312989c0c6cd507f1f652e497483c026476ff9198bb57", @ANYRES32=r7, @ANYRES64=r8, @ANYRESOCT=r3, @ANYRES32=0x0, @ANYRES16=r2], 0xfffffdef) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x12, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r10, 0x2, 0x18}, 0xc) 3m2.233780804s ago: executing program 4 (id=524): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x8cff, 0x0, 0x0, 0xe60}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$unix(r2, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x20}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073013700000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000000c0)='GPL\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) 3m2.220535144s ago: executing program 4 (id=526): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x17) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000280", @ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r2, 0x0, 0x0}, 0x20) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xfe, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) close(0xffffffffffffffff) 3m1.703717992s ago: executing program 4 (id=530): bpf$MAP_CREATE(0x600000000000000, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r3, 0xf, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 3m1.589619724s ago: executing program 4 (id=532): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0xfffffd0f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x18) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000880), 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000000000612e2e00"/30], 0x0, 0x1e}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, r0, 0x1, r3, 0x7) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00 \x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000030000000200"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="850000007a0000007600000000000000270700000000004095000000002ac3b3"], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff6c, 0x10, 0x0, 0xfffffffffffffed8}, 0x23) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x4, 0x3, 0x6, 0x5, 0x0, 0xffffffffffffffc0, 0x10}]}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1e) 2m45.986040659s ago: executing program 32 (id=532): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0xfffffd0f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2}, 0x18) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000880), 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000000000612e2e00"/30], 0x0, 0x1e}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, r0, 0x1, r3, 0x7) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00 \x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000030000000200"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="850000007a0000007600000000000000270700000000004095000000002ac3b3"], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff6c, 0x10, 0x0, 0xfffffffffffffed8}, 0x23) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x4, 0x3, 0x6, 0x5, 0x0, 0xffffffffffffffc0, 0x10}]}, &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xc3, &(0x7f0000000300)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1e) 30.057727827s ago: executing program 5 (id=1326): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061124c00000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x19) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0x7e, 0xf9, &(0x7f0000000080)="9969c7636e0a5baedd85401465f14f560812566b8cf8b88cbccae7cb03702b4df73af579f7d45deba62810d3b7027c6da60e7774f731cad2f1eb276e2a2c2c72d9ccd64efd2683bb912e78bcda53a40d8753c43c52965028aff56cf91bc3a59b55d44a19c5fa66c92861b5d1d9dafed8c1d7a28b48ecf7b7befb3a21d49a", &(0x7f0000000200)=""/249, 0x1, 0x0, 0xd7, 0x94, &(0x7f0000000300)="73102216beaa8edf793c65e279bb6bf5c0e0f013cce1f7a80242f3b739a9e747b8397d4a5c670319eae24bc784c22dcc236e5bede3cc6bd7f1d65ebc1fbad27fc20a3a65b594e91a98d10a161bb59bf026741ae82a01e93753d6b071d6eec962d8903a5244d004f3dce22f8e7c237295625ef4dd17c99eb4caa0048ce480410420056737ab03fef5f4c855a7fe82567a05fcac31e20df042e739528b315f7d18d359ff33d77b1ae44bcc955bd19641ca648416875eb5d8b2ecbbca95d6ae95930eb6fa5a6549cbdd14f6313736a472719814737ea05641", &(0x7f0000000400)="d2f13ee5fe766fe819f221afed3ef9bc94de8db2300f86676aaac7b585f63929e20ed06c74d7ce2f926e2f4d3ab1ce901b2e18febf829b0bf17c9f77c83201c4cf204e79ddc486746defc71e14c25cd0a32d7b271b58ee9c39881547fa43bbda3e7a707caeb33d742b6e1f49bcd546412e22d6750e2d629b35d2838d568607d89a1b879fb3582c8f3b1d61edd319272d27337776", 0x4, 0x0, 0xdf26}, 0x50) 24.54521946s ago: executing program 5 (id=1326): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061124c00000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x19) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0x7e, 0xf9, &(0x7f0000000080)="9969c7636e0a5baedd85401465f14f560812566b8cf8b88cbccae7cb03702b4df73af579f7d45deba62810d3b7027c6da60e7774f731cad2f1eb276e2a2c2c72d9ccd64efd2683bb912e78bcda53a40d8753c43c52965028aff56cf91bc3a59b55d44a19c5fa66c92861b5d1d9dafed8c1d7a28b48ecf7b7befb3a21d49a", &(0x7f0000000200)=""/249, 0x1, 0x0, 0xd7, 0x94, &(0x7f0000000300)="73102216beaa8edf793c65e279bb6bf5c0e0f013cce1f7a80242f3b739a9e747b8397d4a5c670319eae24bc784c22dcc236e5bede3cc6bd7f1d65ebc1fbad27fc20a3a65b594e91a98d10a161bb59bf026741ae82a01e93753d6b071d6eec962d8903a5244d004f3dce22f8e7c237295625ef4dd17c99eb4caa0048ce480410420056737ab03fef5f4c855a7fe82567a05fcac31e20df042e739528b315f7d18d359ff33d77b1ae44bcc955bd19641ca648416875eb5d8b2ecbbca95d6ae95930eb6fa5a6549cbdd14f6313736a472719814737ea05641", &(0x7f0000000400)="d2f13ee5fe766fe819f221afed3ef9bc94de8db2300f86676aaac7b585f63929e20ed06c74d7ce2f926e2f4d3ab1ce901b2e18febf829b0bf17c9f77c83201c4cf204e79ddc486746defc71e14c25cd0a32d7b271b58ee9c39881547fa43bbda3e7a707caeb33d742b6e1f49bcd546412e22d6750e2d629b35d2838d568607d89a1b879fb3582c8f3b1d61edd319272d27337776", 0x4, 0x0, 0xdf26}, 0x50) 18.182223675s ago: executing program 5 (id=1326): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061124c00000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x19) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0x7e, 0xf9, &(0x7f0000000080)="9969c7636e0a5baedd85401465f14f560812566b8cf8b88cbccae7cb03702b4df73af579f7d45deba62810d3b7027c6da60e7774f731cad2f1eb276e2a2c2c72d9ccd64efd2683bb912e78bcda53a40d8753c43c52965028aff56cf91bc3a59b55d44a19c5fa66c92861b5d1d9dafed8c1d7a28b48ecf7b7befb3a21d49a", &(0x7f0000000200)=""/249, 0x1, 0x0, 0xd7, 0x94, &(0x7f0000000300)="73102216beaa8edf793c65e279bb6bf5c0e0f013cce1f7a80242f3b739a9e747b8397d4a5c670319eae24bc784c22dcc236e5bede3cc6bd7f1d65ebc1fbad27fc20a3a65b594e91a98d10a161bb59bf026741ae82a01e93753d6b071d6eec962d8903a5244d004f3dce22f8e7c237295625ef4dd17c99eb4caa0048ce480410420056737ab03fef5f4c855a7fe82567a05fcac31e20df042e739528b315f7d18d359ff33d77b1ae44bcc955bd19641ca648416875eb5d8b2ecbbca95d6ae95930eb6fa5a6549cbdd14f6313736a472719814737ea05641", &(0x7f0000000400)="d2f13ee5fe766fe819f221afed3ef9bc94de8db2300f86676aaac7b585f63929e20ed06c74d7ce2f926e2f4d3ab1ce901b2e18febf829b0bf17c9f77c83201c4cf204e79ddc486746defc71e14c25cd0a32d7b271b58ee9c39881547fa43bbda3e7a707caeb33d742b6e1f49bcd546412e22d6750e2d629b35d2838d568607d89a1b879fb3582c8f3b1d61edd319272d27337776", 0x4, 0x0, 0xdf26}, 0x50) 13.119568292s ago: executing program 5 (id=1326): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061124c00000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x19) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0x7e, 0xf9, &(0x7f0000000080)="9969c7636e0a5baedd85401465f14f560812566b8cf8b88cbccae7cb03702b4df73af579f7d45deba62810d3b7027c6da60e7774f731cad2f1eb276e2a2c2c72d9ccd64efd2683bb912e78bcda53a40d8753c43c52965028aff56cf91bc3a59b55d44a19c5fa66c92861b5d1d9dafed8c1d7a28b48ecf7b7befb3a21d49a", &(0x7f0000000200)=""/249, 0x1, 0x0, 0xd7, 0x94, &(0x7f0000000300)="73102216beaa8edf793c65e279bb6bf5c0e0f013cce1f7a80242f3b739a9e747b8397d4a5c670319eae24bc784c22dcc236e5bede3cc6bd7f1d65ebc1fbad27fc20a3a65b594e91a98d10a161bb59bf026741ae82a01e93753d6b071d6eec962d8903a5244d004f3dce22f8e7c237295625ef4dd17c99eb4caa0048ce480410420056737ab03fef5f4c855a7fe82567a05fcac31e20df042e739528b315f7d18d359ff33d77b1ae44bcc955bd19641ca648416875eb5d8b2ecbbca95d6ae95930eb6fa5a6549cbdd14f6313736a472719814737ea05641", &(0x7f0000000400)="d2f13ee5fe766fe819f221afed3ef9bc94de8db2300f86676aaac7b585f63929e20ed06c74d7ce2f926e2f4d3ab1ce901b2e18febf829b0bf17c9f77c83201c4cf204e79ddc486746defc71e14c25cd0a32d7b271b58ee9c39881547fa43bbda3e7a707caeb33d742b6e1f49bcd546412e22d6750e2d629b35d2838d568607d89a1b879fb3582c8f3b1d61edd319272d27337776", 0x4, 0x0, 0xdf26}, 0x50) 5.889856691s ago: executing program 5 (id=1326): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061124c00000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x19) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0x7e, 0xf9, &(0x7f0000000080)="9969c7636e0a5baedd85401465f14f560812566b8cf8b88cbccae7cb03702b4df73af579f7d45deba62810d3b7027c6da60e7774f731cad2f1eb276e2a2c2c72d9ccd64efd2683bb912e78bcda53a40d8753c43c52965028aff56cf91bc3a59b55d44a19c5fa66c92861b5d1d9dafed8c1d7a28b48ecf7b7befb3a21d49a", &(0x7f0000000200)=""/249, 0x1, 0x0, 0xd7, 0x94, &(0x7f0000000300)="73102216beaa8edf793c65e279bb6bf5c0e0f013cce1f7a80242f3b739a9e747b8397d4a5c670319eae24bc784c22dcc236e5bede3cc6bd7f1d65ebc1fbad27fc20a3a65b594e91a98d10a161bb59bf026741ae82a01e93753d6b071d6eec962d8903a5244d004f3dce22f8e7c237295625ef4dd17c99eb4caa0048ce480410420056737ab03fef5f4c855a7fe82567a05fcac31e20df042e739528b315f7d18d359ff33d77b1ae44bcc955bd19641ca648416875eb5d8b2ecbbca95d6ae95930eb6fa5a6549cbdd14f6313736a472719814737ea05641", &(0x7f0000000400)="d2f13ee5fe766fe819f221afed3ef9bc94de8db2300f86676aaac7b585f63929e20ed06c74d7ce2f926e2f4d3ab1ce901b2e18febf829b0bf17c9f77c83201c4cf204e79ddc486746defc71e14c25cd0a32d7b271b58ee9c39881547fa43bbda3e7a707caeb33d742b6e1f49bcd546412e22d6750e2d629b35d2838d568607d89a1b879fb3582c8f3b1d61edd319272d27337776", 0x4, 0x0, 0xdf26}, 0x50) 3.721458023s ago: executing program 1 (id=1875): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x80000004}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r2, 0x80047441, 0xf0ff1f00000000) 3.720058363s ago: executing program 2 (id=1876): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000c8f140a0aad331ff6754696f74e1762653685eb8aa6fdc977fd66da5e2d388ee253e3714255e2b", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x1b, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10002}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{}, &(0x7f00000008c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0500000004000000ff0f00000500000000000000", @ANYRESOCT=r2, @ANYBLOB="0000000000000002000000000000000000000000ae0915d8005a2b45b02f5589a19ca53ec1c6539269cfcb421d6b974eaf97b5931fbe833b1a0a850abe6dc9e74831f8cd0e66a96c0366602a692effe7fa566a2cbd1ac9d548f942", @ANYRES32=r0, @ANYRES32, @ANYRES32=0x0], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x21, 0x800, 0x6, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r4 = gettid() perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x4, 0x10, 0x4, 0xf, 0x0, 0x4, 0x88000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x4000, 0x80, 0x200, 0x1, 0x101, 0x7ff, 0x7, 0x0, 0xfff, 0x0, 0x9}, r4, 0x6, 0xffffffffffffffff, 0x8) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r3}, 0xc) r6 = getpid() syz_open_procfs$namespace(r6, &(0x7f00000001c0)='ns/cgroup\x00') close(r5) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) 3.599404175s ago: executing program 1 (id=1878): perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0900000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000008c96"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0000000000000000000000000104000000000000", @ANYRES32, @ANYBLOB="ff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x31) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, r2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_clone(0x2108000, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0) syz_clone(0x220200, &(0x7f00000001c0), 0x0, &(0x7f0000000280), &(0x7f0000000340), &(0x7f0000000680)="3fa1f257ee9e6cab6a1ebd0eb5af933ac8985f9ffec55f1afa83abc8cc2acaef57243447935336745b06bf32d99b39261987252139d9c3a1e7a857d142ebe3d66545b39ca68f4ad8e5057fd85749512b0f83b1f9f65f097c1e26d9bcb1a33d3a0f8f0d3b42a72f7c98006f7b8f2ae3a8eea92a6fc000174a4795350a1de087ab87b517809fdb526534e079bc8422a4b9dfd325b8b9f701aaa278ca90b45035438564856d8d1c5812a424084d26f9bbf24773c97c0f6089b8498dd83b8ab2476fe9fffc713ab2f129d1a2579ff7f7c427") bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 3.251974771s ago: executing program 2 (id=1879): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 3.157371532s ago: executing program 2 (id=1880): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1}, 0x18) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x83, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0x64}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x0, 0x80, 0x4, 0x9, 0x1, 0xa, 0x0, 0x6, 0x800, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x5a86, 0xd}, 0x8200, 0x0, 0x8, 0x0, 0xbcff, 0xffffff80, 0xa, 0x0, 0x1, 0x0, 0x1fc000000000000}) 3.130055822s ago: executing program 3 (id=1881): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000", @ANYBLOB="00000000d3ec66ecc053c543da2e2e", @ANYRES64], 0x48) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c23003f) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x5, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000001580)='GPL\x00'}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r6, &(0x7f0000000740)=ANY=[@ANYBLOB="1e0308004d8c71ef2885634a8270e7123c00000000000000000000000000ac1414cf14"], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.271186816s ago: executing program 1 (id=1883): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001dc0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x8000}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x18) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, 0x0, &(0x7f0000000040)=""/73}, 0x20) 2.250563636s ago: executing program 2 (id=1884): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="2365152b5c62a905080000000100000000000098", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r1}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000000500"/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r9, 0x0, 0x87, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dcedf5112ee", 0x0, 0xc, 0x0, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r8, &(0x7f0000000880), 0x12) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x2480, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) 2.055086289s ago: executing program 0 (id=1885): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x5, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000380)='rxrpc_resend\x00', r2, 0x0, 0xafb}, 0x18) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) close(r4) 2.043382369s ago: executing program 1 (id=1886): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000040)={'veth0_to_batadv\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3a63a0eda83f91d6}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000"], 0x48) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) (async) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000040)={'veth0_to_batadv\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3a63a0eda83f91d6}}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000"], 0x48) (async) close(0xffffffffffffffff) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) 1.914707291s ago: executing program 3 (id=1887): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="2365152b5c62a905080000000100000000000098", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r1}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a, 0x0, 0x3e80}, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x5e) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r8, 0x0, 0x87, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dcedf5112ee", 0x0, 0xc, 0x0, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x2, 0x0, 0x7f}, 0x50) write$cgroup_pid(r7, &(0x7f0000000880), 0x12) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x2480, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) 1.913356681s ago: executing program 2 (id=1897): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB, @ANYRES8=0x0, @ANYRES16=r0, @ANYBLOB="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", @ANYRES8=0x0, @ANYBLOB], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x8000000}, 0x78) 1.798921213s ago: executing program 0 (id=1888): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r2, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000000)="7638956a65585578f830e9000000764036e4fc4a0ef1ff5ce537594cb13d3b52b580", 0x0, 0x9, 0x60000000, 0xfffffffffffffe8f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6}, 0x50) 1.713710294s ago: executing program 0 (id=1889): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x2, 0x0, 0x0, &(0x7f0000000580)='GPL\x00', 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x0, 0x0, 0x5, 0x1574}, 0x10, 0x0, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000640)=[{0x2, 0x4, 0x2, 0xc}], 0x10, 0x40}, 0x90) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c3000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000840), 0x2, 0x0) r2 = openat$cgroup_freezer_state(r0, &(0x7f0000002b00), 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) close(r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x18000000, &(0x7f0000000780)=ANY=[@ANYBLOB="0500000004001507e27f00006e0a5c7a700100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="050000002e004000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) ioctl$SIOCSIFHWADDR(r4, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000400000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r1, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e8500000008"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32, @ANYBLOB="0010aa02974ccdd26a71004491cbacd5eef836ea5de21b34aac246dd531044f421dc1cccee91be434f75d83fdf631012190673f8a316adb434b869ae87655b5f9ac4be1853488c2bc51e681e57b872b617d806bf516f7c17c1cb28529b2a690734388f5435f655a99eb5dc97e57b63e6e8b8d0e737d5d9301060f49f2eef78ad66e68020ecdb0ad3adfd3d006c4b21e721097517d02cbdf9d76eee82f838ea7b07c8e232", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r8, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r6, 0x0, 0x4a, 0x2c, &(0x7f0000000180)="b164ce4c75ffadc67249bf58a9025f2bc4cce78f92ceac6a03d78188577a4a9a1eb7e73e52cafac391e7c62563cc6cffce0d4d82297e3081103a3d441ff2e9baf4fc6a7ec82277abd1be", &(0x7f00000002c0)=""/44, 0x9, 0x0, 0x18, 0x74, &(0x7f0000000300)="fdde5e3a8a8d97f5796c4142f6e3f7672255405ed933734e", &(0x7f00000003c0)="a20b11d8e62e77970f09a2136b3c33a7c3fff4b58399c6d8966c661b21f09cfed1d419bea71f3d69a686e67794f3c854705e299ac216b060ba827131531b8ffe1ed8be647fe099ea78e51f9a239f8326dcd2da5e7d79b50a9a7d1d38865de5709aa90feedd4e62f37ab17ed7dedd81c3ed5ff275", 0x2, 0x0, 0x400}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x22}, 0x44) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) 1.596356996s ago: executing program 3 (id=1890): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) close(r3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 1.522759647s ago: executing program 2 (id=1891): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYBLOB, @ANYRESDEC, @ANYRESOCT=r0], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x200, 0x11, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) close(r0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 1.521854847s ago: executing program 1 (id=1892): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0xfffffffffffffd81, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'rose0\x00', 0x112}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'dummy0\x00', 0x1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000380)=r0}, 0x20) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r6}, 0x4) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x401c5820, &(0x7f00000001c0)=0xfdfdffff) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000640)=ANY=[@ANYBLOB="18080000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000000000085000000a500000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1e0000000900000007000000db000000800000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000005000000050000000a00"/28], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r8, 0xfcb4, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x0, 0x0, 0x0, 0x0, 0xc3, &(0x7f0000000640)=""/195, 0x0, 0x0, '\x00', r9, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x7}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x5a, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x53, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000060000008500000061000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001680)=@bpf_tracing={0x1a, 0x4, &(0x7f0000001480)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0xd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}], &(0x7f00000014c0)='syzkaller\x00', 0x8, 0x4, &(0x7f0000001500)=""/4, 0x41000, 0x8, '\x00', r9, 0x18, r7, 0x8, &(0x7f0000001540)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000001580)={0x0, 0x6, 0x6, 0x80de}, 0x10, 0x1264a, 0xffffffffffffffff, 0x6, &(0x7f00000015c0)=[r5, r8, r7, r7, r6], &(0x7f0000001740)=[{0x1, 0x1, 0xb, 0xa}, {0x5, 0x3, 0x8, 0xa}, {0x2, 0x1, 0xe, 0x3}, {0x4, 0x1, 0x9, 0xb}, {0x2, 0x5, 0xb, 0x5}, {0x2, 0x2, 0xe, 0xb}], 0x10, 0xef2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001e00)={0x5, 0x1a, &(0x7f0000000700)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}, @generic={0x89, 0x1, 0x5, 0x1, 0xae70}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, @cb_func, @jmp={0x5, 0x0, 0x5, 0x1, 0x7, 0x4, 0x10}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @map_fd={0x18, 0xb, 0x1, 0x0, r6}], &(0x7f0000000240)='syzkaller\x00', 0x7, 0xc7, &(0x7f00000019c0)=""/199, 0x40f00, 0x20, '\x00', r9, @fallback=0x11, r7, 0x8, &(0x7f0000000280)={0x1000000, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x3, 0x45, 0x6}, 0x10, r10, r11, 0x4, &(0x7f0000001d80)=[r7, r5, r6], &(0x7f0000001dc0)=[{0x4, 0x5, 0x3}, {0x5, 0x4, 0x10, 0x1}, {0x5, 0x3, 0x1, 0x9}, {0x3, 0x3, 0x2000000c, 0x6}], 0x10, 0x3ff}, 0x94) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001100), 0x4) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000011c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000012c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001240), &(0x7f0000001280)='%ps \x00'}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x10, &(0x7f0000000500)=@raw=[@jmp={0x5, 0x1, 0x5, 0x6, 0x4, 0x10, 0xfffffffffffffff0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}, @alu={0x7, 0x0, 0x7, 0x7, 0x6, 0x8, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @alu={0x4, 0x1, 0xd, 0x2, 0xb, 0x0, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @alu={0x4, 0x0, 0x4, 0x7, 0x0, 0x80, 0x8}], &(0x7f0000000580)='GPL\x00', 0x5, 0x62, &(0x7f0000001080)=""/98, 0x41100, 0x70, '\x00', r9, 0x25, r12, 0x8, &(0x7f0000001140)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000001180)={0x5, 0xf, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001300)=[r13, r14, 0xffffffffffffffff, r2], &(0x7f0000001340)=[{0x3, 0x4, 0xb, 0x7}, {0x4, 0x3, 0x3, 0x8}, {0x3, 0x1, 0x3, 0x6}, {0x1, 0x4, 0x0, 0xc}], 0x10, 0x83e}, 0x94) 1.448672118s ago: executing program 3 (id=1893): socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x50) r3 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000540)='(pu&00\t||') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) socketpair(0x2, 0x4, 0x93, &(0x7f0000000240)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101080, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110c230009) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280), 0x0, 0x73, 0x0, 0x0, 0x10, &(0x7f0000000300), &(0x7f00000003c0), 0x8, 0x8e, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x14, &(0x7f0000000640)=ANY=[@ANYRES8=r5, @ANYRES32=0x0, @ANYBLOB], 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) 1.364895129s ago: executing program 0 (id=1894): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1}, 0x18) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r4, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x83, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0x64}, 0x1f00) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x0, 0x80, 0x4, 0x9, 0x1, 0xa, 0x0, 0x6, 0x800, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_config_ext={0x5a86, 0xd}, 0x8200, 0x0, 0x8, 0x0, 0xbcff, 0xffffff80, 0xa, 0x0, 0x1, 0x0, 0x1fc000000000000}) 526.800372ms ago: executing program 0 (id=1895): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000004000000040000000900000000000000", @ANYRES32, @ANYBLOB="0000000000c5d7b8300220733600000000000007", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x26, 0x800, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xcfa4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0x9, 0x3, 0x4, 0x4}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x15, &(0x7f0000000100)={{r3}, &(0x7f0000000040), 0x0}, 0x20) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0x0, 0x24, 0x88, &(0x7f00000001c0)="0ef511b0a4d46140a71c0da1af9123326de5c98c4f516af047c95e4568f5ad4d8cac9205", &(0x7f0000000580)=""/136, 0x9, 0x0, 0xf7, 0x98, &(0x7f0000000780)="497e0dc5864fde2ed346aea87a9f2011f9e612b0cc53bcfb104da644f09a73af4085d90650e18093a4246d3698f5c22e635541d5aa7e8201cb33ae8071d51104a189e88a4bc00e966efb42112cea4aeb259846ed573799727a63e9fb39e95828795543028cc2d54d235755fd6694a4afefa8d6d40e433d207c81cf38445520fe3108571ab40b7c9bb5c68215f252a0e9978a919d269db11f3d1c538a9899eb6eb66849e109a05fe2d2d3034db1da7206f7a6deec1a0211a19a3f1c9a7e079ca329a82a18853df6ffd037b0ff6fe0aefb5eecc59e1508b58caa884433e727d6fdcd3d4d6d83af249252d8f6d88e9c35e1d04b1f88e9e8d1", &(0x7f00000009c0)="e40a1f05f833db52656b6ccd0def8d04628a54aa931a4bfd0f8d72654045a8968fdc712f807ceecc4f6301a88ced302dd0aad684d1f76ade3c7d4479f25abc9f965ab14bc1c3ff9439a4ce7e8c7d6ac56a140fbdf14cd2ba3f4f5c283707aac945fd7817298d708dfe470522da982035afa08d66a0e8d78be35b5ca3012b53de494af1fc4c73cb692463faa16e9f515629c11ef1eb81b4ae", 0x0, 0x0, 0xffffffff}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_kthread_work_queue_work\x00', r6}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xff00000000000003, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xf, 0x3, 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) 459.660973ms ago: executing program 1 (id=1896): bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e00000004000000040000000500000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000002cd54594846d4da088107b7c08fd84762eacbe27778fbaef7aead600e0bbc63a4cb70893835e00494bc684669646eb9e5d4a8352812cebe3908443f55f11c41e3aa18837dbcc42c8deea5d646240b068ec5ab70d9ab761c6fb50f2b564f4240d436ecb36a97d9ef42c9c1c04a41b4cb5005181889bdf42577ccf71dcd4f5cf2fd4e3712d55c68ed326ebb1efd52ed1430e2f3bd5a565f82ad6dafddc3467518f0aebbd9944a49fcbca9c53c981ce20f34b5d1f0a9296055e7f8e6030d69901", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) close(r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb010018000000000000000c00ed000c00000004000000010000000000000604000000005f3000"], 0x0, 0x28, 0x0, 0xfffffffd}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xe, 0x4, 0x4, 0x8}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1f, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006fa2850000000c00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x17, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x19, 0x4, 0x4, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_devices(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="1e030800d3ff71ef288543"], 0xffdd) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r3, @ANYBLOB="000101000000000000080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008d00000001000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000080), &(0x7f0000000180)=r8}, 0x20) ioctl$SIOCSIFHWADDR(r2, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r9}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) 397.483074ms ago: executing program 3 (id=1898): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) (async) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6fba", 0x3}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17110004000000000084000001000504df000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r8, 0x0, &(0x7f0000001780)=""/4096}, 0x20) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6d, '\x00', 0x0, @fallback=0x4, r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a2d}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) (async) gettid() (async) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000180100002020692500000000002060207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r12}, 0xc) (async) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r13, 0x0, 0xfffffdef) 254.128316ms ago: executing program 0 (id=1899): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRES32=r0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESDEC=r3, @ANYRESOCT=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3}, &(0x7f0000000000), &(0x7f0000000280)=r4}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21c04, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r11}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0900000007000000060000000800"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480), &(0x7f0000000380), 0x749b, r12}, 0x38) write$cgroup_subtree(r9, &(0x7f0000000000), 0xfdef) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r13}, 0x10) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) 138.071448ms ago: executing program 3 (id=1900): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000080000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000040008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffc}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r10}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r5, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000002c0), &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xde, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000480), 0x0, 0x0, 0xdb, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r11, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc98, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x4, 0x2, 0x1, 0x50}, @jmp={0x5, 0x0, 0x8, 0x4, 0x9, 0xffffffffffffffe0, 0xfffffffffffffff0}, @map_fd={0x18, 0x2, 0x1, 0x0, r2}]}, &(0x7f0000000080)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x44, '\x00', r11, 0x25, r12, 0x8, &(0x7f0000000340)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x2, 0x5}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000400)=[r2], &(0x7f00000004c0)=[{0x3, 0x5, 0xe, 0xa}], 0x10, 0x7}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r13}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 5 (id=1326): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061124c00000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x19) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0x7e, 0xf9, &(0x7f0000000080)="9969c7636e0a5baedd85401465f14f560812566b8cf8b88cbccae7cb03702b4df73af579f7d45deba62810d3b7027c6da60e7774f731cad2f1eb276e2a2c2c72d9ccd64efd2683bb912e78bcda53a40d8753c43c52965028aff56cf91bc3a59b55d44a19c5fa66c92861b5d1d9dafed8c1d7a28b48ecf7b7befb3a21d49a", &(0x7f0000000200)=""/249, 0x1, 0x0, 0xd7, 0x94, &(0x7f0000000300)="73102216beaa8edf793c65e279bb6bf5c0e0f013cce1f7a80242f3b739a9e747b8397d4a5c670319eae24bc784c22dcc236e5bede3cc6bd7f1d65ebc1fbad27fc20a3a65b594e91a98d10a161bb59bf026741ae82a01e93753d6b071d6eec962d8903a5244d004f3dce22f8e7c237295625ef4dd17c99eb4caa0048ce480410420056737ab03fef5f4c855a7fe82567a05fcac31e20df042e739528b315f7d18d359ff33d77b1ae44bcc955bd19641ca648416875eb5d8b2ecbbca95d6ae95930eb6fa5a6549cbdd14f6313736a472719814737ea05641", &(0x7f0000000400)="d2f13ee5fe766fe819f221afed3ef9bc94de8db2300f86676aaac7b585f63929e20ed06c74d7ce2f926e2f4d3ab1ce901b2e18febf829b0bf17c9f77c83201c4cf204e79ddc486746defc71e14c25cd0a32d7b271b58ee9c39881547fa43bbda3e7a707caeb33d742b6e1f49bcd546412e22d6750e2d629b35d2838d568607d89a1b879fb3582c8f3b1d61edd319272d27337776", 0x4, 0x0, 0xdf26}, 0x50) kernel console output (not intermixed with test programs): ed103ee265e8 [ 65.229101][ T1320] R10: ffffed103ee265e8 R11: 1ffff1103ee265e7 R12: ffff88812e43c000 [ 65.350343][ T1320] R13: 0000000000000002 R14: dffffc0000000000 R15: ffff8881277e8000 [ 65.388566][ T30] audit: type=1400 audit(1751780276.531:132): avc: denied { create } for pid=1346 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 65.389756][ T1320] FS: 00007f774ef296c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 65.422284][ T1320] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 65.429375][ T1320] CR2: 0000001b2d51fffc CR3: 000000011c392000 CR4: 00000000003506a0 [ 65.446114][ T1320] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 65.455628][ T1320] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 65.583047][ T1320] Call Trace: [ 65.586867][ T1320] [ 66.967223][ T1320] resolve_pseudo_ldimm64+0x685/0x11d0 [ 66.979175][ T1320] ? check_attach_btf_id+0xde0/0xde0 [ 66.985725][ T1320] ? bpf_check+0x2852/0xf330 [ 66.992352][ T1320] bpf_check+0x2c44/0xf330 [ 66.998407][ T1320] ? is_bpf_text_address+0x177/0x190 [ 67.005737][ T1320] ? bpf_get_btf_vmlinux+0x60/0x60 [ 67.011820][ T1320] ? unwind_get_return_address+0x4d/0x90 [ 67.018493][ T1320] ? stack_trace_save+0xe0/0xe0 [ 67.023567][ T1320] ? arch_stack_walk+0xee/0x140 [ 67.035055][ T1320] ? stack_trace_save+0x98/0xe0 [ 67.054470][ T1320] ? __stack_depot_save+0x34/0x480 [ 67.117608][ T1320] ? __kasan_slab_alloc+0x69/0xf0 [ 67.170603][ T1320] ? _find_next_bit+0x1fa/0x200 [ 67.175668][ T1320] ? __kasan_kmalloc+0xec/0x110 [ 67.239622][ T1320] ? __kasan_kmalloc+0xda/0x110 [ 67.308422][ T1320] ? kmem_cache_alloc_trace+0x119/0x270 [ 67.313617][ T1361] ref_ctr_offset mismatch. inode: 0x146 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 67.354856][ T1367] device pim6reg1 entered promiscuous mode [ 67.379638][ T1361] GPL: port 2(erspan0) entered blocking state [ 67.386747][ T1361] GPL: port 2(erspan0) entered disabled state [ 67.393410][ T1320] ? selinux_bpf_prog_alloc+0x51/0x140 [ 67.420544][ T1361] device erspan0 entered promiscuous mode [ 67.449995][ T1320] ? security_bpf_prog_alloc+0x62/0x90 [ 67.455497][ T1320] ? bpf_prog_load+0x97c/0x1550 [ 67.477490][ T1320] ? __sys_bpf+0x4c3/0x730 [ 67.483566][ T1320] ? __x64_sys_bpf+0x7c/0x90 [ 67.490006][ T1320] ? x64_sys_call+0x4b9/0x9a0 [ 67.494904][ T1320] ? do_syscall_64+0x4c/0xa0 [ 67.499558][ T1320] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 67.505747][ T1320] ? irqentry_exit+0x37/0x40 [ 67.510454][ T1320] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 67.516352][ T1320] ? irqentry_exit+0x37/0x40 [ 67.522560][ T1320] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 67.531137][ T1320] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 67.537860][ T1369] GPL: port 2(erspan0) entered blocking state [ 67.543963][ T1369] GPL: port 2(erspan0) entered forwarding state [ 67.550657][ T1320] ? bpf_prog_load+0x1021/0x1550 [ 67.555609][ T1320] bpf_prog_load+0x1042/0x1550 [ 67.562060][ T1320] ? map_freeze+0x360/0x360 [ 67.566624][ T1320] ? selinux_bpf+0xc7/0xf0 [ 67.586508][ T1320] ? security_bpf+0x82/0xa0 [ 67.595644][ T1320] __sys_bpf+0x4c3/0x730 [ 67.603225][ T1320] ? bpf_link_show_fdinfo+0x310/0x310 [ 67.612976][ T1320] ? __kasan_check_write+0x14/0x20 [ 67.631116][ T1320] ? switch_fpu_return+0x15d/0x2c0 [ 67.696764][ T1320] __x64_sys_bpf+0x7c/0x90 [ 67.743131][ T1320] x64_sys_call+0x4b9/0x9a0 [ 67.781408][ T1320] do_syscall_64+0x4c/0xa0 [ 67.807046][ T1320] ? clear_bhb_loop+0x50/0xa0 [ 67.816129][ T1320] ? clear_bhb_loop+0x50/0xa0 [ 67.830091][ T1320] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 67.866887][ T1320] RIP: 0033:0x7f77508c0929 [ 67.872280][ T1320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.901566][ T1320] RSP: 002b:00007f774ef29038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 67.911716][ T1320] RAX: ffffffffffffffda RBX: 00007f7750ae7fa0 RCX: 00007f77508c0929 [ 67.919735][ T1320] RDX: 0000000000000080 RSI: 0000200000000440 RDI: 0000000000000005 [ 67.927810][ T1320] RBP: 00007f7750942b39 R08: 0000000000000000 R09: 0000000000000000 [ 68.023590][ T1320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 68.154585][ T1320] R13: 0000000000000000 R14: 00007f7750ae7fa0 R15: 00007ffe1a5f51a8 [ 68.284330][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 68.314801][ T1320] [ 68.317902][ T1320] ---[ end trace 186478ca897ab84d ]--- [ 71.107898][ T1472] device sit0 entered promiscuous mode [ 72.615788][ T1514] device syzkaller0 entered promiscuous mode [ 72.622975][ T1526] ref_ctr_offset mismatch. inode: 0x172 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 74.458168][ T1568] device sit0 entered promiscuous mode [ 74.742807][ T1584] device sit0 left promiscuous mode [ 74.816867][ T1578] device sit0 entered promiscuous mode [ 76.376863][ T30] audit: type=1400 audit(1751780287.521:133): avc: denied { create } for pid=1635 comm="syz.4.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 77.781635][ T1661] device sit0 left promiscuous mode [ 77.902641][ T1661] device sit0 entered promiscuous mode [ 81.831034][ T1736] bridge0: port 3(veth0) entered blocking state [ 81.933526][ T1736] bridge0: port 3(veth0) entered disabled state [ 82.107937][ T1736] device veth0 entered promiscuous mode [ 82.216690][ T1736] bridge0: port 3(veth0) entered blocking state [ 82.223023][ T1736] bridge0: port 3(veth0) entered forwarding state [ 83.095817][ T1769] device sit0 left promiscuous mode [ 86.868301][ T1814] ref_ctr_offset mismatch. inode: 0x1cf offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 86.905395][ T1816] GPL: port 1(erspan0) entered blocking state [ 87.160912][ T1816] GPL: port 1(erspan0) entered disabled state [ 87.167883][ T1816] device erspan0 entered promiscuous mode [ 87.261304][ T1819] GPL: port 1(erspan0) entered blocking state [ 87.267421][ T1819] GPL: port 1(erspan0) entered forwarding state [ 89.451995][ T1866] device wg2 left promiscuous mode [ 90.344019][ T1884] device wg2 left promiscuous mode [ 91.933935][ T30] audit: type=1400 audit(1751780303.081:134): avc: denied { create } for pid=1918 comm="syz.4.445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 93.107936][ T1929] bridge0: port 3(veth0) entered blocking state [ 93.292186][ T1929] bridge0: port 3(veth0) entered disabled state [ 93.406278][ T1929] device veth0 entered promiscuous mode [ 93.593007][ T1929] bridge0: port 3(veth0) entered blocking state [ 93.599283][ T1929] bridge0: port 3(veth0) entered forwarding state [ 94.877551][ T1944] device pim6reg1 entered promiscuous mode [ 95.150324][ T30] audit: type=1400 audit(1751780306.301:135): avc: denied { create } for pid=1950 comm="syz.2.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 95.908662][ T1970] device veth0_vlan left promiscuous mode [ 96.067396][ T1970] device veth0_vlan entered promiscuous mode [ 96.274800][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 96.293640][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 96.323379][ T341] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 96.680656][ T1988] device sit0 left promiscuous mode [ 96.994394][ T1992] bond_slave_1: mtu less than device minimum [ 97.034306][ T1982] bridge0: port 3(veth0) entered blocking state [ 97.055476][ T1982] bridge0: port 3(veth0) entered disabled state [ 97.110295][ T1982] device veth0 entered promiscuous mode [ 97.124304][ T1982] bridge0: port 3(veth0) entered blocking state [ 97.132516][ T1982] bridge0: port 3(veth0) entered forwarding state [ 97.677613][ T30] audit: type=1400 audit(1751780308.821:136): avc: denied { create } for pid=2021 comm="syz.2.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 97.821910][ T30] audit: type=1400 audit(1751780308.821:137): avc: denied { create } for pid=2021 comm="syz.2.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 97.916869][ T30] audit: type=1400 audit(1751780308.851:138): avc: denied { create } for pid=2017 comm="syz.3.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 97.946881][ T30] audit: type=1400 audit(1751780308.871:139): avc: denied { create } for pid=2021 comm="syz.2.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 102.204301][ T2130] device veth1_macvtap left promiscuous mode [ 102.240098][ T2130] device macsec0 entered promiscuous mode [ 105.100351][ T30] audit: type=1400 audit(1751780316.241:140): avc: denied { create } for pid=2257 comm="syz.1.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 105.354647][ T30] audit: type=1400 audit(1751780316.501:141): avc: denied { create } for pid=2271 comm="syz.2.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 106.054632][ T2296] bond_slave_1: mtu less than device minimum [ 106.800922][ T30] audit: type=1400 audit(1751780317.951:142): avc: denied { create } for pid=2317 comm="syz.0.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 107.151511][ T2311] device wg2 entered promiscuous mode [ 113.710037][ T2359] dvmrp1: tun_chr_ioctl cmd 1074812117 [ 120.362865][ T281] syz-executor (281) used greatest stack depth: 21184 bytes left [ 120.386588][ T2374] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.403243][ T2374] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.452877][ T2374] device bridge_slave_0 entered promiscuous mode [ 120.510295][ T2374] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.517323][ T2374] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.550562][ T2374] device bridge_slave_1 entered promiscuous mode [ 120.853855][ T2398] device syzkaller0 entered promiscuous mode [ 121.580589][ T8] device erspan0 left promiscuous mode [ 121.586092][ T8] GPL: port 1(erspan0) entered disabled state [ 121.596712][ T30] audit: type=1400 audit(1751780332.741:143): avc: denied { create } for pid=2374 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 121.690577][ T30] audit: type=1400 audit(1751780332.741:144): avc: denied { write } for pid=2374 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 121.820905][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 121.842363][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 121.852663][ T30] audit: type=1400 audit(1751780332.741:145): avc: denied { read } for pid=2374 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 121.948620][ T2433] device veth0_vlan left promiscuous mode [ 122.035134][ T2433] device veth0_vlan entered promiscuous mode [ 122.389664][ T2442] device pim6reg1 entered promiscuous mode [ 122.406778][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.435554][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.513483][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.520583][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.686149][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.780819][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.874478][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.881557][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.030100][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.116539][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.152627][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.167193][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 123.193379][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 123.329640][ T2437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 123.338011][ T2437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.369205][ T2480] device syzkaller0 entered promiscuous mode [ 123.423399][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 123.435190][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 123.458339][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 123.475266][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.484263][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.532507][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 123.544039][ T2374] device veth0_vlan entered promiscuous mode [ 123.571835][ T2374] device veth1_macvtap entered promiscuous mode [ 123.585500][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 123.594018][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 123.603193][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 123.644173][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 123.652884][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 123.661982][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 123.670486][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 123.692146][ T2495] device pim6reg1 entered promiscuous mode [ 124.292990][ T2514] FAULT_INJECTION: forcing a failure. [ 124.292990][ T2514] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 124.630114][ T2514] CPU: 1 PID: 2514 Comm: syz.0.612 Tainted: G W 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 124.641385][ T2514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 124.651448][ T2514] Call Trace: [ 124.654719][ T2514] [ 124.657640][ T2514] __dump_stack+0x21/0x30 [ 124.661977][ T2514] dump_stack_lvl+0xee/0x150 [ 124.666562][ T2514] ? show_regs_print_info+0x20/0x20 [ 124.671762][ T2514] dump_stack+0x15/0x20 [ 124.675906][ T2514] should_fail+0x3c1/0x510 [ 124.680312][ T2514] should_fail_usercopy+0x1a/0x20 [ 124.685339][ T2514] _copy_from_user+0x20/0xd0 [ 124.689922][ T2514] __sys_bpf+0x233/0x730 [ 124.694156][ T2514] ? bpf_link_show_fdinfo+0x310/0x310 [ 124.699530][ T2514] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 124.705684][ T2514] __x64_sys_bpf+0x7c/0x90 [ 124.710092][ T2514] x64_sys_call+0x4b9/0x9a0 [ 124.714580][ T2514] do_syscall_64+0x4c/0xa0 [ 124.718980][ T2514] ? clear_bhb_loop+0x50/0xa0 [ 124.723635][ T2514] ? clear_bhb_loop+0x50/0xa0 [ 124.728288][ T2514] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 124.734158][ T2514] RIP: 0033:0x7f9e7f96b929 [ 124.738550][ T2514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 124.758132][ T2514] RSP: 002b:00007f9e7dfd4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 124.766523][ T2514] RAX: ffffffffffffffda RBX: 00007f9e7fb92fa0 RCX: 00007f9e7f96b929 [ 124.774473][ T2514] RDX: 0000000000000078 RSI: 0000200000000440 RDI: 0000000000000005 [ 124.782423][ T2514] RBP: 00007f9e7dfd4090 R08: 0000000000000000 R09: 0000000000000000 [ 124.790372][ T2514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 124.798323][ T2514] R13: 0000000000000000 R14: 00007f9e7fb92fa0 R15: 00007ffdf889b028 [ 124.806274][ T2514] [ 126.165756][ T2565] FAULT_INJECTION: forcing a failure. [ 126.165756][ T2565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 126.285646][ T2565] CPU: 1 PID: 2565 Comm: syz.3.628 Tainted: G W 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 126.296876][ T2565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 126.306932][ T2565] Call Trace: [ 126.310205][ T2565] [ 126.313129][ T2565] __dump_stack+0x21/0x30 [ 126.317453][ T2565] dump_stack_lvl+0xee/0x150 [ 126.322036][ T2565] ? show_regs_print_info+0x20/0x20 [ 126.327226][ T2565] ? cpu_clock_event_read+0x50/0x50 [ 126.332425][ T2565] dump_stack+0x15/0x20 [ 126.336592][ T2565] should_fail+0x3c1/0x510 [ 126.341015][ T2565] should_fail_usercopy+0x1a/0x20 [ 126.346040][ T2565] strncpy_from_user+0x24/0x2e0 [ 126.350888][ T2565] bpf_prog_load+0x1b8/0x1550 [ 126.355609][ T2565] ? map_freeze+0x360/0x360 [ 126.360106][ T2565] ? __sys_bpf+0x2b1/0x730 [ 126.364512][ T2565] __sys_bpf+0x4c3/0x730 [ 126.368747][ T2565] ? bpf_link_show_fdinfo+0x310/0x310 [ 126.374111][ T2565] __x64_sys_bpf+0x7c/0x90 [ 126.378531][ T2565] x64_sys_call+0x4b9/0x9a0 [ 126.383055][ T2565] do_syscall_64+0x4c/0xa0 [ 126.387474][ T2565] ? clear_bhb_loop+0x50/0xa0 [ 126.392150][ T2565] ? clear_bhb_loop+0x50/0xa0 [ 126.396820][ T2565] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 126.402699][ T2565] RIP: 0033:0x7f750e33a929 [ 126.407097][ T2565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.426684][ T2565] RSP: 002b:00007f750c9a3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 126.435076][ T2565] RAX: ffffffffffffffda RBX: 00007f750e561fa0 RCX: 00007f750e33a929 [ 126.443027][ T2565] RDX: 0000000000000078 RSI: 0000200000000440 RDI: 0000000000000005 [ 126.450976][ T2565] RBP: 00007f750c9a3090 R08: 0000000000000000 R09: 0000000000000000 [ 126.458923][ T2565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.466869][ T2565] R13: 0000000000000000 R14: 00007f750e561fa0 R15: 00007ffc796ef488 [ 126.474826][ T2565] [ 127.865212][ T2623] FAULT_INJECTION: forcing a failure. [ 127.865212][ T2623] name failslab, interval 1, probability 0, space 0, times 1 [ 127.952757][ T2623] CPU: 0 PID: 2623 Comm: syz.1.645 Tainted: G W 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 127.963993][ T2623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 127.974047][ T2623] Call Trace: [ 127.977321][ T2623] [ 127.980249][ T2623] __dump_stack+0x21/0x30 [ 127.984577][ T2623] dump_stack_lvl+0xee/0x150 [ 127.989165][ T2623] ? show_regs_print_info+0x20/0x20 [ 127.994356][ T2623] dump_stack+0x15/0x20 [ 127.998510][ T2623] should_fail+0x3c1/0x510 [ 128.002921][ T2623] __should_failslab+0xa4/0xe0 [ 128.007680][ T2623] should_failslab+0x9/0x20 [ 128.012176][ T2623] slab_pre_alloc_hook+0x3b/0xe0 [ 128.017111][ T2623] kmem_cache_alloc_trace+0x48/0x270 [ 128.022392][ T2623] ? __get_vm_area_node+0x11d/0x350 [ 128.027587][ T2623] __get_vm_area_node+0x11d/0x350 [ 128.032607][ T2623] __vmalloc_node_range+0xe8/0x840 [ 128.037715][ T2623] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 128.043257][ T2623] ? irqentry_exit+0x37/0x40 [ 128.047844][ T2623] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 128.053644][ T2623] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 128.059794][ T2623] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 128.065330][ T2623] __vmalloc+0x79/0x90 [ 128.069395][ T2623] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 128.074937][ T2623] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 128.080301][ T2623] bpf_prog_alloc+0x1f/0x1e0 [ 128.084881][ T2623] bpf_prog_load+0x7c3/0x1550 [ 128.089551][ T2623] ? map_freeze+0x360/0x360 [ 128.094052][ T2623] ? selinux_bpf+0xc7/0xf0 [ 128.098468][ T2623] ? security_bpf+0x82/0xa0 [ 128.102972][ T2623] __sys_bpf+0x4c3/0x730 [ 128.107217][ T2623] ? bpf_link_show_fdinfo+0x310/0x310 [ 128.112592][ T2623] ? bpf_trace_run2+0xb5/0x1b0 [ 128.117362][ T2623] __x64_sys_bpf+0x7c/0x90 [ 128.121773][ T2623] x64_sys_call+0x4b9/0x9a0 [ 128.126283][ T2623] do_syscall_64+0x4c/0xa0 [ 128.130695][ T2623] ? clear_bhb_loop+0x50/0xa0 [ 128.135367][ T2623] ? clear_bhb_loop+0x50/0xa0 [ 128.140035][ T2623] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.145927][ T2623] RIP: 0033:0x7f4c689a5929 [ 128.150333][ T2623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.169931][ T2623] RSP: 002b:00007f4c6700e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 128.178343][ T2623] RAX: ffffffffffffffda RBX: 00007f4c68bccfa0 RCX: 00007f4c689a5929 [ 128.186313][ T2623] RDX: 0000000000000078 RSI: 0000200000000440 RDI: 0000000000000005 [ 128.194281][ T2623] RBP: 00007f4c6700e090 R08: 0000000000000000 R09: 0000000000000000 [ 128.202246][ T2623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.210207][ T2623] R13: 0000000000000000 R14: 00007f4c68bccfa0 R15: 00007fffaf1d86f8 [ 128.218177][ T2623] [ 128.282982][ T2623] syz.1.645: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 128.302104][ T2623] CPU: 0 PID: 2623 Comm: syz.1.645 Tainted: G W 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 128.313323][ T2623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 128.323372][ T2623] Call Trace: [ 128.326643][ T2623] [ 128.329561][ T2623] __dump_stack+0x21/0x30 [ 128.333885][ T2623] dump_stack_lvl+0xee/0x150 [ 128.338464][ T2623] ? show_regs_print_info+0x20/0x20 [ 128.343656][ T2623] dump_stack+0x15/0x20 [ 128.347804][ T2623] warn_alloc+0x1b0/0x1d0 [ 128.352130][ T2623] ? __should_failslab+0xa4/0xe0 [ 128.357064][ T2623] ? zone_watermark_ok_safe+0x270/0x270 [ 128.362609][ T2623] ? __vmalloc_node_range+0x2ae/0x840 [ 128.367985][ T2623] __vmalloc_node_range+0x2c4/0x840 [ 128.373174][ T2623] ? irqentry_exit+0x37/0x40 [ 128.377759][ T2623] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 128.383556][ T2623] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 128.389704][ T2623] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 128.395240][ T2623] __vmalloc+0x79/0x90 [ 128.399300][ T2623] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 128.404838][ T2623] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 128.410192][ T2623] bpf_prog_alloc+0x1f/0x1e0 [ 128.414760][ T2623] bpf_prog_load+0x7c3/0x1550 [ 128.419412][ T2623] ? map_freeze+0x360/0x360 [ 128.423892][ T2623] ? selinux_bpf+0xc7/0xf0 [ 128.428285][ T2623] ? security_bpf+0x82/0xa0 [ 128.432762][ T2623] __sys_bpf+0x4c3/0x730 [ 128.436978][ T2623] ? bpf_link_show_fdinfo+0x310/0x310 [ 128.442321][ T2623] ? bpf_trace_run2+0xb5/0x1b0 [ 128.447061][ T2623] __x64_sys_bpf+0x7c/0x90 [ 128.451469][ T2623] x64_sys_call+0x4b9/0x9a0 [ 128.456377][ T2623] do_syscall_64+0x4c/0xa0 [ 128.460764][ T2623] ? clear_bhb_loop+0x50/0xa0 [ 128.465413][ T2623] ? clear_bhb_loop+0x50/0xa0 [ 128.470061][ T2623] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.475948][ T2623] RIP: 0033:0x7f4c689a5929 [ 128.480337][ T2623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.499916][ T2623] RSP: 002b:00007f4c6700e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 128.508307][ T2623] RAX: ffffffffffffffda RBX: 00007f4c68bccfa0 RCX: 00007f4c689a5929 [ 128.516251][ T2623] RDX: 0000000000000078 RSI: 0000200000000440 RDI: 0000000000000005 [ 128.524196][ T2623] RBP: 00007f4c6700e090 R08: 0000000000000000 R09: 0000000000000000 [ 128.532140][ T2623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.540089][ T2623] R13: 0000000000000000 R14: 00007f4c68bccfa0 R15: 00007fffaf1d86f8 [ 128.548056][ T2623] [ 128.558069][ T2623] Mem-Info: [ 128.562042][ T2623] active_anon:37 inactive_anon:5340 isolated_anon:0 [ 128.562042][ T2623] active_file:19234 inactive_file:6034 isolated_file:0 [ 128.562042][ T2623] unevictable:0 dirty:220 writeback:0 [ 128.562042][ T2623] slab_reclaimable:8454 slab_unreclaimable:74141 [ 128.562042][ T2623] mapped:30244 shmem:163 pagetables:683 bounce:0 [ 128.562042][ T2623] kernel_misc_reclaimable:0 [ 128.562042][ T2623] free:1540145 free_pcp:26331 free_cma:0 [ 128.604456][ T2623] Node 0 active_anon:148kB inactive_anon:21260kB active_file:76936kB inactive_file:24136kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:120976kB dirty:880kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5784kB pagetables:2732kB all_unreclaimable? no [ 128.637378][ T2623] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2983004kB mlocked:0kB bounce:0kB free_pcp:4232kB local_pcp:4232kB free_cma:0kB [ 128.679233][ T2623] lowmem_reserve[]: 0 3941 3941 [ 128.684181][ T2623] Normal free:3181884kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:148kB inactive_anon:19800kB active_file:76936kB inactive_file:24136kB unevictable:0kB writepending:880kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:103996kB local_pcp:51192kB free_cma:0kB [ 128.713680][ T2623] lowmem_reserve[]: 0 0 0 [ 128.718028][ T2623] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 128.734266][ T2623] Normal: 841*4kB (UME) 799*8kB (UME) 383*16kB (UME) 997*32kB (UME) 919*64kB (UME) 442*128kB (UME) 324*256kB (UM) 164*512kB (UME) 45*1024kB (UME) 16*2048kB (UME) 677*4096kB (UM) = 3181932kB [ 128.755666][ T2623] 25431 total pagecache pages [ 128.760479][ T2623] 0 pages in swap cache [ 128.780151][ T2623] Swap cache stats: add 0, delete 0, find 0/0 [ 128.786232][ T2623] Free swap = 124996kB [ 128.792405][ T2623] Total swap = 124996kB [ 128.796571][ T2623] 2097051 pages RAM [ 128.800426][ T2623] 0 pages HighMem/MovableOnly [ 128.805132][ T2623] 342276 pages reserved [ 128.810278][ T2623] 0 pages cma reserved [ 128.847752][ T2638] device pim6reg1 entered promiscuous mode [ 129.103858][ T2658] device pim6reg1 entered promiscuous mode [ 129.334762][ T30] audit: type=1400 audit(1751780340.481:146): avc: denied { read } for pid=2661 comm="syz.1.658" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 129.356186][ T30] audit: type=1400 audit(1751780340.481:147): avc: denied { open } for pid=2661 comm="syz.1.658" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 129.385824][ T30] audit: type=1400 audit(1751780340.501:148): avc: denied { ioctl } for pid=2661 comm="syz.1.658" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 131.031979][ T2705] device syzkaller0 entered promiscuous mode [ 131.110784][ T2710] device syzkaller0 entered promiscuous mode [ 131.525216][ T2726] device pim6reg1 entered promiscuous mode [ 131.613683][ T2731] syz.1.679[2731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.613862][ T2731] syz.1.679[2731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.409446][ T2768] device veth0_vlan left promiscuous mode [ 132.569132][ T2768] device veth0_vlan entered promiscuous mode [ 132.903201][ T2437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.920595][ T2437] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.021495][ T2437] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.639745][ T2819] device syzkaller0 entered promiscuous mode [ 134.056162][ T2849] device syzkaller0 entered promiscuous mode [ 134.632747][ T30] audit: type=1400 audit(1751780345.781:149): avc: denied { create } for pid=2881 comm="syz.2.731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 134.676162][ T2884] bridge0: port 3(veth0) entered disabled state [ 134.682514][ T2884] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.689699][ T2884] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.901372][ T2884] device veth0 left promiscuous mode [ 134.964097][ T2884] bridge0: port 3(veth0) entered disabled state [ 135.070267][ T2884] device bridge_slave_1 left promiscuous mode [ 135.110131][ T2884] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.117996][ T2884] device bridge_slave_0 left promiscuous mode [ 135.124543][ T2884] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.414225][ T2902] device veth1_macvtap left promiscuous mode [ 138.707748][ T3013] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 138.896661][ T3013] device syzkaller0 entered promiscuous mode [ 140.271218][ T3056] device pim6reg1 entered promiscuous mode [ 141.566435][ T3106] FAULT_INJECTION: forcing a failure. [ 141.566435][ T3106] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.630097][ T3106] CPU: 1 PID: 3106 Comm: syz.3.795 Tainted: G W 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 141.641329][ T3106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 141.651387][ T3106] Call Trace: [ 141.654664][ T3106] [ 141.657595][ T3106] __dump_stack+0x21/0x30 [ 141.661923][ T3106] dump_stack_lvl+0xee/0x150 [ 141.666517][ T3106] ? show_regs_print_info+0x20/0x20 [ 141.671713][ T3106] ? vfs_write+0xc17/0xf70 [ 141.676133][ T3106] dump_stack+0x15/0x20 [ 141.680284][ T3106] should_fail+0x3c1/0x510 [ 141.684703][ T3106] should_fail_usercopy+0x1a/0x20 [ 141.689718][ T3106] _copy_from_user+0x20/0xd0 [ 141.694306][ T3106] __sys_bpf+0x233/0x730 [ 141.698535][ T3106] ? bpf_link_show_fdinfo+0x310/0x310 [ 141.703893][ T3106] ? debug_smp_processor_id+0x17/0x20 [ 141.709250][ T3106] __x64_sys_bpf+0x7c/0x90 [ 141.713672][ T3106] x64_sys_call+0x4b9/0x9a0 [ 141.718160][ T3106] do_syscall_64+0x4c/0xa0 [ 141.722553][ T3106] ? clear_bhb_loop+0x50/0xa0 [ 141.727215][ T3106] ? clear_bhb_loop+0x50/0xa0 [ 141.731866][ T3106] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 141.737736][ T3106] RIP: 0033:0x7f750e33a929 [ 141.742129][ T3106] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.761716][ T3106] RSP: 002b:00007f750c982038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 141.770109][ T3106] RAX: ffffffffffffffda RBX: 00007f750e562080 RCX: 00007f750e33a929 [ 141.778061][ T3106] RDX: 0000000000000050 RSI: 00002000000009c0 RDI: 000000000000000a [ 141.786011][ T3106] RBP: 00007f750c982090 R08: 0000000000000000 R09: 0000000000000000 [ 141.793960][ T3106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.801907][ T3106] R13: 0000000000000000 R14: 00007f750e562080 R15: 00007ffc796ef488 [ 141.809859][ T3106] [ 142.625341][ T3141] bridge0: port 3(veth0) entered disabled state [ 142.633870][ T3141] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.644751][ T3141] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.082706][ T3157] FAULT_INJECTION: forcing a failure. [ 143.082706][ T3157] name failslab, interval 1, probability 0, space 0, times 0 [ 143.116391][ T3157] CPU: 0 PID: 3157 Comm: syz.1.809 Tainted: G W 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 143.127625][ T3157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 143.137676][ T3157] Call Trace: [ 143.140949][ T3157] [ 143.143869][ T3157] __dump_stack+0x21/0x30 [ 143.148187][ T3157] dump_stack_lvl+0xee/0x150 [ 143.152755][ T3157] ? show_regs_print_info+0x20/0x20 [ 143.157935][ T3157] dump_stack+0x15/0x20 [ 143.162069][ T3157] should_fail+0x3c1/0x510 [ 143.166469][ T3157] __should_failslab+0xa4/0xe0 [ 143.171220][ T3157] should_failslab+0x9/0x20 [ 143.175705][ T3157] slab_pre_alloc_hook+0x3b/0xe0 [ 143.180624][ T3157] __kmalloc+0x6d/0x2c0 [ 143.184761][ T3157] ? bpf_test_init+0x100/0x1c0 [ 143.189504][ T3157] bpf_test_init+0x100/0x1c0 [ 143.194071][ T3157] bpf_prog_test_run_xdp+0x1ae/0x910 [ 143.199340][ T3157] ? dev_put+0x80/0x80 [ 143.203388][ T3157] ? __fget_files+0x2c4/0x320 [ 143.208056][ T3157] ? fput_many+0x15a/0x1a0 [ 143.212474][ T3157] ? dev_put+0x80/0x80 [ 143.216536][ T3157] bpf_prog_test_run+0x3d5/0x620 [ 143.221457][ T3157] ? bpf_prog_query+0x230/0x230 [ 143.226287][ T3157] ? selinux_bpf+0xce/0xf0 [ 143.230697][ T3157] ? security_bpf+0x82/0xa0 [ 143.235181][ T3157] __sys_bpf+0x52c/0x730 [ 143.239401][ T3157] ? bpf_link_show_fdinfo+0x310/0x310 [ 143.244755][ T3157] ? debug_smp_processor_id+0x17/0x20 [ 143.250116][ T3157] __x64_sys_bpf+0x7c/0x90 [ 143.254511][ T3157] x64_sys_call+0x4b9/0x9a0 [ 143.258997][ T3157] do_syscall_64+0x4c/0xa0 [ 143.263392][ T3157] ? clear_bhb_loop+0x50/0xa0 [ 143.268053][ T3157] ? clear_bhb_loop+0x50/0xa0 [ 143.272714][ T3157] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 143.278587][ T3157] RIP: 0033:0x7f4c689a5929 [ 143.282980][ T3157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.302562][ T3157] RSP: 002b:00007f4c6700e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 143.310956][ T3157] RAX: ffffffffffffffda RBX: 00007f4c68bccfa0 RCX: 00007f4c689a5929 [ 143.318903][ T3157] RDX: 0000000000000050 RSI: 00002000000009c0 RDI: 000000000000000a [ 143.326851][ T3157] RBP: 00007f4c6700e090 R08: 0000000000000000 R09: 0000000000000000 [ 143.334802][ T3157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.342754][ T3157] R13: 0000000000000000 R14: 00007f4c68bccfa0 R15: 00007fffaf1d86f8 [ 143.350711][ T3157] [ 143.530594][ T3171] device sit0 entered promiscuous mode [ 144.294559][ T3218] FAULT_INJECTION: forcing a failure. [ 144.294559][ T3218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.324376][ T3218] CPU: 0 PID: 3218 Comm: syz.2.828 Tainted: G W 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 144.335604][ T3218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 144.345650][ T3218] Call Trace: [ 144.348925][ T3218] [ 144.351848][ T3218] __dump_stack+0x21/0x30 [ 144.356178][ T3218] dump_stack_lvl+0xee/0x150 [ 144.360763][ T3218] ? show_regs_print_info+0x20/0x20 [ 144.365954][ T3218] dump_stack+0x15/0x20 [ 144.370101][ T3218] should_fail+0x3c1/0x510 [ 144.374509][ T3218] should_fail_usercopy+0x1a/0x20 [ 144.379533][ T3218] _copy_from_user+0x20/0xd0 [ 144.384125][ T3218] bpf_test_init+0x13d/0x1c0 [ 144.388709][ T3218] bpf_prog_test_run_xdp+0x1ae/0x910 [ 144.393985][ T3218] ? dev_put+0x80/0x80 [ 144.398041][ T3218] ? __fget_files+0x2c4/0x320 [ 144.402716][ T3218] ? fput_many+0x15a/0x1a0 [ 144.407119][ T3218] ? dev_put+0x80/0x80 [ 144.411176][ T3218] bpf_prog_test_run+0x3d5/0x620 [ 144.416106][ T3218] ? bpf_prog_query+0x230/0x230 [ 144.420943][ T3218] ? selinux_bpf+0xce/0xf0 [ 144.425349][ T3218] ? security_bpf+0x82/0xa0 [ 144.429838][ T3218] __sys_bpf+0x52c/0x730 [ 144.434073][ T3218] ? bpf_link_show_fdinfo+0x310/0x310 [ 144.439445][ T3218] ? debug_smp_processor_id+0x17/0x20 [ 144.444816][ T3218] __x64_sys_bpf+0x7c/0x90 [ 144.449232][ T3218] x64_sys_call+0x4b9/0x9a0 [ 144.453734][ T3218] do_syscall_64+0x4c/0xa0 [ 144.458137][ T3218] ? clear_bhb_loop+0x50/0xa0 [ 144.462804][ T3218] ? clear_bhb_loop+0x50/0xa0 [ 144.467469][ T3218] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 144.473352][ T3218] RIP: 0033:0x7fc9eab3f929 [ 144.477757][ T3218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.497352][ T3218] RSP: 002b:00007fc9e91a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 144.505773][ T3218] RAX: ffffffffffffffda RBX: 00007fc9ead66fa0 RCX: 00007fc9eab3f929 [ 144.513748][ T3218] RDX: 0000000000000050 RSI: 00002000000009c0 RDI: 000000000000000a [ 144.521719][ T3218] RBP: 00007fc9e91a8090 R08: 0000000000000000 R09: 0000000000000000 [ 144.529690][ T3218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.537667][ T3218] R13: 0000000000000000 R14: 00007fc9ead66fa0 R15: 00007ffc29967a08 [ 144.545642][ T3218] [ 145.787558][ T3272] FAULT_INJECTION: forcing a failure. [ 145.787558][ T3272] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.800810][ T3272] CPU: 0 PID: 3272 Comm: syz.1.847 Tainted: G W 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 145.812003][ T3272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 145.822056][ T3272] Call Trace: [ 145.825318][ T3272] [ 145.828228][ T3272] __dump_stack+0x21/0x30 [ 145.832537][ T3272] dump_stack_lvl+0xee/0x150 [ 145.837103][ T3272] ? show_regs_print_info+0x20/0x20 [ 145.842277][ T3272] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 145.847719][ T3272] dump_stack+0x15/0x20 [ 145.851875][ T3272] should_fail+0x3c1/0x510 [ 145.856271][ T3272] should_fail_usercopy+0x1a/0x20 [ 145.861271][ T3272] _copy_to_user+0x20/0x90 [ 145.865665][ T3272] bpf_test_finish+0x1ae/0x3b0 [ 145.870404][ T3272] ? convert_skb_to___skb+0x360/0x360 [ 145.875754][ T3272] ? xdp_convert_buff_to_md+0x15c/0x1e0 [ 145.881273][ T3272] bpf_prog_test_run_xdp+0x62d/0x910 [ 145.886534][ T3272] ? dev_put+0x80/0x80 [ 145.890577][ T3272] ? __fget_files+0x2c4/0x320 [ 145.895234][ T3272] ? fput_many+0x15a/0x1a0 [ 145.899628][ T3272] ? dev_put+0x80/0x80 [ 145.903671][ T3272] bpf_prog_test_run+0x3d5/0x620 [ 145.908590][ T3272] ? bpf_prog_query+0x230/0x230 [ 145.913416][ T3272] ? selinux_bpf+0xce/0xf0 [ 145.917815][ T3272] ? security_bpf+0x82/0xa0 [ 145.922299][ T3272] __sys_bpf+0x52c/0x730 [ 145.926521][ T3272] ? bpf_link_show_fdinfo+0x310/0x310 [ 145.931869][ T3272] ? debug_smp_processor_id+0x17/0x20 [ 145.937218][ T3272] __x64_sys_bpf+0x7c/0x90 [ 145.941608][ T3272] x64_sys_call+0x4b9/0x9a0 [ 145.946087][ T3272] do_syscall_64+0x4c/0xa0 [ 145.950478][ T3272] ? clear_bhb_loop+0x50/0xa0 [ 145.955134][ T3272] ? clear_bhb_loop+0x50/0xa0 [ 145.959786][ T3272] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 145.965655][ T3272] RIP: 0033:0x7f4c689a5929 [ 145.970050][ T3272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.989631][ T3272] RSP: 002b:00007f4c6700e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 145.998021][ T3272] RAX: ffffffffffffffda RBX: 00007f4c68bccfa0 RCX: 00007f4c689a5929 [ 146.005968][ T3272] RDX: 0000000000000050 RSI: 00002000000009c0 RDI: 000000000000000a [ 146.013918][ T3272] RBP: 00007f4c6700e090 R08: 0000000000000000 R09: 0000000000000000 [ 146.021875][ T3272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.029837][ T3272] R13: 0000000000000000 R14: 00007f4c68bccfa0 R15: 00007fffaf1d86f8 [ 146.037803][ T3272] [ 147.499826][ T3325] FAULT_INJECTION: forcing a failure. [ 147.499826][ T3325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 147.642261][ T3325] CPU: 1 PID: 3325 Comm: syz.3.861 Tainted: G W 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 147.653491][ T3325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 147.663533][ T3325] Call Trace: [ 147.666793][ T3325] [ 147.669703][ T3325] __dump_stack+0x21/0x30 [ 147.674013][ T3325] dump_stack_lvl+0xee/0x150 [ 147.678582][ T3325] ? show_regs_print_info+0x20/0x20 [ 147.683756][ T3325] ? bpf_test_timer_continue+0x155/0x4a0 [ 147.689368][ T3325] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 147.694802][ T3325] dump_stack+0x15/0x20 [ 147.698934][ T3325] should_fail+0x3c1/0x510 [ 147.703327][ T3325] should_fail_usercopy+0x1a/0x20 [ 147.708330][ T3325] _copy_to_user+0x20/0x90 [ 147.712726][ T3325] bpf_test_finish+0x1dd/0x3b0 [ 147.717471][ T3325] ? convert_skb_to___skb+0x360/0x360 [ 147.722823][ T3325] ? xdp_convert_buff_to_md+0x15c/0x1e0 [ 147.728347][ T3325] bpf_prog_test_run_xdp+0x62d/0x910 [ 147.733609][ T3325] ? dev_put+0x80/0x80 [ 147.737654][ T3325] ? __fget_files+0x2c4/0x320 [ 147.742308][ T3325] ? fput_many+0x15a/0x1a0 [ 147.746702][ T3325] ? dev_put+0x80/0x80 [ 147.750749][ T3325] bpf_prog_test_run+0x3d5/0x620 [ 147.755663][ T3325] ? bpf_prog_query+0x230/0x230 [ 147.760487][ T3325] ? selinux_bpf+0xce/0xf0 [ 147.764882][ T3325] ? security_bpf+0x82/0xa0 [ 147.769360][ T3325] __sys_bpf+0x52c/0x730 [ 147.773577][ T3325] ? bpf_link_show_fdinfo+0x310/0x310 [ 147.778932][ T3325] ? debug_smp_processor_id+0x17/0x20 [ 147.784285][ T3325] __x64_sys_bpf+0x7c/0x90 [ 147.788677][ T3325] x64_sys_call+0x4b9/0x9a0 [ 147.793329][ T3325] do_syscall_64+0x4c/0xa0 [ 147.797726][ T3325] ? clear_bhb_loop+0x50/0xa0 [ 147.802379][ T3325] ? clear_bhb_loop+0x50/0xa0 [ 147.807036][ T3325] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 147.812906][ T3325] RIP: 0033:0x7f750e33a929 [ 147.817297][ T3325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.836881][ T3325] RSP: 002b:00007f750c9a3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 147.845273][ T3325] RAX: ffffffffffffffda RBX: 00007f750e561fa0 RCX: 00007f750e33a929 [ 147.853224][ T3325] RDX: 0000000000000050 RSI: 00002000000009c0 RDI: 000000000000000a [ 147.861173][ T3325] RBP: 00007f750c9a3090 R08: 0000000000000000 R09: 0000000000000000 [ 147.869120][ T3325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 147.877067][ T3325] R13: 0000000000000000 R14: 00007f750e561fa0 R15: 00007ffc796ef488 [ 147.885024][ T3325] [ 148.359483][ T3336] device wg2 left promiscuous mode [ 148.385324][ T3336] device wg2 entered promiscuous mode [ 150.189554][ T3363] FAULT_INJECTION: forcing a failure. [ 150.189554][ T3363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 150.210024][ T3363] CPU: 0 PID: 3363 Comm: syz.5.873 Tainted: G W 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 150.221246][ T3363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 150.231285][ T3363] Call Trace: [ 150.234546][ T3363] [ 150.237456][ T3363] __dump_stack+0x21/0x30 [ 150.241767][ T3363] dump_stack_lvl+0xee/0x150 [ 150.246467][ T3363] ? show_regs_print_info+0x20/0x20 [ 150.251667][ T3363] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 150.257123][ T3363] dump_stack+0x15/0x20 [ 150.261267][ T3363] should_fail+0x3c1/0x510 [ 150.265668][ T3363] should_fail_usercopy+0x1a/0x20 [ 150.270676][ T3363] _copy_to_user+0x20/0x90 [ 150.275078][ T3363] bpf_test_finish+0x20c/0x3b0 [ 150.279819][ T3363] ? convert_skb_to___skb+0x360/0x360 [ 150.285180][ T3363] ? xdp_convert_buff_to_md+0x15c/0x1e0 [ 150.290702][ T3363] bpf_prog_test_run_xdp+0x62d/0x910 [ 150.295965][ T3363] ? dev_put+0x80/0x80 [ 150.300007][ T3363] ? __fget_files+0x2c4/0x320 [ 150.304665][ T3363] ? fput_many+0x15a/0x1a0 [ 150.309054][ T3363] ? dev_put+0x80/0x80 [ 150.313098][ T3363] bpf_prog_test_run+0x3d5/0x620 [ 150.318013][ T3363] ? bpf_prog_query+0x230/0x230 [ 150.322838][ T3363] ? selinux_bpf+0xce/0xf0 [ 150.327232][ T3363] ? security_bpf+0x82/0xa0 [ 150.331711][ T3363] __sys_bpf+0x52c/0x730 [ 150.335928][ T3363] ? bpf_link_show_fdinfo+0x310/0x310 [ 150.341280][ T3363] ? debug_smp_processor_id+0x17/0x20 [ 150.346631][ T3363] __x64_sys_bpf+0x7c/0x90 [ 150.351024][ T3363] x64_sys_call+0x4b9/0x9a0 [ 150.355504][ T3363] do_syscall_64+0x4c/0xa0 [ 150.359903][ T3363] ? clear_bhb_loop+0x50/0xa0 [ 150.364553][ T3363] ? clear_bhb_loop+0x50/0xa0 [ 150.369205][ T3363] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 150.375078][ T3363] RIP: 0033:0x7f3672e2b929 [ 150.379483][ T3363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.399075][ T3363] RSP: 002b:00007f3671494038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 150.407472][ T3363] RAX: ffffffffffffffda RBX: 00007f3673052fa0 RCX: 00007f3672e2b929 [ 150.415431][ T3363] RDX: 0000000000000050 RSI: 00002000000009c0 RDI: 000000000000000a [ 150.423383][ T3363] RBP: 00007f3671494090 R08: 0000000000000000 R09: 0000000000000000 [ 150.431334][ T3363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 150.439281][ T3363] R13: 0000000000000000 R14: 00007f3673052fa0 R15: 00007ffdb83c0688 [ 150.447236][ T3363] [ 151.350086][ T3387] device veth1_macvtap left promiscuous mode [ 151.356101][ T3387] device macsec0 entered promiscuous mode [ 151.454405][ T3392] device pim6reg1 entered promiscuous mode [ 151.677135][ T3394] device syzkaller0 entered promiscuous mode [ 152.045517][ T3423] FAULT_INJECTION: forcing a failure. [ 152.045517][ T3423] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 152.090069][ T3423] CPU: 0 PID: 3423 Comm: syz.5.893 Tainted: G W 5.15.185-syzkaller-00178-g5cf73bface18 #0 [ 152.101289][ T3423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 152.111733][ T3423] Call Trace: [ 152.115012][ T3423] [ 152.117926][ T3423] __dump_stack+0x21/0x30 [ 152.122236][ T3423] dump_stack_lvl+0xee/0x150 [ 152.126802][ T3423] ? show_regs_print_info+0x20/0x20 [ 152.131980][ T3423] dump_stack+0x15/0x20 [ 152.136113][ T3423] should_fail+0x3c1/0x510 [ 152.140508][ T3423] should_fail_usercopy+0x1a/0x20 [ 152.145509][ T3423] _copy_to_user+0x20/0x90 [ 152.149902][ T3423] simple_read_from_buffer+0xe9/0x160 [ 152.155253][ T3423] proc_fail_nth_read+0x19a/0x210 [ 152.160258][ T3423] ? proc_fault_inject_write+0x2f0/0x2f0 [ 152.165866][ T3423] ? security_file_permission+0x83/0xa0 [ 152.171390][ T3423] ? proc_fault_inject_write+0x2f0/0x2f0 [ 152.177002][ T3423] vfs_read+0x282/0xbe0 [ 152.181136][ T3423] ? __kasan_check_write+0x14/0x20 [ 152.186222][ T3423] ? kernel_read+0x1f0/0x1f0 [ 152.190786][ T3423] ? __kasan_check_write+0x14/0x20 [ 152.195878][ T3423] ? mutex_lock+0x95/0x1a0 [ 152.200271][ T3423] ? wait_for_completion_killable_timeout+0x10/0x10 [ 152.206843][ T3423] ? __fget_files+0x2c4/0x320 [ 152.211498][ T3423] ? __fdget_pos+0x2d2/0x380 [ 152.216067][ T3423] ? ksys_read+0x71/0x240 [ 152.220370][ T3423] ksys_read+0x140/0x240 [ 152.224586][ T3423] ? vfs_write+0xf70/0xf70 [ 152.228978][ T3423] ? __bpf_trace_sys_enter+0x62/0x70 [ 152.234238][ T3423] __x64_sys_read+0x7b/0x90 [ 152.238723][ T3423] x64_sys_call+0x96d/0x9a0 [ 152.243208][ T3423] do_syscall_64+0x4c/0xa0 [ 152.247600][ T3423] ? clear_bhb_loop+0x50/0xa0 [ 152.252253][ T3423] ? clear_bhb_loop+0x50/0xa0 [ 152.256907][ T3423] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 152.262773][ T3423] RIP: 0033:0x7f3672e2a33c [ 152.267165][ T3423] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 152.286746][ T3423] RSP: 002b:00007f3671494030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 152.295292][ T3423] RAX: ffffffffffffffda RBX: 00007f3673052fa0 RCX: 00007f3672e2a33c [ 152.303254][ T3423] RDX: 000000000000000f RSI: 00007f36714940a0 RDI: 0000000000000008 [ 152.311215][ T3423] RBP: 00007f3671494090 R08: 0000000000000000 R09: 0000000000000000 [ 152.319167][ T3423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.327114][ T3423] R13: 0000000000000000 R14: 00007f3673052fa0 R15: 00007ffdb83c0688 [ 152.335070][ T3423] [ 152.741081][ T30] audit: type=1400 audit(1751780363.891:150): avc: denied { create } for pid=3433 comm="syz.5.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 152.824555][ T3447] bond_slave_1: mtu less than device minimum [ 153.791718][ T3497] syzkaller0: tun_chr_ioctl cmd 35108 [ 154.616290][ T3514] device sit0 entered promiscuous mode [ 155.956192][ T3590] device syzkaller0 entered promiscuous mode [ 156.981693][ T3632] device pim6reg1 entered promiscuous mode [ 158.750643][ T3674] device wg2 entered promiscuous mode [ 158.760122][ T3678] ÿÿÿÿÿÿ: renamed from vlan1 [ 159.499634][ T30] audit: type=1400 audit(1751780370.641:151): avc: denied { create } for pid=3710 comm="syz.2.973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 161.010841][ T3769] @0Ù: renamed from bond_slave_1 [ 164.280950][ T3845] bond_slave_1: mtu less than device minimum [ 165.381571][ T3869] bond_slave_1: mtu less than device minimum [ 167.649834][ T3911] device veth0_vlan left promiscuous mode [ 167.720300][ T3911] device veth0_vlan entered promiscuous mode [ 167.840908][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.874877][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.990822][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.511515][ T30] audit: type=1400 audit(1751780380.661:152): avc: denied { create } for pid=3998 comm="syz.1.1065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 169.583861][ T4000] device macsec0 left promiscuous mode [ 169.626475][ T4005] device veth1_macvtap entered promiscuous mode [ 169.632799][ T4005] device macsec0 entered promiscuous mode [ 169.640465][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 170.422065][ T30] audit: type=1400 audit(1751780381.571:153): avc: denied { create } for pid=4035 comm="syz.1.1074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 170.645849][ T4034] device syzkaller0 entered promiscuous mode [ 170.838196][ T4037] cgroup: fork rejected by pids controller in /syz1 [ 171.304213][ T4103] syz.3.1084[4103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.304298][ T4103] syz.3.1084[4103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.318771][ T4098] device syzkaller0 entered promiscuous mode [ 172.312553][ T4148] device syzkaller0 entered promiscuous mode [ 173.553990][ T4181] ref_ctr_offset mismatch. inode: 0x248 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 173.882931][ T4191] device syzkaller0 entered promiscuous mode [ 174.595921][ T4198] device veth0_vlan left promiscuous mode [ 174.629077][ T4198] device veth0_vlan entered promiscuous mode [ 175.114941][ T4216] device sit0 entered promiscuous mode [ 175.554072][ T4240] device wg2 entered promiscuous mode [ 175.563804][ T4244] device veth0_vlan left promiscuous mode [ 175.582379][ T4244] device veth0_vlan entered promiscuous mode [ 175.755668][ T4255] device pim6reg1 entered promiscuous mode [ 176.415044][ T4270] device syzkaller0 entered promiscuous mode [ 177.150222][ T4297] device wg2 entered promiscuous mode [ 177.491680][ T4317] @ÿ: renamed from bond_slave_0 [ 177.753782][ T4322] device pim6reg1 entered promiscuous mode [ 179.362722][ T4364] device syzkaller0 entered promiscuous mode [ 179.600416][ T4371] device wg2 left promiscuous mode [ 183.634254][ T4506] device sit0 left promiscuous mode [ 183.889236][ T4506] device sit0 entered promiscuous mode [ 186.985976][ T4543] device syzkaller0 entered promiscuous mode [ 187.525667][ T4564] device sit0 left promiscuous mode [ 187.768382][ T4566] device sit0 entered promiscuous mode [ 189.686677][ T4628] device syzkaller0 entered promiscuous mode [ 189.727321][ T4636] device sit0 left promiscuous mode [ 189.797396][ T4628] bond_slave_1: mtu less than device minimum [ 189.906071][ T4636] device sit0 entered promiscuous mode [ 190.547014][ T4649] device veth0_vlan left promiscuous mode [ 190.619424][ T4649] device veth0_vlan entered promiscuous mode [ 190.645010][ T4645] device veth1_macvtap left promiscuous mode [ 190.661572][ T4650] device veth1_macvtap entered promiscuous mode [ 190.700521][ T4650] device macsec0 entered promiscuous mode [ 190.770821][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.809613][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.876695][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 192.630889][ T4728] syz.1.1271[4728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.630965][ T4728] syz.1.1271[4728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.274548][ T4764] ref_ctr_offset mismatch. inode: 0x598 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 194.912992][ T4778] device sit0 left promiscuous mode [ 195.019529][ T4795] device sit0 entered promiscuous mode [ 195.429882][ T4815] device sit0 left promiscuous mode [ 197.524679][ T4902] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.531860][ T4902] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.561237][ T4899] device pim6reg1 entered promiscuous mode [ 198.026774][ T4915] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.033908][ T4915] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.041640][ T4915] device bridge_slave_0 entered promiscuous mode [ 198.048861][ T4915] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.056427][ T4915] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.065511][ T4915] device bridge_slave_1 entered promiscuous mode [ 198.232470][ T4915] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.239506][ T4915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.246806][ T4915] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.253853][ T4915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.286819][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.295053][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.303046][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.324218][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.384619][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.391714][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.502415][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.569879][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.576982][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.682235][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.749520][ T4942] syz.3.1332[4942] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.749939][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.023095][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 199.240655][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.320825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.390213][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.475125][ T4915] device veth0_vlan entered promiscuous mode [ 199.504118][ T4915] device veth1_macvtap entered promiscuous mode [ 199.580487][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.609115][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.648943][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.855409][ T358] device bridge_slave_1 left promiscuous mode [ 199.890215][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.963567][ T358] device bridge_slave_0 left promiscuous mode [ 200.121872][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.193435][ T358] device veth1_macvtap left promiscuous mode [ 200.199473][ T358] device veth0_vlan left promiscuous mode [ 200.834656][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.851482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.926367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.954489][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 202.044867][ T4997] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.116254][ T4997] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.176154][ T4997] device bridge_slave_0 entered promiscuous mode [ 202.240519][ T4997] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.295686][ T4997] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.366677][ T4997] device bridge_slave_1 entered promiscuous mode [ 202.594380][ T358] device bridge_slave_1 left promiscuous mode [ 202.603660][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.694770][ T358] device bridge_slave_0 left promiscuous mode [ 202.710847][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.313063][ T358] device veth1_macvtap left promiscuous mode [ 203.319138][ T358] device veth0_vlan left promiscuous mode [ 203.546983][ T5041] device veth1_macvtap left promiscuous mode [ 203.570590][ T5039] device veth1_macvtap entered promiscuous mode [ 203.611156][ T5039] device macsec0 entered promiscuous mode [ 203.832724][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.860347][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.875190][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.925053][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.940220][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.947296][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.964890][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.980432][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.007042][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.014141][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.040168][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.067843][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 204.089194][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.112723][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.134997][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 204.373762][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 204.422057][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 204.460303][ T4997] device veth0_vlan entered promiscuous mode [ 204.481434][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.533768][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.584606][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.644115][ T4997] device veth1_macvtap entered promiscuous mode [ 204.706246][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 204.730588][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.779206][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 204.836578][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 204.880329][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 204.904739][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 204.920452][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 205.624348][ T45] device bridge_slave_1 left promiscuous mode [ 205.651593][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.761125][ T45] device bridge_slave_0 left promiscuous mode [ 205.837416][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.936825][ T45] device veth1_macvtap left promiscuous mode [ 205.967535][ T45] device veth0_vlan left promiscuous mode [ 206.241020][ T5109] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.248160][ T5109] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.255705][ T5109] device bridge_slave_0 entered promiscuous mode [ 206.290089][ T5109] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.297207][ T5109] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.315731][ T5109] device bridge_slave_1 entered promiscuous mode [ 206.643509][ T5109] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.650585][ T5109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.657821][ T5109] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.664854][ T5109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.784773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.810492][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.818956][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.841542][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.876583][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.885892][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.908978][ T5109] device veth0_vlan entered promiscuous mode [ 206.961254][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.007201][ T5109] device veth1_macvtap entered promiscuous mode [ 207.030414][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 207.051066][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.066405][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.107168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 207.198073][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 207.628913][ T5172] device syzkaller0 entered promiscuous mode [ 207.775566][ T5170] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.845761][ T5170] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.936606][ T5170] device bridge_slave_0 entered promiscuous mode [ 207.997099][ T5170] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.036333][ T5170] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.274701][ T5170] device bridge_slave_1 entered promiscuous mode [ 208.954562][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.962271][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.982792][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.992864][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.001262][ T358] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.008287][ T358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.016597][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.025245][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.033741][ T358] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.040804][ T358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.083818][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.092057][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.194670][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 209.271197][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.341128][ T5230] device veth1_macvtap left promiscuous mode [ 209.347310][ T5230] device macsec0 left promiscuous mode [ 209.500996][ T5170] device veth0_vlan entered promiscuous mode [ 209.507742][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.529607][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.562561][ T358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.610045][ T5244] device veth1_macvtap entered promiscuous mode [ 209.700379][ T5244] device macsec0 entered promiscuous mode [ 209.716579][ T5170] device veth1_macvtap entered promiscuous mode [ 209.729633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.745453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 209.777055][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 209.792541][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.814068][ T45] device bridge_slave_1 left promiscuous mode [ 209.845183][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.938153][ T45] device bridge_slave_0 left promiscuous mode [ 209.968116][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.994766][ T45] device veth1_macvtap left promiscuous mode [ 210.083962][ T45] device veth0_vlan left promiscuous mode [ 210.505374][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 210.514020][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 210.522387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 210.530727][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 211.503285][ T45] device bridge_slave_1 left promiscuous mode [ 211.513671][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.656774][ T45] device bridge_slave_0 left promiscuous mode [ 211.710279][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.780329][ T45] device veth1_macvtap left promiscuous mode [ 211.831672][ T45] device veth0_vlan left promiscuous mode [ 211.991755][ T5293] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.105577][ T5293] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.133911][ T5293] device bridge_slave_0 entered promiscuous mode [ 212.146824][ T5293] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.171164][ T5293] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.228191][ T5293] device bridge_slave_1 entered promiscuous mode [ 212.249102][ T5318] device sit0 left promiscuous mode [ 213.488814][ T5342] device veth0_vlan left promiscuous mode [ 213.496990][ T5342] device veth0_vlan entered promiscuous mode [ 213.648929][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.657178][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.665782][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.674216][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.682457][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.689501][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.986576][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.059054][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.130712][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.200090][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.207175][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.220083][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.228471][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.236609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.245052][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.374780][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 214.383965][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 214.410238][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 214.418480][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.428383][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.436093][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.613471][ T5293] device veth0_vlan entered promiscuous mode [ 214.703303][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 214.719380][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 214.732169][ T5293] device veth1_macvtap entered promiscuous mode [ 214.822442][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 214.840933][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.851134][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.914535][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.973328][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.700701][ T45] device bridge_slave_1 left promiscuous mode [ 215.706828][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.714343][ T45] device bridge_slave_0 left promiscuous mode [ 215.720491][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.728222][ T45] device veth1_macvtap left promiscuous mode [ 215.734452][ T45] device veth0_vlan left promiscuous mode [ 216.076387][ T5402] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.083582][ T5402] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.091241][ T5402] device bridge_slave_0 entered promiscuous mode [ 216.098397][ T5402] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.105731][ T5402] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.113381][ T5402] device bridge_slave_1 entered promiscuous mode [ 216.467179][ T5415] Â: renamed from pim6reg1 [ 216.529004][ T5415] device syzkaller0 entered promiscuous mode [ 216.835513][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.848586][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.913516][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.980756][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.029690][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.036781][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.146751][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.190222][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.198327][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.205371][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.262060][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.289474][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.311239][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.319320][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.327463][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.356251][ T5432] device pim6reg1 entered promiscuous mode [ 217.452259][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.479480][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.498542][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.517059][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.528849][ T5402] device veth0_vlan entered promiscuous mode [ 217.578096][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.595307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.679457][ T5402] device veth1_macvtap entered promiscuous mode [ 217.789249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 217.820515][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.839015][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.847957][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 217.856427][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.887758][ T5468] device sit0 entered promiscuous mode [ 218.728017][ T5491] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.782707][ T5491] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.856386][ T5491] device bridge_slave_0 entered promiscuous mode [ 218.933853][ T5491] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.966517][ T5491] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.034567][ T5491] device bridge_slave_1 entered promiscuous mode [ 219.153214][ T358] device bridge_slave_1 left promiscuous mode [ 219.169872][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.224815][ T358] device bridge_slave_0 left promiscuous mode [ 219.300560][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.356712][ T358] device veth1_macvtap left promiscuous mode [ 219.395254][ T358] device veth0_vlan left promiscuous mode [ 220.318275][ T30] audit: type=1400 audit(1751780431.461:154): avc: denied { create } for pid=5546 comm="syz.3.1488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 220.450567][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.490364][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.675156][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.727545][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.762514][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.769607][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.844964][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.862131][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.879144][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.886236][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.088811][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.096705][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.105370][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.113623][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.122168][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.139850][ T5491] device veth0_vlan entered promiscuous mode [ 221.185169][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 221.223879][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 221.331024][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 221.420583][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.499009][ T5491] device veth1_macvtap entered promiscuous mode [ 221.661127][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.668709][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.676340][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 221.684543][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 221.692935][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.703375][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 221.711597][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.762899][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 221.812370][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 222.787723][ T358] device bridge_slave_1 left promiscuous mode [ 222.793916][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.801484][ T358] device bridge_slave_0 left promiscuous mode [ 222.807581][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.815355][ T358] device veth1_macvtap left promiscuous mode [ 222.821365][ T358] device veth0_vlan left promiscuous mode [ 223.429548][ T5618] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.473356][ T5618] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.630651][ T5618] device bridge_slave_0 entered promiscuous mode [ 223.669904][ T5618] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.743827][ T5618] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.759724][ T5618] device bridge_slave_1 entered promiscuous mode [ 224.176933][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.186780][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.212020][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.226920][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.239134][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.246210][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.254099][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.263571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.272043][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.279079][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.330953][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.353407][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.433235][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.544722][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.617679][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.634228][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.642354][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.688172][ T5618] device veth0_vlan entered promiscuous mode [ 224.716975][ T5682] Â: renamed from pim6reg1 [ 224.776551][ T5682] device syzkaller0 entered promiscuous mode [ 224.809500][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.818920][ T5618] device veth1_macvtap entered promiscuous mode [ 224.852996][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.888953][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 225.975438][ T358] device bridge_slave_1 left promiscuous mode [ 225.985396][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.994814][ T358] device bridge_slave_0 left promiscuous mode [ 226.086948][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.096799][ T358] device veth1_macvtap left promiscuous mode [ 226.103091][ T358] device veth0_vlan left promiscuous mode [ 226.340954][ T5731] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.348063][ T5731] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.355522][ T5731] device bridge_slave_0 entered promiscuous mode [ 226.362822][ T5731] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.369838][ T5731] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.377464][ T5731] device bridge_slave_1 entered promiscuous mode [ 226.505903][ T5731] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.513004][ T5731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.520314][ T5731] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.527358][ T5731] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.569756][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.578491][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.587020][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.607822][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.616542][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.623601][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.632957][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.642596][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.649647][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.671482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.679525][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.720520][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 226.734500][ T5731] device veth0_vlan entered promiscuous mode [ 226.740982][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.749286][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.790683][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.804016][ T5731] device veth1_macvtap entered promiscuous mode [ 226.866180][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 226.948721][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 226.959675][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 227.364975][ T5775] Â: renamed from pim6reg1 [ 228.352371][ T5796] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.359430][ T5796] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.446646][ T5796] device bridge_slave_0 entered promiscuous mode [ 228.456766][ T5796] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.474543][ T5796] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.490734][ T5796] device bridge_slave_1 entered promiscuous mode [ 228.837428][ T5796] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.844515][ T5796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.851807][ T5796] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.858821][ T5796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.177241][ T5832] Â: renamed from pim6reg1 [ 229.191376][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.218966][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.348949][ T358] device bridge_slave_1 left promiscuous mode [ 229.360075][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.367751][ T358] device bridge_slave_0 left promiscuous mode [ 229.374579][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.382889][ T358] device veth1_macvtap left promiscuous mode [ 229.388904][ T358] device veth0_vlan left promiscuous mode [ 229.554931][ T5841] device veth0_vlan left promiscuous mode [ 229.561442][ T5841] device veth0_vlan entered promiscuous mode [ 229.645502][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.662835][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.743976][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.759539][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.767920][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.774979][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.805074][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.817844][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.827247][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.834308][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.946515][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.954634][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.974587][ T5796] device veth0_vlan entered promiscuous mode [ 229.989818][ T5796] device veth1_macvtap entered promiscuous mode [ 230.333129][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.345499][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.354231][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.362811][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.371491][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.379413][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.388056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.400314][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.408577][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.416329][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.424704][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.433301][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.442287][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.451162][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.461948][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.832813][ T30] audit: type=1400 audit(1751780442.981:155): avc: denied { create } for pid=5906 comm="syz.1.1582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 232.345298][ T5904] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.352453][ T5904] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.359983][ T5904] device bridge_slave_0 entered promiscuous mode [ 232.367173][ T5904] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.374271][ T5904] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.385090][ T5904] device bridge_slave_1 entered promiscuous mode [ 232.749807][ T358] device bridge_slave_1 left promiscuous mode [ 232.852415][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.012352][ T358] device bridge_slave_0 left promiscuous mode [ 233.100551][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.186288][ T358] device veth1_macvtap left promiscuous mode [ 233.195429][ T358] device veth0_vlan left promiscuous mode [ 233.458436][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.481793][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.552503][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.573510][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.581808][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.588836][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.603155][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.612272][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.634429][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.641510][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.679541][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.750968][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.767956][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.776081][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.784970][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.807199][ T5904] device veth0_vlan entered promiscuous mode [ 233.815242][ T5959] device veth0_vlan left promiscuous mode [ 233.854001][ T5959] device veth0_vlan entered promiscuous mode [ 233.991443][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 234.003919][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.092115][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 234.101788][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.154254][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.221777][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.281326][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.361591][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.404779][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.484601][ T5904] device veth1_macvtap entered promiscuous mode [ 234.591244][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 234.683943][ T5971] device sit0 left promiscuous mode [ 235.021077][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.074759][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.141321][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 235.149841][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.619597][ T5987] device syzkaller0 entered promiscuous mode [ 236.746758][ T5997] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.754027][ T5997] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.766633][ T5997] device bridge_slave_0 entered promiscuous mode [ 236.774654][ T5997] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.782351][ T5997] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.792027][ T5997] device bridge_slave_1 entered promiscuous mode [ 237.385372][ T358] device bridge_slave_1 left promiscuous mode [ 237.391679][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.399491][ T358] device bridge_slave_0 left promiscuous mode [ 237.406036][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.414841][ T358] device veth1_macvtap left promiscuous mode [ 237.421008][ T358] device veth0_vlan left promiscuous mode [ 237.720469][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.727951][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.736733][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.760293][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.780535][ T5586] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.787590][ T5586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.817922][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.923591][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.950327][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.961686][ T5586] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.968750][ T5586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.109695][ T5997] device veth0_vlan entered promiscuous mode [ 238.123668][ T5997] device veth1_macvtap entered promiscuous mode [ 238.130726][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.140638][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.148683][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.157214][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.165374][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 238.173952][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.230549][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 238.275931][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.284359][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 238.292799][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.301390][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 238.321997][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.330802][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.338263][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.347617][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.366463][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.376535][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.436751][ T6053] Â: renamed from pim6reg1 [ 238.458185][ T6053] device syzkaller0 entered promiscuous mode [ 240.613986][ T6070] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.630009][ T6070] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.670475][ T6070] device bridge_slave_0 entered promiscuous mode [ 240.678669][ T6070] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.685822][ T6070] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.693596][ T6070] device bridge_slave_1 entered promiscuous mode [ 240.921968][ T6085] bridge0: port 3(veth0) entered disabled state [ 240.930618][ T6085] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.942453][ T6085] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.297284][ T6087] device veth0 left promiscuous mode [ 241.306305][ T6087] bridge0: port 3(veth0) entered disabled state [ 241.353300][ T6087] device bridge_slave_1 left promiscuous mode [ 241.364897][ T6087] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.403042][ T6087] device bridge_slave_0 left promiscuous mode [ 241.414109][ T6087] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.980027][ T6111] Â: renamed from pim6reg1 [ 241.986400][ T358] device bridge_slave_1 left promiscuous mode [ 241.996161][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.068454][ T358] device bridge_slave_0 left promiscuous mode [ 242.122864][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.173363][ T358] device veth1_macvtap left promiscuous mode [ 242.179478][ T358] device veth0_vlan left promiscuous mode [ 242.301915][ T6115] device syzkaller0 entered promiscuous mode [ 242.336883][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.347376][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.358086][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.367451][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.383475][ T5586] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.390563][ T5586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.408245][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.416979][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.454636][ T5586] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.461729][ T5586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.485877][ T6128] device pim6reg1 entered promiscuous mode [ 242.492856][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.502765][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.511862][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.519924][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.528722][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.542904][ T6128] bond_slave_1: mtu less than device minimum [ 242.570629][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 242.579917][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 242.596516][ T6070] device veth0_vlan entered promiscuous mode [ 242.609946][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 242.633545][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.654417][ T6070] device veth1_macvtap entered promiscuous mode [ 242.663699][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.671275][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.679261][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 242.687541][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 242.696095][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.706583][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 242.714918][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.820067][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.880353][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 244.301141][ T358] device bridge_slave_1 left promiscuous mode [ 244.307273][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.314735][ T358] device bridge_slave_0 left promiscuous mode [ 244.320974][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.329087][ T358] device veth1_macvtap left promiscuous mode [ 244.335150][ T358] device veth0_vlan left promiscuous mode [ 244.711001][ T30] audit: type=1400 audit(1751780455.861:156): avc: denied { create } for pid=6171 comm="syz.1.1651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 244.757356][ T6175] device syzkaller0 entered promiscuous mode [ 244.810489][ T6169] Â: renamed from pim6reg1 [ 244.956215][ T6179] device syzkaller0 entered promiscuous mode [ 245.141138][ T6178] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.158829][ T6178] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.228606][ T6178] device bridge_slave_0 entered promiscuous mode [ 245.237682][ T6178] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.247346][ T6178] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.261771][ T6178] device bridge_slave_1 entered promiscuous mode [ 245.515407][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.525225][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.609823][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.621810][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.639831][ T5586] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.646927][ T5586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.669652][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.686881][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.703947][ T5586] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.711040][ T5586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.734662][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.762205][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 245.781019][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.798049][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.823471][ T6178] device veth0_vlan entered promiscuous mode [ 245.832044][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.882553][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.974235][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.035813][ T6251] device syzkaller0 entered promiscuous mode [ 246.065573][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.081320][ T6178] device veth1_macvtap entered promiscuous mode [ 246.111193][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 246.200235][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 247.500926][ T358] device bridge_slave_1 left promiscuous mode [ 247.507040][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.514541][ T358] device bridge_slave_0 left promiscuous mode [ 247.520715][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.528450][ T358] device veth1_macvtap left promiscuous mode [ 247.534481][ T358] device veth0_vlan left promiscuous mode [ 248.349179][ T6277] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.396961][ T6277] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.419752][ T6277] device bridge_slave_0 entered promiscuous mode [ 248.446201][ T6277] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.477432][ T6277] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.497137][ T6277] device bridge_slave_1 entered promiscuous mode [ 248.744015][ T6300] device sit0 left promiscuous mode [ 249.408434][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.424748][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.472833][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.490482][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.507566][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.514682][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.532133][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.567627][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.601002][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.631612][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.638677][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.671521][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.697236][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.736857][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 249.764812][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 249.892079][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 249.904981][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 249.992941][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 250.080365][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.196171][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.230680][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.256288][ T6277] device veth0_vlan entered promiscuous mode [ 250.292753][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 250.301786][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.369784][ T6277] device veth1_macvtap entered promiscuous mode [ 250.395740][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 250.428922][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 250.485175][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.568166][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 250.647160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.783200][ T6413] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.796737][ T6413] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.808340][ T6413] device bridge_slave_0 entered promiscuous mode [ 252.815609][ T6413] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.822894][ T6413] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.830368][ T6413] device bridge_slave_1 entered promiscuous mode [ 253.091664][ T358] device bridge_slave_1 left promiscuous mode [ 253.097909][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.105814][ T358] device bridge_slave_0 left promiscuous mode [ 253.112098][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.120183][ T358] device veth1_macvtap left promiscuous mode [ 253.126268][ T358] device veth0_vlan left promiscuous mode [ 253.338585][ T6439] ÿÿÿÿÿÿ: renamed from vlan1 [ 253.413860][ T6437] device bridge_slave_1 left promiscuous mode [ 253.451549][ T6437] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.503286][ T6437] device bridge_slave_0 left promiscuous mode [ 253.515857][ T6437] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.271161][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.291673][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.343685][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.370338][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.449427][ T5586] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.456540][ T5586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.530177][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.540858][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.549300][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.557901][ T5586] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.564951][ T5586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.619120][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.627340][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.657778][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.673698][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.690029][ T6476] device veth0 left promiscuous mode [ 254.715786][ T6476] bridge0: port 3(veth0) entered disabled state [ 254.776287][ T6476] device bridge_slave_1 left promiscuous mode [ 254.791785][ T6476] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.844281][ T6476] device bridge_slave_0 left promiscuous mode [ 254.862786][ T6476] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.227796][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.242723][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.277871][ T6413] device veth0_vlan entered promiscuous mode [ 255.301918][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 255.320760][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.331232][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.349009][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.477270][ T6413] device veth1_macvtap entered promiscuous mode [ 255.611642][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 255.650941][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 255.710682][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 255.803385][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.830543][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.838943][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.930380][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 257.661024][ T358] device bridge_slave_1 left promiscuous mode [ 257.667152][ T358] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.674830][ T358] device bridge_slave_0 left promiscuous mode [ 257.681039][ T358] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.688766][ T358] device veth1_macvtap left promiscuous mode [ 257.694801][ T358] device veth0_vlan left promiscuous mode [ 257.959929][ T6523] device veth0_vlan left promiscuous mode [ 257.985736][ T6523] device veth0_vlan entered promiscuous mode [ 258.077528][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.100599][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.108400][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 258.216905][ T6533] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.238430][ T6533] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.253602][ T6533] device bridge_slave_0 entered promiscuous mode [ 258.271036][ T6533] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.316788][ T6533] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.331902][ T6533] device bridge_slave_1 entered promiscuous mode [ 258.503391][ T6550] device pim6reg1 entered promiscuous mode [ 258.573234][ T6564] @0ÿ: renamed from bond_slave_0 [ 259.033357][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.052012][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.107060][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.186228][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.307137][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.314226][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.570750][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.633576][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.646189][ T30] audit: type=1400 audit(1751780470.791:157): avc: denied { create } for pid=6595 comm="syz.3.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 259.794696][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.842891][ T30] audit: type=1400 audit(1751780470.921:158): avc: denied { create } for pid=6593 comm="syz.2.1758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 259.861428][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.869375][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.392872][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 260.460817][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.479027][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 260.490450][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.514607][ T6533] device veth0_vlan entered promiscuous mode [ 260.535306][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.545279][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.554684][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.563472][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.600514][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.608942][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.627157][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 260.690428][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 260.759440][ T6533] device veth1_macvtap entered promiscuous mode [ 260.834064][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 260.858628][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 260.941715][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.016416][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.080496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 261.157131][ T6629] Â: renamed from pim6reg1 [ 261.413352][ T30] audit: type=1400 audit(1751780472.561:159): avc: denied { unmount } for pid=6533 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 261.474056][ T6641] ªªªªªª: renamed from vlan0 [ 261.503519][ T6645] @0ÿ: renamed from bond_slave_0 [ 261.618823][ T6652] device syzkaller0 entered promiscuous mode [ 263.260772][ T8] device bridge_slave_1 left promiscuous mode [ 263.266909][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.291354][ T8] device bridge_slave_0 left promiscuous mode [ 263.297523][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.306002][ T8] device veth1_macvtap left promiscuous mode [ 263.355507][ T8] device veth0_vlan left promiscuous mode [ 263.467914][ T6679] Â: renamed from pim6reg1 [ 263.528701][ T30] audit: type=1400 audit(1751780474.671:160): avc: denied { mounton } for pid=6682 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 264.048003][ T6682] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.068228][ T6682] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.124422][ T6682] device bridge_slave_0 entered promiscuous mode [ 264.145308][ T6682] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.152434][ T6682] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.159889][ T6682] device bridge_slave_1 entered promiscuous mode [ 264.410705][ T6715] device sit0 entered promiscuous mode [ 265.762759][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.771525][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.807560][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.924995][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.094280][ T5586] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.101365][ T5586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.320276][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.361044][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.400462][ T5586] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.407558][ T5586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.455587][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.463756][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.618238][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 266.626744][ T5586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.820167][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 266.838841][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.992639][ T6682] device veth0_vlan entered promiscuous mode [ 267.013152][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.075392][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.173944][ T6682] device veth1_macvtap entered promiscuous mode [ 267.246459][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 267.275192][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 267.370406][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 267.380601][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 267.388907][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 267.599275][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 267.640728][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 268.980540][ T45] device bridge_slave_1 left promiscuous mode [ 268.986656][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.994093][ T45] device bridge_slave_0 left promiscuous mode [ 269.000257][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.007819][ T45] device veth1_macvtap left promiscuous mode [ 269.013844][ T45] device veth0_vlan left promiscuous mode [ 269.976656][ T6798] device wg2 entered promiscuous mode [ 270.059858][ T6802] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.067769][ T6802] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.075603][ T6802] device bridge_slave_0 entered promiscuous mode [ 270.083309][ T6802] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.090530][ T6802] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.098072][ T6802] device bridge_slave_1 entered promiscuous mode [ 270.807996][ T6802] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.815092][ T6802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.822400][ T6802] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.829432][ T6802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.957726][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.983666][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.035862][ T6853] Â: renamed from pim6reg1 [ 271.494775][ T6862] device sit0 left promiscuous mode [ 271.570025][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.591057][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.599160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.610858][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.621843][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.628877][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.636442][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.644802][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.653073][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.660110][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.667947][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.676371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.690175][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 271.698390][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.064734][ T6870] device syzkaller0 entered promiscuous mode [ 272.113634][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 272.141856][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.183619][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 272.216377][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.282899][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.321452][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.370041][ T6895] device sit0 entered promiscuous mode [ 272.541782][ T6802] device veth0_vlan entered promiscuous mode [ 272.555857][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 272.564151][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 272.578015][ T6802] device veth1_macvtap entered promiscuous mode [ 272.586789][ T6899] Â: renamed from pim6reg1 [ 272.644702][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 272.654583][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 272.663419][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 272.792664][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 272.861169][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 274.220907][ T10] device bridge_slave_1 left promiscuous mode [ 274.227024][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.234485][ T10] device bridge_slave_0 left promiscuous mode [ 274.240670][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.248315][ T10] device veth1_macvtap left promiscuous mode [ 274.254365][ T10] device veth0_vlan left promiscuous mode [ 275.207020][ T6933] device veth0_vlan left promiscuous mode [ 275.252339][ T6933] device veth0_vlan entered promiscuous mode [ 275.259332][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 275.381285][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 275.475691][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 275.970566][ T6946] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.977827][ T6946] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.203734][ T6946] device bridge_slave_0 entered promiscuous mode [ 276.293841][ T6946] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.301063][ T6946] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.356418][ T6946] device bridge_slave_1 entered promiscuous mode [ 278.451331][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.469094][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.492739][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.562993][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.600239][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.607331][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.698225][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.750425][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.800747][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.807922][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.083732][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.101770][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.170276][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.230332][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.238479][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.255949][ T6946] device veth0_vlan entered promiscuous mode [ 279.511176][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 279.541929][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 279.690386][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 279.698362][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.723183][ T6946] device veth1_macvtap entered promiscuous mode [ 279.990142][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 280.013061][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.021501][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 280.030187][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 280.039025][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 280.089235][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 280.098259][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 280.106957][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 280.115201][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.220592][ T10] device bridge_slave_1 left promiscuous mode [ 281.226702][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.234192][ T10] device bridge_slave_0 left promiscuous mode [ 281.240383][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.248094][ T10] device veth1_macvtap left promiscuous mode [ 281.254202][ T10] device veth0_vlan left promiscuous mode [ 283.220591][ T7034] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.293989][ T7034] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.361615][ T7034] device bridge_slave_0 entered promiscuous mode [ 284.025205][ T7042] device syzkaller0 entered promiscuous mode [ 284.049420][ T7034] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.060041][ T7034] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.090482][ T7034] device bridge_slave_1 entered promiscuous mode [ 284.391419][ T7067] device veth0_vlan left promiscuous mode [ 284.405095][ T7067] device veth0_vlan entered promiscuous mode [ 284.454279][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.568658][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.576275][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 284.683136][ T7079] device sit0 left promiscuous mode [ 285.180357][ T7086] device veth0_vlan left promiscuous mode [ 285.195184][ T7086] device veth0_vlan entered promiscuous mode [ 285.379491][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.397938][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.502470][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.518763][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.535856][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.542936][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.565354][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.575140][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.588831][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.595902][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.604701][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.613033][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.621371][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.629700][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.672297][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.695718][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 285.734964][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.770417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.840361][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.849664][ T7034] device veth0_vlan entered promiscuous mode [ 285.878318][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.886186][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.898788][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 285.907190][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.928992][ T7034] device veth1_macvtap entered promiscuous mode [ 285.954630][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.001889][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.010561][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.018893][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.049094][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=5 req=1326 state=3 status=67 (errno 9: Bad file descriptor) [ 286.175441][ T30] audit: type=1400 audit(1751780497.301:161): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14950]" dev="pipefs" ino=14950 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 287.300684][ T45] device bridge_slave_1 left promiscuous mode [ 287.306807][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.314354][ T45] device bridge_slave_0 left promiscuous mode [ 287.320518][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.328472][ T45] device veth1_macvtap left promiscuous mode [ 287.334587][ T45] device veth0_vlan left promiscuous mode [ 288.462016][ T45] GPL: port 2(erspan0) entered disabled state [ 288.469064][ T45] GPL: port 1(erspan0) entered disabled state [ 288.476378][ T45] device erspan0 left promiscuous mode [ 288.481848][ T45] GPL: port 2(erspan0) entered disabled state [ 288.489851][ T45] device erspan0 left promiscuous mode [ 288.495369][ T45] GPL: port 1(erspan0) entered disabled state [ 288.900443][ T45] device veth0_to_team left promiscuous mode [ 288.906483][ T45] GPL: port 1(veth0_to_team) entered disabled state [ 288.913692][ T45] device veth0_to_team left promiscuous mode [ 288.919686][ T45] GPL: port 1(veth0_to_team) entered disabled state [ 288.927186][ T45] device veth0_to_team left promiscuous mode [ 288.933265][ T45] GPL: port 1(veth0_to_team) entered disabled state [ 288.941162][ T45] device veth1_macvtap left promiscuous mode [ 288.947137][ T45] device veth0_vlan left promiscuous mode [ 288.953275][ T45] device veth1_macvtap left promiscuous mode [ 288.959248][ T45] device veth0_vlan left promiscuous mode [ 288.965242][ T45] device veth1_macvtap left promiscuous mode [ 288.971455][ T45] device veth0_vlan left promiscuous mode