last executing test programs: 21m51.81219928s ago: executing program 2 (id=1692): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x1, '\x00', 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8937, &(0x7f0000000000)={'veth0_vlan\x00', @random="0100002010ff"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a0000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r7}, 0x18) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000500000000000000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000d0137589c0eef51509f121e4c2b7d6acb0f5e5f3eecc9e8cef1e4e879e74cd3b9728dd2a98e30f59819306fb375116460f73076b3aaefe9129b82c0900"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_tracing={0x1a, 0x9, &(0x7f0000000540)=@raw=[@call={0x85, 0x0, 0x0, 0x7c}, @ldst={0x1, 0x3, 0x3, 0xa, 0x1, 0xffffffffffffffc0, 0xfffffffffffffffc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @jmp={0x5, 0x1, 0x2, 0x9, 0x9, 0xffffffffffffffff, 0x8}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f00000005c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x6, 0x5, 0x100}, 0x10, 0x24e37, r1, 0x6, &(0x7f0000000680)=[r4, r8], &(0x7f00000006c0)=[{0x4, 0x3, 0xb, 0x6}, {0x1, 0x4, 0x7, 0x53a223cc1c673c6b}, {0x1, 0x4, 0xa}, {0x5, 0x3, 0x1, 0x2}, {0x2, 0x3, 0x2, 0xb}, {0x3, 0x4, 0x2, 0x8}], 0x10, 0x4, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x10) socketpair(0x1, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 21m51.517104987s ago: executing program 2 (id=1695): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="180406000e000001000000000400000007010000080700007500fcff0000000095000000d3031a00041f8ea47c2eb2b7639c2ad3a4c89eb40634ab9b5ade7978eb59ff70cd62adbe9c31865cf39dc9e93813d9433f34dad576b1897b3533f883f9e873d9c435ab89afdd4ff0c24c0053f1721e9dc694f461734e10ea76584696317ca540336bc0e60e7d6d44484e01102b1c830d2630c3932755946ba8848b0d93caec1f4d89f99dcd2e9cb4d3646bc48d7ece5cbb87cdd67955cf5c813c05411a276d6afe065ac5849c64aebf30294fc59168bcb9a25164a1826a81cf45e576ef4dd94e292cbbf69d0787fa4b596ce132d7e976b136871cebb77ad2e34ffcf52557e6a0403769815ed13ca7b6c9f2fd7d11461997a57b35715cee9809008af9df0690f5d42d2e0f2d967aa4bc96a7d4b343411ef4d962699ffc5c434cf53339430fe9d668405875e14bea5c4aea70b9de7b9fb36561bdc896a0cc666f0d9b49832984ed9effda637edfb97defbd3219055f5a7ee877c79ec93133f0109e9746acd0cba749390a9b575a129f1838688c21ea8db8"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) 21m51.458674893s ago: executing program 2 (id=1696): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x9, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000880)='sched_process_fork\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='-4'], 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d080", 0x2}], 0x1}, 0x20000801) recvmsg(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 21m50.593417483s ago: executing program 2 (id=1700): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x9, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000880)='sched_process_fork\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d080", 0x2}], 0x1}, 0x20000801) recvmsg(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) bpf$MAP_CREATE(0x0, 0x0, 0x0) 21m48.034454749s ago: executing program 2 (id=1703): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) 21m47.996347722s ago: executing program 2 (id=1705): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x411789936da97f22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xeb72, 0x7}, 0x6060, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r0, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740), &(0x7f00000007c0), 0xffffd6c0, r1}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) write$cgroup_pid(r4, &(0x7f00000001c0), 0x12) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000200)=0x1, 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) write$cgroup_pid(r8, &(0x7f0000000180), 0x12) recvmsg$unix(r2, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x240) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="0100000000000000000000000000000000000000d3cdab93ce2a9c501ff6cb94346fa195b68203a5b1876aa32a5b04c81f05764c0e0a8f55e9b5977b4d8ca3f10e505ed03b6b09279d072125921757e055251070650a0eadd9892105f670890059958c54caa1154e5903ee64e8b813dbafd8dbac9cb9a1615c2f24bf458e75a478fb8895f5950a87248bee820e9eba00098a34a6807cde834d30b39b14a5786a88428d67ce191ef2a4350200007009160000e4ff0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r9, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000280), 0x75, r10}, 0x38) 5.803962125s ago: executing program 3 (id=5215): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000010000000000000000711213000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000ffff00000000000800000000"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x3, 0x7fff, 0x10000, 0x4c022, r3, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x800000, 0x0, 0x2, 0x9, @value, @void, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x10000, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x2008}, 0x8) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r5, 0x8004745a, 0x2000000c) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) 5.348098508s ago: executing program 0 (id=5218): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x1, &(0x7f0000000200)=@raw=[@exit], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'syzkaller0\x00', 0x9d12}) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000000)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller0\x00', @random="371692e7f7ef"}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x64000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000100)) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f00000001c0)=0x1) close(0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r1}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2e6405000000000065060400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7956244cef7baf48e6d2885a09a87507ebfc75b5b0f4e4309ebcdac5f7a860c008cbdd3b4c3b7f28754860c9c781f6410457253e89ad528d985636a86ec0f68f59cd1159a2c2e85d726859a919cc9548a349980d1ccdce27f94bc074c27f81078545c146a0857153b7b8f00034debae58a4ab415b0d7ff0575cc272cd3d7e8d974927676468ff2d86e0ffac94792ed9cf6b40b3cf252a47c05ae8a70d57cc3e067d1867b54d24e20000000000000020009ebf84d3b042d6e432cd080e3b57239f0127473e6ba922aff649609d40b47ec331ccba3cf96f9483ff19a6471bf5abc742d9cbcfb964b11b31034694a6aad86cf08a6c7b2235dc99de9aa3e6b77c7a2877261ed32da90864987f30926c9013eec3b86836ae50447aa5a79f40c235000000453302712c3d8fc4e2b61adb0695e800000000d4f4e91f0000002c33df424d1bafe5725c8a404724f8a4f1cda7997b65954f74097579b91da309b887af2485c2d9ab09b506000000000000000bf7b2ff4602aec1eea200000064881c5630521a08e051374cf05c921a06fb7818000000009dc8d95e0e5b365d10e1004dae58b3b5b89709b0ff47b200000000004000cbef88811dc8c1b27ac7d9a6bb70f60eb9c01dd2fc79b85e4d961498f3a80131d21d856177a2189f45d011ef1da5c6d57bb8fd387ccea9c3899a914e47e82f040000009d81003f927355408f87264797d3fa970949793b94329d580500d1f91c0d22587e05a61e3d8576ca168e88d7a9af95b04a37c27bfffab9abbb31fa8c0080258cfa6d3f166e695f3c56490aeef464d9965d70a50f1282619344f223548e75fa39643adac1322c87ca253ff2fb1882760d6feab16bacdf83c11816dbe959ebc5ec479c8319f73e2249eab0486b110702a481d3b51976a52303056e800b4ae5acc2df636a65eb1d672bf2000000cda8462cc9b16624998be65683321e970000000009b8e20762c1bf4a3eb6769f2b23e842bacd9c685edea0ffa3e975424f8ede49e61a4de808a38ba3512d64dc71867df4eee3f1ff791cf7c9862f98b45852e4b2f78721b978a2df2f2a29a387c6f0576b36038f819286eca99a6a434811cf2a117d775fe986a49fb82cf5f15972d5ab18f1045384501adabb20f7b0e15ff47f1744e2341b59034959a1289ba6e243668e6735305707e3de7652bfc5b60c76deff43a1d6fd6a4180ab723735abbeffe7f2ec3a0bb86f9eddfc0f3d1d503d7a54b49e1ae6c5aa620d27e91aa0aa0ed6fcacfc91fbb4c256409e54daefbb107c381fa729ff5f3907d93430da178d685d7730f5e129438a5214f722096d29863301b0b811f69145d3fbd78a9059e454474f92e65828b018174a9f4738b8c71fbdeac26ab95e02f9a847182766964976b1fccdb9f35721e43e33883cf16ed1343fb7429eb395123b0a4262b7023c22039b9002589a378ed4c6267965af78b861bd025312538cec97966b8973d4e299d9802264d06e40ae118e1d242d1128dcedeb44030df12ef68f78215d65f96eb55db8cbcb060008000d988374f85451a694ffe38a1d03916ff1eec72b31c98d42e1a1bda1290de1a499a5a385b31112a48ba3e6d6849914c1788a7aca37177cc341fff44fec5c5e0abae01c439a1b0311e074e81ae9993b5b3459553e4ece78d4c1501c70f5d81e0725d5b273755c0000000000000000aa4234ff82182952a76233d18e7d49638aeb04e7a9e9e7eafb7c255372795d2d192a0a33cab0f5bf2e93e0544fcdf2df2bc6ce96e5a11993d54f97a23754ac828674dbb93c0ad345715be4a13678b01edf76d8a923655800a2c88cce004505ab45d8f5f88aa887bbce5c18970428516f6099bdbb2cd7a2356397f1a0a23e662e2a6c4834400cbaa41c3c574e6e6aefb7a68da5ec1ae49f968bbe0e0bf9878516f553639f5b4828e92019b61f5874be1c7cdd9482df50bc24a8a1fa10d291390eb84e26a2e8dbeaa45604b05a116c1210a7540bf81005044273f5a8ffc538db289350eb248e483bd8920efcf30a798c2b636243e0a37262ca47dfeefa753ba528f7ba77e825051ce69b4475d7d714ba0c636e6ae9f710411d30ef424aeaabe057c7df6ff8f767bcd9012e1047c686f5ccb76ab3a5df53cbc22ba7ea8f6a8e220bb4d83de1e4dc19d6c1be841503850803bc2c2d5e0e34270a7f1cca0c6c53a8e5f891f7a793a70da62d6d88fbb90d220acc687931b42d6be83ab870da3c0a567f5e65ec0457f4ad2a4ec0b671b36388afd5520a8483a4b11f7d02a41b315f0f9e59f47668d68a74838d6976e12fd45200014041dffacbf60892ec8bd7560686f137a806d3dfaba900b47cac62f828342fff009adb5b2251461a1b9d6ba625b8fe04e69a1a4be2696f0000000086e172932e03000000000000005942e1b9d6dc28ab8e19e1111dd893e801015642faf21eef40d6e7de3ef62c4bc5ff17e7aeb2841098f845d1cc9ec4eee79c298fb0ba939b13707044e2e9cc0d350438c1c8c6bb9a38c6ac5ca0d9cf1f3d6915f25cb26edfc28b3079b97df32601240e454db103fb0c4a14c16837394d2b3673a3f160d3a7b83ecd0509ce9eba0c7bf7843799b1b56a234f9eaab8a3f14f1472bb6aaeb8ac9ee4054605558ab31f339f6a4caf2ee2fd01f34dca3300000000000000000000000000000000f59f8e6e00000000c44130098d833a24000000000095e6f945ba9a941cef5e70b8c152321e24b5b29bcf374dcf5a29a35d76e6e2bf8df95462690a4fc9ec8129e92b6ebb4b40a992a75d3c5954d0bfc87db24d856359079b29b3c374d081c300b2cfaa596d24e800ef8e2201f2fb7a9946f89f9f31f7cbd603fd7f8898c70b5c65f2e28f22e1a79a6af3a54861b07f124642e98389557affbdede09b5566a4a1ee73b20846810030a754acddcdafe3ceeeebc0b5f2fedfe7d198e3067f3dbac9441a9ab8409cbbb7e15b9ae3944097de34de2001c8533a3766e6e4c4c4702ccb932a27a3962814cd6aa8fc684beeaa3932efae3a9052be8eec1e95f6ad8d41dd34829503ba4b66e27154cb6e34aa13450522df1723130b6fb9bec59ae347c93f00e40e293c98d849a33f773c743728992f40faccd5c23130a1c6bfd6fc661bca1598137ddd1090ded672f5a48a40cab3f640c8241a364cbde0f188eec7da7bccafbd5bf28a46f0eecc6b550471b0b0770c6a5a411c0e0b19e15a461e7c6833ba936e214b013f2819ec6572a43b5cd32b11d7e4f8dcf8f7820a17b7b2ee6178a03351dd25091e46bfd82a3979b9cad109fd6217cd52aa81bdabd50826a674bd16b8f7e6aed12a305366599f5f029a7b24558c02750500002f1c19d16a6f391906000000cc0bbbfb8c698ecc137d96711100e0108d3bd2afed0b279ebf0527552a9331e646c424b14ffbb815622bfd2f635855bed1b164d0a56bd104be069854111c5b26ec3c652b5f0a6b9676dae987ec23456ba05a4dfb15321ef6b76e7e547a688c67ab531cfc784c9f940d9fb0464a6cce635e14b80dc5c1c64e75e6bd5355d84f8df272f18f58c570e7afd83ee77f157c146aa747b728969aeb4aba1d8f9de14275bf4a53e95235ae13768ab3fb8ab6ea50e884c2ea98e6400bf0c5ae2887cd1da0e57ccfdf5eca2b455247efcc13102846c0a85f20c80007c0ce6efce627b95b8ad3003385de97101678fb2163ecea6e70a77a6fbc089e31a5ccece932229b8f79faa6863d6857c3d9a9710f9f8ad16eeb8342278f311cbc226498028234d21466892983378fe64acbb44f694cd78e43c74aa75505cb1c91b189f8f89f233a05f5cd4e173a373178557843dd705268f74a9e5429945503195aefd6706b584d8408c9652b3fe68500747f7ee8375fa559c3ad195d3795df1a8364cd13acc3256ee4634c73eeb6954d0fcf09ab84df0b8900e0c6fea2ccb600ae7a4b128cae19df160e7c207b89132d1d5bdc9ffc79f0549b82df521817651d5fead5128205b92ccdccc69407ab556217af277af911dbd456dfc43dd061b6c91485dcc208cf0b3d0bf851de413f5de5ec015e296914afab6411109355e027ce04990d9aae251b9deb11b7db45b9f15b7b55d8fdbedd9e6cf891205694f02be8b9ea8ecd41308a0e1b93ae3435bfa88b440b1f701b4d0fc49c82193f27f8023b630ea97edbf3bf421a0a1a2b4ac7bb30bcd1cdd172c0df37408fd6827bb03e8742fc1c7a2befd1299928c5f79e846a8dc7ca648d960a759e6711b69776896a9656d59af6d44bc5348229fa84ae78af8421a22c4b4c17a3d24a4a0104000000000000d77cc4eef51c2b417c8c7458ddd7dd9d1a863bf0a9e1a30a19020490038017a5c7e474c83302a2c2b5c976dacf3dda7191c757f208000000000000005f7ed983f65723fbb36b9b51abb0dbcd33570000000000000000251aa4f139d0485ffcf89f01639fd1579a3802f720a0215c720a97071f5065a23642a58275dbca444b00e2e5835185d5d5b2796eb0fe32cf3b0633f58ecc7648c3c6efe82f93a3008052416512eea30ea9472e0b456a652883c0907323cf03be193ad0438cdef7a98a1671a1918df310dc4bfd61c3db4819ab1c57b348a8ff1ed36364a20fe846f11d045de81f069bac8425b31c5d08b433562ffb318c1285011f9b78b2401989384311101e452f54661ecdb2514a6ae50dbdd422de0f0f8c670000000000390be79688f80c4c314cb1b14afcaa5d23f9032e0ec51f45f447d6a7c798fcf7e60e2180e289410801e4f03a0e140f388f25b92da1025d8409e171a2336ed71cca86eb4658fe06df286e0e20276b0618eeffd05774f15686cd9d3182ca2fec863875f305fed6baf48a594db12582a38cfdffffffffffffff0cf8d920517835fe7d09cfcb624f6931f1cc6f6b71f58de9ddc38e0c43992f6bc57a718d0cfd197b5324b4e05ef1caa96db3ae1f2f2e5791faba2ebbe1a6faf21f2748fb1fb6743c3ca8af4e6b02518c9b7fdc1b5721eb1c3ed98db25536f74ac7861afc94544e52dcb5c60460a05802e3b437ac977bfa26b887a2443e8d559c58187f004eb82b07937df6e96f77ed551926bec4e0188fae10a35d1c5f1768ac6be829be1827f9df303160df18597efba46f1babc3d74adc31ca71bdab9079e4288881b434484eadde9da6b81802842abd462d546c59d87acc014f81d3414759bda12d2a2c6bc1bfa807bd3101eb227184a61107b6d0618e2a3b842671e084ac3f0ff94dc48b51601247318ab4d1c5106458000000000008000000000000cfee0107e6c2fe8639d926829fdbbd86bf591a8c3c235d8939af9d923f648165881a6c29997234406200b3b1c321cc158dbe17123eace3000000000000000000000000000000000000796de6ae4ae40bdf9a6e8c5dc29562262af9cd54e8e3ecc7e3c8cba0ecc791683496c4e5c1a5729714d9f9031f49b400cd2667b4ea6df54809615a4f973f93e6ccec72f16ff998e29ed99df733680a9d5cea57f99cc139b6ea9014f3000000000000000000000000000000000000feeab45a4046a622b0dceb413e4e39b7317e92cbed46b41ab5115bfb542c933783d750852dfdc6656aaf15e10615a88821f2f1bc53969b52d6852755e7681ad5beda80b38ccd34116b99f50b4fdd967b3f20f260455412b675639a26c76840cce40e323bde9d673fceda0ad6981565c8a183d928903b4f4472dde41b6dcd75314c31e704dfcb222c8359fe88944f852242270c932abfaeece0843d708f5cd25b2a63ae1e79723c1c3c013836b47da0a35d0f34c0705caae54024cf8ade6396ff44482284f415e5769d9ae8688a8d5516690aae9ce1c785262734723519b042a161e6efabf263a46ba92254a51ff6502470f3038cf6d8d991931cfd82ea97e1b596133e7754908d912d1054d174f5a731c019f152a5ca2e48599b6d563bfcd8c0950f4292769217a6e309452b14e64ae64ad58ced33582a1b3d2e0c300059fb1ee78cdddb827293de267d64bf47c3c8c419683c948e46de8cea0b232da00ff39ebef3b73b3d6fbeecd3f9ff06b7e08ed8ce2b9b9cf2e08975f5959fa7028f68c525ab173c0c553d21bd1e9176abdf799e7a08d2f3c14e1ca99d525bc3af0ca0f48f145c65b10dfc67803aab67f6b631d3d7e237fec4bc6eacc364b7cdd925973705d40c5a614e354d9b92357845d15ea41ad3e3a98396131f835e17f0cbfbdc59453991e689f9ce19bd4a3b4121e5a8b5dbb519b5556cb70603ceac0b7ca02cb05a01afa3164ca428add947673cdba49a0e6e8aeeddf52c0f0ef224c69a3c96c2fddf56d74c4ae7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 3.992313212s ago: executing program 0 (id=5220): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42703, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x145}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 3.128755191s ago: executing program 0 (id=5222): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000003000000000000000700000000000000", @ANYRES32, @ANYBLOB="006483000000000000ebfefffffffffffff80000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000b37fa3e829dacf0b"], 0xfffffffffffffe48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000007000000000000000200000d000000000d00000002000000040000008200000000000000003ab9d1cf050a72db008003005800305f610068ce596d11faa49601b1a4ec56932ce2ac6fb89495151c82f04cb8e912607625e65152b1d907db3924d6773e669181d074ffc97e9b5eefbb"], 0x0, 0x4b, 0x0, 0x1, 0x6, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x7, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="eb00000004000000fe7f0000c85c181d6b11b683d96dd6562529000000000000006a1d4c1bd6bf48e8", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000000, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) 2.6020458s ago: executing program 1 (id=5224): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000003000000000000000700000000000000", @ANYRES32, @ANYBLOB="006483000000000000ebfefffffffffffff80000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000b37fa3e829dacf0b"], 0xfffffffffffffe48) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000007000000000000000200000d000000000d00000002000000040000008200000000000000003ab9d1cf050a72db008003005800305f610068ce596d11faa49601b1a4ec56932ce2ac6fb89495151c82f04cb8e912607625e65152b1d907db3924d6773e669181d074ffc97e9b5eefbb459d"], 0x0, 0x4b, 0x0, 0x1, 0x6, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x7, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000000, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) 2.272445431s ago: executing program 4 (id=5225): socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x17) 2.142478362s ago: executing program 3 (id=5226): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000010000000000000000711213000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000ffff00000000000800000000"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x3, 0x7fff, 0x10000, 0x4c022, r3, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x800000, 0x0, 0x2, 0x9, @value, @void, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x10000, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x2008}, 0x8) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r5, 0x8004745a, 0x2000000c) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) 2.094142037s ago: executing program 4 (id=5227): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYBLOB='\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="037065060fd05c65c25900f288a84a4708"], 0xfdef) 1.971575638s ago: executing program 4 (id=5228): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42703, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x145}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.332689317s ago: executing program 4 (id=5229): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000000000002e0000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) write$cgroup_devices(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0xffdd) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x13, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) socketpair$unix(0x1, 0x2, 0x0, 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x48, &(0x7f0000000040)=r4, 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) openat$tun(0xffffff9c, &(0x7f0000000040), 0x501080, 0x0) 1.038524324s ago: executing program 3 (id=5230): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x5b) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x0, 0xfffffdb9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 1.035880874s ago: executing program 0 (id=5231): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000003000000000000000700000000000000", @ANYRES32, @ANYBLOB="006483000000000000ebfefffffffffffff80000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000b37fa3e829dacf0b"], 0xfffffffffffffe48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000007000000000000000200000d000000000d00000002000000040000008200000000000000003ab9d1cf050a72db008003005800305f610068ce596d11faa49601b1a4ec56932ce2ac6fb89495151c82f04cb8e912607625e65152b1d907db3924d6773e669181d074ffc97e9b5eefbb459d"], 0x0, 0x4b, 0x0, 0x1, 0x6, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x7, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="eb00000004000000fe7f0000c85c181d6b11b683d96dd6562529000000000000006a1d4c1bd6bf48e8", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x19) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000000, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6}, 0x0, &(0x7f00000002c0)}, 0x20) 852.344251ms ago: executing program 4 (id=5232): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x5b) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x0, 0xfffffdb9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 771.631009ms ago: executing program 3 (id=5233): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000000000002e0000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) write$cgroup_devices(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0xffdd) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x13, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) socketpair$unix(0x1, 0x2, 0x0, 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x48, &(0x7f0000000040)=r4, 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) openat$tun(0xffffff9c, &(0x7f0000000040), 0x501080, 0x0) 762.595329ms ago: executing program 1 (id=5234): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42703, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x145}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 611.075693ms ago: executing program 0 (id=5235): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000003000000000000000700000000000000", @ANYRES32, @ANYBLOB="006483000000000000ebfefffffffffffff80000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000b37fa3e829dacf0b"], 0xfffffffffffffe48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000007000000000000000200000d000000000d00000002000000040000008200000000000000003ab9d1cf050a72db008003005800305f610068ce596d11faa49601b1a4ec56932ce2ac6fb89495151c82f04cb8e912607625e65152b1d907db3924d6773e669181d074ffc97e9b5eefbb459d"], 0x0, 0x4b, 0x0, 0x1, 0x6, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x7, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="eb00000004000000fe7f0000c85c181d6b11b683d96dd6562529000000000000006a1d4c1bd6bf48e8", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x19) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000000, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6}, 0x0, &(0x7f00000002c0)}, 0x20) 607.142054ms ago: executing program 1 (id=5236): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[], 0x17) 557.598798ms ago: executing program 1 (id=5237): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYBLOB='\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="037065060fd05c65c25900f288a84a4708"], 0xfdef) 557.061628ms ago: executing program 1 (id=5238): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42703, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x145}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 555.727018ms ago: executing program 3 (id=5246): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42703, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x80000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x145}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 522.909181ms ago: executing program 4 (id=5239): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000010000000000000000711213000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000ffff00000000000800000000"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x3, 0x7fff, 0x10000, 0x4c022, r3, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x800000, 0x0, 0x2, 0x9, @value, @void, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x10000, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x2008}, 0x8) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r5, 0x8004745a, 0x2000000c) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) 395.177443ms ago: executing program 1 (id=5240): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000010000000000000000711213000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000ffff00000000000800000000"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x3, 0x7fff, 0x10000, 0x4c022, r3, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x800000, 0x0, 0x2, 0x9, @value, @void, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x10000, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x2008}, 0x8) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r5, 0x8004745a, 0x2000000c) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) 343.253448ms ago: executing program 3 (id=5241): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000003000000000000000700000000000000", @ANYRES32, @ANYBLOB="006483000000000000ebfefffffffffffff80000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000b37fa3e829dacf0b"], 0xfffffffffffffe48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000007000000000000000200000d000000000d00000002000000040000008200000000000000003ab9d1cf050a72db008003005800305f610068ce596d11faa49601b1a4ec56932ce2ac6fb89495151c82f04cb8e912607625e65152b1d907db3924d6773e669181d074ffc97e9b5eefbb45"], 0x0, 0x4b, 0x0, 0x1, 0x6, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x7, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="eb00000004000000fe7f0000c85c181d6b11b683d96dd6562529000000000000006a1d4c1bd6bf48e8", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000000, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) 0s ago: executing program 0 (id=5242): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000000000002e0000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) write$cgroup_devices(r1, &(0x7f0000000300)=ANY=[@ANYBLOB], 0xffdd) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x13, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32, @ANYBLOB], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) socketpair$unix(0x1, 0x2, 0x0, 0x0) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x48, &(0x7f0000000040)=r4, 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) openat$tun(0xffffff9c, &(0x7f0000000040), 0x501080, 0x0) kernel console output (not intermixed with test programs): 9.367802][T17316] device syzkaller0 entered promiscuous mode [ 1589.564607][T17323] device sit0 left promiscuous mode [ 1589.576596][T17324] device sit0 entered promiscuous mode [ 1590.035256][T17329] device veth0_vlan left promiscuous mode [ 1590.140149][T17329] device veth0_vlan entered promiscuous mode [ 1591.532824][T17341] bond_slave_1: mtu less than device minimum [ 1591.999368][T17348] device sit0 left promiscuous mode [ 1592.031118][T17348] device sit0 entered promiscuous mode [ 1592.911965][T17361] device sit0 left promiscuous mode [ 1593.035810][T17362] device sit0 entered promiscuous mode [ 1593.146245][T17365] bridge0: port 4(vlan0) entered disabled state [ 1593.199264][T17365] device veth0_vlan left promiscuous mode [ 1593.265405][T17365] device veth0_vlan entered promiscuous mode [ 1593.396891][T17365] bridge0: port 4(vlan0) entered blocking state [ 1593.403982][T17365] bridge0: port 4(vlan0) entered forwarding state [ 1594.306824][T17385] device syzkaller0 entered promiscuous mode [ 1594.622985][T17390] tun0: tun_chr_ioctl cmd 1074025677 [ 1594.637580][T17390] tun0: linktype set to 513 [ 1594.676252][T17395] device sit0 left promiscuous mode [ 1594.693567][T17395] device sit0 entered promiscuous mode [ 1595.218460][T17408] device sit0 left promiscuous mode [ 1595.351656][T17414] device sit0 entered promiscuous mode [ 1595.930692][T17420] bond_slave_1: mtu less than device minimum [ 1596.553060][T17440] tun0: tun_chr_ioctl cmd 1074025677 [ 1596.558573][T17440] tun0: linktype set to 513 [ 1596.709118][T17444] device sit0 left promiscuous mode [ 1596.719946][T17444] device sit0 entered promiscuous mode [ 1596.883847][T17448] bridge0: port 3(vlan0) entered disabled state [ 1596.894406][T17448] device veth0_vlan left promiscuous mode [ 1596.901805][T17448] device veth0_vlan entered promiscuous mode [ 1596.911091][T17448] bridge0: port 3(vlan0) entered blocking state [ 1596.917192][T17448] bridge0: port 3(vlan0) entered forwarding state [ 1598.049195][T17471] FAULT_INJECTION: forcing a failure. [ 1598.049195][T17471] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1598.110654][T17471] CPU: 0 PID: 17471 Comm: syz.1.4184 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1598.121770][T17471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1598.131665][T17471] Call Trace: [ 1598.134788][T17471] [ 1598.137566][T17471] dump_stack_lvl+0x151/0x1b7 [ 1598.142175][T17471] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1598.147470][T17471] ? __kasan_check_write+0x14/0x20 [ 1598.152428][T17471] dump_stack+0x15/0x1c [ 1598.156408][T17471] should_fail_ex+0x3d0/0x520 [ 1598.160925][T17471] should_fail+0xb/0x10 [ 1598.164917][T17471] should_fail_usercopy+0x1a/0x20 [ 1598.169775][T17471] _copy_from_user+0x1e/0xc0 [ 1598.174202][T17471] perf_copy_attr+0x163/0x880 [ 1598.178719][T17471] __se_sys_perf_event_open+0xd7/0x3d60 [ 1598.184098][T17471] ? __kasan_check_write+0x14/0x20 [ 1598.189043][T17471] ? mutex_unlock+0xb2/0x260 [ 1598.193471][T17471] ? __mutex_lock_slowpath+0x10/0x10 [ 1598.198593][T17471] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1598.204058][T17471] ? fput+0x15b/0x1b0 [ 1598.207879][T17471] ? __ia32_sys_read+0x90/0x90 [ 1598.212481][T17471] ? debug_smp_processor_id+0x17/0x20 [ 1598.217687][T17471] __x64_sys_perf_event_open+0xbf/0xd0 [ 1598.222984][T17471] x64_sys_call+0x7de/0x9a0 [ 1598.227319][T17471] do_syscall_64+0x3b/0xb0 [ 1598.231572][T17471] ? clear_bhb_loop+0x55/0xb0 [ 1598.236088][T17471] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1598.241820][T17471] RIP: 0033:0x7fb4ce37dff9 [ 1598.246068][T17471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1598.265770][T17471] RSP: 002b:00007fb4cf158038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1598.274016][T17471] RAX: ffffffffffffffda RBX: 00007fb4ce535f80 RCX: 00007fb4ce37dff9 [ 1598.281826][T17471] RDX: 000000000000000a RSI: ffffffffffffffff RDI: 0000000020000100 [ 1598.289645][T17471] RBP: 00007fb4cf158090 R08: 0000000000000002 R09: 0000000000000000 [ 1598.297450][T17471] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1598.305262][T17471] R13: 0000000000000001 R14: 00007fb4ce535f80 R15: 00007ffcb4221408 [ 1598.313079][T17471] [ 1598.462888][T17481] device sit0 left promiscuous mode [ 1598.477643][T17484] device sit0 entered promiscuous mode [ 1598.603734][T17488] device sit0 left promiscuous mode [ 1598.694155][T17488] device sit0 entered promiscuous mode [ 1599.003348][T17516] bond_slave_1: mtu less than device minimum [ 1599.009368][T17517] device sit0 left promiscuous mode [ 1599.087645][T17520] device sit0 entered promiscuous mode [ 1599.170849][T17523] device syzkaller0 entered promiscuous mode [ 1599.708395][T17535] FAULT_INJECTION: forcing a failure. [ 1599.708395][T17535] name failslab, interval 1, probability 0, space 0, times 0 [ 1599.721047][T17535] CPU: 0 PID: 17535 Comm: syz.3.4203 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1599.732135][T17535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1599.742027][T17535] Call Trace: [ 1599.745154][T17535] [ 1599.747928][T17535] dump_stack_lvl+0x151/0x1b7 [ 1599.752441][T17535] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1599.757733][T17535] ? skb_release_data+0x19e/0x840 [ 1599.762594][T17535] ? __kasan_kmalloc+0x9c/0xb0 [ 1599.767195][T17535] dump_stack+0x15/0x1c [ 1599.771187][T17535] should_fail_ex+0x3d0/0x520 [ 1599.775698][T17535] ? skb_clone+0x1f8/0x380 [ 1599.779954][T17535] __should_failslab+0xaf/0xf0 [ 1599.784554][T17535] should_failslab+0x9/0x20 [ 1599.788891][T17535] kmem_cache_alloc+0x3b/0x2c0 [ 1599.793493][T17535] skb_clone+0x1f8/0x380 [ 1599.797624][T17535] bpf_clone_redirect+0xa5/0x3c0 [ 1599.802351][T17535] bpf_prog_64e505a7b7f97a05+0x55/0x5a [ 1599.807715][T17535] ? module_enable_nx+0x320/0x3a0 [ 1599.812509][T17535] ? __stack_depot_save+0x36/0x480 [ 1599.817536][T17535] ? kasan_set_track+0x60/0x70 [ 1599.822134][T17535] ? kasan_set_track+0x4b/0x70 [ 1599.826733][T17535] ? kasan_save_alloc_info+0x1f/0x30 [ 1599.831855][T17535] ? __kasan_slab_alloc+0x6c/0x80 [ 1599.836715][T17535] ? slab_post_alloc_hook+0x53/0x2c0 [ 1599.841840][T17535] ? kmem_cache_alloc+0x175/0x2c0 [ 1599.846696][T17535] ? build_skb+0x2c/0x220 [ 1599.850864][T17535] ? bpf_prog_test_run_skb+0x3ad/0x13a0 [ 1599.856245][T17535] ? bpf_prog_test_run+0x3b0/0x630 [ 1599.861190][T17535] ? __sys_bpf+0x59f/0x7f0 [ 1599.865443][T17535] ? __x64_sys_bpf+0x7c/0x90 [ 1599.869873][T17535] ? x64_sys_call+0x87f/0x9a0 [ 1599.874383][T17535] ? do_syscall_64+0x3b/0xb0 [ 1599.878812][T17535] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1599.884718][T17535] ? __kasan_check_read+0x11/0x20 [ 1599.889575][T17535] ? bpf_test_timer_continue+0x140/0x460 [ 1599.895043][T17535] bpf_test_run+0x4ab/0xa40 [ 1599.899387][T17535] ? convert___skb_to_skb+0x670/0x670 [ 1599.904589][T17535] ? eth_type_trans+0x342/0x710 [ 1599.909278][T17535] ? eth_get_headlen+0x240/0x240 [ 1599.914049][T17535] ? bpf_prog_test_run_skb+0x7ab/0x13a0 [ 1599.919445][T17535] ? convert___skb_to_skb+0x44/0x670 [ 1599.924551][T17535] ? memcpy+0x56/0x70 [ 1599.928372][T17535] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 1599.933581][T17535] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 1599.939310][T17535] ? __kasan_check_write+0x14/0x20 [ 1599.944251][T17535] ? fput+0x15b/0x1b0 [ 1599.948072][T17535] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 1599.953803][T17535] bpf_prog_test_run+0x3b0/0x630 [ 1599.958574][T17535] ? bpf_prog_query+0x260/0x260 [ 1599.963263][T17535] ? selinux_bpf+0xd2/0x100 [ 1599.967607][T17535] ? security_bpf+0x82/0xb0 [ 1599.971940][T17535] __sys_bpf+0x59f/0x7f0 [ 1599.976021][T17535] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1599.981236][T17535] ? __ia32_sys_read+0x90/0x90 [ 1599.985827][T17535] ? debug_smp_processor_id+0x17/0x20 [ 1599.991035][T17535] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1599.996938][T17535] __x64_sys_bpf+0x7c/0x90 [ 1600.001190][T17535] x64_sys_call+0x87f/0x9a0 [ 1600.005532][T17535] do_syscall_64+0x3b/0xb0 [ 1600.009782][T17535] ? clear_bhb_loop+0x55/0xb0 [ 1600.014298][T17535] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1600.020025][T17535] RIP: 0033:0x7f27ec57dff9 [ 1600.024278][T17535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1600.043719][T17535] RSP: 002b:00007f27ed30d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1600.051964][T17535] RAX: ffffffffffffffda RBX: 00007f27ec735f80 RCX: 00007f27ec57dff9 [ 1600.059776][T17535] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 1600.067587][T17535] RBP: 00007f27ed30d090 R08: 0000000000000000 R09: 0000000000000000 [ 1600.075398][T17535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1600.083209][T17535] R13: 0000000000000000 R14: 00007f27ec735f80 R15: 00007ffcc198c998 [ 1600.091027][T17535] [ 1600.112826][T17537] device sit0 left promiscuous mode [ 1600.139270][T17537] device sit0 entered promiscuous mode [ 1600.461839][T17552] syz.1.4209 (17552) used obsolete PPPIOCDETACH ioctl [ 1600.526347][T17557] device sit0 left promiscuous mode [ 1600.699419][T17562] FAULT_INJECTION: forcing a failure. [ 1600.699419][T17562] name failslab, interval 1, probability 0, space 0, times 0 [ 1600.797711][T17562] CPU: 0 PID: 17562 Comm: syz.4.4211 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1600.808824][T17562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1600.818721][T17562] Call Trace: [ 1600.821839][T17562] [ 1600.824619][T17562] dump_stack_lvl+0x151/0x1b7 [ 1600.829129][T17562] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1600.834424][T17562] ? should_fail_ex+0x33d/0x520 [ 1600.839113][T17562] dump_stack+0x15/0x1c [ 1600.843104][T17562] should_fail_ex+0x3d0/0x520 [ 1600.847615][T17562] ? __request_module+0x28c/0x8d0 [ 1600.852477][T17562] __should_failslab+0xaf/0xf0 [ 1600.857077][T17562] should_failslab+0x9/0x20 [ 1600.861416][T17562] __kmem_cache_alloc_node+0x3d/0x250 [ 1600.866624][T17562] ? __request_module+0x28c/0x8d0 [ 1600.871489][T17562] kmalloc_trace+0x2a/0xa0 [ 1600.875738][T17562] ? dev_load+0x5b/0xb0 [ 1600.879729][T17562] __request_module+0x28c/0x8d0 [ 1600.884418][T17562] ? capable+0x78/0xe0 [ 1600.888321][T17562] ? _trace_android_vh_delayacct_wpcopy_end+0x120/0x120 [ 1600.895096][T17562] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1600.901084][T17562] ? security_capable+0x87/0xb0 [ 1600.905767][T17562] dev_load+0x5b/0xb0 [ 1600.909585][T17562] dev_ioctl+0x52c/0xe60 [ 1600.913665][T17562] sock_do_ioctl+0x26b/0x450 [ 1600.918092][T17562] ? sock_show_fdinfo+0xa0/0xa0 [ 1600.922781][T17562] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1600.928768][T17562] ? do_vfs_ioctl+0x121/0x29a0 [ 1600.933370][T17562] sock_ioctl+0x455/0x740 [ 1600.937535][T17562] ? __fget_files+0x78/0x330 [ 1600.941961][T17562] ? sock_poll+0x400/0x400 [ 1600.946216][T17562] ? __fget_files+0x2cb/0x330 [ 1600.950730][T17562] ? security_file_ioctl+0x84/0xb0 [ 1600.955673][T17562] ? sock_poll+0x400/0x400 [ 1600.959928][T17562] __se_sys_ioctl+0x114/0x190 [ 1600.964441][T17562] __x64_sys_ioctl+0x7b/0x90 [ 1600.968867][T17562] x64_sys_call+0x98/0x9a0 [ 1600.973118][T17562] do_syscall_64+0x3b/0xb0 [ 1600.977372][T17562] ? clear_bhb_loop+0x55/0xb0 [ 1600.981890][T17562] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1600.987612][T17562] RIP: 0033:0x7f509277dff9 [ 1600.991868][T17562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1601.011312][T17562] RSP: 002b:00007f509360a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1601.019561][T17562] RAX: ffffffffffffffda RBX: 00007f5092936058 RCX: 00007f509277dff9 [ 1601.027365][T17562] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 1601.035363][T17562] RBP: 00007f509360a090 R08: 0000000000000000 R09: 0000000000000000 [ 1601.043162][T17562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1601.050975][T17562] R13: 0000000000000000 R14: 00007f5092936058 R15: 00007ffe37ec4458 [ 1601.058790][T17562] [ 1601.136972][T17567] bond_slave_1: mtu less than device minimum [ 1601.159434][ T28] audit: type=1400 audit(1728338308.905:150): avc: denied { sys_module } for pid=17556 comm="syz.4.4211" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1601.763668][T17572] device syzkaller0 entered promiscuous mode [ 1601.925068][T17582] device syzkaller0 entered promiscuous mode [ 1602.692267][T17604] device sit0 left promiscuous mode [ 1602.703141][T17604] device sit0 entered promiscuous mode [ 1602.983679][T17614] device sit0 left promiscuous mode [ 1603.006099][T17614] device sit0 entered promiscuous mode [ 1603.686769][T17622] tun0: tun_chr_ioctl cmd 1074025681 [ 1603.695717][T17623] bond_slave_1: mtu less than device minimum [ 1603.995261][T17647] device sit0 entered promiscuous mode [ 1604.829684][T17657] device sit0 left promiscuous mode [ 1604.856943][T17659] device sit0 entered promiscuous mode [ 1605.068588][T17679] FAULT_INJECTION: forcing a failure. [ 1605.068588][T17679] name failslab, interval 1, probability 0, space 0, times 0 [ 1605.081206][T17679] CPU: 1 PID: 17679 Comm: syz.0.4242 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1605.092285][T17679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1605.102179][T17679] Call Trace: [ 1605.105302][T17679] [ 1605.108088][T17679] dump_stack_lvl+0x151/0x1b7 [ 1605.112600][T17679] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1605.117899][T17679] dump_stack+0x15/0x1c [ 1605.121888][T17679] should_fail_ex+0x3d0/0x520 [ 1605.126398][T17679] ? __get_vm_area_node+0x129/0x370 [ 1605.131432][T17679] __should_failslab+0xaf/0xf0 [ 1605.136467][T17679] should_failslab+0x9/0x20 [ 1605.140810][T17679] __kmem_cache_alloc_node+0x3d/0x250 [ 1605.146016][T17679] ? __get_vm_area_node+0x129/0x370 [ 1605.151053][T17679] kmalloc_node_trace+0x26/0xb0 [ 1605.155736][T17679] __get_vm_area_node+0x129/0x370 [ 1605.160597][T17679] __vmalloc_node_range+0x335/0x1560 [ 1605.165716][T17679] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 1605.171105][T17679] ? vmap+0x2b0/0x2b0 [ 1605.174913][T17679] ? selinux_capset+0xf0/0xf0 [ 1605.179428][T17679] ? avc_has_perm_noaudit+0x348/0x430 [ 1605.184635][T17679] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 1605.190105][T17679] __vmalloc+0x7a/0x90 [ 1605.194012][T17679] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 1605.199399][T17679] bpf_prog_alloc_no_stats+0x3e/0x400 [ 1605.204600][T17679] ? security_capable+0x87/0xb0 [ 1605.209296][T17679] bpf_prog_alloc+0x22/0x1c0 [ 1605.213709][T17679] bpf_prog_load+0x84a/0x1bf0 [ 1605.218243][T17679] ? map_freeze+0x3a0/0x3a0 [ 1605.222564][T17679] ? selinux_bpf+0xcb/0x100 [ 1605.226987][T17679] ? security_bpf+0x82/0xb0 [ 1605.232283][T17679] __sys_bpf+0x52c/0x7f0 [ 1605.236361][T17679] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1605.241572][T17679] ? __ia32_sys_read+0x90/0x90 [ 1605.246170][T17679] ? debug_smp_processor_id+0x17/0x20 [ 1605.251379][T17679] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1605.257278][T17679] __x64_sys_bpf+0x7c/0x90 [ 1605.261532][T17679] x64_sys_call+0x87f/0x9a0 [ 1605.265872][T17679] do_syscall_64+0x3b/0xb0 [ 1605.270125][T17679] ? clear_bhb_loop+0x55/0xb0 [ 1605.274638][T17679] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1605.280367][T17679] RIP: 0033:0x7fb38bb7dff9 [ 1605.284619][T17679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1605.304147][T17679] RSP: 002b:00007fb38c8f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1605.312393][T17679] RAX: ffffffffffffffda RBX: 00007fb38bd35f80 RCX: 00007fb38bb7dff9 [ 1605.320204][T17679] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 1605.328017][T17679] RBP: 00007fb38c8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 1605.335825][T17679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1605.343643][T17679] R13: 0000000000000000 R14: 00007fb38bd35f80 R15: 00007ffddd3fca28 [ 1605.351456][T17679] [ 1605.354717][T17679] syz.0.4242: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 1605.375516][T17684] bond_slave_1: mtu less than device minimum [ 1605.382234][T17679] CPU: 0 PID: 17679 Comm: syz.0.4242 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1605.393329][T17679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1605.403226][T17679] Call Trace: [ 1605.406349][T17679] [ 1605.409125][T17679] dump_stack_lvl+0x151/0x1b7 [ 1605.413641][T17679] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1605.418933][T17679] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1605.424576][T17679] dump_stack+0x15/0x1c [ 1605.428570][T17679] warn_alloc+0x21a/0x3a0 [ 1605.432745][T17679] ? should_failslab+0x9/0x20 [ 1605.437251][T17679] ? zone_watermark_ok_safe+0x270/0x270 [ 1605.442630][T17679] ? kmalloc_node_trace+0x3d/0xb0 [ 1605.447489][T17679] ? __get_vm_area_node+0x361/0x370 [ 1605.452523][T17679] __vmalloc_node_range+0x35a/0x1560 [ 1605.457648][T17679] ? vmap+0x2b0/0x2b0 [ 1605.461462][T17679] ? selinux_capset+0xf0/0xf0 [ 1605.465976][T17679] ? avc_has_perm_noaudit+0x348/0x430 [ 1605.471184][T17679] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 1605.476565][T17679] __vmalloc+0x7a/0x90 [ 1605.480472][T17679] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 1605.485851][T17679] bpf_prog_alloc_no_stats+0x3e/0x400 [ 1605.491058][T17679] ? security_capable+0x87/0xb0 [ 1605.495748][T17679] bpf_prog_alloc+0x22/0x1c0 [ 1605.500174][T17679] bpf_prog_load+0x84a/0x1bf0 [ 1605.504689][T17679] ? map_freeze+0x3a0/0x3a0 [ 1605.509030][T17679] ? selinux_bpf+0xcb/0x100 [ 1605.513368][T17679] ? security_bpf+0x82/0xb0 [ 1605.517707][T17679] __sys_bpf+0x52c/0x7f0 [ 1605.521783][T17679] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1605.526995][T17679] ? __ia32_sys_read+0x90/0x90 [ 1605.531599][T17679] ? debug_smp_processor_id+0x17/0x20 [ 1605.536799][T17679] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1605.542791][T17679] __x64_sys_bpf+0x7c/0x90 [ 1605.547041][T17679] x64_sys_call+0x87f/0x9a0 [ 1605.551381][T17679] do_syscall_64+0x3b/0xb0 [ 1605.555634][T17679] ? clear_bhb_loop+0x55/0xb0 [ 1605.560158][T17679] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1605.565874][T17679] RIP: 0033:0x7fb38bb7dff9 [ 1605.570219][T17679] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1605.589663][T17679] RSP: 002b:00007fb38c8f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1605.597903][T17679] RAX: ffffffffffffffda RBX: 00007fb38bd35f80 RCX: 00007fb38bb7dff9 [ 1605.605713][T17679] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 1605.613526][T17679] RBP: 00007fb38c8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 1605.621338][T17679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1605.629238][T17679] R13: 0000000000000000 R14: 00007fb38bd35f80 R15: 00007ffddd3fca28 [ 1605.637053][T17679] [ 1605.644790][T17679] Mem-Info: [ 1605.648033][T17679] active_anon:5264 inactive_anon:0 isolated_anon:0 [ 1605.648033][T17679] active_file:21294 inactive_file:2567 isolated_file:0 [ 1605.648033][T17679] unevictable:0 dirty:374 writeback:0 [ 1605.648033][T17679] slab_reclaimable:7084 slab_unreclaimable:78382 [ 1605.648033][T17679] mapped:21116 shmem:165 pagetables:511 [ 1605.648033][T17679] sec_pagetables:0 bounce:0 [ 1605.648033][T17679] kernel_misc_reclaimable:0 [ 1605.648033][T17679] free:1521481 free_pcp:19974 free_cma:0 [ 1605.714070][T17679] Node 0 active_anon:20956kB inactive_anon:0kB active_file:85176kB inactive_file:10268kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:84464kB dirty:1496kB writeback:0kB shmem:660kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4280kB pagetables:2044kB sec_pagetables:0kB all_unreclaimable? no [ 1605.802179][T17679] DMA32 free:2966484kB boost:0kB min:62552kB low:78188kB high:93824kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971568kB mlocked:0kB bounce:0kB free_pcp:5084kB local_pcp:56kB free_cma:0kB [ 1605.837544][T17679] lowmem_reserve[]: 0 3932 3932 3932 [ 1605.842845][T17679] Normal free:3119440kB boost:0kB min:84900kB low:106124kB high:127348kB reserved_highatomic:0KB active_anon:21028kB inactive_anon:0kB active_file:85176kB inactive_file:10268kB unevictable:0kB writepending:1496kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:74200kB local_pcp:48228kB free_cma:0kB [ 1605.872930][T17679] lowmem_reserve[]: 0 0 0 0 [ 1605.877309][T17679] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 722*4096kB (M) = 2966484kB [ 1605.895837][T17693] device sit0 left promiscuous mode [ 1605.897480][T17679] Normal: 2172*4kB (UME) 1262*8kB (UME) 463*16kB (UM) 314*32kB (UME) 658*64kB (UME) 261*128kB (UME) 52*256kB (UME) 12*512kB (UME) 6*1024kB (U) 4*2048kB (U) 726*4096kB (UM) = 3119248kB [ 1605.921885][T17679] 24029 total pagecache pages [ 1605.934276][T17695] device sit0 entered promiscuous mode [ 1605.939253][T17679] 0 pages in swap cache [ 1605.944269][T17679] Free swap = 124996kB [ 1605.948287][T17679] Total swap = 124996kB [ 1605.952306][T17679] 2097051 pages RAM [ 1605.955897][T17679] 0 pages HighMem/MovableOnly [ 1605.960437][T17679] 347559 pages reserved [ 1605.964454][T17679] 0 pages cma reserved [ 1606.088574][T17705] device sit0 left promiscuous mode [ 1606.098802][T17705] device sit0 entered promiscuous mode [ 1606.250555][T17714] FAULT_INJECTION: forcing a failure. [ 1606.250555][T17714] name failslab, interval 1, probability 0, space 0, times 0 [ 1606.263383][T17714] CPU: 1 PID: 17714 Comm: syz.3.4251 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1606.274735][T17714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1606.284710][T17714] Call Trace: [ 1606.287833][T17714] [ 1606.290610][T17714] dump_stack_lvl+0x151/0x1b7 [ 1606.295122][T17714] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1606.300419][T17714] ? visit_groups_merge+0x24f4/0x2560 [ 1606.305630][T17714] dump_stack+0x15/0x1c [ 1606.309618][T17714] should_fail_ex+0x3d0/0x520 [ 1606.314130][T17714] ? dup_task_struct+0x5a/0x7d0 [ 1606.319177][T17714] __should_failslab+0xaf/0xf0 [ 1606.323770][T17714] should_failslab+0x9/0x20 [ 1606.328113][T17714] kmem_cache_alloc_node+0x3e/0x2d0 [ 1606.333138][T17714] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 1606.338085][T17714] dup_task_struct+0x5a/0x7d0 [ 1606.342598][T17714] ? __kasan_check_write+0x14/0x20 [ 1606.347555][T17714] copy_process+0x5c3/0x3530 [ 1606.351983][T17714] ? __kasan_check_write+0x14/0x20 [ 1606.356920][T17714] ? _raw_spin_lock+0xa4/0x1b0 [ 1606.361521][T17714] ? ctx_sched_in+0x276/0x310 [ 1606.366035][T17714] ? _raw_spin_unlock+0x4c/0x70 [ 1606.370719][T17714] ? perf_event_context_sched_in+0x4ea/0x5e0 [ 1606.376534][T17714] ? idle_dummy+0x10/0x10 [ 1606.380699][T17714] ? __perf_event_task_sched_in+0x1a0/0x1f0 [ 1606.386431][T17714] ? perf_pmu_sched_task+0x190/0x190 [ 1606.391551][T17714] kernel_clone+0x229/0x890 [ 1606.395890][T17714] ? _raw_spin_unlock+0x4c/0x70 [ 1606.400583][T17714] ? finish_task_switch+0x167/0x7b0 [ 1606.405611][T17714] ? create_io_thread+0x180/0x180 [ 1606.410472][T17714] ? __schedule+0xcbd/0x1560 [ 1606.414901][T17714] __x64_sys_clone+0x231/0x280 [ 1606.419498][T17714] ? __do_sys_vfork+0x110/0x110 [ 1606.424186][T17714] ? fpregs_restore_userregs+0x130/0x290 [ 1606.429654][T17714] ? switch_fpu_return+0xe/0x10 [ 1606.434347][T17714] x64_sys_call+0x1b0/0x9a0 [ 1606.438680][T17714] do_syscall_64+0x3b/0xb0 [ 1606.442932][T17714] ? clear_bhb_loop+0x55/0xb0 [ 1606.447449][T17714] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1606.453173][T17714] RIP: 0033:0x7f27ec57dff9 [ 1606.457430][T17714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1606.476870][T17714] RSP: 002b:00007f27ed2ebfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1606.485117][T17714] RAX: ffffffffffffffda RBX: 00007f27ec736058 RCX: 00007f27ec57dff9 [ 1606.492926][T17714] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000024001000 [ 1606.500737][T17714] RBP: 00007f27ed2ec090 R08: 0000000000000000 R09: 0000000000000000 [ 1606.508549][T17714] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1606.516361][T17714] R13: 0000000000000000 R14: 00007f27ec736058 R15: 00007ffcc198c998 [ 1606.524175][T17714] [ 1607.016871][T17728] device sit0 left promiscuous mode [ 1607.033726][T17728] device sit0 entered promiscuous mode [ 1608.787870][ T10] device bridge_slave_1 left promiscuous mode [ 1608.793784][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1608.801168][ T10] device bridge_slave_0 left promiscuous mode [ 1608.807070][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1608.814572][ T10] device veth1_macvtap left promiscuous mode [ 1608.820412][ T10] device veth0_vlan left promiscuous mode [ 1609.587706][T17748] device sit0 left promiscuous mode [ 1609.688781][T17748] device sit0 entered promiscuous mode [ 1610.532597][T17760] device pim6reg1 entered promiscuous mode [ 1610.850711][T17772] device veth0_vlan left promiscuous mode [ 1610.876652][T17772] device veth0_vlan entered promiscuous mode [ 1611.075614][ T8720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1611.110455][ T8720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1611.166505][ T8720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1611.659926][T17761] bridge0: port 1(bridge_slave_0) entered blocking state [ 1611.666831][T17761] bridge0: port 1(bridge_slave_0) entered disabled state [ 1611.674551][T17761] device bridge_slave_0 entered promiscuous mode [ 1611.728324][T17791] bond_slave_1: mtu less than device minimum [ 1611.735658][T17761] bridge0: port 2(bridge_slave_1) entered blocking state [ 1611.747436][T17761] bridge0: port 2(bridge_slave_1) entered disabled state [ 1611.754549][T17761] device bridge_slave_1 entered promiscuous mode [ 1611.778314][T17795] device sit0 left promiscuous mode [ 1611.837885][T17795] device sit0 entered promiscuous mode [ 1612.401359][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1612.412436][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1612.518618][T17812] device sit0 left promiscuous mode [ 1612.534221][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1612.544917][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1612.553264][ T8831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1612.560136][ T8831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1612.568323][T17812] device sit0 entered promiscuous mode [ 1612.604330][T17818] FAULT_INJECTION: forcing a failure. [ 1612.604330][T17818] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1612.643083][T17818] CPU: 0 PID: 17818 Comm: syz.0.4280 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1612.654199][T17818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1612.664093][T17818] Call Trace: [ 1612.667220][T17818] [ 1612.669991][T17818] dump_stack_lvl+0x151/0x1b7 [ 1612.674504][T17818] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1612.679804][T17818] ? avc_has_perm_noaudit+0x2dd/0x430 [ 1612.685009][T17818] dump_stack+0x15/0x1c [ 1612.688998][T17818] should_fail_ex+0x3d0/0x520 [ 1612.693601][T17818] should_fail_alloc_page+0x68/0x90 [ 1612.698638][T17818] __alloc_pages+0x1f4/0x780 [ 1612.703064][T17818] ? prep_new_page+0x110/0x110 [ 1612.707661][T17818] __folio_alloc+0x15/0x40 [ 1612.711916][T17818] shmem_alloc_and_acct_folio+0x78c/0xa50 [ 1612.717467][T17818] ? mem_cgroup_swap_full+0x1a0/0x1a0 [ 1612.722677][T17818] ? shmem_replace_folio+0x6a0/0x6a0 [ 1612.727801][T17818] ? xas_load+0x38f/0x3b0 [ 1612.731964][T17818] ? __filemap_get_folio+0xaa1/0xae0 [ 1612.737085][T17818] ? page_cache_prev_miss+0x410/0x410 [ 1612.742294][T17818] ? irqentry_exit+0x30/0x40 [ 1612.746716][T17818] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1612.752360][T17818] shmem_get_folio_gfp+0x12d4/0x24b0 [ 1612.757487][T17818] ? shmem_get_folio+0xa0/0xa0 [ 1612.762083][T17818] ? fault_in_iov_iter_readable+0x49/0x290 [ 1612.767723][T17818] ? fault_in_readable+0x172/0x2d0 [ 1612.772675][T17818] ? fault_in_readable+0x17c/0x2d0 [ 1612.777615][T17818] shmem_write_begin+0x164/0x3a0 [ 1612.782389][T17818] ? __kasan_check_write+0x14/0x20 [ 1612.787337][T17818] ? shmem_writepage+0xe00/0xe00 [ 1612.792115][T17818] generic_perform_write+0x2f9/0x5c0 [ 1612.797235][T17818] ? generic_file_direct_write+0x6b0/0x6b0 [ 1612.802960][T17818] ? __file_remove_privs+0x640/0x640 [ 1612.808081][T17818] ? generic_write_checks+0x15c/0x1c0 [ 1612.813289][T17818] __generic_file_write_iter+0x174/0x3a0 [ 1612.818844][T17818] ? generic_file_write_iter+0x23/0x310 [ 1612.824229][T17818] generic_file_write_iter+0xb1/0x310 [ 1612.829433][T17818] vfs_write+0xaf6/0xed0 [ 1612.833511][T17818] ? __hrtimer_run_queues+0x46b/0xad0 [ 1612.838721][T17818] ? file_end_write+0x1c0/0x1c0 [ 1612.843403][T17818] ? mutex_lock+0xb1/0x1e0 [ 1612.847659][T17818] ? bit_wait_io_timeout+0x120/0x120 [ 1612.852783][T17818] ? __fdget_pos+0x2e2/0x390 [ 1612.857212][T17818] ? ksys_write+0x77/0x2c0 [ 1612.861553][T17818] ksys_write+0x199/0x2c0 [ 1612.865711][T17818] ? __ia32_sys_read+0x90/0x90 [ 1612.870316][T17818] ? debug_smp_processor_id+0x17/0x20 [ 1612.875605][T17818] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1612.881510][T17818] __x64_sys_write+0x7b/0x90 [ 1612.885934][T17818] x64_sys_call+0x2f/0x9a0 [ 1612.890187][T17818] do_syscall_64+0x3b/0xb0 [ 1612.894441][T17818] ? clear_bhb_loop+0x55/0xb0 [ 1612.898953][T17818] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1612.904686][T17818] RIP: 0033:0x7fb38bb7dff9 [ 1612.908935][T17818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1612.928380][T17818] RSP: 002b:00007fb38c8f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1612.936626][T17818] RAX: ffffffffffffffda RBX: 00007fb38bd35f80 RCX: 00007fb38bb7dff9 [ 1612.944432][T17818] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000008 [ 1612.952243][T17818] RBP: 00007fb38c8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 1612.960069][T17818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1612.967868][T17818] R13: 0000000000000000 R14: 00007fb38bd35f80 R15: 00007ffddd3fca28 [ 1612.975684][T17818] [ 1613.201062][ T8720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1613.280644][ T8720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1613.396108][ T8720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1613.568655][ T8720] bridge0: port 2(bridge_slave_1) entered blocking state [ 1613.575511][ T8720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1613.726627][T17826] bridge0: port 4(vlan0) entered disabled state [ 1613.883565][T17822] device veth0_vlan left promiscuous mode [ 1614.312942][T17822] device veth0_vlan entered promiscuous mode [ 1614.357426][T17822] bridge0: port 4(vlan0) entered blocking state [ 1614.364312][T17822] bridge0: port 4(vlan0) entered forwarding state [ 1614.487680][T17836] bond_slave_1: mtu less than device minimum [ 1614.495617][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1614.504107][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1614.512174][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1614.520615][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1614.529210][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1614.537382][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1614.547534][T17839] bond_slave_1: mtu less than device minimum [ 1614.661534][T17761] device veth0_vlan entered promiscuous mode [ 1614.700481][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1614.708493][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1614.722802][T17761] device veth1_macvtap entered promiscuous mode [ 1614.933753][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1614.951321][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1615.051513][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1615.073907][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1615.081984][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1615.161735][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1615.188463][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1615.196653][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1615.215959][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1615.701575][T17859] bond_slave_1: mtu less than device minimum [ 1617.168554][T17865] bond_slave_1: mtu less than device minimum [ 1617.845237][T17876] device pim6reg1 entered promiscuous mode [ 1618.671717][T17889] device sit0 left promiscuous mode [ 1618.691224][T17889] device sit0 entered promiscuous mode [ 1619.737168][T17903] bridge0: port 3(vlan0) entered disabled state [ 1619.784075][T17902] device veth0_vlan left promiscuous mode [ 1619.850401][T17902] device veth0_vlan entered promiscuous mode [ 1619.886168][T17902] bridge0: port 3(vlan0) entered blocking state [ 1619.892879][T17902] bridge0: port 3(vlan0) entered forwarding state [ 1619.984560][T17904] bond_slave_1: mtu less than device minimum [ 1622.037617][T17918] device sit0 left promiscuous mode [ 1622.075510][T17918] device sit0 entered promiscuous mode [ 1622.838108][T17922] bond_slave_1: mtu less than device minimum [ 1627.040370][T17958] device syzkaller0 entered promiscuous mode [ 1627.071276][T17969] device veth0_vlan left promiscuous mode [ 1627.129296][T17969] device veth0_vlan entered promiscuous mode [ 1627.325218][T17971] device sit0 left promiscuous mode [ 1627.350352][T17972] device sit0 entered promiscuous mode [ 1628.000534][T17974] bond_slave_1: mtu less than device minimum [ 1629.825074][T17986] bond_slave_1: mtu less than device minimum [ 1631.357795][T17991] device sit0 left promiscuous mode [ 1631.499392][T17995] device sit0 entered promiscuous mode [ 1632.877633][T18010] device veth1_macvtap left promiscuous mode [ 1633.042007][T18016] bridge0: port 2(bridge_slave_1) entered disabled state [ 1633.434448][T18041] device sit0 left promiscuous mode [ 1633.447938][T18042] bridge0: port 3(vlan0) entered disabled state [ 1633.466869][T18041] device sit0 entered promiscuous mode [ 1633.511578][T18042] device veth0_vlan left promiscuous mode [ 1633.520397][T18042] device veth0_vlan entered promiscuous mode [ 1633.550278][T18042] bridge0: port 3(vlan0) entered blocking state [ 1633.557169][T18042] bridge0: port 3(vlan0) entered forwarding state [ 1634.680116][T18051] bond_slave_1: mtu less than device minimum [ 1635.380149][T18066] device sit0 left promiscuous mode [ 1635.655995][T18066] device sit0 entered promiscuous mode [ 1635.926651][T18069] FAULT_INJECTION: forcing a failure. [ 1635.926651][T18069] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1635.939780][T18069] CPU: 1 PID: 18069 Comm: syz.3.4337 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1635.950779][T18069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1635.960672][T18069] Call Trace: [ 1635.963795][T18069] [ 1635.966572][T18069] dump_stack_lvl+0x151/0x1b7 [ 1635.971085][T18069] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1635.976384][T18069] dump_stack+0x15/0x1c [ 1635.980372][T18069] should_fail_ex+0x3d0/0x520 [ 1635.984887][T18069] should_fail+0xb/0x10 [ 1635.988878][T18069] should_fail_usercopy+0x1a/0x20 [ 1635.993741][T18069] _copy_from_user+0x1e/0xc0 [ 1635.998164][T18069] get_user_ifreq+0xd5/0x230 [ 1636.002679][T18069] sock_do_ioctl+0x1a7/0x450 [ 1636.007106][T18069] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1636.012051][T18069] ? sock_show_fdinfo+0xa0/0xa0 [ 1636.016750][T18069] ? selinux_file_ioctl+0x3cc/0x540 [ 1636.021773][T18069] sock_ioctl+0x455/0x740 [ 1636.025940][T18069] ? sock_poll+0x400/0x400 [ 1636.030192][T18069] ? __fget_files+0x2cb/0x330 [ 1636.034718][T18069] ? security_file_ioctl+0x84/0xb0 [ 1636.039650][T18069] ? sock_poll+0x400/0x400 [ 1636.043906][T18069] __se_sys_ioctl+0x114/0x190 [ 1636.048419][T18069] __x64_sys_ioctl+0x7b/0x90 [ 1636.052845][T18069] x64_sys_call+0x98/0x9a0 [ 1636.057096][T18069] do_syscall_64+0x3b/0xb0 [ 1636.061348][T18069] ? clear_bhb_loop+0x55/0xb0 [ 1636.065863][T18069] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1636.071594][T18069] RIP: 0033:0x7f27ec57dff9 [ 1636.075844][T18069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1636.095286][T18069] RSP: 002b:00007f27ed2ec038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1636.103532][T18069] RAX: ffffffffffffffda RBX: 00007f27ec736058 RCX: 00007f27ec57dff9 [ 1636.111341][T18069] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 1636.119154][T18069] RBP: 00007f27ed2ec090 R08: 0000000000000000 R09: 0000000000000000 [ 1636.126963][T18069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1636.134777][T18069] R13: 0000000000000000 R14: 00007f27ec736058 R15: 00007ffcc198c998 [ 1636.142593][T18069] [ 1636.230276][T18068] device sit0 left promiscuous mode [ 1637.152530][ T28] audit: type=1400 audit(1728338344.895:151): avc: denied { create } for pid=18093 comm="syz.3.4346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 1642.327009][T18138] device syzkaller0 entered promiscuous mode [ 1642.531513][T18147] device veth1_macvtap left promiscuous mode [ 1642.664615][T18158] bridge0: port 4(vlan0) entered disabled state [ 1642.670870][T18158] bridge0: port 3(dummy0) entered disabled state [ 1642.677101][T18158] bridge0: port 1(bridge_slave_0) entered disabled state [ 1642.693759][T18163] device vlan0 left promiscuous mode [ 1642.707750][T18163] bridge0: port 4(vlan0) entered disabled state [ 1642.727746][T18163] device dummy0 left promiscuous mode [ 1642.733947][T18163] bridge0: port 3(dummy0) entered disabled state [ 1642.741010][T18163] bridge0: port 2(bridge_slave_1) entered disabled state [ 1642.748360][T18163] device bridge_slave_0 left promiscuous mode [ 1642.754371][T18163] bridge0: port 1(bridge_slave_0) entered disabled state [ 1642.847975][T18176] bond_slave_1: mtu less than device minimum [ 1642.889655][T18173] device veth0_vlan left promiscuous mode [ 1642.944576][T18173] device veth0_vlan entered promiscuous mode [ 1643.432053][T18191] syz.1.4374[18191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1643.432124][T18191] syz.1.4374[18191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1643.497850][T18194] FAULT_INJECTION: forcing a failure. [ 1643.497850][T18194] name failslab, interval 1, probability 0, space 0, times 0 [ 1643.529145][T18194] CPU: 1 PID: 18194 Comm: syz.4.4375 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1643.540278][T18194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1643.550171][T18194] Call Trace: [ 1643.553292][T18194] [ 1643.556072][T18194] dump_stack_lvl+0x151/0x1b7 [ 1643.560585][T18194] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1643.565881][T18194] dump_stack+0x15/0x1c [ 1643.569873][T18194] should_fail_ex+0x3d0/0x520 [ 1643.574388][T18194] ? security_file_alloc+0x29/0x120 [ 1643.579416][T18194] __should_failslab+0xaf/0xf0 [ 1643.584019][T18194] should_failslab+0x9/0x20 [ 1643.588355][T18194] kmem_cache_alloc+0x3b/0x2c0 [ 1643.592959][T18194] ? __alloc_file+0x29/0x2a0 [ 1643.597383][T18194] security_file_alloc+0x29/0x120 [ 1643.602247][T18194] __alloc_file+0xb2/0x2a0 [ 1643.606498][T18194] alloc_empty_file+0x95/0x180 [ 1643.611098][T18194] alloc_file+0x5a/0x5e0 [ 1643.615179][T18194] alloc_file_pseudo+0x259/0x2f0 [ 1643.619951][T18194] ? alloc_empty_file_noaccount+0x80/0x80 [ 1643.625507][T18194] anon_inode_getfile+0xa7/0x180 [ 1643.630296][T18194] __se_sys_perf_event_open+0x1006/0x3d60 [ 1643.635836][T18194] ? mutex_lock+0x101/0x1e0 [ 1643.640180][T18194] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1643.645650][T18194] ? __ia32_sys_read+0x90/0x90 [ 1643.650248][T18194] __x64_sys_perf_event_open+0xbf/0xd0 [ 1643.655538][T18194] x64_sys_call+0x7de/0x9a0 [ 1643.659874][T18194] do_syscall_64+0x3b/0xb0 [ 1643.664131][T18194] ? clear_bhb_loop+0x55/0xb0 [ 1643.668643][T18194] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1643.674369][T18194] RIP: 0033:0x7f509277dff9 [ 1643.678622][T18194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1643.698066][T18194] RSP: 002b:00007f509362b038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1643.706314][T18194] RAX: ffffffffffffffda RBX: 00007f5092935f80 RCX: 00007f509277dff9 [ 1643.714122][T18194] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00000000200012c0 [ 1643.721933][T18194] RBP: 00007f509362b090 R08: 0000000000000000 R09: 0000000000000000 [ 1643.729838][T18194] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1643.737642][T18194] R13: 0000000000000000 R14: 00007f5092935f80 R15: 00007ffe37ec4458 [ 1643.745461][T18194] [ 1643.797572][T18199] device sit0 left promiscuous mode [ 1643.836750][T18199] device sit0 entered promiscuous mode [ 1644.577279][T18209] bond_slave_1: mtu less than device minimum [ 1644.607889][T18211] device veth1_macvtap left promiscuous mode [ 1647.630477][T18236] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 1648.139565][T18254] bridge0: port 3(vlan0) entered disabled state [ 1648.145689][T18254] bridge0: port 1(bridge_slave_0) entered disabled state [ 1648.155963][T18254] device vlan0 left promiscuous mode [ 1648.169514][T18254] bridge0: port 3(vlan0) entered disabled state [ 1648.176281][T18254] bridge0: port 2(bridge_slave_1) entered disabled state [ 1648.185022][T18254] device bridge_slave_0 left promiscuous mode [ 1648.192485][T18254] bridge0: port 1(bridge_slave_0) entered disabled state [ 1648.563348][T18277] bond_slave_1: mtu less than device minimum [ 1650.012775][T18337] device bridge_slave_1 entered promiscuous mode [ 1650.418018][T18350] FAULT_INJECTION: forcing a failure. [ 1650.418018][T18350] name failslab, interval 1, probability 0, space 0, times 0 [ 1650.431422][T18350] CPU: 1 PID: 18350 Comm: syz.3.4424 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1650.442523][T18350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1650.452420][T18350] Call Trace: [ 1650.455538][T18350] [ 1650.458317][T18350] dump_stack_lvl+0x151/0x1b7 [ 1650.462832][T18350] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1650.468128][T18350] dump_stack+0x15/0x1c [ 1650.472118][T18350] should_fail_ex+0x3d0/0x520 [ 1650.476631][T18350] ? sk_prot_alloc+0x5f/0x330 [ 1650.481144][T18350] __should_failslab+0xaf/0xf0 [ 1650.485748][T18350] should_failslab+0x9/0x20 [ 1650.490088][T18350] kmem_cache_alloc+0x3b/0x2c0 [ 1650.494687][T18350] sk_prot_alloc+0x5f/0x330 [ 1650.499025][T18350] ? kasan_save_alloc_info+0x1f/0x30 [ 1650.504144][T18350] sk_alloc+0x38/0x440 [ 1650.508048][T18350] ? security_inode_alloc+0x29/0x120 [ 1650.513172][T18350] tipc_sk_create+0x103/0x1ac0 [ 1650.517774][T18350] ? __kasan_check_write+0x14/0x20 [ 1650.522724][T18350] ? _raw_spin_lock+0xa4/0x1b0 [ 1650.527316][T18350] ? _raw_spin_trylock_bh+0x190/0x190 [ 1650.532614][T18350] ? inode_init_always+0x737/0x970 [ 1650.537562][T18350] ? try_module_get+0x12a/0x290 [ 1650.542248][T18350] __sock_create+0x3a6/0x760 [ 1650.546681][T18350] __sys_socketpair+0x29f/0x6e0 [ 1650.551366][T18350] ? __ia32_sys_socket+0x90/0x90 [ 1650.556137][T18350] ? __ia32_sys_read+0x90/0x90 [ 1650.560734][T18350] __x64_sys_socketpair+0x9b/0xb0 [ 1650.565596][T18350] x64_sys_call+0x19b/0x9a0 [ 1650.569931][T18350] do_syscall_64+0x3b/0xb0 [ 1650.574184][T18350] ? clear_bhb_loop+0x55/0xb0 [ 1650.578697][T18350] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1650.584425][T18350] RIP: 0033:0x7f27ec57dff9 [ 1650.588691][T18350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1650.608121][T18350] RSP: 002b:00007f27ed30d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1650.616374][T18350] RAX: ffffffffffffffda RBX: 00007f27ec735f80 RCX: 00007f27ec57dff9 [ 1650.624181][T18350] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 1650.631998][T18350] RBP: 00007f27ed30d090 R08: 0000000000000000 R09: 0000000000000000 [ 1650.639799][T18350] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 1650.647611][T18350] R13: 0000000000000000 R14: 00007f27ec735f80 R15: 00007ffcc198c998 [ 1650.655430][T18350] [ 1650.896364][ T28] audit: type=1400 audit(1728338358.635:152): avc: denied { create } for pid=18369 comm="syz.0.4430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1651.624421][T18399] device sit0 left promiscuous mode [ 1651.807411][T18400] device sit0 entered promiscuous mode [ 1652.085576][T18410] device syzkaller0 entered promiscuous mode [ 1652.154072][T18415] device pim6reg1 entered promiscuous mode [ 1652.495037][T18433] device sit0 left promiscuous mode [ 1652.596060][T18437] bond_slave_1: mtu less than device minimum [ 1652.611891][T18433] device sit0 entered promiscuous mode [ 1652.916701][T18448] FAULT_INJECTION: forcing a failure. [ 1652.916701][T18448] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1652.931733][T18448] CPU: 1 PID: 18448 Comm: syz.0.4456 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1652.942913][T18448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1652.952817][T18448] Call Trace: [ 1652.955930][T18448] [ 1652.958710][T18448] dump_stack_lvl+0x151/0x1b7 [ 1652.963223][T18448] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1652.968531][T18448] dump_stack+0x15/0x1c [ 1652.972515][T18448] should_fail_ex+0x3d0/0x520 [ 1652.977025][T18448] should_fail+0xb/0x10 [ 1652.981017][T18448] should_fail_usercopy+0x1a/0x20 [ 1652.985876][T18448] _copy_from_user+0x1e/0xc0 [ 1652.990304][T18448] __sys_bpf+0x23b/0x7f0 [ 1652.994384][T18448] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1652.999592][T18448] ? __ia32_sys_read+0x90/0x90 [ 1653.004191][T18448] ? debug_smp_processor_id+0x17/0x20 [ 1653.009398][T18448] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1653.015297][T18448] __x64_sys_bpf+0x7c/0x90 [ 1653.019555][T18448] x64_sys_call+0x87f/0x9a0 [ 1653.023891][T18448] do_syscall_64+0x3b/0xb0 [ 1653.028143][T18448] ? clear_bhb_loop+0x55/0xb0 [ 1653.032655][T18448] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1653.038383][T18448] RIP: 0033:0x7fb38bb7dff9 [ 1653.042639][T18448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1653.062079][T18448] RSP: 002b:00007fb38c8f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1653.070325][T18448] RAX: ffffffffffffffda RBX: 00007fb38bd35f80 RCX: 00007fb38bb7dff9 [ 1653.078224][T18448] RDX: 0000000000000050 RSI: 0000000020000740 RDI: 0000000000000000 [ 1653.086122][T18448] RBP: 00007fb38c8f0090 R08: 0000000000000000 R09: 0000000000000000 [ 1653.093933][T18448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1653.101761][T18448] R13: 0000000000000000 R14: 00007fb38bd35f80 R15: 00007ffddd3fca28 [ 1653.109560][T18448] [ 1655.571293][T18486] device sit0 left promiscuous mode [ 1655.672625][T18487] device sit0 entered promiscuous mode [ 1656.999135][ T28] audit: type=1400 audit(1728338364.745:153): avc: denied { write } for pid=18504 comm="syz.0.4472" name="ppp" dev="devtmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 1657.023250][ T28] audit: type=1400 audit(1728338364.765:154): avc: denied { create } for pid=18500 comm="syz.3.4471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 1657.245321][T18515] device pim6reg1 entered promiscuous mode [ 1657.648475][T18526] device sit0 entered promiscuous mode [ 1657.953728][T18529] device sit0 left promiscuous mode [ 1657.965149][T18533] device sit0 entered promiscuous mode [ 1658.702958][T18538] device sit0 left promiscuous mode [ 1658.729358][T18539] device sit0 entered promiscuous mode [ 1659.269422][T18546] bond_slave_1: mtu less than device minimum [ 1659.391271][T18551] device sit0 left promiscuous mode [ 1659.413309][T18553] device sit0 entered promiscuous mode [ 1661.849414][T18580] device sit0 left promiscuous mode [ 1662.178103][T18586] device sit0 left promiscuous mode [ 1662.302545][T18590] device sit0 entered promiscuous mode [ 1662.369256][T18594] device sit0 left promiscuous mode [ 1662.400841][T18594] device sit0 entered promiscuous mode [ 1662.437585][T18596] device sit0 left promiscuous mode [ 1662.470910][T18596] device sit0 entered promiscuous mode [ 1663.077589][T18608] device sit0 left promiscuous mode [ 1663.233055][T18612] device sit0 entered promiscuous mode [ 1663.952330][T18614] device sit0 left promiscuous mode [ 1663.986997][T18617] device sit0 entered promiscuous mode [ 1664.777636][T18630] bond_slave_1: mtu less than device minimum [ 1664.984320][T18635] device sit0 left promiscuous mode [ 1665.165901][T18638] device sit0 entered promiscuous mode [ 1665.615442][T18644] device sit0 left promiscuous mode [ 1665.771609][T18644] device sit0 entered promiscuous mode [ 1667.063195][T18656] bond_slave_1: mtu less than device minimum [ 1667.477607][T18660] device veth0_vlan left promiscuous mode [ 1667.553924][T18660] device veth0_vlan entered promiscuous mode [ 1667.579579][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1667.587487][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1667.594694][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1667.800570][T18664] device sit0 left promiscuous mode [ 1667.825687][T18664] device sit0 entered promiscuous mode [ 1668.211817][T18668] device veth0_vlan left promiscuous mode [ 1668.314686][T18668] device veth0_vlan entered promiscuous mode [ 1669.464852][T18685] device sit0 left promiscuous mode [ 1669.501182][T18685] device sit0 entered promiscuous mode [ 1671.375330][ T10] device bridge_slave_1 left promiscuous mode [ 1671.440023][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1671.507865][ T10] device bridge_slave_0 left promiscuous mode [ 1671.513897][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1671.878125][ T10] device veth1_macvtap left promiscuous mode [ 1671.883984][ T10] device veth0_vlan left promiscuous mode [ 1672.251235][ T28] audit: type=1400 audit(1728338379.995:155): avc: denied { create } for pid=18698 comm="syz.3.4524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 1672.813412][T18711] device sit0 left promiscuous mode [ 1672.960007][T18712] device sit0 entered promiscuous mode [ 1672.987054][T18701] bridge0: port 1(bridge_slave_0) entered blocking state [ 1672.997148][T18701] bridge0: port 1(bridge_slave_0) entered disabled state [ 1673.009833][T18701] device bridge_slave_0 entered promiscuous mode [ 1673.016707][T18701] bridge0: port 2(bridge_slave_1) entered blocking state [ 1673.023651][T18701] bridge0: port 2(bridge_slave_1) entered disabled state [ 1673.030836][T18701] device bridge_slave_1 entered promiscuous mode [ 1673.130960][T18719] device sit0 entered promiscuous mode [ 1673.169054][T18717] device veth0_vlan left promiscuous mode [ 1673.246491][T18717] device veth0_vlan entered promiscuous mode [ 1674.165958][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1674.176326][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1674.287440][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1674.347867][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1674.437663][ T8831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1674.444539][ T8831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1674.459225][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1674.467607][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1674.475784][ T8831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1674.482650][ T8831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1674.546408][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1674.568678][T18733] bond_slave_1: mtu less than device minimum [ 1674.606248][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1674.700352][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1674.767697][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1674.775617][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1674.783624][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1674.791902][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1675.048071][T18701] device veth0_vlan entered promiscuous mode [ 1675.057304][T18701] device veth1_macvtap entered promiscuous mode [ 1675.160302][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1675.186565][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1675.237097][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1675.288468][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1675.296419][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1675.525320][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1675.532688][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1675.539961][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1675.547949][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1675.555953][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1675.564032][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1675.758231][T18748] device veth0_vlan left promiscuous mode [ 1675.904144][T18748] device veth0_vlan entered promiscuous mode [ 1679.507820][T18761] tun0: tun_chr_ioctl cmd 1074025677 [ 1679.523395][T18761] tun0: linktype set to 513 [ 1679.528716][T18759] bond_slave_1: mtu less than device minimum [ 1679.594395][T18767] device sit0 left promiscuous mode [ 1679.621877][T18767] device sit0 entered promiscuous mode [ 1680.460633][T18785] bond_slave_1: mtu less than device minimum [ 1681.046469][T18797] tun0: tun_chr_ioctl cmd 1074025677 [ 1681.055618][T18797] tun0: linktype set to 513 [ 1682.233139][T18801] bond_slave_1: mtu less than device minimum [ 1686.393643][T18830] device sit0 left promiscuous mode [ 1686.599367][T18830] device sit0 entered promiscuous mode [ 1687.024851][T18834] bond_slave_1: mtu less than device minimum [ 1688.117392][T18841] device veth0_vlan left promiscuous mode [ 1688.153609][T18841] device veth0_vlan entered promiscuous mode [ 1688.281855][T14451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1688.291270][T14451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1688.298945][T14451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1688.306423][T18843] device sit0 left promiscuous mode [ 1688.435342][T18846] device sit0 entered promiscuous mode [ 1688.690620][T18854] device sit0 left promiscuous mode [ 1688.699729][T18852] device sit0 left promiscuous mode [ 1688.759401][T18854] device sit0 entered promiscuous mode [ 1688.788189][T18852] device sit0 entered promiscuous mode [ 1689.824372][T18866] tun0: tun_chr_ioctl cmd 1074025677 [ 1689.838025][T18866] tun0: linktype set to 513 [ 1690.240258][T18881] bond_slave_1: mtu less than device minimum [ 1690.337527][T18882] bond_slave_1: mtu less than device minimum [ 1691.826451][T18891] device sit0 left promiscuous mode [ 1691.978682][T18893] device sit0 entered promiscuous mode [ 1692.947758][T18911] device sit0 left promiscuous mode [ 1693.064925][T18911] device sit0 entered promiscuous mode [ 1693.529659][T18922] device veth0_vlan left promiscuous mode [ 1693.657387][T18922] device veth0_vlan entered promiscuous mode [ 1695.310581][T18961] bond_slave_1: mtu less than device minimum [ 1695.322189][T18964] device sit0 left promiscuous mode [ 1695.535811][T18964] device sit0 entered promiscuous mode [ 1695.917027][T18971] tun0: tun_chr_ioctl cmd 1074025677 [ 1695.922283][T18971] tun0: linktype set to 513 [ 1695.998972][T18970] bond_slave_1: mtu less than device minimum [ 1696.399333][T18979] device veth0_vlan left promiscuous mode [ 1696.405216][T18979] device veth0_vlan entered promiscuous mode [ 1696.412298][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1696.422826][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1696.559765][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1696.577718][T18981] bond_slave_1: mtu less than device minimum [ 1700.992386][T18994] tun0: tun_chr_ioctl cmd 1074025677 [ 1701.097423][T18994] tun0: linktype set to 513 [ 1701.368847][T19006] device sit0 left promiscuous mode [ 1701.379390][T19004] device sit0 left promiscuous mode [ 1701.393107][T19008] device sit0 entered promiscuous mode [ 1701.461847][T19006] device sit0 entered promiscuous mode [ 1701.721951][T19016] tun0: tun_chr_ioctl cmd 1074025677 [ 1701.729635][T19016] tun0: linktype set to 513 [ 1701.734364][T19019] device sit0 left promiscuous mode [ 1701.761951][T19019] device sit0 entered promiscuous mode [ 1701.935350][T19022] bond_slave_1: mtu less than device minimum [ 1703.521415][ T28] audit: type=1400 audit(1728338411.255:156): avc: denied { create } for pid=19044 comm="syz.0.4617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1703.577610][T19053] FAULT_INJECTION: forcing a failure. [ 1703.577610][T19053] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1703.598892][T19053] CPU: 0 PID: 19053 Comm: syz.4.4618 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1703.610429][T19053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1703.620320][T19053] Call Trace: [ 1703.623447][T19053] [ 1703.626233][T19053] dump_stack_lvl+0x151/0x1b7 [ 1703.630748][T19053] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1703.636125][T19053] dump_stack+0x15/0x1c [ 1703.640109][T19053] should_fail_ex+0x3d0/0x520 [ 1703.644636][T19053] should_fail+0xb/0x10 [ 1703.648615][T19053] should_fail_usercopy+0x1a/0x20 [ 1703.653478][T19053] _copy_to_user+0x1e/0x90 [ 1703.657734][T19053] simple_read_from_buffer+0xc7/0x150 [ 1703.662952][T19053] proc_fail_nth_read+0x1a3/0x210 [ 1703.667800][T19053] ? proc_fault_inject_write+0x390/0x390 [ 1703.673265][T19053] ? fsnotify_perm+0x269/0x5b0 [ 1703.677866][T19053] ? security_file_permission+0x86/0xb0 [ 1703.683244][T19053] ? proc_fault_inject_write+0x390/0x390 [ 1703.688716][T19053] vfs_read+0x26c/0xae0 [ 1703.692709][T19053] ? kernel_read+0x1f0/0x1f0 [ 1703.697135][T19053] ? mutex_lock+0xb1/0x1e0 [ 1703.701395][T19053] ? bit_wait_io_timeout+0x120/0x120 [ 1703.706508][T19053] ? __fdget_pos+0x2e2/0x390 [ 1703.710935][T19053] ? ksys_read+0x77/0x2c0 [ 1703.715104][T19053] ksys_read+0x199/0x2c0 [ 1703.719179][T19053] ? vfs_write+0xed0/0xed0 [ 1703.723434][T19053] ? debug_smp_processor_id+0x17/0x20 [ 1703.728640][T19053] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1703.734545][T19053] __x64_sys_read+0x7b/0x90 [ 1703.738881][T19053] x64_sys_call+0x28/0x9a0 [ 1703.743134][T19053] do_syscall_64+0x3b/0xb0 [ 1703.747386][T19053] ? clear_bhb_loop+0x55/0xb0 [ 1703.751902][T19053] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1703.757631][T19053] RIP: 0033:0x7f509277ca3c [ 1703.761884][T19053] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 1703.781325][T19053] RSP: 002b:00007f509362b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1703.789573][T19053] RAX: ffffffffffffffda RBX: 00007f5092935f80 RCX: 00007f509277ca3c [ 1703.797380][T19053] RDX: 000000000000000f RSI: 00007f509362b0a0 RDI: 0000000000000003 [ 1703.805191][T19053] RBP: 00007f509362b090 R08: 0000000000000000 R09: 0000000000000000 [ 1703.813009][T19053] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1703.820815][T19053] R13: 0000000000000001 R14: 00007f5092935f80 R15: 00007ffe37ec4458 [ 1703.828633][T19053] [ 1703.877662][T19055] device sit0 left promiscuous mode [ 1704.079052][T19055] device sit0 entered promiscuous mode [ 1704.299160][ T28] audit: type=1400 audit(1728338412.045:157): avc: denied { append } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1704.447445][ T28] audit: type=1400 audit(1728338412.045:158): avc: denied { open } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1704.476460][ T28] audit: type=1400 audit(1728338412.045:159): avc: denied { getattr } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1704.611230][T19077] device sit0 left promiscuous mode [ 1704.627216][T19078] bond_slave_1: mtu less than device minimum [ 1704.686030][T19077] device sit0 entered promiscuous mode [ 1704.711363][T19082] device sit0 left promiscuous mode [ 1704.807314][T19082] device sit0 entered promiscuous mode [ 1705.419446][ T28] audit: type=1400 audit(1728338413.165:160): avc: denied { create } for pid=19096 comm="syz.1.4633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1705.818005][T19104] bond_slave_1: mtu less than device minimum [ 1705.912036][T19105] bond_slave_1: mtu less than device minimum [ 1706.996135][T19145] device sit0 left promiscuous mode [ 1707.016044][T19145] device sit0 entered promiscuous mode [ 1707.587934][T19147] bond_slave_1: mtu less than device minimum [ 1707.614475][T19156] device sit0 left promiscuous mode [ 1707.719921][T19156] device sit0 entered promiscuous mode [ 1708.512696][T19167] device sit0 left promiscuous mode [ 1708.573590][T19169] device sit0 entered promiscuous mode [ 1709.146757][T19170] bond_slave_1: mtu less than device minimum [ 1710.179115][T19188] bond_slave_1: mtu less than device minimum [ 1710.584788][T19196] device sit0 left promiscuous mode [ 1710.760680][T19198] device sit0 entered promiscuous mode [ 1711.538647][T19209] device sit0 left promiscuous mode [ 1711.774070][T19217] device veth0_vlan left promiscuous mode [ 1711.869788][T19217] device veth0_vlan entered promiscuous mode [ 1712.122477][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1712.133236][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1712.337758][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1712.346282][T19232] bond_slave_1: mtu less than device minimum [ 1713.103905][T19242] bond_slave_1: mtu less than device minimum [ 1713.303106][T19246] device macsec0 entered promiscuous mode [ 1713.312645][T19248] device sit0 entered promiscuous mode [ 1713.338934][T19250] device sit0 left promiscuous mode [ 1713.367864][T19250] device sit0 entered promiscuous mode [ 1714.729957][T19259] bond_slave_1: mtu less than device minimum [ 1717.182059][T19265] bond_slave_1: mtu less than device minimum [ 1718.846076][T19269] device sit0 left promiscuous mode [ 1718.869202][T19270] device sit0 entered promiscuous mode [ 1718.930822][T19273] device lo entered promiscuous mode [ 1718.936152][T19273] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 1719.129395][T19285] device sit0 left promiscuous mode [ 1719.261142][T19285] device sit0 entered promiscuous mode [ 1719.404607][T19287] bond_slave_1: mtu less than device minimum [ 1719.439225][T19295] device sit0 left promiscuous mode [ 1719.473844][T19295] device sit0 entered promiscuous mode [ 1720.230621][T19313] device veth0_vlan left promiscuous mode [ 1720.312724][T19313] device veth0_vlan entered promiscuous mode [ 1721.103343][T19328] device sit0 left promiscuous mode [ 1722.522596][T19340] bond_slave_1: mtu less than device minimum [ 1722.748827][T19352] device sit0 entered promiscuous mode [ 1723.661520][T19358] device veth0_vlan left promiscuous mode [ 1723.954563][T19358] device veth0_vlan entered promiscuous mode [ 1724.528269][T19379] device sit0 left promiscuous mode [ 1724.798188][T19385] bond_slave_1: mtu less than device minimum [ 1725.052571][T19393] bond_slave_1: mtu less than device minimum [ 1725.131665][T19396] device veth0_vlan left promiscuous mode [ 1725.148341][T19396] device veth0_vlan entered promiscuous mode [ 1725.217652][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1725.225670][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1725.233058][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1726.337088][T19404] bond_slave_1: mtu less than device minimum [ 1726.539005][T19414] device sit0 left promiscuous mode [ 1726.959886][T19418] bond_slave_1: mtu less than device minimum [ 1728.016213][T19434] bond_slave_1: mtu less than device minimum [ 1729.947074][T19447] device sit0 entered promiscuous mode [ 1731.030461][T19467] FAULT_INJECTION: forcing a failure. [ 1731.030461][T19467] name failslab, interval 1, probability 0, space 0, times 0 [ 1731.199481][T19467] CPU: 1 PID: 19467 Comm: syz.4.4730 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1731.210595][T19467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1731.220494][T19467] Call Trace: [ 1731.223616][T19467] [ 1731.226389][T19467] dump_stack_lvl+0x151/0x1b7 [ 1731.230906][T19467] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1731.236203][T19467] dump_stack+0x15/0x1c [ 1731.240190][T19467] should_fail_ex+0x3d0/0x520 [ 1731.244706][T19467] ? security_prepare_creds+0x4d/0x140 [ 1731.249998][T19467] __should_failslab+0xaf/0xf0 [ 1731.254597][T19467] should_failslab+0x9/0x20 [ 1731.258938][T19467] __kmem_cache_alloc_node+0x3d/0x250 [ 1731.264236][T19467] ? security_prepare_creds+0x4d/0x140 [ 1731.269536][T19467] __kmalloc+0xa3/0x1e0 [ 1731.273519][T19467] security_prepare_creds+0x4d/0x140 [ 1731.278641][T19467] prepare_creds+0x472/0x6a0 [ 1731.283162][T19467] copy_creds+0xf0/0x630 [ 1731.287240][T19467] copy_process+0x855/0x3530 [ 1731.291669][T19467] ? timerqueue_add+0x250/0x270 [ 1731.296353][T19467] ? idle_dummy+0x10/0x10 [ 1731.300521][T19467] kernel_clone+0x229/0x890 [ 1731.304862][T19467] ? create_io_thread+0x180/0x180 [ 1731.309723][T19467] __x64_sys_clone+0x231/0x280 [ 1731.314317][T19467] ? __do_sys_vfork+0x110/0x110 [ 1731.319011][T19467] ? debug_smp_processor_id+0x17/0x20 [ 1731.324215][T19467] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1731.330117][T19467] x64_sys_call+0x1b0/0x9a0 [ 1731.334456][T19467] do_syscall_64+0x3b/0xb0 [ 1731.338706][T19467] ? clear_bhb_loop+0x55/0xb0 [ 1731.343230][T19467] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1731.348946][T19467] RIP: 0033:0x7f509277dff9 [ 1731.353209][T19467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1731.372646][T19467] RSP: 002b:00007f5093609fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1731.380982][T19467] RAX: ffffffffffffffda RBX: 00007f5092936058 RCX: 00007f509277dff9 [ 1731.388799][T19467] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000024001000 [ 1731.396605][T19467] RBP: 00007f509360a090 R08: 0000000000000000 R09: 0000000000000000 [ 1731.405024][T19467] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1731.412837][T19467] R13: 0000000000000000 R14: 00007f5092936058 R15: 00007ffe37ec4458 [ 1731.420652][T19467] [ 1733.057886][ T8] device bridge_slave_1 left promiscuous mode [ 1733.063808][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1733.071133][ T8] device bridge_slave_0 left promiscuous mode [ 1733.077046][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1733.084691][ T8] device veth1_macvtap left promiscuous mode [ 1733.090529][ T8] device veth0_vlan left promiscuous mode [ 1734.360467][T19484] bond_slave_1: mtu less than device minimum [ 1734.563705][T19487] bond_slave_1: mtu less than device minimum [ 1734.687771][T19482] bridge0: port 1(bridge_slave_0) entered blocking state [ 1734.694735][T19482] bridge0: port 1(bridge_slave_0) entered disabled state [ 1734.702365][T19482] device bridge_slave_0 entered promiscuous mode [ 1734.766105][T19482] bridge0: port 2(bridge_slave_1) entered blocking state [ 1734.773015][T19482] bridge0: port 2(bridge_slave_1) entered disabled state [ 1734.780474][T19482] device bridge_slave_1 entered promiscuous mode [ 1735.207672][T19502] device sit0 left promiscuous mode [ 1735.223558][T19502] device sit0 entered promiscuous mode [ 1735.372436][T19482] bridge0: port 2(bridge_slave_1) entered blocking state [ 1735.379310][T19482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1735.386399][T19482] bridge0: port 1(bridge_slave_0) entered blocking state [ 1735.393196][T19482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1735.429085][ T8452] bridge0: port 1(bridge_slave_0) entered disabled state [ 1735.436159][ T8452] bridge0: port 2(bridge_slave_1) entered disabled state [ 1735.443510][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1735.451415][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1735.496319][T14451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1735.504786][T14451] bridge0: port 1(bridge_slave_0) entered blocking state [ 1735.511653][T14451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1735.527948][T14451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1735.536120][T14451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1735.544335][T14451] bridge0: port 2(bridge_slave_1) entered blocking state [ 1735.551196][T14451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1735.565873][T14451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1735.573865][T14451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1735.582435][T14451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1735.590511][T14451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1735.803976][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1735.825207][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1735.837176][T19482] device veth0_vlan entered promiscuous mode [ 1735.929772][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1735.937707][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1736.076910][T14451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1736.084265][T14451] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1736.320655][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1736.352473][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1736.362108][T19482] device veth1_macvtap entered promiscuous mode [ 1736.398323][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1736.405700][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1736.414705][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1736.423065][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1736.431199][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1737.169848][T19538] device veth0_vlan left promiscuous mode [ 1737.247539][T19538] device veth0_vlan entered promiscuous mode [ 1738.611305][T19553] bond_slave_1: mtu less than device minimum [ 1739.866199][T19579] device veth1_macvtap entered promiscuous mode [ 1739.872566][T19579] device macsec0 entered promiscuous mode [ 1739.879393][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1740.197091][ T28] audit: type=1400 audit(1728338447.935:161): avc: denied { create } for pid=19581 comm="syz.0.4762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 1741.027511][T19590] device sit0 entered promiscuous mode [ 1741.508872][T19595] bond_slave_1: mtu less than device minimum [ 1742.097607][T19602] device syzkaller0 entered promiscuous mode [ 1742.173680][T19612] bond_slave_1: mtu less than device minimum [ 1743.551288][T19645] device sit0 left promiscuous mode [ 1743.614008][T19646] device sit0 entered promiscuous mode [ 1744.629995][T19664] bond_slave_1: mtu less than device minimum [ 1745.013270][T19665] bond_slave_1: mtu less than device minimum [ 1746.189263][T19691] device sit0 left promiscuous mode [ 1746.516713][T19696] device sit0 entered promiscuous mode [ 1747.270750][T19698] bond_slave_1: mtu less than device minimum [ 1747.276600][T19702] bond_slave_1: mtu less than device minimum [ 1749.107972][T19726] bond_slave_1: mtu less than device minimum [ 1749.122991][T19729] FAULT_INJECTION: forcing a failure. [ 1749.122991][T19729] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1749.136111][T19729] CPU: 1 PID: 19729 Comm: syz.4.4803 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1749.147207][T19729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1749.157106][T19729] Call Trace: [ 1749.160229][T19729] [ 1749.163002][T19729] dump_stack_lvl+0x151/0x1b7 [ 1749.167606][T19729] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1749.172897][T19729] ? migrate_enable+0x1cb/0x2b0 [ 1749.177589][T19729] dump_stack+0x15/0x1c [ 1749.181576][T19729] should_fail_ex+0x3d0/0x520 [ 1749.186090][T19729] should_fail+0xb/0x10 [ 1749.190170][T19729] should_fail_usercopy+0x1a/0x20 [ 1749.195030][T19729] _copy_to_user+0x1e/0x90 [ 1749.199283][T19729] generic_map_lookup_batch+0x6ff/0xcc0 [ 1749.204669][T19729] ? bpf_map_update_value+0x410/0x410 [ 1749.209874][T19729] ? bpf_map_do_batch+0x99/0x630 [ 1749.214647][T19729] ? bpf_map_update_value+0x410/0x410 [ 1749.219852][T19729] bpf_map_do_batch+0x2e2/0x630 [ 1749.224540][T19729] __sys_bpf+0x66b/0x7f0 [ 1749.228620][T19729] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1749.233830][T19729] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1749.239819][T19729] __x64_sys_bpf+0x7c/0x90 [ 1749.244069][T19729] x64_sys_call+0x87f/0x9a0 [ 1749.248409][T19729] do_syscall_64+0x3b/0xb0 [ 1749.252661][T19729] ? clear_bhb_loop+0x55/0xb0 [ 1749.257346][T19729] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1749.263076][T19729] RIP: 0033:0x7f509277dff9 [ 1749.267331][T19729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1749.286774][T19729] RSP: 002b:00007f509362b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1749.295101][T19729] RAX: ffffffffffffffda RBX: 00007f5092935f80 RCX: 00007f509277dff9 [ 1749.303002][T19729] RDX: 0000000000000038 RSI: 00000000200004c0 RDI: 0000000000000018 [ 1749.310813][T19729] RBP: 00007f509362b090 R08: 0000000000000000 R09: 0000000000000000 [ 1749.318622][T19729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1749.326434][T19729] R13: 0000000000000000 R14: 00007f5092935f80 R15: 00007ffe37ec4458 [ 1749.334251][T19729] [ 1749.339976][ T28] audit: type=1400 audit(1728338457.085:162): avc: denied { rename } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1749.363680][ T28] audit: type=1400 audit(1728338457.085:163): avc: denied { unlink } for pid=85 comm="syslogd" name="messages.0" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1749.386399][ T28] audit: type=1400 audit(1728338457.085:164): avc: denied { create } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1749.518539][T19732] device sit0 left promiscuous mode [ 1749.722696][T19735] device sit0 entered promiscuous mode [ 1750.380510][T19753] bond_slave_1: mtu less than device minimum [ 1750.471650][T19758] device sit0 left promiscuous mode [ 1750.564822][T19758] device sit0 entered promiscuous mode [ 1750.570553][T19758] FAULT_INJECTION: forcing a failure. [ 1750.570553][T19758] name failslab, interval 1, probability 0, space 0, times 0 [ 1750.588726][T19758] CPU: 0 PID: 19758 Comm: syz.3.4810 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1750.599834][T19758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1750.609722][T19758] Call Trace: [ 1750.612841][T19758] [ 1750.615619][T19758] dump_stack_lvl+0x151/0x1b7 [ 1750.620131][T19758] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1750.625424][T19758] ? irq_work_queue+0xcd/0x160 [ 1750.630029][T19758] dump_stack+0x15/0x1c [ 1750.634019][T19758] should_fail_ex+0x3d0/0x520 [ 1750.638532][T19758] ? __alloc_skb+0xcc/0x2d0 [ 1750.643055][T19758] __should_failslab+0xaf/0xf0 [ 1750.647648][T19758] should_failslab+0x9/0x20 [ 1750.651989][T19758] kmem_cache_alloc_node+0x3e/0x2d0 [ 1750.657024][T19758] __alloc_skb+0xcc/0x2d0 [ 1750.661188][T19758] ? __dev_set_promiscuity+0x1c1/0x5b0 [ 1750.666480][T19758] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 1750.671604][T19758] rtmsg_ifinfo+0x78/0x120 [ 1750.675852][T19758] __dev_notify_flags+0xdd/0x610 [ 1750.680629][T19758] ? __dev_change_flags+0x6e0/0x6e0 [ 1750.685665][T19758] ? __dev_change_flags+0x505/0x6e0 [ 1750.690696][T19758] ? dev_get_flags+0x1e0/0x1e0 [ 1750.695293][T19758] ? _raw_spin_lock+0xa4/0x1b0 [ 1750.699897][T19758] dev_change_flags+0xf0/0x1a0 [ 1750.704494][T19758] dev_ifsioc+0x177/0x1150 [ 1750.708750][T19758] ? dev_ioctl+0xe60/0xe60 [ 1750.713000][T19758] ? __mutex_lock_slowpath+0xe/0x10 [ 1750.718034][T19758] ? mutex_lock+0x130/0x1e0 [ 1750.722374][T19758] ? bit_wait_io_timeout+0x120/0x120 [ 1750.727504][T19758] dev_ioctl+0x543/0xe60 [ 1750.731577][T19758] sock_do_ioctl+0x26b/0x450 [ 1750.736001][T19758] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1750.741047][T19758] ? sock_show_fdinfo+0xa0/0xa0 [ 1750.745734][T19758] ? __kasan_check_write+0x14/0x20 [ 1750.750680][T19758] ? selinux_file_ioctl+0x3cc/0x540 [ 1750.755711][T19758] sock_ioctl+0x455/0x740 [ 1750.759879][T19758] ? sock_poll+0x400/0x400 [ 1750.764130][T19758] ? __se_sys_ioctl+0x38/0x190 [ 1750.768730][T19758] ? selinux_file_ioctl+0x1/0x540 [ 1750.773593][T19758] ? security_file_ioctl+0x84/0xb0 [ 1750.778537][T19758] ? sock_poll+0x400/0x400 [ 1750.782791][T19758] __se_sys_ioctl+0x114/0x190 [ 1750.787305][T19758] __x64_sys_ioctl+0x7b/0x90 [ 1750.791733][T19758] x64_sys_call+0x98/0x9a0 [ 1750.795986][T19758] do_syscall_64+0x3b/0xb0 [ 1750.800237][T19758] ? clear_bhb_loop+0x55/0xb0 [ 1750.804750][T19758] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1750.810477][T19758] RIP: 0033:0x7f27ec57dff9 [ 1750.814732][T19758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1750.834174][T19758] RSP: 002b:00007f27ed30d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1750.842426][T19758] RAX: ffffffffffffffda RBX: 00007f27ec735f80 RCX: 00007f27ec57dff9 [ 1750.850230][T19758] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 1750.858040][T19758] RBP: 00007f27ed30d090 R08: 0000000000000000 R09: 0000000000000000 [ 1750.865853][T19758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1750.873830][T19758] R13: 0000000000000000 R14: 00007f27ec735f80 R15: 00007ffcc198c998 [ 1750.881651][T19758] [ 1751.903958][T19783] bond_slave_1: mtu less than device minimum [ 1752.148879][T19792] bond_slave_1: mtu less than device minimum [ 1753.346542][T19812] device veth0_vlan left promiscuous mode [ 1753.468403][T19812] device veth0_vlan entered promiscuous mode [ 1753.968942][T19811] device veth0_vlan left promiscuous mode [ 1754.092249][T19811] device veth0_vlan entered promiscuous mode [ 1754.560400][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1754.568643][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1754.575862][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1754.583321][T19824] bond_slave_1: mtu less than device minimum [ 1757.307412][T19832] bond_slave_1: mtu less than device minimum [ 1758.505778][T19856] device sit0 left promiscuous mode [ 1758.517889][T19859] device sit0 entered promiscuous mode [ 1758.583973][T19864] device veth0_vlan left promiscuous mode [ 1758.592624][T19864] device veth0_vlan entered promiscuous mode [ 1758.611068][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1758.640454][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1758.677641][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1758.765398][T19866] device veth0_vlan left promiscuous mode [ 1758.783668][T19866] device veth0_vlan entered promiscuous mode [ 1759.365450][T19880] device sit0 left promiscuous mode [ 1759.391033][T19880] device sit0 entered promiscuous mode [ 1759.600661][T19884] FAULT_INJECTION: forcing a failure. [ 1759.600661][T19884] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1759.758305][T19884] CPU: 0 PID: 19884 Comm: syz.4.4847 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1759.769419][T19884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1759.779313][T19884] Call Trace: [ 1759.782436][T19884] [ 1759.785216][T19884] dump_stack_lvl+0x151/0x1b7 [ 1759.789728][T19884] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1759.795019][T19884] ? __kasan_check_write+0x14/0x20 [ 1759.799967][T19884] dump_stack+0x15/0x1c [ 1759.803959][T19884] should_fail_ex+0x3d0/0x520 [ 1759.808473][T19884] should_fail+0xb/0x10 [ 1759.812464][T19884] should_fail_usercopy+0x1a/0x20 [ 1759.817325][T19884] _copy_from_user+0x1e/0xc0 [ 1759.821754][T19884] copy_msghdr_from_user+0xaa/0x670 [ 1759.826787][T19884] ? sendmsg_copy_msghdr+0x70/0x70 [ 1759.831735][T19884] ? __sys_recvmsg+0x22e/0x3d0 [ 1759.836342][T19884] __sys_recvmsg+0x24b/0x3d0 [ 1759.840761][T19884] ? ____sys_recvmsg+0x530/0x530 [ 1759.845535][T19884] ? __kasan_check_write+0x14/0x20 [ 1759.850481][T19884] ? __ia32_sys_read+0x90/0x90 [ 1759.855082][T19884] ? debug_smp_processor_id+0x17/0x20 [ 1759.860287][T19884] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1759.866189][T19884] __x64_sys_recvmsg+0x7f/0x90 [ 1759.870792][T19884] x64_sys_call+0x171/0x9a0 [ 1759.875129][T19884] do_syscall_64+0x3b/0xb0 [ 1759.879383][T19884] ? clear_bhb_loop+0x55/0xb0 [ 1759.883895][T19884] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1759.889623][T19884] RIP: 0033:0x7f509277dff9 [ 1759.893878][T19884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1759.913319][T19884] RSP: 002b:00007f509362b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1759.921572][T19884] RAX: ffffffffffffffda RBX: 00007f5092935f80 RCX: 00007f509277dff9 [ 1759.929377][T19884] RDX: 0000000040002002 RSI: 0000000020000000 RDI: 000000000000000c [ 1759.937187][T19884] RBP: 00007f509362b090 R08: 0000000000000000 R09: 0000000000000000 [ 1759.944998][T19884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1759.952897][T19884] R13: 0000000000000000 R14: 00007f5092935f80 R15: 00007ffe37ec4458 [ 1759.960715][T19884] [ 1760.121445][ T28] audit: type=1400 audit(1728338467.865:165): avc: denied { create } for pid=19892 comm="syz.3.4848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1760.248881][T19899] device sit0 left promiscuous mode [ 1760.278599][T19899] device sit0 entered promiscuous mode [ 1760.822862][T19910] bond_slave_1: mtu less than device minimum [ 1761.087070][T19912] bond_slave_1: mtu less than device minimum [ 1761.159992][ T28] audit: type=1400 audit(1728338468.905:166): avc: denied { create } for pid=19908 comm="syz.4.4853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1761.341582][T19918] device veth0_vlan left promiscuous mode [ 1761.369647][T19918] device veth0_vlan entered promiscuous mode [ 1761.487880][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1761.495941][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1761.581553][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1762.076698][T19932] device veth0_vlan left promiscuous mode [ 1762.083703][T19932] device veth0_vlan entered promiscuous mode [ 1763.305117][T19942] device sit0 left promiscuous mode [ 1763.314268][T19944] device sit0 left promiscuous mode [ 1763.339648][T19942] device sit0 entered promiscuous mode [ 1763.411922][T19944] device sit0 entered promiscuous mode [ 1763.688265][T19956] bond_slave_1: mtu less than device minimum [ 1763.898133][T19962] device veth0_vlan left promiscuous mode [ 1764.067354][T19962] device veth0_vlan entered promiscuous mode [ 1764.170289][T19973] device pim6reg1 entered promiscuous mode [ 1764.368775][T19974] device syzkaller0 entered promiscuous mode [ 1764.971969][T19983] device sit0 left promiscuous mode [ 1764.982685][T19983] device sit0 entered promiscuous mode [ 1765.176824][T19988] device sit0 left promiscuous mode [ 1765.190952][T19988] device sit0 entered promiscuous mode [ 1766.175797][T19995] device pim6reg1 entered promiscuous mode [ 1766.253902][T19993] device veth1_macvtap entered promiscuous mode [ 1766.262823][T19993] device macsec0 entered promiscuous mode [ 1766.343966][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1766.432576][T20000] device veth0_vlan left promiscuous mode [ 1766.451007][T20000] device veth0_vlan entered promiscuous mode [ 1766.883560][T20021] device veth0_vlan left promiscuous mode [ 1766.892034][T20021] device veth0_vlan entered promiscuous mode [ 1766.926015][T20023] device veth0_vlan left promiscuous mode [ 1766.952091][T20023] device veth0_vlan entered promiscuous mode [ 1767.363767][T20037] device sit0 left promiscuous mode [ 1767.404230][T20037] device sit0 entered promiscuous mode [ 1768.173476][T20039] device veth0_vlan left promiscuous mode [ 1768.221754][T20039] device veth0_vlan entered promiscuous mode [ 1768.351971][T20057] bond_slave_1: mtu less than device minimum [ 1768.358139][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1768.365983][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1768.375768][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1768.397308][T20061] device syzkaller0 entered promiscuous mode [ 1768.595763][T20066] device veth0_vlan left promiscuous mode [ 1768.925065][T20066] device veth0_vlan entered promiscuous mode [ 1770.079366][T20096] device sit0 left promiscuous mode [ 1770.111515][T20096] device sit0 entered promiscuous mode [ 1770.405488][T20110] bond_slave_1: mtu less than device minimum [ 1770.913025][T20116] bond_slave_1: mtu less than device minimum [ 1771.213128][ T28] audit: type=1400 audit(1728338478.955:167): avc: denied { create } for pid=20125 comm="syz.0.4916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1771.682396][T20149] device sit0 left promiscuous mode [ 1771.697040][T20149] device sit0 entered promiscuous mode [ 1771.813357][T20151] device veth0_vlan left promiscuous mode [ 1771.820220][T20151] device veth0_vlan entered promiscuous mode [ 1773.532288][T20176] bond_slave_1: mtu less than device minimum [ 1773.577166][T20178] FAULT_INJECTION: forcing a failure. [ 1773.577166][T20178] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.589610][T20178] CPU: 1 PID: 20178 Comm: syz.1.4933 Tainted: G W 6.1.99-syzkaller-00109-g0e8b65e41ffd #0 [ 1773.600760][T20178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1773.610655][T20178] Call Trace: [ 1773.613782][T20178] [ 1773.616676][T20178] dump_stack_lvl+0x151/0x1b7 [ 1773.621185][T20178] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1773.626480][T20178] dump_stack+0x15/0x1c [ 1773.630507][T20178] should_fail_ex+0x3d0/0x520 [ 1773.634984][T20178] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 1773.640623][T20178] __should_failslab+0xaf/0xf0 [ 1773.645226][T20178] should_failslab+0x9/0x20 [ 1773.649564][T20178] __kmem_cache_alloc_node+0x3d/0x250 [ 1773.654768][T20178] ? kasan_save_alloc_info+0x1f/0x30 [ 1773.659891][T20178] ? __kasan_slab_alloc+0x6c/0x80 [ 1773.664752][T20178] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 1773.670307][T20178] kmalloc_trace+0x2a/0xa0 [ 1773.674559][T20178] selinux_sk_alloc_security+0x7d/0x1a0 [ 1773.680106][T20178] security_sk_alloc+0x72/0xb0 [ 1773.684701][T20178] sk_prot_alloc+0x114/0x330 [ 1773.689131][T20178] sk_alloc+0x38/0x440 [ 1773.693032][T20178] ? security_inode_alloc+0x29/0x120 [ 1773.698156][T20178] tipc_sk_create+0x103/0x1ac0 [ 1773.702754][T20178] ? __kasan_check_write+0x14/0x20 [ 1773.707706][T20178] ? _raw_spin_lock+0xa4/0x1b0 [ 1773.712301][T20178] ? _raw_spin_trylock_bh+0x190/0x190 [ 1773.717515][T20178] ? inode_init_always+0x737/0x970 [ 1773.722548][T20178] ? try_module_get+0x12a/0x290 [ 1773.727229][T20178] __sock_create+0x3a6/0x760 [ 1773.731657][T20178] __sys_socketpair+0x29f/0x6e0 [ 1773.736350][T20178] ? __ia32_sys_socket+0x90/0x90 [ 1773.741137][T20178] ? __ia32_sys_read+0x90/0x90 [ 1773.745806][T20178] __x64_sys_socketpair+0x9b/0xb0 [ 1773.750668][T20178] x64_sys_call+0x19b/0x9a0 [ 1773.755006][T20178] do_syscall_64+0x3b/0xb0 [ 1773.759261][T20178] ? clear_bhb_loop+0x55/0xb0 [ 1773.763773][T20178] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1773.769499][T20178] RIP: 0033:0x7fb4ce37dff9 [ 1773.773763][T20178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1773.793282][T20178] RSP: 002b:00007fb4cf158038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1773.801524][T20178] RAX: ffffffffffffffda RBX: 00007fb4ce535f80 RCX: 00007fb4ce37dff9 [ 1773.809339][T20178] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 1773.817147][T20178] RBP: 00007fb4cf158090 R08: 0000000000000000 R09: 0000000000000000 [ 1773.824958][T20178] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 1773.832769][T20178] R13: 0000000000000000 R14: 00007fb4ce535f80 R15: 00007ffcb4221408 [ 1773.840586][T20178] [ 1774.599132][T20192] bond_slave_1: mtu less than device minimum [ 1775.030368][T20207] bond_slave_1: mtu less than device minimum [ 1775.855057][T20229] bond_slave_1: mtu less than device minimum [ 1777.575790][T20239] device veth0_vlan left promiscuous mode [ 1777.668026][T20239] device veth0_vlan entered promiscuous mode [ 1777.822053][T20241] device veth0_vlan left promiscuous mode [ 1777.842613][T20241] device veth0_vlan entered promiscuous mode [ 1779.987504][T20260] bond_slave_1: mtu less than device minimum [ 1781.818753][T20286] bond_slave_1: mtu less than device minimum [ 1781.828250][T20290] device sit0 left promiscuous mode [ 1781.847822][T20292] device sit0 entered promiscuous mode [ 1782.068826][T20294] device sit0 left promiscuous mode [ 1782.084989][T20295] device sit0 entered promiscuous mode [ 1782.195495][T20299] device veth0_vlan left promiscuous mode [ 1782.270599][T20299] device veth0_vlan entered promiscuous mode [ 1782.688615][T20306] bond_slave_1: mtu less than device minimum [ 1784.630077][T20361] bond_slave_1: mtu less than device minimum [ 1784.643894][T20356] bridge0: port 1(bridge_slave_0) entered blocking state [ 1784.652014][T20356] bridge0: port 1(bridge_slave_0) entered disabled state [ 1784.659242][T20356] device bridge_slave_0 entered promiscuous mode [ 1784.680523][T20356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1784.687454][T20356] bridge0: port 2(bridge_slave_1) entered disabled state [ 1784.694671][T20356] device bridge_slave_1 entered promiscuous mode [ 1784.834939][T20358] bridge0: port 1(bridge_slave_0) entered blocking state [ 1784.842048][T20358] bridge0: port 1(bridge_slave_0) entered disabled state [ 1784.849356][T20358] device bridge_slave_0 entered promiscuous mode [ 1784.864577][T20358] bridge0: port 2(bridge_slave_1) entered blocking state [ 1784.871968][T20358] bridge0: port 2(bridge_slave_1) entered disabled state [ 1784.879273][T20358] device bridge_slave_1 entered promiscuous mode [ 1784.903591][T20363] bridge0: port 1(bridge_slave_0) entered blocking state [ 1784.910481][T20363] bridge0: port 1(bridge_slave_0) entered disabled state [ 1784.917711][T20363] device bridge_slave_0 entered promiscuous mode [ 1784.931067][T20363] bridge0: port 2(bridge_slave_1) entered blocking state [ 1784.938930][T20363] bridge0: port 2(bridge_slave_1) entered disabled state [ 1784.946147][T20363] device bridge_slave_1 entered promiscuous mode [ 1785.068937][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1785.076179][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1785.083592][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1785.091742][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1785.099745][T11401] bridge0: port 1(bridge_slave_0) entered blocking state [ 1785.106556][T11401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1785.113859][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1785.122055][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1785.130022][T11401] bridge0: port 2(bridge_slave_1) entered blocking state [ 1785.136842][T11401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1785.150787][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1785.169195][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1785.177047][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1785.190680][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1785.199084][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1785.219823][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1785.227082][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1785.237826][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1785.246187][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1785.254530][ T8831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1785.261376][ T8831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1785.268603][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1785.276603][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1785.284629][ T8831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1785.291462][ T8831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1785.307851][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1785.315285][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1785.323659][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1785.331802][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1785.339654][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1785.348317][T13092] device vlan0 left promiscuous mode [ 1785.353458][T13092] bridge0: port 4(vlan0) entered disabled state [ 1785.359984][T13092] device team_slave_1 left promiscuous mode [ 1785.365704][T13092] bridge0: port 3(team_slave_1) entered disabled state [ 1785.372756][T13092] bridge0: port 2(bridge_slave_1) entered disabled state [ 1785.379892][T13092] device bridge_slave_0 left promiscuous mode [ 1785.385777][T13092] bridge0: port 1(bridge_slave_0) entered disabled state [ 1785.394183][T13092] device veth1_macvtap left promiscuous mode [ 1785.400027][T13092] device veth0_vlan left promiscuous mode [ 1785.405777][T13092] device veth0_vlan left promiscuous mode [ 1785.412311][T13092] device veth1_macvtap left promiscuous mode [ 1785.418151][T13092] device veth0_vlan left promiscuous mode [ 1785.586520][T20356] device veth0_vlan entered promiscuous mode [ 1785.593767][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1785.601168][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1785.626064][T20363] device veth0_vlan entered promiscuous mode [ 1785.641067][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1785.649042][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1785.656676][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1785.664454][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1785.672401][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1785.680537][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1785.688680][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1785.696402][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1785.704109][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1785.712076][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1785.720439][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1785.727651][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1785.736167][T20363] device veth1_macvtap entered promiscuous mode [ 1785.746464][T20356] device veth1_macvtap entered promiscuous mode [ 1785.754590][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1785.762853][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1785.770790][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1785.787554][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1785.795819][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1785.804269][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1785.812453][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1785.820854][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1785.828023][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1785.835142][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1785.843127][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1785.851191][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1785.859229][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1785.867241][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1785.875347][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1785.883314][ T8831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1785.890145][ T8831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1785.897272][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1785.905342][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1785.913267][ T8831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1785.920099][ T8831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1785.927698][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1785.962402][T20374] device sit0 entered promiscuous mode [ 1786.497737][T20379] bond_slave_1: mtu less than device minimum [ 1786.503748][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1786.522112][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1786.529908][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1786.538922][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1786.594408][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1786.603930][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1786.624359][T20358] device veth0_vlan entered promiscuous mode [ 1786.636590][T20358] device veth1_macvtap entered promiscuous mode [ 1786.643791][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1786.651863][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1786.659832][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1786.668065][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1786.675907][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1786.701651][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1786.708946][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1786.716171][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1786.724514][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1786.732814][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1786.741063][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1786.790043][T20386] device sit0 entered promiscuous mode [ 1787.253985][T20402] device veth0_vlan left promiscuous mode [ 1787.304556][T20402] device veth0_vlan entered promiscuous mode [ 1787.719806][T20418] bond_slave_1: mtu less than device minimum [ 1787.946398][T20437] device sit0 left promiscuous mode [ 1787.967235][T20437] device sit0 entered promiscuous mode [ 1788.678985][T20441] bond_slave_1: mtu less than device minimum [ 1789.933757][T20452] device pim6reg1 entered promiscuous mode [ 1790.204121][T20467] bond_slave_1: mtu less than device minimum [ 1790.294838][T20475] device veth0_vlan left promiscuous mode [ 1790.546747][T20475] device veth0_vlan entered promiscuous mode [ 1790.786283][T20480] device sit0 left promiscuous mode [ 1790.881295][T20481] device sit0 entered promiscuous mode [ 1791.177857][T20483] bond_slave_1: mtu less than device minimum [ 1791.183740][T20487] bond_slave_1: mtu less than device minimum [ 1792.062056][T20494] bond_slave_1: mtu less than device minimum [ 1794.977717][T13092] device bridge_slave_1 left promiscuous mode [ 1794.983632][T13092] bridge0: port 2(bridge_slave_1) entered disabled state [ 1794.990904][T13092] device bridge_slave_0 left promiscuous mode [ 1794.996799][T13092] bridge0: port 1(bridge_slave_0) entered disabled state [ 1795.004392][T13092] device veth1_macvtap left promiscuous mode [ 1795.010235][T13092] device veth0_vlan left promiscuous mode [ 1796.139823][T20518] GPL: port 1(team_slave_1) entered blocking state [ 1796.151520][T20518] GPL: port 1(team_slave_1) entered disabled state [ 1796.182709][T20518] device team_slave_1 entered promiscuous mode [ 1796.194607][T20521] device sit0 left promiscuous mode [ 1796.214275][T20527] device sit0 entered promiscuous mode [ 1796.307558][T20524] device sit0 entered promiscuous mode [ 1797.200769][T20541] bond_slave_1: mtu less than device minimum [ 1797.206657][T20540] bond_slave_1: mtu less than device minimum [ 1797.914551][T20525] bridge0: port 1(bridge_slave_0) entered blocking state [ 1797.921598][T20525] bridge0: port 1(bridge_slave_0) entered disabled state [ 1797.929063][T20525] device bridge_slave_0 entered promiscuous mode [ 1797.935888][T20525] bridge0: port 2(bridge_slave_1) entered blocking state [ 1798.029266][T20525] bridge0: port 2(bridge_slave_1) entered disabled state [ 1798.141957][T20525] device bridge_slave_1 entered promiscuous mode [ 1799.618194][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1799.628438][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1799.664544][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1799.672768][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1799.686797][ T8831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1799.693692][ T8831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1799.701018][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1799.709528][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1799.717635][ T8831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1799.724456][ T8831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1799.976859][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1799.994690][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1800.025609][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1800.035077][ T28] audit: type=1400 audit(1728338507.785:168): avc: denied { ioctl } for pid=20567 comm="syz.4.5047" path="socket:[96570]" dev="sockfs" ino=96570 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1800.035095][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1800.035315][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1800.083776][T20566] device sit0 left promiscuous mode [ 1800.102177][T20569] device sit0 entered promiscuous mode [ 1800.781449][T20525] device veth0_vlan entered promiscuous mode [ 1800.788464][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1800.796989][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1800.805952][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1800.813916][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1800.822355][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1800.830073][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1800.843329][T20577] bond_slave_1: mtu less than device minimum [ 1800.978556][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1800.986593][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1801.058913][T20525] device veth1_macvtap entered promiscuous mode [ 1801.515291][T20591] bond_slave_1: mtu less than device minimum [ 1801.532086][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1801.539795][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1801.548293][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1801.556402][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1801.564593][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1801.863890][T20601] bond_slave_1: mtu less than device minimum [ 1802.118142][T20599] bond_slave_1: mtu less than device minimum [ 1802.421303][T20607] device sit0 left promiscuous mode [ 1802.503937][T20609] device sit0 entered promiscuous mode [ 1802.618063][T20611] bond_slave_1: mtu less than device minimum [ 1805.564461][T20636] GPL: port 1(team_slave_1) entered blocking state [ 1805.570965][T20636] GPL: port 1(team_slave_1) entered disabled state [ 1805.578173][T20636] device team_slave_1 entered promiscuous mode [ 1805.835495][T20637] bond_slave_1: mtu less than device minimum [ 1806.077962][T20643] bond_slave_1: mtu less than device minimum [ 1808.631905][T20649] device veth0_vlan left promiscuous mode [ 1808.637837][T20649] device veth0_vlan entered promiscuous mode [ 1808.649418][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1808.667458][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1808.674774][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1809.765621][T20673] device veth0_vlan left promiscuous mode [ 1809.835614][T20673] device veth0_vlan entered promiscuous mode [ 1810.121077][T20671] bond_slave_1: mtu less than device minimum [ 1812.395661][T20697] bond_slave_1: mtu less than device minimum [ 1812.461090][T20696] bond_slave_1: mtu less than device minimum [ 1814.286417][T20726] bond_slave_1: mtu less than device minimum [ 1814.635696][T20729] device veth0_vlan left promiscuous mode [ 1814.664796][T20729] device veth0_vlan entered promiscuous mode [ 1814.856392][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1814.864549][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1814.925781][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1817.828376][T20739] device sit0 left promiscuous mode [ 1817.889791][T20740] device sit0 entered promiscuous mode [ 1818.660132][T20746] device sit0 left promiscuous mode [ 1818.799773][T20748] device sit0 entered promiscuous mode [ 1819.702806][T20759] bond_slave_1: mtu less than device minimum [ 1819.822900][T20771] device veth0_vlan left promiscuous mode [ 1820.045327][T20771] device veth0_vlan entered promiscuous mode [ 1821.492922][T20784] device sit0 left promiscuous mode [ 1821.503015][T20786] device sit0 entered promiscuous mode [ 1822.548288][T20794] device sit0 left promiscuous mode [ 1822.734832][T20797] device sit0 entered promiscuous mode [ 1823.120064][T20796] device sit0 left promiscuous mode [ 1823.137478][T20798] device sit0 entered promiscuous mode [ 1823.737505][T20817] bond_slave_1: mtu less than device minimum [ 1823.826121][T20815] bond_slave_1: mtu less than device minimum [ 1823.908815][T20822] bond_slave_1: mtu less than device minimum [ 1826.808216][T20837] bond_slave_1: mtu less than device minimum [ 1828.267253][T20841] device sit0 left promiscuous mode [ 1828.289673][T20844] device sit0 entered promiscuous mode [ 1828.359698][T20851] device sit0 left promiscuous mode [ 1828.395152][T20851] device sit0 entered promiscuous mode [ 1829.627190][T20862] device sit0 left promiscuous mode [ 1829.699232][T20860] device veth0_vlan left promiscuous mode [ 1829.757975][T20860] device veth0_vlan entered promiscuous mode [ 1829.873188][T20867] device sit0 entered promiscuous mode [ 1829.969380][T20874] bond_slave_1: mtu less than device minimum [ 1830.342962][T20889] bond_slave_1: mtu less than device minimum [ 1830.358042][T20886] device sit0 left promiscuous mode [ 1830.617874][T20891] device sit0 entered promiscuous mode [ 1832.293334][T20905] device sit0 left promiscuous mode [ 1832.463009][T20908] device sit0 entered promiscuous mode [ 1833.277694][T20922] device sit0 left promiscuous mode [ 1833.305979][T20923] device sit0 entered promiscuous mode [ 1833.486325][T20925] bond_slave_1: mtu less than device minimum [ 1835.682724][T20938] bond_slave_1: mtu less than device minimum [ 1836.029092][T20947] device sit0 left promiscuous mode [ 1836.237765][T20947] device sit0 entered promiscuous mode [ 1837.370969][T20964] bond_slave_1: mtu less than device minimum [ 1837.476657][T20971] device sit0 left promiscuous mode [ 1837.587187][T20972] device sit0 entered promiscuous mode [ 1838.037794][T20979] bond_slave_1: mtu less than device minimum [ 1838.687559][T20990] device sit0 left promiscuous mode [ 1839.603909][T21003] device sit0 left promiscuous mode [ 1839.625325][T21004] bond_slave_1: mtu less than device minimum [ 1839.637230][T21005] device sit0 entered promiscuous mode [ 1840.135938][T21015] device sit0 entered promiscuous mode [ 1840.918666][T21019] bond_slave_1: mtu less than device minimum [ 1841.068114][T21023] device sit0 left promiscuous mode [ 1841.116826][T21021] device sit0 left promiscuous mode [ 1841.188374][T21023] device sit0 entered promiscuous mode [ 1841.295205][T21025] device sit0 entered promiscuous mode [ 1841.450253][T21030] device veth0_vlan left promiscuous mode [ 1841.460882][T21030] device veth0_vlan entered promiscuous mode [ 1841.469796][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1841.479547][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1841.486742][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1842.240454][T21042] bond_slave_1: mtu less than device minimum [ 1842.346417][T21049] device veth0_vlan left promiscuous mode [ 1842.439297][T21049] device veth0_vlan entered promiscuous mode [ 1843.284617][T21074] device sit0 left promiscuous mode [ 1843.305033][T21074] device sit0 entered promiscuous mode [ 1843.360519][T21070] bridge0: port 1(bridge_slave_0) entered blocking state [ 1843.367772][T21070] bridge0: port 1(bridge_slave_0) entered disabled state [ 1843.375116][T21070] device bridge_slave_0 entered promiscuous mode [ 1843.393705][T21072] bridge0: port 1(bridge_slave_0) entered blocking state [ 1843.400663][T21072] bridge0: port 1(bridge_slave_0) entered disabled state [ 1843.408400][T21072] device bridge_slave_0 entered promiscuous mode [ 1843.415026][T21070] bridge0: port 2(bridge_slave_1) entered blocking state [ 1843.422421][T21070] bridge0: port 2(bridge_slave_1) entered disabled state [ 1843.429882][T21070] device bridge_slave_1 entered promiscuous mode [ 1843.440688][T21072] bridge0: port 2(bridge_slave_1) entered blocking state [ 1843.447594][T21072] bridge0: port 2(bridge_slave_1) entered disabled state [ 1843.454809][T21072] device bridge_slave_1 entered promiscuous mode [ 1843.472945][T21071] bridge0: port 1(bridge_slave_0) entered blocking state [ 1843.479838][T21071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1843.487063][T21071] device bridge_slave_0 entered promiscuous mode [ 1843.494269][T21071] bridge0: port 2(bridge_slave_1) entered blocking state [ 1843.501387][T21071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1843.508808][T21071] device bridge_slave_1 entered promiscuous mode [ 1843.695235][T21089] bond_slave_1: mtu less than device minimum [ 1843.704377][T21072] bridge0: port 2(bridge_slave_1) entered blocking state [ 1843.711252][T21072] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1843.718334][T21072] bridge0: port 1(bridge_slave_0) entered blocking state [ 1843.725106][T21072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1843.784930][ T8] device team_slave_1 left promiscuous mode [ 1843.790745][ T8] GPL: port 1(team_slave_1) entered disabled state [ 1843.797823][ T8] device bridge_slave_1 left promiscuous mode [ 1843.803741][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1843.810982][ T8] device bridge_slave_0 left promiscuous mode [ 1843.816877][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1843.825084][ T8] device bridge_slave_1 left promiscuous mode [ 1843.831043][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1843.838282][ T8] device bridge_slave_0 left promiscuous mode [ 1843.844184][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1843.851820][ T8] device bridge_slave_1 left promiscuous mode [ 1843.857799][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1843.864869][ T8] device bridge_slave_0 left promiscuous mode [ 1843.870872][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1843.878723][ T8] device veth1_macvtap left promiscuous mode [ 1843.884525][ T8] device veth0_vlan left promiscuous mode [ 1843.890406][ T8] device veth1_macvtap left promiscuous mode [ 1843.896213][ T8] device veth0_vlan left promiscuous mode [ 1843.902140][ T8] device veth1_macvtap left promiscuous mode [ 1843.907964][ T8] device veth0_vlan left promiscuous mode [ 1844.173323][T11401] bridge0: port 1(bridge_slave_0) entered disabled state [ 1844.180589][T11401] bridge0: port 2(bridge_slave_1) entered disabled state [ 1844.241922][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1844.251812][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1844.261000][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1844.269293][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1844.277581][ T8452] bridge0: port 1(bridge_slave_0) entered blocking state [ 1844.284409][ T8452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1844.291892][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1844.300052][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1844.308281][ T8452] bridge0: port 2(bridge_slave_1) entered blocking state [ 1844.315111][ T8452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1844.322600][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1844.330514][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1844.338548][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1844.346409][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1844.364519][T21072] device veth0_vlan entered promiscuous mode [ 1844.380304][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1844.388679][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1844.398143][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1844.405762][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1844.413808][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1844.421154][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1844.428454][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1844.436568][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1844.444653][ T8452] bridge0: port 1(bridge_slave_0) entered blocking state [ 1844.451496][ T8452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1844.458688][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1844.466805][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1844.482210][ T8452] bridge0: port 2(bridge_slave_1) entered blocking state [ 1844.489065][ T8452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1844.496530][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1844.503860][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1844.511104][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1844.540211][T21094] bond_slave_1: mtu less than device minimum [ 1844.546311][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1844.554337][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1844.562264][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1844.572439][T11401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1844.593544][T21072] device veth1_macvtap entered promiscuous mode [ 1844.600109][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1844.608404][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1844.616484][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1844.624835][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1844.632914][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1844.670297][T21070] device veth0_vlan entered promiscuous mode [ 1844.688751][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1844.696663][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1844.704662][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1844.712794][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1844.724537][T21070] device veth1_macvtap entered promiscuous mode [ 1844.738780][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1844.746085][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1844.753357][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1844.761714][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1844.769721][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1844.777351][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1844.785335][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1844.799320][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1844.806545][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1844.813798][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1844.821842][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1844.829977][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1844.838007][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1844.846165][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1844.854288][ T8452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1844.862248][ T8452] bridge0: port 1(bridge_slave_0) entered blocking state [ 1844.869093][ T8452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1844.884628][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1844.892410][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1844.900626][ T337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1844.908770][ T337] bridge0: port 2(bridge_slave_1) entered blocking state [ 1844.915587][ T337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1844.935502][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1844.943537][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1844.951885][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1844.960258][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1844.987501][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1845.019745][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1845.075101][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1845.082652][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1845.098144][T21071] device veth0_vlan entered promiscuous mode [ 1845.129946][T21103] device sit0 left promiscuous mode [ 1845.205668][T21107] device sit0 entered promiscuous mode [ 1845.336637][T21071] device veth1_macvtap entered promiscuous mode [ 1845.345365][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1845.357582][T21108] bond_slave_1: mtu less than device minimum [ 1845.383880][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1845.392373][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1845.455977][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1845.466575][ T8831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1845.502564][T21113] tun0: tun_chr_ioctl cmd 1074025677 [ 1845.510303][T21113] tun0: linktype set to 513 [ 1845.612121][T21123] device sit0 left promiscuous mode [ 1845.634155][T21123] device sit0 entered promiscuous mode [ 1846.052912][T21129] bond_slave_1: mtu less than device minimum [ 1846.137867][T21132] device veth0_vlan left promiscuous mode [ 1846.260293][T21132] device veth0_vlan entered promiscuous mode [ 1846.520809][T21139] device sit0 entered promiscuous mode [ 1846.545575][T21140] bond_slave_1: mtu less than device minimum [ 1846.875286][T21148] device veth0_vlan left promiscuous mode [ 1846.906746][T21148] device veth0_vlan entered promiscuous mode [ 1847.557771][T21156] device sit0 left promiscuous mode [ 1847.585550][T21156] device sit0 entered promiscuous mode [ 1848.354917][T21169] device veth0_vlan left promiscuous mode [ 1848.364145][T21169] device veth0_vlan entered promiscuous mode [ 1848.371142][T21151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1848.379414][T21151] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1848.386643][T21151] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1848.756665][T21178] tun0: tun_chr_ioctl cmd 1074025680 [ 1849.205671][T21182] device sit0 entered promiscuous mode [ 1849.965447][T21180] device veth0_vlan left promiscuous mode [ 1850.181566][T21180] device veth0_vlan entered promiscuous mode [ 1850.537803][T21196] device veth0_vlan left promiscuous mode [ 1850.573124][T21196] device veth0_vlan entered promiscuous mode [ 1850.796785][T21151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1850.804985][T21151] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1850.857723][T21151] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1851.154630][T21204] bond_slave_1: mtu less than device minimum [ 1852.349246][T21220] device sit0 left promiscuous mode [ 1852.460451][T21221] device sit0 entered promiscuous mode [ 1853.900653][T21237] bond_slave_1: mtu less than device minimum [ 1854.230606][T21243] device veth0_vlan left promiscuous mode [ 1854.314456][T21243] device veth0_vlan entered promiscuous mode [ 1854.610558][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1854.618426][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1854.625958][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1854.634701][T21248] device sit0 entered promiscuous mode [ 1855.078649][T21254] bridge0: port 3(vlan0) entered blocking state [ 1855.096563][T21254] bridge0: port 3(vlan0) entered disabled state [ 1855.103360][T21254] device vlan0 entered promiscuous mode [ 1855.109488][T21254] bridge0: port 3(vlan0) entered blocking state [ 1855.115613][T21254] bridge0: port 3(vlan0) entered forwarding state [ 1855.602362][T21272] device sit0 left promiscuous mode [ 1855.613946][T21260] bond_slave_1: mtu less than device minimum [ 1855.627510][T21272] device sit0 entered promiscuous mode [ 1855.748745][T21283] device sit0 left promiscuous mode [ 1855.763700][T21285] device sit0 left promiscuous mode [ 1855.803113][T21286] bond_slave_1: mtu less than device minimum [ 1855.840156][T21283] device sit0 entered promiscuous mode [ 1855.875128][T21285] device sit0 entered promiscuous mode [ 1855.951638][T21291] bridge0: port 3(vlan0) entered disabled state [ 1856.047305][T21288] device veth0_vlan left promiscuous mode [ 1856.248449][T21288] device veth0_vlan entered promiscuous mode [ 1856.536286][T21288] bridge0: port 3(vlan0) entered blocking state [ 1856.543126][T21288] bridge0: port 3(vlan0) entered forwarding state [ 1856.718153][T21297] device veth0_vlan left promiscuous mode [ 1856.776403][T21297] device veth0_vlan entered promiscuous mode SYZFAIL: repeatedly failed to execute the program proc=2 req=1739 state=1 status=9 (errno 11: Resource temporarily unavailable) [ 1859.008224][ T8] device bridge_slave_1 left promiscuous mode [ 1859.014136][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1859.021458][ T8] device bridge_slave_0 left promiscuous mode [ 1859.027438][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1859.034888][ T8] device bridge_slave_1 left promiscuous mode [ 1859.040890][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1859.048215][ T8] device bridge_slave_0 left promiscuous mode [ 1859.054115][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1859.061899][ T8] device veth1_macvtap left promiscuous mode [ 1859.067758][ T8] device veth0_vlan left promiscuous mode [ 1859.073500][ T8] device veth1_macvtap left promiscuous mode [ 1859.079336][ T8] device veth0_vlan left promiscuous mode [ 1860.078048][ T8] device bridge_slave_1 left promiscuous mode [ 1860.083963][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1860.091257][ T8] device bridge_slave_0 left promiscuous mode [ 1860.097164][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1860.104707][ T8] device vlan0 left promiscuous mode [ 1860.109930][ T8] bridge0: port 3(vlan0) entered disabled state [ 1860.116214][ T8] device bridge_slave_1 left promiscuous mode [ 1860.122157][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 1860.129240][ T8] device bridge_slave_0 left promiscuous mode [ 1860.135130][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 1860.142520][ T8] device team_slave_1 left promiscuous mode [ 1860.148309][ T8] GPL: port 1(team_slave_1) entered disabled state [ 1860.155677][ T8] device veth1_macvtap left promiscuous mode [ 1860.161603][ T8] device veth0_vlan left promiscuous mode [ 1860.167332][ T8] device veth1_macvtap left promiscuous mode [ 1860.173150][ T8] device veth0_vlan left promiscuous mode [ 1860.178986][ T8] device veth1_macvtap left promiscuous mode [ 1860.184864][ T8] device veth0_vlan left promiscuous mode