last executing test programs: 1m19.00000806s ago: executing program 3 (id=1595): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d5ddb", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) 1m16.759965116s ago: executing program 3 (id=1595): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d5ddb", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) 1m13.702188074s ago: executing program 3 (id=1595): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d5ddb", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) 1m12.119471829s ago: executing program 3 (id=1595): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d5ddb", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) 1m9.634433227s ago: executing program 3 (id=1595): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d5ddb", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) 1m7.179406906s ago: executing program 3 (id=1595): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d5ddb", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) 1m6.119259123s ago: executing program 2 (id=1774): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071122400000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000380)=""/76}, 0x20) 1m5.992513655s ago: executing program 2 (id=1775): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000bfd50000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='signal_deliver\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r2}, &(0x7f0000000100), &(0x7f0000000300)=r4}, 0x20) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x30) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', r5, @fallback=0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x12, 0x16, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x82f, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, [@exit, @btf_id={0x18, 0x8, 0x3, 0x0, 0x3}, @ringbuf_query], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x101, 0x0, 0x0, 0x41100, 0x1c, '\x00', r5, @fallback=0x23, r6, 0x8, &(0x7f0000000400)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x3, 0x7, 0x4, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000880)=[r7, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xfffffffb, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_ext={0x1c, 0x10, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xeda6}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@exit], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000740)='syzkaller\x00', 0x80, 0x75, &(0x7f0000000780)=""/117, 0x41000, 0x0, '\x00', r5, 0x0, r2, 0x8, &(0x7f0000000800)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000840)={0x1, 0x3, 0xc0, 0x4}, 0x10, 0x1cee1, r2, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) r8 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@decl_tag={0x10, 0x0, 0x0, 0x11, 0x1, 0x1}]}, {0x0, [0x61, 0x30, 0x30, 0x61, 0x0]}}, &(0x7f00000003c0)=""/170, 0x2f, 0xaa, 0x0, 0x12e, 0x0, @void, @value}, 0x28) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r11 = perf_event_open(&(0x7f0000000640)={0x5, 0x80, 0x1, 0x6, 0x5, 0x3, 0x0, 0x6, 0x10, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x8000000000000001, 0x1000}, 0x3188, 0xa, 0x7fffffff, 0x9, 0x8, 0x556, 0x1ff, 0x0, 0xfff, 0x0, 0xb484}, r8, 0xf, r2, 0x1) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x6, 0x2, 0x2, 0x7, 0x0, 0x10, 0x40b12, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, @perf_bp={&(0x7f0000000540), 0x3}, 0x4800, 0x4, 0x2, 0x9, 0x100000000, 0xc, 0x3, 0x0, 0x3, 0x0, 0x7}, r8, 0xd, r11, 0x8) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x12, 0xc, &(0x7f0000000280)=ANY=[@ANYRESOCT=r0, @ANYRES32=r9, @ANYBLOB="0000000000000000b708000000000e51a29981007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7350000304673c17c77ddb00000002085"], &(0x7f0000000240)='GPL\x00', 0x0, 0xffffffffffffff56, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) close(r0) 1m5.844974637s ago: executing program 4 (id=1777): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b7030000fdffffff8500000071"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100)='THAWED\x00', 0x7) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r4 = syz_clone(0x1340200, 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000780)="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") socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'erspan0\x00'}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$unix(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000340)="ce716126521fe9543028fdd62b5ead3953e721fdd1f84b37c321f851407a4d9f9c5c08db53c23ab7fc04c1ece753c5571e83fc32e98f2593679c0a07bbbee2968a1084ebb22d70d5a8d7761a85f731091861098e97586a741bb82e5df51d1c838d3378d5", 0x64}, {&(0x7f00000003c0)="7383a6bcc9da15c63fa139b605b8f95d1e170b915b933b072c0d0249591f481b47c19a93ee5adb19f5de09c08c490d9a7c5d4d9f5fd0f55e0843dbea40dfc283c6abfbdab7c11e35c6b357b1a10837d8d35a9ebb8ef1e742c479e3b39fbca62ba92329f9ef2b4b3d02917ba6ab37f1d29f4c552eae7699f3a538e1379a9094b25806132a087e6ab7f5b537f189e7e377edda2a22ea", 0x95}, {&(0x7f0000001780)="edbf2ab4b6cdb03676f7274358b678f4c9500ef0e6ba7f43cfe2ea5eb47a4e963c3f20d784cc87d873e4d2259ab041bd35ab9a530b93dae1af1466fafb4cacfe53ee20653d2ce01c12bd483c812710eb809e8894edb83a2732ba9b85df00111104bf22adb8049f9731f37aa67971e0d61d32b641e0a49e8e0d5824b0c0a7cfe8daf569312fcc8033372f11a23012c00317b67b366c78e2866f6ed8d93e2d38e02c186e1aecfb52251428fb010297bb8a22d2eb1e653f6ee775cd4ebe82e7d8c5d3ccbfcbbc6d8f585e9a7b1183e7b9e630c1b857d620b7418c1c9b0a1d7506516106e629255a04fb0238b7c89bfda68780e69a030b10a16b9f", 0xf9}], 0x3, &(0x7f0000000480)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee00, 0xee01}}}], 0x60, 0x80}, 0x20000081) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8942, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8922, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1}, &(0x7f0000000500), &(0x7f0000000540)=r6}, 0x20) 1m5.448576503s ago: executing program 2 (id=1781): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3ed", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) 1m5.447209623s ago: executing program 4 (id=1782): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3ed", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) 1m5.181345197s ago: executing program 2 (id=1783): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000007f1600850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) close(r4) 1m5.158766158s ago: executing program 1 (id=1784): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 1m5.157911938s ago: executing program 4 (id=1785): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071122400000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000380)=""/76}, 0x20) 1m5.098583759s ago: executing program 2 (id=1786): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00e7ffff3f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=r3, @ANYRESHEX=0x0, @ANYRES64=r2, @ANYRES64=r0, @ANYRESHEX=r1], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYRESDEC=r3, @ANYRESHEX=0x0, @ANYRES64=r2, @ANYRES64=r0, @ANYRESHEX=r1], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40010) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xb, 0xc, &(0x7f0000000280)=ANY=[@ANYRES16=r4], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10003, @void, @value}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xb, 0xc, &(0x7f0000000280)=ANY=[@ANYRES16=r4], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10003, @void, @value}, 0x94) r9 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0)={r1}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x2c, 0x3, 0xb, 0xf76, 0x41000, r5, 0x8, '\x00', 0x0, r9, 0x0, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x15062, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0600000004000000990500000a00000000000000", @ANYRES32, @ANYBLOB], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r10, 0x0, 0x1ba8847c99}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r8}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r11, &(0x7f0000000180), 0x40010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="2d84000906ffb9"], 0xffdd) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="750a000000000000611168000000000018000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1m5.058743179s ago: executing program 4 (id=1787): r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'hugetlb'}, {0x2b, 'net'}]}, 0xe) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x80cd, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x120, 0x120, 0x7, [@struct={0x3, 0x4, 0x0, 0x4, 0x1, 0x9, [{0xc, 0x2, 0x9}, {0x2, 0x4, 0x4}, {0xf, 0x1, 0x8}, {0x200, 0x0, 0x7}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xe, 0x2}, {0x9, 0x1}, {0xd, 0x2}, {0x9}, {0x8, 0x3}, {0xb, 0x5}]}, @float={0x5, 0x0, 0x0, 0x10, 0x8}, @fwd={0xf}, @union={0x10, 0x5, 0x0, 0x5, 0x0, 0x6a47, [{0x8, 0x0, 0x6}, {0x5, 0x0, 0x2}, {0x7, 0x0, 0x5}, {0x4, 0x4, 0x40a8}, {0xa, 0x1, 0x1}]}, @float={0xc, 0x0, 0x0, 0x10, 0xc}, @restrict={0xd, 0x0, 0x0, 0xb, 0x5}, @union={0x10, 0x3, 0x0, 0x5, 0x1, 0x7, [{0x10, 0x0, 0x2}, {0x5, 0x4, 0x8}, {0x3, 0x5}]}]}, {0x0, [0x30, 0x30, 0x0, 0x30, 0x30]}}, &(0x7f0000000380)=""/4096, 0x13f, 0x1000, 0x0, 0xb6, 0x10000, @value}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xc, 0x9, 0x7, 0x8, 0x9395, r1, 0x45, '\x00', r2, 0xffffffffffffffff, 0x4, 0x4, 0x4, 0x0, @value=r3, @void, @void, @value}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001580)={{r1, 0xffffffffffffffff}, &(0x7f0000001500), &(0x7f0000001540)='%+9llu \x00'}, 0x20) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001640)=@bpf_ext={0x1c, 0x13, &(0x7f00000013c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @call={0x85, 0x0, 0x0, 0xad}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x3}, @exit, @exit]}, &(0x7f0000001480)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x60, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000014c0)={0x1, 0xa, 0x2, 0xfffffffe}, 0x10, 0x2296b, r1, 0x3, &(0x7f00000015c0)=[0xffffffffffffffff, r5, r1, r4, r4, r4], &(0x7f0000001600)=[{0x3, 0x1, 0x3, 0x3}, {0x0, 0x1, 0xc, 0x2}, {0x1, 0x5, 0x3, 0x2}], 0x10, 0x5, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001780)={{r4, 0xffffffffffffffff}, &(0x7f0000001700), &(0x7f0000001740)=r6}, 0x20) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000017c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000001800)}], 0x1, &(0x7f0000001880)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev={0xac, 0x14, 0x14, 0x1f}, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x705}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xd}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr=0x64010101, @multicast1}}}, @ip_retopts={{0x34, 0x0, 0x7, {[@generic={0xcd, 0x4, "9cc2"}, @cipso={0x86, 0x1e, 0xfffffffffffffffd, [{0x2, 0xb, "df7978a06cca1d9b68"}, {0x5, 0xd, "cbf5150331ba5840f71845"}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xf}}], 0x128}, 0x20000040) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001a00)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000001a40)=r6, 0x4) close(0xffffffffffffffff) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a80), 0x0, 0x0) ioctl$TUNSETPERSIST(r10, 0x400454cb, 0x0) ioctl$TUNSETDEBUG(r10, 0x400454c9, &(0x7f0000001ac0)=0x7) openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x486080, 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001b40)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001b80)={r5, 0xffffffffffffffff}, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001dc0)={0x7fffffff, 0x0}, 0x8) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001e00)=@bloom_filter={0x1e, 0x1, 0x5, 0x7, 0x5228, r11, 0x7fff, '\x00', r2, r11, 0x3, 0x0, 0x4, 0xd, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001ec0)=@bpf_lsm={0x1d, 0x1b, &(0x7f0000001bc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x200}, [@exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r11}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x9}, @jmp={0x5, 0x0, 0x6, 0x3, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @map_val={0x18, 0x0, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x7fffffff}]}, &(0x7f0000001cc0)='syzkaller\x00', 0x7e3, 0x5b, &(0x7f0000001d00)=""/91, 0x40f00, 0x10, '\x00', r2, 0x1b, r11, 0x8, &(0x7f0000001d80)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, r13, 0x0, 0x0, &(0x7f0000001e80)=[r7, r5, r7, r14, r11, r11], 0x0, 0x10, 0x7, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000020c0)={r1, &(0x7f0000001f80)="8bc680702ffc78674ef5dbff8310ba2131816b4fe9f6f89cb27004d6c59bca777548aab52e4fda13995b1f804c1ee347f726d40a3e36b21bb329b16a348c8b36bf1b3ffa723c050ea4d271900198df11543b01ee0cc23d70ce854ee35d48f58adeae1494557b142c1fb8eeed478eb09c4ff5a299920d0dca72db608d53e044869bee12ee6edd6a3e9f484fd57e9074f1450243eb4344df1da4c967efa902b0aaf38862ef6b0f1455b534b505b93654d1cb9302df8835f49c659622eadfae78f2b2c2b7cbc5a3d95ca4065a2ea71440f55d02d9d847b8671ed32ef2b9a77632f0463c0621062a4a5c27100f27c1f701eabbd125213a5c4ee6", &(0x7f0000002080)=""/47}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002240)={0x18, 0x1, &(0x7f0000002100)=@raw=[@alu={0x7, 0x1, 0xa, 0x6, 0x1, 0xfffffffffffffff8, 0x1}], &(0x7f0000002140)='GPL\x00', 0xffff, 0x11, &(0x7f0000002180)=""/17, 0x41100, 0x63, '\x00', r2, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000021c0)={0x2, 0x8, 0x401, 0x200}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000002200)=[{0x4, 0x5, 0xa, 0xb}, {0x0, 0x1, 0xf, 0x4}, {0x0, 0x1, 0x6, 0x9}], 0x10, 0x3, @void, @value}, 0x94) close(r0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000002300)) r15 = openat$tun(0xffffffffffffff9c, &(0x7f0000002340), 0x220082, 0x0) ioctl$TUNGETVNETBE(r15, 0x800454df, &(0x7f0000002380)=0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002740)={0x6, 0x8, &(0x7f0000002480)=@raw=[@ringbuf_query, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x59}, @ldst={0x3, 0x2, 0x3, 0x6, 0x1, 0xfffffffffffffff4, 0x4}], &(0x7f00000024c0)='GPL\x00', 0x0, 0xe2, &(0x7f0000002500)=""/226, 0x40f00, 0x19, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f00000026c0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002700), 0x10, 0xb, @void, @value}, 0x94) 1m4.959889121s ago: executing program 1 (id=1788): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b700"/96], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2a979d) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='cpuset.memory_pressure\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x12) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000e0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000100000d03000000000000000300000000000000000000010500000020000000000000000000000300"/86], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @cgroup_skb, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r6, 0x8982, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1m4.959265371s ago: executing program 4 (id=1789): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1f, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000007c0)=ANY=[], &(0x7f0000000040)=""/247, 0x1a, 0xf7, 0x0, 0x0, 0x0, @void, @value}, 0x28) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000063014000000000009500000000100000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="020000000400000008000000010000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000021b00000000000000000000000000000000000000000000000da7f4dd82c1e508639d171b8000551af60dc5a3c558a550d8595a6ec131608ac7b4a3ce81ee61e08e116310a181ba1d2fe4aa78d4d54a7611a911c0aa6bf35825364881e6a5ee67f5a4d5ff55e47de2b50538eafa26beb6c1e89e830b1a308a67762f1df05a8acf5ab0acd316b33a148a6"], 0x48) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) sendmsg$inet(r4, &(0x7f0000000840)={&(0x7f0000000500)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000580)="7a691d754ef1eaeac6c153aa5ecc14a69c0eea36f4da09398232cfb29a6f4783c73f0e9f878344e696d70df0aa0607f93994d142e19283efb59756133664cbaa3266e691153f3003266596af50fbaeb546a93435ba", 0x55}, {&(0x7f0000000680)="b5d0fa55ec65ae5fb22c488e6743b5739a5822eef14de46e8c373acd4c69c5200cbca5b76df334f7ef9d97f4b01a102398c0c9041b54350d277bbea6ead43b38098eb3ab08524af786159b7a4c5e6f49ebdfa98f69688b896c50e5b702be84218ca4cbabe192b7812886ba93ae235d5b61c49c6b6cafd770c8", 0x79}], 0x2, &(0x7f0000000900)=[@ip_tos_int={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x60}, 0x800) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r6}, 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f0000000180)=@raw=[@cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffff9}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x2}], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYRESOCT=r2, @ANYRES32=r0, @ANYBLOB="f4fb03559561a4e17183bcd6ec223f8a779a9d66aa7c643e14ff734522179536a23f828b026afb5d3ce991658da75efadec20e149591a0a2a0d0fef98708993fffa1155daef3bb33c68c7c4527ffd4488e95e9f1a2808fb8450ce436d82b9b85db597bc539fb423052f88887e1ca3b7973b2d8f58096446e9af95a6dfb9435c0308b50733be05997417c1c75a8452f182bffc22ee8fabdb91db2af841e3efda87a9f1a3643cab5c015f3565e94fa0d7b716de914797fae64f8921fef31588f1e34e5a210ba26d28a1ba7bb4519beb069ce118090437f435f"], 0x48) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef) 1m4.681855945s ago: executing program 1 (id=1792): bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b000000000000000000000000800007000000005c25d66308b0fa81f823bacad1c86b85154dc77a7a1a731e4e9537024fa0a13469e85c57bc69058580f0872e819a9e541832044b2c427f65f48349025c25226dac9cdd8b258dd972ef38111c02e0d0b84d786e4e29ed4c0b67dc3bdeffa649e3b4958587e1d8e26afdd35aa07f44e3ab18", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000fb7335db91850b43fd75f29cd0fa6df6794fcfeda542311b2b04002da1a29d60b72c777a44f96002b043c21c38b280452208492d25873ea3c3ab065d51a73fd51d729a1085336990a3698a2ebe044d4aa5cc5dfc11d6aabcb08adf86420eef49df2696b38e20b4ba3bf3672bb2359a860ff0b2f015b6f2a3fcc3e9e5f27453b18adcbb1792244cb04bca766de16b426c925971f1b6a4b86227692a4d0e777c0fb3a3687f9cd466ba802c4b7af6972930c3036820541fd8fa4f63c14c6efed1c256345ac179733f00f5224e18fe82f58cf49e"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00@\x00'/18, @ANYRES32=0x0, @ANYBLOB='\x00'/21], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) perf_event_open(&(0x7f00000006c0)={0x5, 0x80, 0x0, 0x0, 0xfb, 0x3, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext={0xd3, 0xd}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x7}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r10 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r10, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000680)=r1, 0x4) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) syz_clone(0x6804500, 0x0, 0xfffffffffffffe93, 0x0, 0x0, 0x0) 1m4.592528487s ago: executing program 2 (id=1793): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x7, 0x2036f, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_config_ext={0x1}, 0x8, 0x0, 0xf4}, 0x0, 0xffffffffffffffff, r3, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000040000000000000000089591f004615f3d667aff0ec6000fa496b934a99a4f06c97aa57694fe18cd80411079814f06cbd7f9df6a3b6c381432a4b479489c025c2be028a050abf9f7c0000c749"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000110000000000000000020018110000", @ANYRES64, @ANYBLOB="0000000000000000b7080000090000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x20) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r8}, &(0x7f0000000540), &(0x7f0000000580)=r9}, 0x20) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r11 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r11, &(0x7f00000001c0), 0x9) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000002e75b45ef7201b2109171a591239a80000"], 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='scmi_xfer_response_wait\x00', r13}, 0x33) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r14, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 1m3.784971949s ago: executing program 4 (id=1795): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r0}, 0x18) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x2000035e, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000d40)={0x0, 0x7000003, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r4, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000009c0)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x9, '\x00', r5, r4, 0x3, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) close(r4) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c23003f) r7 = gettid() perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x6, 0x3, 0x7, 0x0, 0x0, 0x2b, 0x570704df3645dae1, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x8, 0x3ff}, 0x100055, 0x8000000000000000, 0xa, 0x0, 0x19, 0x8, 0x8, 0x0, 0xff, 0x0, 0x1}, r7, 0xb, 0xffffffffffffffff, 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000880)) ioctl$SIOCSIFHWADDR(r8, 0x8b36, &(0x7f0000000000)={'veth0_to_bridge\x00', @random="0000f80700"}) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r0, 0x4) 1m3.784327159s ago: executing program 1 (id=1796): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000007f1600850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) close(r4) 1m3.783255899s ago: executing program 1 (id=1797): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x4e, &(0x7f00000001c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0xc9, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6978800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x111, 0x400, 0xffffffff, 0x3061, r0, 0x0, '\x00', r1, r3, 0x1, 0x5, 0x4, 0x1, @void, @value, @void, @value}, 0x50) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x9, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r4, 0x0, 0x7e, 0x8e, &(0x7f00000005c0)="b888e94c85700f1a9eb04d1c5cded3009165db0837b67441afd438e0bf6c60036cda2cc7a959ab8ed76cd6b595bad68c029694c9af26cb45e551eb6e7c5f9d68638db5e38b4ca5e02bd750ab0e190dd2f39e1ea2ba6353d6dc9740df7478b1514fe37684d80d66f33242f5582b416966065833da5ed55c92294d6f05d9c9", &(0x7f0000000640)=""/142, 0x2437, 0x0, 0xff, 0xd9, &(0x7f0000000700)="99d1e0fabf2c5d5b2ed6a7c7d8dbd5935cc4c172b09f1fcb28f470abd11a1befc29cdf8afc7d0e7495bcd2f1abcba416a4296c0eb602af097e39d14915fc416fbb48a3e7c89afef31e4501c668a40f04103a456e70887db72a9355ca6b7c907c6f6bee557fbe36a6f1cc088f43a1711a886442119993dc5bf3c161100d3cdadbb223a68ffe13c934f48097e72732b9af8ee5d38fe571f066e6c563107b5e71cd67dcf41875b5101ffb83e2a1b520f4aa6fe2a82d6fe96cc06288280f5482469a25034dd755c32301031474cd9dcc4de29e73d806d404468e7d4b482e45a13850535f181dd91cce0045b5e3208521025e9a8585d7d03ad62c18402309a65a6d", &(0x7f0000000800)="1ff58fa25a1fd829f1cf3190fbe9075bc1a142e993989ac382ce0aecbe914f1c3589ca64752095799c12c0b4ad4e50d06dc34167709c30b19b30599845ff9c7907dc7d6b93d67fa928bbb86dcb222efeb70aecd43e1ab6b429ad49cd8f55fd3ed237b7b663e8e792e005c69ee26ab032ee727e8fee76d65258951b201433cca6ca9a0ab41c75bb6f87c4d14d8f35b6f2ce938b57e5d41ceb6abb3435742aaef612e60ae5b3ce704c5af91186dcc0cce99967a5a685429edfcb293cd1eb71f0bb15b4ed69f5e6169fb8a7f74acbb45fd78205603e10a972122e", 0x1, 0x0, 0xfffffff6}, 0x50) 59.806576122s ago: executing program 1 (id=1799): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 44.268812825s ago: executing program 32 (id=1799): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 44.268482465s ago: executing program 33 (id=1793): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x7, 0x2036f, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_config_ext={0x1}, 0x8, 0x0, 0xf4}, 0x0, 0xffffffffffffffff, r3, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000040000000000000000089591f004615f3d667aff0ec6000fa496b934a99a4f06c97aa57694fe18cd80411079814f06cbd7f9df6a3b6c381432a4b479489c025c2be028a050abf9f7c0000c749"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000110000000000000000020018110000", @ANYRES64, @ANYBLOB="0000000000000000b7080000090000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x20) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r8}, &(0x7f0000000540), &(0x7f0000000580)=r9}, 0x20) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r11 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r11, &(0x7f00000001c0), 0x9) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000002e75b45ef7201b2109171a591239a80000"], 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='scmi_xfer_response_wait\x00', r13}, 0x33) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r14, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 41.492445209s ago: executing program 34 (id=1795): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r0}, 0x18) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x2000035e, &(0x7f0000000000)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000d40)={0x0, 0x7000003, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r4, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000009c0)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x9, '\x00', r5, r4, 0x3, 0x1, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) close(r4) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c23003f) r7 = gettid() perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x6, 0x3, 0x7, 0x0, 0x0, 0x2b, 0x570704df3645dae1, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x8, 0x3ff}, 0x100055, 0x8000000000000000, 0xa, 0x0, 0x19, 0x8, 0x8, 0x0, 0xff, 0x0, 0x1}, r7, 0xb, 0xffffffffffffffff, 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000880)) ioctl$SIOCSIFHWADDR(r8, 0x8b36, &(0x7f0000000000)={'veth0_to_bridge\x00', @random="0000f80700"}) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r0, 0x4) 36.738267414s ago: executing program 0 (id=1806): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) (async) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e486dd"], 0xfdef) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYRES16=r3, @ANYRESHEX=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6}, 0x0, &(0x7f00000002c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x4}, 0x10498a, 0xc8, 0x3, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x80}, 0x103100, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}) (async) close(r8) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="000000c76d000000000000008100000081", @ANYRES32=r0, @ANYRESOCT, @ANYBLOB="4730b88e733465b2c3627066a3612c42dc9165b68d2461d7359b55189e09200f323368"], 0x48) 36.737844174s ago: executing program 0 (id=1807): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x4, 0x0, 0xff, 0x0, 0x0, 0x8, 0x46a04, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x772, 0x2, @perf_config_ext={0x8, 0x80}, 0x1001, 0x4b9d, 0x0, 0x3, 0x0, 0x5, 0x1, 0x0, 0x5, 0x0, 0x8001}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) r2 = perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x9, 0x7, 0x0, 0xff, 0x0, 0x0, 0x40200, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x6389, 0x2, 0xe, 0x8, 0x10, 0x7, 0x3, 0x0, 0x0, 0x0, 0x3}, r0, 0xe, r1, 0xe) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x50000, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f00000001c0)={'pimreg\x00'}) r4 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x8, 0xa, 0x42, 0x35, 0x0, 0x7, 0xc000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, @perf_config_ext={0x1, 0x10001}, 0x102040, 0xffffffffffff0001, 0x4, 0x5, 0x6, 0x9, 0x9, 0x0, 0x11c, 0x0, 0x6}, 0x0, 0xf, r1, 0x3) openat$cgroup_type(r0, &(0x7f00000002c0), 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'rose0\x00', 0x400}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={0x1, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680), 0x4) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0xfffffffa, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xbc4f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r11 = openat$cgroup_ro(r0, &(0x7f0000000800)='cgroup.events\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x9, 0x1d, &(0x7f0000000380)=@raw=[@btf_id={0x18, 0x6, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10}, @ldst={0x3, 0x2, 0x2, 0x9, 0x6, 0x4}, @ldst={0x3, 0x0, 0x2, 0x1, 0x8, 0xfffffffffffffff4, 0xffffffffffffffff}, @ldst={0x0, 0x0, 0x2, 0x2, 0x1, 0x6, 0xfffffffffffffff0}, @generic={0x0, 0x2, 0x6, 0x8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}], &(0x7f0000000480)='syzkaller\x00', 0x1, 0xb6, &(0x7f00000004c0)=""/182, 0x41100, 0x8, '\x00', r6, @fallback=0x3, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, r7, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, r8, r9, r10, r4, r11, r12], 0x0, 0x10, 0x10, @void, @value}, 0x94) ioctl$TUNGETVNETHDRSZ(r11, 0x800454d7, &(0x7f0000000a00)) r13 = bpf$ITER_CREATE(0x21, &(0x7f0000000a40)={r11}, 0x8) close(r2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000a80), 0x301082, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x17, 0x1, &(0x7f0000000ac0)=@raw=[@call={0x85, 0x0, 0x0, 0xc5}], &(0x7f0000000b00)='GPL\x00', 0x1, 0x78, &(0x7f0000000b40)=""/120, 0x0, 0x10, '\x00', 0x0, @cgroup_sysctl, r13, 0x8, &(0x7f0000000bc0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000c00)={0x3, 0x3, 0x0, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000c40)=[r13], &(0x7f0000000c80)=[{0x4, 0x3, 0x5, 0x7}], 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000d80)={0x1, 0x0}, 0x8) r15 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000dc0)={r14}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r11}, &(0x7f0000000e00), &(0x7f0000000e40)=r15}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000f00)=@generic={&(0x7f0000000ec0)='./file0\x00', 0x0, 0x18}, 0x18) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000f80)={0xb0, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000f40)={@map=r10, r11, 0x25, 0x2020, 0x0, @void, @void, @value=r16}, 0x20) syz_clone(0x1002000, &(0x7f0000000fc0)="63fe8fec9468189074722054e92b195c1b7da311942ad0505ff152fd2cc2d04ff2635fbb83417bc09acf77230ebd169658235a26fc8fffb518ac14d4a9271e551c32ea84e97ed521268bbf14aaa84fb0d643e3ca3b23f016a80d9ca6b0f373b04e599d2590ee4bb4905315795c613b26b55e6f260029a660600f499e246da7a1764b0f758698b636cce35d84fedcdb9a5fcf738711fc68e195b08a4f04cc6ab1849d92ed1cdc09f93d7de223421c9ad110362bfd", 0xb4, &(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)="45a3cec5d242f913f5b81e8bb62e87f60d55abfc7e26fe5456f12a4931f1897eb1b8c54c139bcb7ecdce16cde3dae31b7b2586d12f68efb463abd4cfbecf2d80bf5fc1cc024450cdd11d0b785b3e3faac243437b397ac4451a4db35699807cfb88fe289e3bc20e4911bcb8692f72df6f50c57c6b5938484a3bf67aed3cf67e441dcf192a72ac40321c61c35bc8c7dcb1512264ae1ba9cf13e6") 36.737514954s ago: executing program 0 (id=1808): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0x2000000000000351, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES64=r1, @ANYRES32=r0], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x17, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x57, &(0x7f00000003c0)=ANY=[@ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140064f3b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='module_request\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="629ff7d394a2"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x7, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYBLOB="00000000000000009500000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000900)={&(0x7f0000000480)="137e52380a574660727f1da2b4610ff0bc59e8f4e4d0e2f0dd1c194a2d4a58e3712572bf13019805fd1f00b8ac8d131b3ccd96b034e2707e93af2b5ad2cbff32ae249c9a33467d629301fb88261381042996475c727a50cc3d9c7cb576da38cb9ac7da51ef872644f2df7f3062725ea16aae47a452444faef5bab2bc5fc19a1ee3ff4b0963e05ee9b4334878504c1c15286b55bb65606c616c6d64d702e9d2f9dfb3ed", &(0x7f0000000600)=""/15, &(0x7f0000000800)="1cd384b4f3596e9ce8686711a1789de72c5686a3dbe4caaac462a7e6118784bc848466f4c5943c6b64d86d", &(0x7f0000000840)="4e204314a9149c14b46b46801b5e5a7b0838248d0974a749acf5ae266f9b680b88a76889b62c98c88b36dac5f936ca22b16e667ce766d13b1c8ca91c55f3c62447e47d7276d186e73edc67dfb246dd5eafa4246d04ffa0231ba27a5e21bb54f23ac9ec2f1889129915299740848de0f07a8368881b2d86739cca1a51226a987e90b9aa7bfd", 0x5c, r4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000a40)="f37425430000731417b808ae9f561a0decf962d18543db18cac4f1a5e6eaa68b243c7aa24b49e42872bcb00db46c31c5febc71bf16601d4253a65ac45dd10b1db8d0e09cb8c07729a086eec13c1bdd95f690c91f9a0cdc970900000000000000994f3eb859ed7f04be85ae2abe4105c5d4d4729783dc179c326e0b8bed29da2aaacbde7b0ac2f8992f1707600f211f2714825fe13c4fc4d767b7572c9d2a2a7e9bc2efef41f4405dbb30a7d513b5b5a6", 0x402, r0}, 0x38) socketpair(0xa, 0x3, 0x40, &(0x7f0000000280)) 20.887979762s ago: executing program 0 (id=1809): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002300)={&(0x7f0000000780)=ANY=[@ANYBLOB], 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b40800000000000173114100000000008510000002000000b7000000000000009500c200000000009500001200000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000380), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x9, 0x800, 0x7e, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a2, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x70000000, 0x0, 0x3f00, 0x0, 0x0, 0x1000, 0xff600000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23000000}, 0x3b) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000020850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x23) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1c, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) 18.728164106s ago: executing program 0 (id=1810): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0xa, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000020000000200000004"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='kfree\x00'}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x1, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r5, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740), &(0x7f00000007c0), 0xffffd6c0, r6, 0x0, 0x20}, 0x38) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r3) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 15.097074433s ago: executing program 0 (id=1811): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000fdffffffe27f00000200000000000000ded218ea6aef45256191b94ca116e9e4958ce4c289305f376619a30daf4d5b4fe27ba9b374a47ab9355f4c2ce83a0544c88a3cce197f8f6f25d915c93232cc523378042b5ac38cf1823d95565e34068a1af8f0ebc9ca12abaccbdefbd7fe376061101779e525528cc1249493555768ad3abddabf6ab6a6563abfdc4cf35b521475717744589a1ead3f6fbb57541c4bbbbdad433f7e3acab9f26874a41274b647e5ffb660f91a87f62cb512bc0f9cb67901b11d96da8c106ebf", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0) ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x15) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r4, @ANYBLOB="09000000006c22e533d88abd0100000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000040000000500"/28], 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0xc080300, &(0x7f0000000780)="a7508896e1d5dc0760f447ac6c3b4bea3e350d29afce689d656266f26e0f66c7906e78ff2cfef1e0a655a774c8045c0959574fb71b923727680c7bf00228b29e7a33aceb5068a3f73fada55a1bb0791920417a2ea2c52f09991652a4ff117bc6bd7ffcc97b5b84db04f9fff02f", 0x6d, &(0x7f0000000600), &(0x7f0000000680), &(0x7f0000000800)="915e6c2e570717f45fc2476b1adaee5cab4d65de963745e81958783f8ec31c5bc955f66bcfb43603a931e1473da4f860568dd964605809cb21b21a4dca99715f97dfcbafd6a71bb8b7c58b8975f3ac9d0d9e835474fa83209435dd56f6b167c021ddcc2becb6a427f958c617d5ecb375a8a88f4d17739f07a38f1b92969658b54ac0910c34cdad2df6f137a6fbfed81585402b1059f265224bbd33c41adb0c1d3d4bbf") sendmsg$unix(r6, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000340)="bad896201b25a500a17880f0ec1142c8ce9c26b253f93debfe031f19c4979bab0e98aa52c9f88cc3f4bc65d2985308c5df1252847b57e15a730ede64b9d220f4e40399a71a6e2bae7f7ed4c92607404865834cdc97518fdd0f90b1aedc02152b99b648b7eb01038a79d2a7ce19b0083966c35dc550cd255c268a91979fabb14d15fcc9d89033e761c6450af1bad60882b6cc28e4ef0cb9d17e2a9316e1f9dc99220f568c4171ca806be64c7b8f3432b652956f4e5d7aa649ac8f1681d511c8a97bb6e72a2a34a0e8f3055410ea5c1ba3d67501", 0xd3}, {&(0x7f00000004c0)="d872d4acb79416dc95c5a166375daff1144e213dfe685a19cc14b0bec7d551509175ad8df7255fe16ae71508c6d0c185b536c708a07503fb20df6f9bda390dd9685c6ff5d3e38915fefc4505b36bb5b12955a81cfe657e5467a823a09b9cd7602b2a0709f73a169ac550ca5a1d63cc959c5340145dba1ab4386fc5c3625684587a3271e4b56a811f54127e99b5ae7be31a6672790ab75a72f3ec8cddec50ea2f805d394c6389db70c2ab05f0878bb6adbd5b887a2ee23490b69508506888", 0xbe}, {&(0x7f0000001340)="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", 0x1000}], 0x3, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r9, r2, r13, r9, r12]}}, @rights={{0x20, 0x1, 0x1, [r0, r8, r11, r6]}}, @rights={{0x18, 0x1, 0x1, [r14, r4]}}, @rights={{0x18, 0x1, 0x1, [r7, r2]}}, @rights={{0x1c, 0x1, 0x1, [r7, r9, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0xd8, 0x2000e000}, 0x10000841) ioctl$SIOCSIFHWADDR(r11, 0x8b0f, &(0x7f0000000000)={'bridge_slave_1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='\xe4-\x00') close(0xffffffffffffffff) sendmsg$unix(r15, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) close(r9) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 35 (id=1811): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000fdffffffe27f00000200000000000000ded218ea6aef45256191b94ca116e9e4958ce4c289305f376619a30daf4d5b4fe27ba9b374a47ab9355f4c2ce83a0544c88a3cce197f8f6f25d915c93232cc523378042b5ac38cf1823d95565e34068a1af8f0ebc9ca12abaccbdefbd7fe376061101779e525528cc1249493555768ad3abddabf6ab6a6563abfdc4cf35b521475717744589a1ead3f6fbb57541c4bbbbdad433f7e3acab9f26874a41274b647e5ffb660f91a87f62cb512bc0f9cb67901b11d96da8c106ebf", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0) ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x15) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r4, @ANYBLOB="09000000006c22e533d88abd0100000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000040000000500"/28], 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0xc080300, &(0x7f0000000780)="a7508896e1d5dc0760f447ac6c3b4bea3e350d29afce689d656266f26e0f66c7906e78ff2cfef1e0a655a774c8045c0959574fb71b923727680c7bf00228b29e7a33aceb5068a3f73fada55a1bb0791920417a2ea2c52f09991652a4ff117bc6bd7ffcc97b5b84db04f9fff02f", 0x6d, &(0x7f0000000600), &(0x7f0000000680), &(0x7f0000000800)="915e6c2e570717f45fc2476b1adaee5cab4d65de963745e81958783f8ec31c5bc955f66bcfb43603a931e1473da4f860568dd964605809cb21b21a4dca99715f97dfcbafd6a71bb8b7c58b8975f3ac9d0d9e835474fa83209435dd56f6b167c021ddcc2becb6a427f958c617d5ecb375a8a88f4d17739f07a38f1b92969658b54ac0910c34cdad2df6f137a6fbfed81585402b1059f265224bbd33c41adb0c1d3d4bbf") sendmsg$unix(r6, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000340)="bad896201b25a500a17880f0ec1142c8ce9c26b253f93debfe031f19c4979bab0e98aa52c9f88cc3f4bc65d2985308c5df1252847b57e15a730ede64b9d220f4e40399a71a6e2bae7f7ed4c92607404865834cdc97518fdd0f90b1aedc02152b99b648b7eb01038a79d2a7ce19b0083966c35dc550cd255c268a91979fabb14d15fcc9d89033e761c6450af1bad60882b6cc28e4ef0cb9d17e2a9316e1f9dc99220f568c4171ca806be64c7b8f3432b652956f4e5d7aa649ac8f1681d511c8a97bb6e72a2a34a0e8f3055410ea5c1ba3d67501", 0xd3}, {&(0x7f00000004c0)="d872d4acb79416dc95c5a166375daff1144e213dfe685a19cc14b0bec7d551509175ad8df7255fe16ae71508c6d0c185b536c708a07503fb20df6f9bda390dd9685c6ff5d3e38915fefc4505b36bb5b12955a81cfe657e5467a823a09b9cd7602b2a0709f73a169ac550ca5a1d63cc959c5340145dba1ab4386fc5c3625684587a3271e4b56a811f54127e99b5ae7be31a6672790ab75a72f3ec8cddec50ea2f805d394c6389db70c2ab05f0878bb6adbd5b887a2ee23490b69508506888", 0xbe}, {&(0x7f0000001340)="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", 0x1000}], 0x3, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [r9, r2, r13, r9, r12]}}, @rights={{0x20, 0x1, 0x1, [r0, r8, r11, r6]}}, @rights={{0x18, 0x1, 0x1, [r14, r4]}}, @rights={{0x18, 0x1, 0x1, [r7, r2]}}, @rights={{0x1c, 0x1, 0x1, [r7, r9, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0xd8, 0x2000e000}, 0x10000841) ioctl$SIOCSIFHWADDR(r11, 0x8b0f, &(0x7f0000000000)={'bridge_slave_1\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='\xe4-\x00') close(0xffffffffffffffff) sendmsg$unix(r15, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) close(r9) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.129856][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.143017][ T289] device veth1_macvtap entered promiscuous mode [ 23.150722][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.159170][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.167169][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.176528][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.184966][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.205756][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.213777][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.222334][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.230693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.239010][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.246738][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.254761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.263243][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.271570][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.285349][ T292] device veth1_macvtap entered promiscuous mode [ 23.293419][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.302305][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.311236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.319834][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.328300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.336338][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.354231][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.362536][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.378172][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.386354][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.396024][ T289] request_module fs-gadgetfs succeeded, but still no fs? [ 23.406918][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.415198][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.448078][ T293] device veth0_vlan entered promiscuous mode [ 23.460647][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.479565][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.489821][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.497510][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.536613][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.545280][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.547284][ C0] hrtimer: interrupt took 181817 ns [ 23.561405][ T293] device veth1_macvtap entered promiscuous mode [ 23.614975][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.622808][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.631586][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.649816][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.663845][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.673366][ T329] device veth1_macvtap left promiscuous mode [ 23.927175][ T331] device veth1_macvtap entered promiscuous mode [ 23.939049][ T331] device macsec0 entered promiscuous mode [ 23.951243][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.029336][ T322] device veth1_macvtap left promiscuous mode [ 24.035237][ T322] device macsec0 entered promiscuous mode [ 24.058586][ T322] device veth1_macvtap entered promiscuous mode [ 24.444493][ T360] device veth1_macvtap left promiscuous mode [ 24.549208][ T360] device veth1_macvtap entered promiscuous mode [ 24.635479][ T365] device veth1_macvtap left promiscuous mode [ 24.688438][ T365] device macsec0 entered promiscuous mode [ 24.773169][ T368] device veth1_macvtap entered promiscuous mode [ 24.812768][ T373] syz.1.18[373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.813012][ T373] syz.1.18[373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.854261][ T375] device wg2 entered promiscuous mode [ 25.753297][ T391] device veth1_macvtap left promiscuous mode [ 25.786856][ T392] device veth1_macvtap entered promiscuous mode [ 25.924148][ T397] device veth1_macvtap left promiscuous mode [ 25.970622][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 25.970639][ T30] audit: type=1400 audit(1742995951.792:115): avc: denied { create } for pid=404 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 26.045438][ T397] device macsec0 entered promiscuous mode [ 26.080654][ T406] device veth1_macvtap entered promiscuous mode [ 26.097262][ T414] syz.2.30[414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.097338][ T414] syz.2.30[414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.129228][ T408] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.147159][ T408] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.154354][ T30] audit: type=1400 audit(1742995951.982:116): avc: denied { cpu } for pid=410 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.533588][ T30] audit: type=1400 audit(1742995952.362:117): avc: denied { read } for pid=421 comm="syz.1.33" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.758270][ T30] audit: type=1400 audit(1742995952.362:118): avc: denied { open } for pid=421 comm="syz.1.33" path="/dev/ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.887317][ T30] audit: type=1400 audit(1742995952.372:119): avc: denied { ioctl } for pid=421 comm="syz.1.33" path="/dev/ppp" dev="devtmpfs" ino=150 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.059187][ T30] audit: type=1400 audit(1742995952.462:120): avc: denied { create } for pid=423 comm="syz.3.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 27.254924][ T30] audit: type=1400 audit(1742995953.082:121): avc: denied { create } for pid=441 comm="syz.2.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 27.290368][ T30] audit: type=1400 audit(1742995953.122:122): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 27.769001][ T450] device veth1_macvtap left promiscuous mode [ 27.776669][ T450] device macsec0 entered promiscuous mode [ 27.915415][ T452] device veth1_macvtap left promiscuous mode [ 27.955477][ T455] device veth1_macvtap entered promiscuous mode [ 27.964014][ T456] device veth1_macvtap entered promiscuous mode [ 28.040920][ T355] syz.4.11 (355) used greatest stack depth: 21680 bytes left [ 28.057040][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.483002][ T30] audit: type=1400 audit(1742995954.312:123): avc: denied { create } for pid=472 comm="syz.2.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 28.793619][ T30] audit: type=1400 audit(1742995954.342:124): avc: denied { create } for pid=470 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 29.096711][ T491] device veth1_macvtap left promiscuous mode [ 29.152832][ T491] device veth1_macvtap entered promiscuous mode [ 29.486607][ T510] FAULT_INJECTION: forcing a failure. [ 29.486607][ T510] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 29.547727][ T510] CPU: 0 PID: 510 Comm: syz.4.62 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 29.557207][ T510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 29.567270][ T510] Call Trace: [ 29.570380][ T510] [ 29.573159][ T510] dump_stack_lvl+0x151/0x1c0 [ 29.577672][ T510] ? io_uring_drop_tctx_refs+0x190/0x190 [ 29.583147][ T510] dump_stack+0x15/0x20 [ 29.587128][ T510] should_fail+0x3c6/0x510 [ 29.591384][ T510] should_fail_usercopy+0x1a/0x20 [ 29.596361][ T510] _copy_from_user+0x20/0xd0 [ 29.600777][ T510] __sys_bpf+0x1e9/0x760 [ 29.604859][ T510] ? fput_many+0x160/0x1b0 [ 29.609110][ T510] ? bpf_link_show_fdinfo+0x300/0x300 [ 29.614320][ T510] ? debug_smp_processor_id+0x17/0x20 [ 29.619531][ T510] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 29.625427][ T510] __x64_sys_bpf+0x7c/0x90 [ 29.629681][ T510] x64_sys_call+0x87f/0x9a0 [ 29.634017][ T510] do_syscall_64+0x3b/0xb0 [ 29.638275][ T510] ? clear_bhb_loop+0x35/0x90 [ 29.642788][ T510] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 29.648526][ T510] RIP: 0033:0x7f95e29cc169 [ 29.652766][ T510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 29.672211][ T510] RSP: 002b:00007f95e1036038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 29.680453][ T510] RAX: ffffffffffffffda RBX: 00007f95e2be4fa0 RCX: 00007f95e29cc169 [ 29.688271][ T510] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005 [ 29.696086][ T510] RBP: 00007f95e1036090 R08: 0000000000000000 R09: 0000000000000000 [ 29.703892][ T510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 29.711701][ T510] R13: 0000000000000000 R14: 00007f95e2be4fa0 R15: 00007ffccc7ed188 [ 29.719520][ T510] [ 30.010552][ T528] device veth1_macvtap left promiscuous mode [ 30.063664][ T534] device veth1_macvtap entered promiscuous mode [ 30.417165][ T557] FAULT_INJECTION: forcing a failure. [ 30.417165][ T557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 30.450451][ T557] CPU: 1 PID: 557 Comm: syz.4.79 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 30.459941][ T557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 30.469837][ T557] Call Trace: [ 30.472957][ T557] [ 30.475736][ T557] dump_stack_lvl+0x151/0x1c0 [ 30.480247][ T557] ? io_uring_drop_tctx_refs+0x190/0x190 [ 30.485717][ T557] ? kstrtouint_from_user+0x20a/0x2a0 [ 30.490933][ T557] ? kstrtol_from_user+0x310/0x310 [ 30.495970][ T557] ? avc_has_perm_noaudit+0x348/0x430 [ 30.501346][ T557] dump_stack+0x15/0x20 [ 30.505330][ T557] should_fail+0x3c6/0x510 [ 30.509590][ T557] should_fail_usercopy+0x1a/0x20 [ 30.514534][ T557] strncpy_from_user+0x24/0x2d0 [ 30.519223][ T557] bpf_prog_load+0x185/0x1b50 [ 30.523734][ T557] ? map_freeze+0x370/0x370 [ 30.528089][ T557] ? selinux_bpf+0xcb/0x100 [ 30.532411][ T557] ? security_bpf+0x82/0xb0 [ 30.536751][ T557] __sys_bpf+0x4bc/0x760 [ 30.540828][ T557] ? fput_many+0x160/0x1b0 [ 30.545080][ T557] ? bpf_link_show_fdinfo+0x300/0x300 [ 30.550290][ T557] ? debug_smp_processor_id+0x17/0x20 [ 30.555499][ T557] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 30.561397][ T557] __x64_sys_bpf+0x7c/0x90 [ 30.565652][ T557] x64_sys_call+0x87f/0x9a0 [ 30.569995][ T557] do_syscall_64+0x3b/0xb0 [ 30.574246][ T557] ? clear_bhb_loop+0x35/0x90 [ 30.578761][ T557] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 30.584493][ T557] RIP: 0033:0x7f95e29cc169 [ 30.588740][ T557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.608179][ T557] RSP: 002b:00007f95e1036038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 30.616424][ T557] RAX: ffffffffffffffda RBX: 00007f95e2be4fa0 RCX: 00007f95e29cc169 [ 30.624243][ T557] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005 [ 30.632051][ T557] RBP: 00007f95e1036090 R08: 0000000000000000 R09: 0000000000000000 [ 30.639858][ T557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 30.647675][ T557] R13: 0000000000000000 R14: 00007f95e2be4fa0 R15: 00007ffccc7ed188 [ 30.655488][ T557] [ 30.683710][ T561] device bridge0 entered promiscuous mode [ 31.045627][ T600] bond_slave_1: mtu less than device minimum [ 31.423288][ T617] FAULT_INJECTION: forcing a failure. [ 31.423288][ T617] name failslab, interval 1, probability 0, space 0, times 1 [ 31.450122][ T617] CPU: 0 PID: 617 Comm: syz.3.97 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 31.459590][ T617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 31.469485][ T617] Call Trace: [ 31.472610][ T617] [ 31.475388][ T617] dump_stack_lvl+0x151/0x1c0 [ 31.479900][ T617] ? io_uring_drop_tctx_refs+0x190/0x190 [ 31.485372][ T617] dump_stack+0x15/0x20 [ 31.489379][ T617] should_fail+0x3c6/0x510 [ 31.493619][ T617] __should_failslab+0xa4/0xe0 [ 31.498216][ T617] should_failslab+0x9/0x20 [ 31.502568][ T617] slab_pre_alloc_hook+0x37/0xd0 [ 31.507333][ T617] kmem_cache_alloc_trace+0x48/0x270 [ 31.512454][ T617] ? __get_vm_area_node+0x117/0x360 [ 31.517491][ T617] ? __kasan_slab_free+0x11/0x20 [ 31.522261][ T617] __get_vm_area_node+0x117/0x360 [ 31.527124][ T617] __vmalloc_node_range+0xe2/0x8d0 [ 31.532077][ T617] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 31.537444][ T617] ? selinux_capset+0xf0/0xf0 [ 31.541964][ T617] ? kstrtouint_from_user+0x20a/0x2a0 [ 31.547170][ T617] ? kstrtol_from_user+0x310/0x310 [ 31.552119][ T617] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 31.557495][ T617] __vmalloc+0x7a/0x90 [ 31.561400][ T617] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 31.566803][ T617] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 31.571991][ T617] ? bpf_prog_alloc+0x15/0x1e0 [ 31.576592][ T617] bpf_prog_alloc+0x1f/0x1e0 [ 31.581020][ T617] bpf_prog_load+0x800/0x1b50 [ 31.585621][ T617] ? map_freeze+0x370/0x370 [ 31.590045][ T617] ? selinux_bpf+0xcb/0x100 [ 31.594387][ T617] ? security_bpf+0x82/0xb0 [ 31.598737][ T617] __sys_bpf+0x4bc/0x760 [ 31.602887][ T617] ? fput_many+0x160/0x1b0 [ 31.607142][ T617] ? bpf_link_show_fdinfo+0x300/0x300 [ 31.612437][ T617] ? debug_smp_processor_id+0x17/0x20 [ 31.617641][ T617] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 31.623542][ T617] __x64_sys_bpf+0x7c/0x90 [ 31.627801][ T617] x64_sys_call+0x87f/0x9a0 [ 31.632135][ T617] do_syscall_64+0x3b/0xb0 [ 31.636387][ T617] ? clear_bhb_loop+0x35/0x90 [ 31.640902][ T617] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 31.646630][ T617] RIP: 0033:0x7f7c7a5e4169 [ 31.650886][ T617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.670335][ T617] RSP: 002b:00007f7c78c4e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 31.678834][ T617] RAX: ffffffffffffffda RBX: 00007f7c7a7fcfa0 RCX: 00007f7c7a5e4169 [ 31.686645][ T617] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005 [ 31.694454][ T617] RBP: 00007f7c78c4e090 R08: 0000000000000000 R09: 0000000000000000 [ 31.702266][ T617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 31.710210][ T617] R13: 0000000000000000 R14: 00007f7c7a7fcfa0 R15: 00007ffee4d4ea28 [ 31.718026][ T617] [ 31.727368][ T617] syz.3.97: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 31.743653][ T617] CPU: 1 PID: 617 Comm: syz.3.97 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 31.753114][ T617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 31.763016][ T617] Call Trace: [ 31.766135][ T617] [ 31.768911][ T617] dump_stack_lvl+0x151/0x1c0 [ 31.773420][ T617] ? io_uring_drop_tctx_refs+0x190/0x190 [ 31.778884][ T617] ? pr_cont_kernfs_name+0xf0/0x100 [ 31.783925][ T617] dump_stack+0x15/0x20 [ 31.787916][ T617] warn_alloc+0x21a/0x390 [ 31.792091][ T617] ? zone_watermark_ok_safe+0x270/0x270 [ 31.797459][ T617] ? kmem_cache_alloc_trace+0x11a/0x270 [ 31.802838][ T617] ? __get_vm_area_node+0x117/0x360 [ 31.807876][ T617] ? __get_vm_area_node+0x347/0x360 [ 31.812910][ T617] __vmalloc_node_range+0x2c1/0x8d0 [ 31.817939][ T617] ? selinux_capset+0xf0/0xf0 [ 31.822454][ T617] ? kstrtouint_from_user+0x20a/0x2a0 [ 31.827666][ T617] ? kstrtol_from_user+0x310/0x310 [ 31.832618][ T617] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 31.837991][ T617] __vmalloc+0x7a/0x90 [ 31.841906][ T617] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 31.847316][ T617] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 31.852487][ T617] ? bpf_prog_alloc+0x15/0x1e0 [ 31.857087][ T617] bpf_prog_alloc+0x1f/0x1e0 [ 31.861520][ T617] bpf_prog_load+0x800/0x1b50 [ 31.866029][ T617] ? map_freeze+0x370/0x370 [ 31.870552][ T617] ? selinux_bpf+0xcb/0x100 [ 31.874880][ T617] ? security_bpf+0x82/0xb0 [ 31.879221][ T617] __sys_bpf+0x4bc/0x760 [ 31.883300][ T617] ? fput_many+0x160/0x1b0 [ 31.887563][ T617] ? bpf_link_show_fdinfo+0x300/0x300 [ 31.892765][ T617] ? debug_smp_processor_id+0x17/0x20 [ 31.897965][ T617] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 31.903875][ T617] __x64_sys_bpf+0x7c/0x90 [ 31.908207][ T617] x64_sys_call+0x87f/0x9a0 [ 31.912546][ T617] do_syscall_64+0x3b/0xb0 [ 31.916805][ T617] ? clear_bhb_loop+0x35/0x90 [ 31.921315][ T617] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 31.927059][ T617] RIP: 0033:0x7f7c7a5e4169 [ 31.931305][ T617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 31.950737][ T617] RSP: 002b:00007f7c78c4e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 31.958988][ T617] RAX: ffffffffffffffda RBX: 00007f7c7a7fcfa0 RCX: 00007f7c7a5e4169 [ 31.966968][ T617] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005 [ 31.974783][ T617] RBP: 00007f7c78c4e090 R08: 0000000000000000 R09: 0000000000000000 [ 31.982591][ T617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 31.990399][ T617] R13: 0000000000000000 R14: 00007f7c7a7fcfa0 R15: 00007ffee4d4ea28 [ 31.998218][ T617] [ 32.007611][ T617] Mem-Info: [ 32.010718][ T617] active_anon:75 inactive_anon:7772 isolated_anon:0 [ 32.010718][ T617] active_file:3400 inactive_file:13641 isolated_file:0 [ 32.010718][ T617] unevictable:0 dirty:911 writeback:0 [ 32.010718][ T617] slab_reclaimable:7601 slab_unreclaimable:72818 [ 32.010718][ T617] mapped:28502 shmem:200 pagetables:577 bounce:0 [ 32.010718][ T617] kernel_misc_reclaimable:0 [ 32.010718][ T617] free:1552817 free_pcp:20836 free_cma:0 [ 32.070897][ T617] Node 0 active_anon:300kB inactive_anon:30688kB active_file:13600kB inactive_file:54564kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:113908kB dirty:3644kB writeback:0kB shmem:800kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4040kB pagetables:2008kB all_unreclaimable? no [ 32.121515][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 32.121530][ T30] audit: type=1400 audit(1742995957.952:129): avc: denied { create } for pid=621 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 32.189212][ T617] DMA32 free:2974676kB min:62568kB low:78208kB high:93848kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2978944kB mlocked:0kB bounce:0kB free_pcp:4268kB local_pcp:0kB free_cma:0kB [ 32.327286][ T30] audit: type=1400 audit(1742995958.152:130): avc: denied { create } for pid=644 comm="syz.2.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 32.377448][ T617] lowmem_reserve[]: 0 3941 3941 [ 32.397376][ T617] Normal free:3236288kB min:84884kB low:106104kB high:127324kB reserved_highatomic:0KB active_anon:300kB inactive_anon:20788kB active_file:13600kB inactive_file:54564kB unevictable:0kB writepending:3644kB present:5242880kB managed:4035584kB mlocked:0kB bounce:0kB free_pcp:92424kB local_pcp:45344kB free_cma:0kB [ 32.501981][ T617] lowmem_reserve[]: 0 0 0 [ 32.506204][ T617] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 723*4096kB (M) = 2974676kB [ 32.625290][ T617] Normal: 46*4kB (UE) 57*8kB (UM) 129*16kB (UM) 132*32kB (UME) 124*64kB (UME) 14*128kB (UME) 6*256kB (UME) 1*512kB (M) 2*1024kB (UE) 0*2048kB 785*4096kB (M) = 3236112kB [ 32.687344][ T617] 20766 total pagecache pages [ 32.691874][ T617] 0 pages in swap cache [ 32.714872][ T30] audit: type=1400 audit(1742995958.542:131): avc: denied { create } for pid=670 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 32.734405][ T617] Swap cache stats: add 0, delete 0, find 0/0 [ 32.858504][ T617] Free swap = 124996kB [ 32.862503][ T617] Total swap = 124996kB [ 32.866496][ T617] 2097051 pages RAM [ 32.997284][ T617] 0 pages HighMem/MovableOnly [ 33.001922][ T617] 343419 pages reserved [ 33.005891][ T617] 0 pages cma reserved [ 33.490785][ T698] device veth1_macvtap left promiscuous mode [ 33.563802][ T707] device veth1_macvtap entered promiscuous mode [ 33.674133][ T710] device pim6reg1 entered promiscuous mode [ 33.682630][ T30] audit: type=1400 audit(1742995959.512:132): avc: denied { create } for pid=714 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 34.109129][ T30] audit: type=1400 audit(1742995959.942:133): avc: denied { create } for pid=716 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 34.357985][ T757] device veth1_macvtap left promiscuous mode [ 34.396187][ T758] device veth1_macvtap entered promiscuous mode [ 34.562623][ T30] audit: type=1400 audit(1742995960.392:134): avc: denied { create } for pid=763 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 35.042100][ T777] device syzkaller0 entered promiscuous mode [ 35.086065][ T782] device sit0 entered promiscuous mode [ 35.413356][ T30] audit: type=1400 audit(1742995961.242:135): avc: denied { create } for pid=794 comm="syz.3.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.517771][ T30] audit: type=1400 audit(1742995961.302:136): avc: denied { ioctl } for pid=798 comm="syz.2.154" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 35.717657][ T812] device pim6reg1 entered promiscuous mode [ 35.860500][ T30] audit: type=1400 audit(1742995961.692:137): avc: denied { write } for pid=813 comm="syz.0.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.987970][ T829] device syzkaller0 entered promiscuous mode [ 36.992013][ T872] device sit0 entered promiscuous mode [ 37.321192][ T30] audit: type=1400 audit(1742995963.152:138): avc: denied { setopt } for pid=894 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 37.512882][ T907] device pim6reg1 entered promiscuous mode [ 37.678199][ T30] audit: type=1400 audit(1742995963.502:139): avc: denied { read } for pid=910 comm="syz.4.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 38.172842][ T929] device sit0 entered promiscuous mode [ 39.318710][ T974] device veth1_macvtap left promiscuous mode [ 40.115357][ T1014] device veth1_macvtap left promiscuous mode [ 40.273491][ T1020] device syzkaller0 entered promiscuous mode [ 41.180781][ T1081] device veth1_macvtap left promiscuous mode [ 41.267910][ T1084] device pim6reg1 entered promiscuous mode [ 42.167083][ T1114] device veth1_macvtap left promiscuous mode [ 42.196931][ T959] syz.0.203 (959) used greatest stack depth: 21528 bytes left [ 42.335763][ T1131] device pim6reg1 entered promiscuous mode [ 42.448841][ T1134] FAULT_INJECTION: forcing a failure. [ 42.448841][ T1134] name failslab, interval 1, probability 0, space 0, times 0 [ 42.486544][ T1134] CPU: 1 PID: 1134 Comm: syz.0.269 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 42.496190][ T1134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 42.506178][ T1134] Call Trace: [ 42.509302][ T1134] [ 42.512079][ T1134] dump_stack_lvl+0x151/0x1c0 [ 42.516589][ T1134] ? io_uring_drop_tctx_refs+0x190/0x190 [ 42.522380][ T1134] ? kasan_quarantine_put+0x34/0x1a0 [ 42.527502][ T1134] ? kmem_cache_free+0x115/0x330 [ 42.532707][ T1134] ? ____kasan_slab_free+0x131/0x160 [ 42.537953][ T1134] dump_stack+0x15/0x20 [ 42.541944][ T1134] should_fail+0x3c6/0x510 [ 42.546209][ T1134] __should_failslab+0xa4/0xe0 [ 42.550791][ T1134] should_failslab+0x9/0x20 [ 42.555136][ T1134] slab_pre_alloc_hook+0x37/0xd0 [ 42.559912][ T1134] kmem_cache_alloc_trace+0x48/0x270 [ 42.565027][ T1134] ? kobject_uevent_env+0x269/0x700 [ 42.570063][ T1134] kobject_uevent_env+0x269/0x700 [ 42.574921][ T1134] kobject_uevent+0x1f/0x30 [ 42.579257][ T1134] __kobject_del+0xee/0x300 [ 42.583611][ T1134] kobject_put+0x1cc/0x260 [ 42.588073][ T1134] netdev_queue_update_kobjects+0x390/0x400 [ 42.593820][ T1134] ? skb_queue_purge+0x19b/0x1b0 [ 42.598921][ T1134] netif_set_real_num_tx_queues+0x16b/0x7c0 [ 42.604649][ T1134] __tun_detach+0xb78/0x1510 [ 42.609081][ T1134] __tun_chr_ioctl+0xb7c/0x2290 [ 42.613938][ T1134] ? tun_flow_create+0x320/0x320 [ 42.618622][ T1134] ? __fget_files+0x31e/0x380 [ 42.623139][ T1134] tun_chr_ioctl+0x2a/0x40 [ 42.627384][ T1134] ? tun_chr_poll+0x6d0/0x6d0 [ 42.631984][ T1134] __se_sys_ioctl+0x114/0x190 [ 42.636509][ T1134] __x64_sys_ioctl+0x7b/0x90 [ 42.640924][ T1134] x64_sys_call+0x98/0x9a0 [ 42.645178][ T1134] do_syscall_64+0x3b/0xb0 [ 42.649429][ T1134] ? clear_bhb_loop+0x35/0x90 [ 42.653943][ T1134] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 42.659671][ T1134] RIP: 0033:0x7fc1394ba169 [ 42.663930][ T1134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.683366][ T1134] RSP: 002b:00007fc137b24038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 42.691621][ T1134] RAX: ffffffffffffffda RBX: 00007fc1396d2fa0 RCX: 00007fc1394ba169 [ 42.699422][ T1134] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000005 [ 42.707239][ T1134] RBP: 00007fc137b24090 R08: 0000000000000000 R09: 0000000000000000 [ 42.715255][ T1134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.723404][ T1134] R13: 0000000000000000 R14: 00007fc1396d2fa0 R15: 00007ffea5e698e8 [ 42.731403][ T1134] [ 43.020769][ T1159] ref_ctr_offset mismatch. inode: 0x119 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 43.069112][ T1155] device syzkaller0 entered promiscuous mode [ 43.515291][ T1181] device wg2 entered promiscuous mode [ 44.208310][ T30] audit: type=1400 audit(1742995970.042:140): avc: denied { create } for pid=1229 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 44.396284][ T1245] device syzkaller0 entered promiscuous mode [ 44.418256][ T1240] device veth1_macvtap left promiscuous mode [ 45.699902][ T1302] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.710036][ T1302] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.843847][ T1302] device bridge_slave_1 left promiscuous mode [ 45.879940][ T1302] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.897553][ T1302] device bridge_slave_0 left promiscuous mode [ 45.937944][ T1302] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.319605][ T1327] ref_ctr_offset mismatch. inode: 0x178 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 47.261021][ T1350] device pim6reg1 entered promiscuous mode [ 47.371981][ T30] audit: type=1400 audit(1742995973.202:141): avc: denied { create } for pid=1374 comm="syz.2.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 47.594472][ T1390] FAULT_INJECTION: forcing a failure. [ 47.594472][ T1390] name failslab, interval 1, probability 0, space 0, times 0 [ 47.627481][ T1390] CPU: 1 PID: 1390 Comm: syz.1.342 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 47.637136][ T1390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 47.647271][ T1390] Call Trace: [ 47.650398][ T1390] [ 47.653161][ T1390] dump_stack_lvl+0x151/0x1c0 [ 47.657678][ T1390] ? io_uring_drop_tctx_refs+0x190/0x190 [ 47.663144][ T1390] dump_stack+0x15/0x20 [ 47.667131][ T1390] should_fail+0x3c6/0x510 [ 47.671420][ T1390] __should_failslab+0xa4/0xe0 [ 47.676174][ T1390] should_failslab+0x9/0x20 [ 47.680502][ T1390] slab_pre_alloc_hook+0x37/0xd0 [ 47.685283][ T1390] ? alloc_uevent_skb+0x80/0x230 [ 47.690047][ T1390] __kmalloc_track_caller+0x6c/0x2c0 [ 47.695171][ T1390] ? alloc_uevent_skb+0x80/0x230 [ 47.699945][ T1390] ? alloc_uevent_skb+0x80/0x230 [ 47.705011][ T1390] __alloc_skb+0x10c/0x550 [ 47.709291][ T1390] alloc_uevent_skb+0x80/0x230 [ 47.713876][ T1390] kobject_uevent_net_broadcast+0x188/0x590 [ 47.719619][ T1390] kobject_uevent_env+0x525/0x700 [ 47.724469][ T1390] kobject_uevent+0x1f/0x30 [ 47.728812][ T1390] __kobject_del+0xee/0x300 [ 47.733141][ T1390] kobject_put+0x1cc/0x260 [ 47.737398][ T1390] netdev_queue_update_kobjects+0x390/0x400 [ 47.743299][ T1390] ? skb_queue_purge+0x19b/0x1b0 [ 47.748070][ T1390] netif_set_real_num_tx_queues+0x16b/0x7c0 [ 47.753805][ T1390] __tun_detach+0xb78/0x1510 [ 47.758230][ T1390] __tun_chr_ioctl+0xb7c/0x2290 [ 47.763185][ T1390] ? tun_flow_create+0x320/0x320 [ 47.767957][ T1390] ? __fget_files+0x31e/0x380 [ 47.772480][ T1390] tun_chr_ioctl+0x2a/0x40 [ 47.776727][ T1390] ? tun_chr_poll+0x6d0/0x6d0 [ 47.781234][ T1390] __se_sys_ioctl+0x114/0x190 [ 47.785858][ T1390] __x64_sys_ioctl+0x7b/0x90 [ 47.790271][ T1390] x64_sys_call+0x98/0x9a0 [ 47.794513][ T1390] do_syscall_64+0x3b/0xb0 [ 47.798774][ T1390] ? clear_bhb_loop+0x35/0x90 [ 47.803279][ T1390] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.809009][ T1390] RIP: 0033:0x7fafeefa7169 [ 47.813269][ T1390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.832810][ T1390] RSP: 002b:00007fafed611038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 47.841047][ T1390] RAX: ffffffffffffffda RBX: 00007fafef1bffa0 RCX: 00007fafeefa7169 [ 47.848869][ T1390] RDX: 0000200000000100 RSI: 00000000400454d9 RDI: 0000000000000005 [ 47.856854][ T1390] RBP: 00007fafed611090 R08: 0000000000000000 R09: 0000000000000000 [ 47.864661][ T1390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.872833][ T1390] R13: 0000000000000000 R14: 00007fafef1bffa0 R15: 00007fff490919b8 [ 47.880641][ T1390] [ 48.021613][ T1404] syz.0.345[1404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.021693][ T1404] syz.0.345[1404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.146196][ T1409] device veth1_macvtap entered promiscuous mode [ 48.179985][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 48.247670][ T1413] device syzkaller0 entered promiscuous mode [ 48.360856][ T1412] device sit0 entered promiscuous mode [ 48.685009][ T30] audit: type=1400 audit(1742995974.512:142): avc: denied { create } for pid=1454 comm="syz.3.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 49.239943][ T1468] device pim6reg1 entered promiscuous mode [ 49.713872][ T1487] device veth0_vlan left promiscuous mode [ 49.733850][ T1487] device veth0_vlan entered promiscuous mode [ 49.802748][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 49.825750][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 49.887848][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 49.981392][ T1504] device sit0 left promiscuous mode [ 50.168198][ T1516] device sit0 entered promiscuous mode [ 50.395787][ T30] audit: type=1400 audit(1742995976.222:143): avc: denied { tracepoint } for pid=1525 comm="syz.3.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 50.661806][ T1537] device syzkaller0 entered promiscuous mode [ 51.155364][ T1563] device sit0 left promiscuous mode [ 51.269018][ T1563] device sit0 entered promiscuous mode [ 53.836160][ T1653] device veth0_vlan left promiscuous mode [ 53.882781][ T1653] device veth0_vlan entered promiscuous mode [ 53.977076][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 53.990831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 54.015449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.039808][ T1655] device sit0 entered promiscuous mode [ 54.210027][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 54.257669][ T1666] device syzkaller0 entered promiscuous mode [ 54.704192][ T1676] device pim6reg1 entered promiscuous mode [ 55.928909][ T30] audit: type=1400 audit(1742995981.762:144): avc: denied { create } for pid=1700 comm="syz.0.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 55.949886][ T1706] device sit0 left promiscuous mode [ 55.999179][ T1706] device sit0 entered promiscuous mode [ 56.220037][ T1716] device veth1_macvtap entered promiscuous mode [ 56.235588][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 56.244134][ T30] audit: type=1400 audit(1742995982.082:145): avc: denied { ioctl } for pid=1710 comm="syz.2.437" path="socket:[21251]" dev="sockfs" ino=21251 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 56.516984][ T1715] device veth1_macvtap left promiscuous mode [ 56.648992][ T1720] device veth1_macvtap entered promiscuous mode [ 57.171694][ T1740] device veth1_macvtap left promiscuous mode [ 57.255372][ T1746] device veth1_macvtap entered promiscuous mode [ 57.367439][ T30] audit: type=1400 audit(1742995983.202:146): avc: denied { write } for pid=1747 comm="syz.3.452" name="cgroup.subtree_control" dev="cgroup2" ino=291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 57.457174][ T30] audit: type=1400 audit(1742995983.202:147): avc: denied { open } for pid=1747 comm="syz.3.452" path="" dev="cgroup2" ino=291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 57.585749][ T30] audit: type=1400 audit(1742995983.412:148): avc: denied { read } for pid=1747 comm="syz.3.452" name="cgroup.subtree_control" dev="cgroup2" ino=291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 57.696290][ T1762] device pim6reg1 entered promiscuous mode [ 57.884689][ T30] audit: type=1400 audit(1742995983.712:149): avc: denied { create } for pid=1768 comm="syz.1.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 58.810921][ T1798] syz.0.467[1798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.811012][ T1798] syz.0.467[1798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.830487][ T1796] device macsec0 left promiscuous mode [ 59.057495][ T1803] device veth1_macvtap left promiscuous mode [ 59.116281][ T1804] device veth1_macvtap entered promiscuous mode [ 59.147839][ T1804] device macsec0 entered promiscuous mode [ 59.168003][ T1805] device veth1_macvtap entered promiscuous mode [ 59.218632][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 65.632599][ T1843] ÿÿÿÿÿÿ: renamed from vlan1 [ 65.717040][ T1849] device veth1_macvtap left promiscuous mode [ 65.787055][ T1853] device syzkaller0 entered promiscuous mode [ 65.823812][ T1858] device veth1_macvtap entered promiscuous mode [ 65.851303][ T1862] syz.4.485[1862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.856230][ T1862] syz.4.485[1862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.364805][ T1921] device veth1_macvtap left promiscuous mode [ 67.469313][ T1921] device veth1_macvtap entered promiscuous mode [ 67.797147][ T30] audit: type=1400 audit(1742995993.622:150): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 67.820848][ T30] audit: type=1400 audit(1742995993.622:151): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 68.023777][ T1968] device wg2 entered promiscuous mode [ 68.440115][ T30] audit: type=1400 audit(1742995994.272:152): avc: denied { create } for pid=1983 comm="syz.1.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 68.828086][ T30] audit: type=1400 audit(1742995994.662:153): avc: denied { create } for pid=2004 comm="syz.0.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 68.877530][ T2003] device sit0 left promiscuous mode [ 68.881413][ T30] audit: type=1400 audit(1742995994.682:154): avc: denied { create } for pid=2004 comm="syz.0.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 68.995720][ T2017] device pim6reg1 entered promiscuous mode [ 69.119546][ T2028] device syzkaller0 entered promiscuous mode [ 69.456090][ T2052] syz.4.549[2052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.456166][ T2052] syz.4.549[2052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.468052][ T2056] syz.4.549[2056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.482151][ T2056] syz.4.549[2056] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.741603][ T2074] device syzkaller0 entered promiscuous mode [ 69.974989][ T2078] device veth0_vlan left promiscuous mode [ 69.993112][ T2078] device veth0_vlan entered promiscuous mode [ 70.168536][ T30] audit: type=1400 audit(1742995996.002:155): avc: denied { create } for pid=2092 comm="syz.1.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 70.440655][ T2113] device veth1_macvtap left promiscuous mode [ 70.509378][ T2117] device veth1_macvtap entered promiscuous mode [ 71.123416][ T2155] device veth1_macvtap left promiscuous mode [ 71.209243][ T2155] device veth1_macvtap entered promiscuous mode [ 71.287608][ T2162] syz.4.585[2162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.287688][ T2162] syz.4.585[2162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.183662][ T2198] device sit0 entered promiscuous mode [ 72.285217][ T2105] syz.1.563 (2105) used greatest stack depth: 21496 bytes left [ 72.366436][ T2205] device veth1_macvtap entered promiscuous mode [ 72.406568][ T478] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 74.395056][ T2284] device syzkaller0 entered promiscuous mode [ 75.203377][ T2342] device pim6reg1 entered promiscuous mode [ 75.237294][ T2343] bond_slave_1: mtu greater than device maximum [ 75.354954][ T2351] device syzkaller0 entered promiscuous mode [ 75.406362][ T2353] device veth1_macvtap entered promiscuous mode [ 75.455629][ T478] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 75.527388][ T2359] device pim6reg1 entered promiscuous mode [ 75.946247][ T2378] device sit0 left promiscuous mode [ 76.013169][ T2378] device sit0 entered promiscuous mode [ 76.179706][ T2384] device sit0 left promiscuous mode [ 76.244487][ T2389] device sit0 entered promiscuous mode [ 76.371837][ T2390] device syzkaller0 entered promiscuous mode [ 76.438797][ T2397] device syzkaller0 entered promiscuous mode [ 77.037514][ T2432] device syzkaller0 entered promiscuous mode [ 77.076110][ T2453] syz.1.680[2453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.076190][ T2453] syz.1.680[2453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.130839][ T2449] device veth1_macvtap left promiscuous mode [ 77.214195][ T2455] device veth1_macvtap entered promiscuous mode [ 77.231551][ T2458] device veth1_macvtap left promiscuous mode [ 77.304743][ T2462] device veth1_macvtap entered promiscuous mode [ 77.328973][ T2465] device sit0 left promiscuous mode [ 77.374659][ T2465] device sit0 entered promiscuous mode [ 77.467620][ T2467] device wg2 entered promiscuous mode [ 77.488480][ T2472] device veth0_vlan left promiscuous mode [ 77.507688][ T2472] device veth0_vlan entered promiscuous mode [ 77.541850][ T2467] device pim6reg1 entered promiscuous mode [ 77.790878][ T2499] device syzkaller0 entered promiscuous mode [ 78.987199][ C0] sched: RT throttling activated [ 79.818598][ T2498] device veth1_macvtap left promiscuous mode [ 79.856952][ T2503] device veth1_macvtap entered promiscuous mode [ 79.921427][ T2514] device syzkaller0 entered promiscuous mode [ 79.975758][ T2514] device sit0 left promiscuous mode [ 80.016129][ T2521] syz.1.700[2521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.016209][ T2521] syz.1.700[2521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.043193][ T2527] device sit0 entered promiscuous mode [ 80.061467][ T2521] syz.1.700[2521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.061519][ T2521] syz.1.700[2521] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.187354][ T2523] device wg2 left promiscuous mode [ 80.233768][ T2529] device wg2 entered promiscuous mode [ 80.418685][ T30] audit: type=1400 audit(1742996006.242:156): avc: denied { create } for pid=2534 comm="syz.2.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 80.688899][ T2552] device syzkaller0 entered promiscuous mode [ 80.990858][ T2559] device veth0_vlan left promiscuous mode [ 81.012274][ T2559] device veth0_vlan entered promiscuous mode [ 81.060143][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 81.072862][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 81.088410][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 81.170833][ T2564] syz.4.714[2564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.170912][ T2564] syz.4.714[2564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.775478][ T2594] device syzkaller0 entered promiscuous mode [ 81.957038][ T2602] syz.1.726[2602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.957118][ T2602] syz.1.726[2602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.002173][ T2604] device veth0_vlan left promiscuous mode [ 82.086677][ T2604] device veth0_vlan entered promiscuous mode [ 82.101109][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.127947][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.158056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 82.791003][ T2636] device veth1_macvtap left promiscuous mode [ 82.894920][ T2640] device veth1_macvtap entered promiscuous mode [ 83.216387][ T2663] syz.1.748[2663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.216465][ T2663] syz.1.748[2663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.450572][ T2660] cgroup: fork rejected by pids controller in [ 83.466123][ T30] audit: type=1400 audit(1742996009.292:157): avc: denied { append } for pid=2671 comm="syz.3.750" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 83.494825][ T2660] /syz0 [ 84.311061][ T2784] device pim6reg1 entered promiscuous mode [ 84.490458][ T2792] device veth0_vlan left promiscuous mode [ 84.563624][ T2792] device veth0_vlan entered promiscuous mode [ 84.592502][ T30] audit: type=1400 audit(1742996010.422:158): avc: denied { create } for pid=2807 comm="syz.2.761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 84.661048][ T290] syz-executor (290) used greatest stack depth: 19712 bytes left [ 84.791705][ T2815] syz.3.763[2815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.791780][ T2815] syz.3.763[2815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.818333][ T2811] device pim6reg1 entered promiscuous mode [ 85.233293][ T2817] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.242514][ T2817] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.250784][ T2817] device bridge_slave_0 entered promiscuous mode [ 85.260626][ T2817] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.270711][ T2817] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.278388][ T2817] device bridge_slave_1 entered promiscuous mode [ 85.560018][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.569914][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.625906][ T478] device bridge_slave_1 left promiscuous mode [ 85.636875][ T478] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.649804][ T478] device bridge_slave_0 left promiscuous mode [ 85.656241][ T478] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.665232][ T478] device veth0_vlan left promiscuous mode [ 85.779190][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.787680][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.796001][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.802894][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.810115][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.818556][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.826568][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.833436][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.840761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.947339][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.957628][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.968227][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.976218][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.991158][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 86.010814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 86.019960][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 86.027746][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 86.048351][ T2817] device veth0_vlan entered promiscuous mode [ 86.072490][ T2817] device veth1_macvtap entered promiscuous mode [ 86.088888][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 86.125964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 86.177663][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 86.203958][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 86.212422][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 86.271398][ T30] audit: type=1400 audit(1742996012.102:159): avc: denied { mounton } for pid=2817 comm="syz-executor" path="/root/syzkaller.ps2X9J/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.310016][ T30] audit: type=1400 audit(1742996012.132:160): avc: denied { mount } for pid=2817 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.381825][ T30] audit: type=1400 audit(1742996012.132:161): avc: denied { mounton } for pid=2817 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.732670][ T2866] device syzkaller0 entered promiscuous mode [ 87.087963][ T2876] syz.4.781[2876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.088046][ T2876] syz.4.781[2876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.275453][ T30] audit: type=1400 audit(1742996013.102:162): avc: denied { append } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 87.355491][ T2896] device syzkaller0 entered promiscuous mode [ 87.393092][ T30] audit: type=1400 audit(1742996013.102:163): avc: denied { open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 87.447540][ T30] audit: type=1400 audit(1742996013.102:164): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 87.673184][ T2923] syz.0.795[2923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.673265][ T2923] syz.0.795[2923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.773828][ T2930] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.792126][ T2930] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.808280][ T2930] device bridge_slave_1 left promiscuous mode [ 87.814526][ T2930] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.830770][ T2930] device bridge_slave_0 left promiscuous mode [ 87.836997][ T2930] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.467903][ T2961] device syzkaller0 entered promiscuous mode [ 88.580073][ T2961] FAULT_INJECTION: forcing a failure. [ 88.580073][ T2961] name failslab, interval 1, probability 0, space 0, times 0 [ 88.619161][ T2961] CPU: 1 PID: 2961 Comm: syz.3.806 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 88.628812][ T2961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 88.638821][ T2961] Call Trace: [ 88.641948][ T2961] [ 88.644909][ T2961] dump_stack_lvl+0x151/0x1c0 [ 88.649414][ T2961] ? io_uring_drop_tctx_refs+0x190/0x190 [ 88.654873][ T2961] ? exit_to_user_mode_prepare+0x5a/0xa0 [ 88.660348][ T2961] dump_stack+0x15/0x20 [ 88.664337][ T2961] should_fail+0x3c6/0x510 [ 88.668675][ T2961] __should_failslab+0xa4/0xe0 [ 88.673276][ T2961] should_failslab+0x9/0x20 [ 88.677717][ T2961] slab_pre_alloc_hook+0x37/0xd0 [ 88.682490][ T2961] __kmalloc+0x6d/0x2c0 [ 88.686482][ T2961] ? kobject_get_path+0xbc/0x1f0 [ 88.691256][ T2961] kobject_get_path+0xbc/0x1f0 [ 88.695853][ T2961] kobject_uevent_env+0x27f/0x700 [ 88.700736][ T2961] kobject_uevent+0x1f/0x30 [ 88.705165][ T2961] __kobject_del+0xee/0x300 [ 88.709498][ T2961] kobject_put+0x1cc/0x260 [ 88.713749][ T2961] netdev_queue_update_kobjects+0x390/0x400 [ 88.719476][ T2961] ? skb_queue_purge+0x19b/0x1b0 [ 88.724250][ T2961] netif_set_real_num_tx_queues+0x16b/0x7c0 [ 88.729982][ T2961] __tun_detach+0xb78/0x1510 [ 88.734410][ T2961] ? wait_for_completion_killable_timeout+0x10/0x10 [ 88.740965][ T2961] ? tun_chr_open+0x530/0x530 [ 88.745470][ T2961] tun_chr_close+0x92/0x140 [ 88.749808][ T2961] __fput+0x228/0x8c0 [ 88.753689][ T2961] ____fput+0x15/0x20 [ 88.757442][ T2961] task_work_run+0x129/0x190 [ 88.761872][ T2961] exit_to_user_mode_loop+0xc4/0xe0 [ 88.766908][ T2961] exit_to_user_mode_prepare+0x5a/0xa0 [ 88.772198][ T2961] syscall_exit_to_user_mode+0x26/0x160 [ 88.777581][ T2961] do_syscall_64+0x47/0xb0 [ 88.781830][ T2961] ? clear_bhb_loop+0x35/0x90 [ 88.786346][ T2961] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 88.792073][ T2961] RIP: 0033:0x7f7c7a5e4169 [ 88.796331][ T2961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 88.815775][ T2961] RSP: 002b:00007f7c78c4e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 88.824014][ T2961] RAX: 0000000000000000 RBX: 00007f7c7a7fcfa0 RCX: 00007f7c7a5e4169 [ 88.831831][ T2961] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 88.839637][ T2961] RBP: 00007f7c78c4e090 R08: 0000000000000000 R09: 0000000000000000 [ 88.847450][ T2961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 88.855269][ T2961] R13: 0000000000000000 R14: 00007f7c7a7fcfa0 R15: 00007ffee4d4ea28 [ 88.863076][ T2961] [ 89.186445][ T2977] syz.1.810[2977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.186525][ T2977] syz.1.810[2977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.377315][ T2987] device veth1_macvtap left promiscuous mode [ 89.418262][ T2988] device veth1_macvtap entered promiscuous mode [ 90.146989][ T3010] device syzkaller0 entered promiscuous mode [ 90.183432][ T3005] ref_ctr_offset mismatch. inode: 0x38a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 90.249781][ T3010] FAULT_INJECTION: forcing a failure. [ 90.249781][ T3010] name failslab, interval 1, probability 0, space 0, times 0 [ 90.347289][ T3010] CPU: 0 PID: 3010 Comm: syz.1.822 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 90.356937][ T3010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 90.366832][ T3010] Call Trace: [ 90.369954][ T3010] [ 90.372733][ T3010] dump_stack_lvl+0x151/0x1c0 [ 90.377255][ T3010] ? io_uring_drop_tctx_refs+0x190/0x190 [ 90.382724][ T3010] dump_stack+0x15/0x20 [ 90.386707][ T3010] should_fail+0x3c6/0x510 [ 90.390967][ T3010] __should_failslab+0xa4/0xe0 [ 90.395561][ T3010] ? __alloc_skb+0xbe/0x550 [ 90.399896][ T3010] should_failslab+0x9/0x20 [ 90.404243][ T3010] slab_pre_alloc_hook+0x37/0xd0 [ 90.409021][ T3010] ? __alloc_skb+0xbe/0x550 [ 90.413354][ T3010] kmem_cache_alloc+0x44/0x250 [ 90.417953][ T3010] __alloc_skb+0xbe/0x550 [ 90.422121][ T3010] alloc_uevent_skb+0x80/0x230 [ 90.426720][ T3010] kobject_uevent_net_broadcast+0x188/0x590 [ 90.432470][ T3010] kobject_uevent_env+0x525/0x700 [ 90.437311][ T3010] kobject_uevent+0x1f/0x30 [ 90.441650][ T3010] __kobject_del+0xee/0x300 [ 90.445989][ T3010] kobject_put+0x1cc/0x260 [ 90.450243][ T3010] netdev_queue_update_kobjects+0x390/0x400 [ 90.456237][ T3010] ? skb_queue_purge+0x19b/0x1b0 [ 90.461101][ T3010] netif_set_real_num_tx_queues+0x16b/0x7c0 [ 90.466832][ T3010] __tun_detach+0xb78/0x1510 [ 90.471257][ T3010] ? wait_for_completion_killable_timeout+0x10/0x10 [ 90.477689][ T3010] ? tun_chr_open+0x530/0x530 [ 90.482185][ T3010] tun_chr_close+0x92/0x140 [ 90.486522][ T3010] __fput+0x228/0x8c0 [ 90.490341][ T3010] ____fput+0x15/0x20 [ 90.494159][ T3010] task_work_run+0x129/0x190 [ 90.498585][ T3010] exit_to_user_mode_loop+0xc4/0xe0 [ 90.503708][ T3010] exit_to_user_mode_prepare+0x5a/0xa0 [ 90.509001][ T3010] syscall_exit_to_user_mode+0x26/0x160 [ 90.514391][ T3010] do_syscall_64+0x47/0xb0 [ 90.518641][ T3010] ? clear_bhb_loop+0x35/0x90 [ 90.523325][ T3010] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 90.529057][ T3010] RIP: 0033:0x7fafeefa7169 [ 90.533308][ T3010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.552765][ T3010] RSP: 002b:00007fafed611038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 90.560992][ T3010] RAX: 0000000000000000 RBX: 00007fafef1bffa0 RCX: 00007fafeefa7169 [ 90.568802][ T3010] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 90.576727][ T3010] RBP: 00007fafed611090 R08: 0000000000000000 R09: 0000000000000000 [ 90.584537][ T3010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.592354][ T3010] R13: 0000000000000000 R14: 00007fafef1bffa0 R15: 00007fff490919b8 [ 90.600171][ T3010] [ 90.792744][ T3022] syz.3.824[3022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.792824][ T3022] syz.3.824[3022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.956697][ T3024] device syzkaller0 entered promiscuous mode [ 91.418961][ T3041] device pim6reg1 entered promiscuous mode [ 91.606719][ T3051] device syzkaller0 entered promiscuous mode [ 91.636574][ T3049] device veth1_macvtap left promiscuous mode [ 91.686770][ T3060] device veth1_macvtap entered promiscuous mode [ 91.772726][ T3062] FAULT_INJECTION: forcing a failure. [ 91.772726][ T3062] name failslab, interval 1, probability 0, space 0, times 0 [ 91.811813][ T3062] CPU: 1 PID: 3062 Comm: syz.3.835 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 91.821582][ T3062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 91.831488][ T3062] Call Trace: [ 91.834598][ T3062] [ 91.837370][ T3062] dump_stack_lvl+0x151/0x1c0 [ 91.841885][ T3062] ? io_uring_drop_tctx_refs+0x190/0x190 [ 91.847355][ T3062] dump_stack+0x15/0x20 [ 91.851339][ T3062] should_fail+0x3c6/0x510 [ 91.855622][ T3062] __should_failslab+0xa4/0xe0 [ 91.860214][ T3062] should_failslab+0x9/0x20 [ 91.864534][ T3062] slab_pre_alloc_hook+0x37/0xd0 [ 91.869308][ T3062] ? alloc_uevent_skb+0x80/0x230 [ 91.874084][ T3062] __kmalloc_track_caller+0x6c/0x2c0 [ 91.879208][ T3062] ? alloc_uevent_skb+0x80/0x230 [ 91.883976][ T3062] ? alloc_uevent_skb+0x80/0x230 [ 91.888748][ T3062] __alloc_skb+0x10c/0x550 [ 91.893004][ T3062] alloc_uevent_skb+0x80/0x230 [ 91.897600][ T3062] kobject_uevent_net_broadcast+0x188/0x590 [ 91.903330][ T3062] kobject_uevent_env+0x525/0x700 [ 91.908193][ T3062] kobject_uevent+0x1f/0x30 [ 91.912530][ T3062] __kobject_del+0xee/0x300 [ 91.916879][ T3062] kobject_put+0x1cc/0x260 [ 91.921121][ T3062] netdev_queue_update_kobjects+0x390/0x400 [ 91.926848][ T3062] ? skb_queue_purge+0x19b/0x1b0 [ 91.931639][ T3062] netif_set_real_num_tx_queues+0x16b/0x7c0 [ 91.937359][ T3062] __tun_detach+0xb78/0x1510 [ 91.941783][ T3062] ? wait_for_completion_killable_timeout+0x10/0x10 [ 91.948231][ T3062] ? tun_chr_open+0x530/0x530 [ 91.952715][ T3062] tun_chr_close+0x92/0x140 [ 91.957054][ T3062] __fput+0x228/0x8c0 [ 91.960883][ T3062] ____fput+0x15/0x20 [ 91.964697][ T3062] task_work_run+0x129/0x190 [ 91.969119][ T3062] exit_to_user_mode_loop+0xc4/0xe0 [ 91.974155][ T3062] exit_to_user_mode_prepare+0x5a/0xa0 [ 91.979446][ T3062] syscall_exit_to_user_mode+0x26/0x160 [ 91.984827][ T3062] do_syscall_64+0x47/0xb0 [ 91.989086][ T3062] ? clear_bhb_loop+0x35/0x90 [ 91.993604][ T3062] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 91.999329][ T3062] RIP: 0033:0x7f7c7a5e4169 [ 92.003578][ T3062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.023113][ T3062] RSP: 002b:00007f7c78c2d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 92.031356][ T3062] RAX: 0000000000000000 RBX: 00007f7c7a7fd080 RCX: 00007f7c7a5e4169 [ 92.039163][ T3062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 92.046981][ T3062] RBP: 00007f7c78c2d090 R08: 0000000000000000 R09: 0000000000000000 [ 92.054784][ T3062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.062621][ T3062] R13: 0000000000000000 R14: 00007f7c7a7fd080 R15: 00007ffee4d4ea28 [ 92.070424][ T3062] [ 92.407033][ T3097] device sit0 left promiscuous mode [ 92.623570][ T3110] device pim6reg1 entered promiscuous mode [ 92.659826][ T3097] device sit0 entered promiscuous mode [ 93.125327][ T3132] device syzkaller0 entered promiscuous mode [ 93.188438][ T3132] FAULT_INJECTION: forcing a failure. [ 93.188438][ T3132] name failslab, interval 1, probability 0, space 0, times 0 [ 93.296310][ T3132] CPU: 1 PID: 3132 Comm: syz.4.858 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 93.305962][ T3132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 93.315857][ T3132] Call Trace: [ 93.318980][ T3132] [ 93.321755][ T3132] dump_stack_lvl+0x151/0x1c0 [ 93.326288][ T3132] ? io_uring_drop_tctx_refs+0x190/0x190 [ 93.331744][ T3132] dump_stack+0x15/0x20 [ 93.335727][ T3132] should_fail+0x3c6/0x510 [ 93.339983][ T3132] __should_failslab+0xa4/0xe0 [ 93.344580][ T3132] should_failslab+0x9/0x20 [ 93.348920][ T3132] slab_pre_alloc_hook+0x37/0xd0 [ 93.353696][ T3132] kmem_cache_alloc_trace+0x48/0x270 [ 93.358813][ T3132] ? kobject_uevent_env+0x269/0x700 [ 93.363863][ T3132] kobject_uevent_env+0x269/0x700 [ 93.368715][ T3132] kobject_uevent+0x1f/0x30 [ 93.373049][ T3132] __kobject_del+0xee/0x300 [ 93.377391][ T3132] kobject_put+0x1cc/0x260 [ 93.381643][ T3132] net_rx_queue_update_kobjects+0x418/0x490 [ 93.387369][ T3132] ? netif_set_real_num_tx_queues+0x600/0x7c0 [ 93.393277][ T3132] netif_set_real_num_rx_queues+0x105/0x1e0 [ 93.399188][ T3132] __tun_detach+0xbb4/0x1510 [ 93.403610][ T3132] ? wait_for_completion_killable_timeout+0x10/0x10 [ 93.410030][ T3132] ? tun_chr_open+0x530/0x530 [ 93.414551][ T3132] tun_chr_close+0x92/0x140 [ 93.418881][ T3132] __fput+0x228/0x8c0 [ 93.422703][ T3132] ____fput+0x15/0x20 [ 93.426529][ T3132] task_work_run+0x129/0x190 [ 93.430949][ T3132] exit_to_user_mode_loop+0xc4/0xe0 [ 93.436163][ T3132] exit_to_user_mode_prepare+0x5a/0xa0 [ 93.441455][ T3132] syscall_exit_to_user_mode+0x26/0x160 [ 93.446834][ T3132] do_syscall_64+0x47/0xb0 [ 93.451086][ T3132] ? clear_bhb_loop+0x35/0x90 [ 93.455597][ T3132] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 93.461328][ T3132] RIP: 0033:0x7f95e29cc169 [ 93.465582][ T3132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.485036][ T3132] RSP: 002b:00007f95e1036038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 93.493272][ T3132] RAX: 0000000000000000 RBX: 00007f95e2be4fa0 RCX: 00007f95e29cc169 [ 93.501083][ T3132] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 93.508895][ T3132] RBP: 00007f95e1036090 R08: 0000000000000000 R09: 0000000000000000 [ 93.517141][ T3132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.525065][ T3132] R13: 0000000000000000 R14: 00007f95e2be4fa0 R15: 00007ffccc7ed188 [ 93.532878][ T3132] [ 93.623807][ T3144] syz.2.863[3144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.623889][ T3144] syz.2.863[3144] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.583703][ T3186] device syzkaller0 entered promiscuous mode [ 94.818757][ T3191] syz.3.879[3191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.818837][ T3191] syz.3.879[3191] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.919994][ T30] audit: type=1400 audit(1742996020.752:165): avc: denied { create } for pid=3193 comm="syz.0.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 95.224053][ T3207] device syzkaller0 entered promiscuous mode [ 95.383498][ T3207] FAULT_INJECTION: forcing a failure. [ 95.383498][ T3207] name failslab, interval 1, probability 0, space 0, times 0 [ 95.423870][ T3207] CPU: 1 PID: 3207 Comm: syz.3.884 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 95.433523][ T3207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 95.443505][ T3207] Call Trace: [ 95.446722][ T3207] [ 95.449578][ T3207] dump_stack_lvl+0x151/0x1c0 [ 95.454098][ T3207] ? io_uring_drop_tctx_refs+0x190/0x190 [ 95.459568][ T3207] ? do_syscall_64+0x47/0xb0 [ 95.463986][ T3207] dump_stack+0x15/0x20 [ 95.467974][ T3207] should_fail+0x3c6/0x510 [ 95.472235][ T3207] __should_failslab+0xa4/0xe0 [ 95.476830][ T3207] should_failslab+0x9/0x20 [ 95.481171][ T3207] slab_pre_alloc_hook+0x37/0xd0 [ 95.485946][ T3207] __kmalloc+0x6d/0x2c0 [ 95.489957][ T3207] ? kobject_get_path+0xbc/0x1f0 [ 95.494714][ T3207] kobject_get_path+0xbc/0x1f0 [ 95.499311][ T3207] kobject_uevent_env+0x27f/0x700 [ 95.504173][ T3207] kobject_uevent+0x1f/0x30 [ 95.508637][ T3207] __kobject_del+0xee/0x300 [ 95.512993][ T3207] kobject_put+0x1cc/0x260 [ 95.517438][ T3207] net_rx_queue_update_kobjects+0x418/0x490 [ 95.523288][ T3207] ? netif_set_real_num_tx_queues+0x600/0x7c0 [ 95.529247][ T3207] netif_set_real_num_rx_queues+0x105/0x1e0 [ 95.535100][ T3207] __tun_detach+0xbb4/0x1510 [ 95.539526][ T3207] ? wait_for_completion_killable_timeout+0x10/0x10 [ 95.545948][ T3207] ? tun_chr_open+0x530/0x530 [ 95.550472][ T3207] tun_chr_close+0x92/0x140 [ 95.554801][ T3207] __fput+0x228/0x8c0 [ 95.558630][ T3207] ____fput+0x15/0x20 [ 95.562443][ T3207] task_work_run+0x129/0x190 [ 95.566866][ T3207] exit_to_user_mode_loop+0xc4/0xe0 [ 95.571897][ T3207] exit_to_user_mode_prepare+0x5a/0xa0 [ 95.577330][ T3207] syscall_exit_to_user_mode+0x26/0x160 [ 95.582706][ T3207] do_syscall_64+0x47/0xb0 [ 95.586958][ T3207] ? clear_bhb_loop+0x35/0x90 [ 95.591472][ T3207] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 95.597200][ T3207] RIP: 0033:0x7f7c7a5e4169 [ 95.601458][ T3207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.620904][ T3207] RSP: 002b:00007f7c78c4e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 95.629179][ T3207] RAX: 0000000000000000 RBX: 00007f7c7a7fcfa0 RCX: 00007f7c7a5e4169 [ 95.637560][ T3207] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 95.645473][ T3207] RBP: 00007f7c78c4e090 R08: 0000000000000000 R09: 0000000000000000 [ 95.653281][ T3207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.661095][ T3207] R13: 0000000000000000 R14: 00007f7c7a7fcfa0 R15: 00007ffee4d4ea28 [ 95.668935][ T3207] [ 96.037617][ T30] audit: type=1400 audit(1742996021.862:166): avc: denied { create } for pid=3217 comm="syz.3.888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 96.110079][ T3220] device veth1_macvtap left promiscuous mode [ 96.330971][ T3222] device veth1_macvtap entered promiscuous mode [ 96.525344][ T3229] device sit0 left promiscuous mode [ 96.655935][ T3237] device sit0 entered promiscuous mode [ 97.208543][ T3250] device veth1_macvtap left promiscuous mode [ 97.320524][ T3251] device veth1_macvtap entered promiscuous mode [ 98.246371][ T3279] device veth1_macvtap left promiscuous mode [ 98.312123][ T3279] device macsec0 entered promiscuous mode [ 98.484599][ T3283] device veth1_macvtap entered promiscuous mode [ 98.730992][ T3296] device veth1_macvtap left promiscuous mode [ 98.817484][ T3300] device veth1_macvtap entered promiscuous mode [ 99.418235][ T3314] device sit0 left promiscuous mode [ 99.502738][ T3317] device sit0 entered promiscuous mode [ 99.690571][ T3319] syz.0.921[3319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.692880][ T3319] syz.0.921[3319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.880905][ T3322] device syzkaller0 entered promiscuous mode [ 100.044396][ T3332] device syzkaller0 entered promiscuous mode [ 100.213955][ T3330] device bond_slave_1 entered promiscuous mode [ 100.351479][ T478] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 100.359885][ T478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.484394][ T3339] device sit0 left promiscuous mode [ 100.587898][ T3342] device veth1_macvtap left promiscuous mode [ 100.661169][ T3339] device sit0 entered promiscuous mode [ 100.753178][ T3344] device veth1_macvtap entered promiscuous mode [ 101.793065][ T3372] syz.3.938[3372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.793134][ T3372] syz.3.938[3372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.865801][ T3376] device sit0 left promiscuous mode [ 101.929420][ T3378] device sit0 entered promiscuous mode [ 102.410575][ T3390] device veth1_macvtap left promiscuous mode [ 102.499604][ T3395] device veth1_macvtap entered promiscuous mode [ 102.575116][ T478] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 102.593244][ T3396] device veth1_macvtap left promiscuous mode [ 102.668453][ T3399] device veth1_macvtap entered promiscuous mode [ 102.895854][ T3406] device veth1_macvtap left promiscuous mode [ 102.936029][ T3409] device pim6reg1 entered promiscuous mode [ 102.961937][ T3410] device veth1_macvtap entered promiscuous mode [ 102.990329][ T3414] device syzkaller0 entered promiscuous mode [ 103.084127][ T30] audit: type=1400 audit(1742996028.912:167): avc: denied { create } for pid=3417 comm="syz.3.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 103.408968][ T3435] device pim6reg1 entered promiscuous mode [ 103.517966][ T3441] device veth1_macvtap left promiscuous mode [ 103.563789][ T3445] device syzkaller0 entered promiscuous mode [ 103.570692][ T3441] device veth1_macvtap entered promiscuous mode [ 103.741206][ T3454] device syzkaller0 entered promiscuous mode [ 103.887258][ T3460] device sit0 left promiscuous mode [ 103.976132][ T3462] device sit0 entered promiscuous mode [ 104.494322][ T3494] device pim6reg1 entered promiscuous mode [ 104.637154][ T3498] device veth1_macvtap left promiscuous mode [ 104.686628][ T3508] device veth1_macvtap entered promiscuous mode [ 105.232640][ T3540] device veth1_macvtap left promiscuous mode [ 105.323549][ T3543] device veth1_macvtap entered promiscuous mode [ 105.653765][ T3552] device syzkaller0 entered promiscuous mode [ 105.671664][ T3555] tap0: tun_chr_ioctl cmd 1074025677 [ 105.677290][ T3555] tap0: linktype set to 769 [ 106.085603][ T3567] device pim6reg1 entered promiscuous mode [ 106.936040][ T3600] device syzkaller0 entered promiscuous mode [ 108.043444][ T3627] device syzkaller0 entered promiscuous mode [ 108.370711][ T3634] device veth1_macvtap left promiscuous mode [ 108.436837][ T3639] device veth1_macvtap entered promiscuous mode [ 108.706347][ T3646] device syzkaller0 entered promiscuous mode [ 108.723951][ T3649] device sit0 left promiscuous mode [ 109.395198][ T30] audit: type=1400 audit(1742996035.222:168): avc: denied { create } for pid=3702 comm="syz.0.1050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 109.459086][ T3706] syz.2.1051[3706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.459167][ T3706] syz.2.1051[3706] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.904287][ T3737] syz.4.1063[3737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.918146][ T3735] device sit0 entered promiscuous mode [ 109.940396][ T3737] syz.4.1063[3737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.080117][ T3745] device veth1_macvtap left promiscuous mode [ 110.132416][ T3745] device veth1_macvtap entered promiscuous mode [ 110.417914][ T3766] syz.3.1074[3766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.420130][ T3766] syz.3.1074[3766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.568252][ T3776] syz.0.1078[3776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.580024][ T3776] syz.0.1078[3776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.615670][ T3775] device syzkaller0 entered promiscuous mode [ 110.673091][ T3780] device veth1_macvtap left promiscuous mode [ 110.724748][ T3782] device veth1_macvtap entered promiscuous mode [ 110.880209][ T3802] syz.2.1086[3802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.880287][ T3802] syz.2.1086[3802] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.024657][ T3809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.315025][ T3828] device veth1_macvtap left promiscuous mode [ 111.355672][ T3828] device veth1_macvtap entered promiscuous mode [ 111.797849][ T3854] ªªªªªª: renamed from vlan0 [ 112.134999][ T3862] cgroup: fork rejected by pids controller in /syz3 [ 112.628900][ T4003] device pim6reg1 entered promiscuous mode [ 112.723338][ T4013] device veth1_macvtap left promiscuous mode [ 112.772121][ T4013] device veth1_macvtap entered promiscuous mode [ 112.836804][ T4015] device veth0_vlan left promiscuous mode [ 112.857976][ T4015] device veth0_vlan entered promiscuous mode [ 113.369552][ T4044] device syzkaller0 entered promiscuous mode [ 113.550910][ T4048] device syzkaller0 entered promiscuous mode [ 113.614864][ T4033] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.640678][ T4033] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.668338][ T4033] device bridge_slave_0 entered promiscuous mode [ 113.676982][ T4033] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.684104][ T4033] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.691613][ T4033] device bridge_slave_1 entered promiscuous mode [ 113.722053][ T312] device bridge_slave_1 left promiscuous mode [ 113.730191][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.751179][ T312] device bridge_slave_0 left promiscuous mode [ 113.757163][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.766136][ T312] device veth1_macvtap left promiscuous mode [ 113.946290][ T4063] device veth1_macvtap left promiscuous mode [ 113.979148][ T4066] device veth1_macvtap entered promiscuous mode [ 114.130579][ T30] audit: type=1400 audit(1742996039.962:169): avc: denied { create } for pid=4033 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 114.192744][ T30] audit: type=1400 audit(1742996039.982:170): avc: denied { write } for pid=4033 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 114.213572][ T30] audit: type=1400 audit(1742996039.992:171): avc: denied { read } for pid=4033 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 114.248414][ T4090] device syzkaller0 entered promiscuous mode [ 114.344499][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.363195][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.424244][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.459386][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.489325][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.496195][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.549226][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.567671][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.575769][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.582812][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.590600][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 114.628420][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.669285][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.796047][ T478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 114.831596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.846156][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.854112][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.868607][ T4033] device veth0_vlan entered promiscuous mode [ 114.925610][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.937439][ T4033] device veth1_macvtap entered promiscuous mode [ 115.020909][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 115.041220][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 115.165271][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 115.216805][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 115.390332][ T4142] device syzkaller0 entered promiscuous mode [ 115.766785][ T4150] device pim6reg1 entered promiscuous mode [ 116.224177][ T4174] bpf_get_probe_write_proto: 10 callbacks suppressed [ 116.224198][ T4174] syz.3.1175[4174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.269267][ T4174] syz.3.1175[4174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.269283][ T4179] device wg2 left promiscuous mode [ 117.810930][ T4245] device veth1_macvtap left promiscuous mode [ 117.817155][ T4245] device macsec0 entered promiscuous mode [ 117.864556][ T4245] device veth1_macvtap entered promiscuous mode [ 118.042668][ T4248] device sit0 entered promiscuous mode [ 119.496109][ T4332] device pim6reg1 entered promiscuous mode [ 119.584649][ T4338] device sit0 entered promiscuous mode [ 119.675940][ T4342] device veth1_macvtap left promiscuous mode [ 119.754761][ T4342] device veth1_macvtap entered promiscuous mode [ 119.867817][ T4351] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.927956][ T4357] syz.4.1233[4357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.928062][ T4357] syz.4.1233[4357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.089792][ T4362] device pim6reg1 entered promiscuous mode [ 120.180108][ T4377] device veth1_macvtap left promiscuous mode [ 120.267306][ T4381] device veth1_macvtap entered promiscuous mode [ 121.266300][ T4430] device veth1_macvtap left promiscuous mode [ 121.335514][ T4436] device veth1_macvtap entered promiscuous mode [ 121.813159][ T4462] device pim6reg1 entered promiscuous mode [ 121.872802][ T4471] device veth1_macvtap left promiscuous mode [ 121.881785][ T4471] device macsec0 left promiscuous mode [ 122.029897][ T4474] device veth1_macvtap entered promiscuous mode [ 122.057309][ T4474] device macsec0 entered promiscuous mode [ 122.098235][ T30] audit: type=1400 audit(1742996047.932:172): avc: denied { create } for pid=4479 comm="syz.2.1270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 122.119252][ T4482] device veth1_macvtap left promiscuous mode [ 122.229570][ T4482] device veth1_macvtap entered promiscuous mode [ 122.503911][ T4493] bond_slave_1: mtu less than device minimum [ 123.621043][ T4524] device veth1_macvtap left promiscuous mode [ 123.750742][ T4531] device veth1_macvtap entered promiscuous mode [ 124.489875][ T4562] device veth1_macvtap left promiscuous mode [ 124.577884][ T4574] device veth1_macvtap entered promiscuous mode [ 124.584830][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 124.640952][ T4573] syz.0.1303 (4573) used obsolete PPPIOCDETACH ioctl [ 124.723582][ T4581] device syzkaller0 entered promiscuous mode [ 124.749504][ T30] audit: type=1400 audit(1742996050.582:173): avc: denied { create } for pid=4584 comm="syz.2.1307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 124.911793][ T4592] device syzkaller0 entered promiscuous mode [ 124.938018][ T4599] syz.1.1310[4599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.939851][ T4599] syz.1.1310[4599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.437773][ T4638] tun0: tun_chr_ioctl cmd 1074025673 [ 125.593390][ T4626] device syzkaller0 entered promiscuous mode [ 125.613899][ T4637] tun0: tun_chr_ioctl cmd 1074025678 [ 125.621328][ T4637] tun0: group set to 0 [ 125.649973][ T4638] tun0: tun_chr_ioctl cmd 1074025678 [ 125.678824][ T4638] tun0: group set to 0 [ 126.678494][ T4696] ------------[ cut here ]------------ [ 126.715027][ T4696] trace type BPF program uses run-time allocation [ 126.765385][ T4696] WARNING: CPU: 1 PID: 4696 at kernel/bpf/verifier.c:11701 check_map_prog_compatibility+0x6f1/0x890 [ 126.827328][ T4696] Modules linked in: [ 126.836650][ T4696] CPU: 0 PID: 4696 Comm: syz.3.1341 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 126.907537][ T4696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 126.917711][ T4696] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 127.010551][ T4696] Code: db e9 f9 fc ff ff e8 de 29 ed ff 31 db e9 ed fc ff ff e8 d2 29 ed ff c6 05 b0 52 a3 05 01 48 c7 c7 a0 f5 87 85 e8 2f 6f be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 127.163780][ T4696] RSP: 0018:ffffc90000aa7328 EFLAGS: 00010246 [ 127.197336][ T4696] RAX: 0251e093f062f400 RBX: 0000000000000001 RCX: 0000000000080000 [ 127.257281][ T4696] RDX: ffffc900012c9000 RSI: 00000000000009d7 RDI: 00000000000009d8 [ 127.297294][ T4696] RBP: ffffc90000aa7370 R08: ffffffff8157a585 R09: ffffed103ee265e8 [ 127.367324][ T4696] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 127.425564][ T4696] R13: ffff888112a13000 R14: ffffc900000ac000 R15: dffffc0000000000 [ 127.481496][ T4696] FS: 00007ff92dda96c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 127.581919][ T4696] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 127.613416][ T4696] CR2: 00007f95e2a89ea4 CR3: 0000000190de6000 CR4: 00000000003506b0 [ 127.621670][ T4696] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 127.622096][ T4725] device veth0_vlan left promiscuous mode [ 127.629509][ T4696] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 127.629529][ T4696] Call Trace: [ 127.629536][ T4696] [ 127.629543][ T4696] ? show_regs+0x58/0x60 [ 127.629572][ T4696] ? __warn+0x160/0x2f0 [ 127.629592][ T4696] ? check_map_prog_compatibility+0x6f1/0x890 [ 127.629623][ T4696] ? report_bug+0x3d9/0x5b0 [ 127.629648][ T4696] ? check_map_prog_compatibility+0x6f1/0x890 [ 127.683140][ T4725] device veth0_vlan entered promiscuous mode [ 127.735006][ T4696] ? handle_bug+0x41/0x70 [ 127.741701][ T4696] ? exc_invalid_op+0x1b/0x50 [ 127.746272][ T4696] ? asm_exc_invalid_op+0x1b/0x20 [ 127.751383][ T4696] ? __wake_up_klogd+0xd5/0x110 [ 127.756207][ T4696] ? check_map_prog_compatibility+0x6f1/0x890 [ 127.762363][ T4696] ? check_map_prog_compatibility+0x6f1/0x890 [ 127.768327][ T4696] resolve_pseudo_ldimm64+0x682/0x1240 [ 127.773618][ T4696] ? check_attach_btf_id+0xef0/0xef0 [ 127.820265][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 127.828696][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 127.833768][ T4696] ? __mark_reg_known+0x1b0/0x1b0 [ 127.841061][ T4696] ? security_capable+0x87/0xb0 [ 127.846102][ T4696] bpf_check+0x3190/0x12c60 [ 127.849024][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 127.850629][ T4696] ? is_bpf_text_address+0x172/0x190 [ 127.862920][ T4696] ? stack_trace_save+0x1c0/0x1c0 [ 127.867878][ T4696] ? __kernel_text_address+0x9b/0x110 [ 127.873076][ T4696] ? unwind_get_return_address+0x4d/0x90 [ 127.878849][ T4696] ? bpf_get_btf_vmlinux+0x60/0x60 [ 127.883812][ T4696] ? arch_stack_walk+0xf3/0x140 [ 127.888523][ T4696] ? stack_trace_save+0x113/0x1c0 [ 127.895772][ T4696] ? stack_trace_snprint+0xf0/0xf0 [ 127.902018][ T4696] ? stack_trace_snprint+0xf0/0xf0 [ 127.928394][ T4696] ? __stack_depot_save+0x34/0x470 [ 127.954288][ T4696] ? ____kasan_kmalloc+0xed/0x110 [ 127.967234][ T4696] ? ____kasan_kmalloc+0xdb/0x110 [ 128.007935][ T4696] ? __kasan_kmalloc+0x9/0x10 [ 128.012480][ T4696] ? kmem_cache_alloc_trace+0x11a/0x270 [ 128.066305][ T4696] ? selinux_bpf_prog_alloc+0x51/0x140 [ 128.100063][ T4696] ? security_bpf_prog_alloc+0x62/0x90 [ 128.111813][ T4696] ? bpf_prog_load+0x9ee/0x1b50 [ 128.116521][ T4696] ? __sys_bpf+0x4bc/0x760 [ 128.139538][ T4768] device syzkaller0 entered promiscuous mode [ 128.153284][ T4696] ? __x64_sys_bpf+0x7c/0x90 [ 128.157946][ T4696] ? x64_sys_call+0x87f/0x9a0 [ 128.162503][ T4696] ? do_syscall_64+0x3b/0xb0 [ 128.166937][ T4696] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.177956][ T4696] ? __kasan_kmalloc+0x9/0x10 [ 128.182541][ T4696] ? memset+0x35/0x40 [ 128.188517][ T4696] ? bpf_obj_name_cpy+0x196/0x1e0 [ 128.193643][ T4696] bpf_prog_load+0x12ac/0x1b50 [ 128.199941][ T4696] ? map_freeze+0x370/0x370 [ 128.204345][ T4696] ? selinux_bpf+0xcb/0x100 [ 128.212301][ T4696] ? security_bpf+0x82/0xb0 [ 128.216677][ T4696] __sys_bpf+0x4bc/0x760 [ 128.222095][ T4696] ? bpf_link_show_fdinfo+0x300/0x300 [ 128.227563][ T4696] ? __kasan_check_write+0x14/0x20 [ 128.232506][ T4696] ? switch_fpu_return+0x15f/0x2e0 [ 128.242504][ T4696] __x64_sys_bpf+0x7c/0x90 [ 128.247102][ T4696] x64_sys_call+0x87f/0x9a0 [ 128.257901][ T4696] do_syscall_64+0x3b/0xb0 [ 128.262214][ T4696] ? clear_bhb_loop+0x35/0x90 [ 128.266681][ T4696] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 128.272952][ T4696] RIP: 0033:0x7ff92f73f169 [ 128.277385][ T4696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 128.296946][ T4696] RSP: 002b:00007ff92dda9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 128.305272][ T4696] RAX: ffffffffffffffda RBX: 00007ff92f957fa0 RCX: 00007ff92f73f169 [ 128.313112][ T4696] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 128.321075][ T4696] RBP: 00007ff92f7c02a0 R08: 0000000000000000 R09: 0000000000000000 [ 128.328988][ T4696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 128.336872][ T4696] R13: 0000000000000000 R14: 00007ff92f957fa0 R15: 00007ffca98f2d98 [ 128.345159][ T4696] [ 128.348071][ T4696] ---[ end trace bb115d9b2e867a25 ]--- [ 130.004825][ T4883] ref_ctr_offset mismatch. inode: 0x22d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 130.089433][ T4884] device veth1_macvtap left promiscuous mode [ 130.121432][ T4883] GPL: port 1(erspan0) entered blocking state [ 130.137702][ T4883] GPL: port 1(erspan0) entered disabled state [ 130.144170][ T4883] device erspan0 entered promiscuous mode [ 130.168500][ T4884] device veth1_macvtap entered promiscuous mode [ 130.223189][ T4878] GPL: port 1(erspan0) entered blocking state [ 130.229400][ T4878] GPL: port 1(erspan0) entered forwarding state [ 130.359994][ T4890] device veth1_macvtap left promiscuous mode [ 130.411430][ T4892] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 130.432417][ T4892] syzkaller0: linktype set to 821 [ 130.451192][ T4890] device veth1_macvtap entered promiscuous mode [ 130.809313][ T4900] device sit0 left promiscuous mode [ 132.591836][ T4939] device veth1_macvtap left promiscuous mode [ 132.682333][ T4944] device veth1_macvtap entered promiscuous mode [ 132.787957][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 133.112221][ T4955] device veth0_vlan left promiscuous mode [ 133.119494][ T4955] device veth0_vlan entered promiscuous mode [ 133.932316][ T4985] device wg2 entered promiscuous mode [ 134.401042][ T5003] syz.4.1433[5003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.402881][ T5003] syz.4.1433[5003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.455325][ T5008] device veth0_vlan left promiscuous mode [ 134.575976][ T5008] device veth0_vlan entered promiscuous mode [ 134.635745][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.648185][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.666465][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.770812][ T5020] device syzkaller0 entered promiscuous mode [ 134.902934][ T5048] device sit0 left promiscuous mode [ 134.976145][ T5047] device sit0 entered promiscuous mode [ 135.429547][ T5070] device pim6reg1 entered promiscuous mode [ 135.851481][ T5083] device syzkaller0 entered promiscuous mode [ 137.563754][ T5180] device pim6reg1 entered promiscuous mode [ 138.682747][ T5240] device veth1_macvtap left promiscuous mode [ 138.768536][ T5240] device macsec0 left promiscuous mode [ 138.949195][ T5227] device veth1_macvtap entered promiscuous mode [ 138.956557][ T5227] device macsec0 entered promiscuous mode [ 139.068887][ T30] audit: type=1400 audit(1742996064.902:174): avc: denied { create } for pid=5257 comm="syz.3.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 139.159250][ T30] audit: type=1400 audit(1742996064.992:175): avc: denied { create } for pid=5264 comm="syz.0.1518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 139.575428][ T5294] device sit0 entered promiscuous mode [ 139.757782][ T5303] syz.3.1527[5303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.757860][ T5303] syz.3.1527[5303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.997491][ T5315] device wg2 entered promiscuous mode [ 140.294970][ T5323] device syzkaller0 entered promiscuous mode [ 141.759031][ T5342] device veth1_macvtap left promiscuous mode [ 141.811201][ T5342] device veth1_macvtap entered promiscuous mode [ 141.894651][ T5347] syz.1.1541[5347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.894771][ T5347] syz.1.1541[5347] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.875074][ T5371] device wg2 entered promiscuous mode [ 143.277709][ T5392] Ÿë: port 1(ip6gretap0) entered blocking state [ 143.283876][ T5392] Ÿë: port 1(ip6gretap0) entered disabled state [ 143.290604][ T5392] device ip6gretap0 entered promiscuous mode [ 143.579248][ T5402] device veth1_macvtap left promiscuous mode [ 143.619763][ T5405] device veth1_macvtap entered promiscuous mode [ 144.069944][ T5432] device syzkaller0 entered promiscuous mode [ 144.149751][ T5435] ref_ctr_offset mismatch. inode: 0x6ca offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 144.489127][ T5451] syz.2.1571 uses obsolete (PF_INET,SOCK_PACKET) [ 144.972630][ T5466] device veth1_macvtap left promiscuous mode [ 145.109701][ T5470] device veth1_macvtap entered promiscuous mode [ 146.529356][ T5532] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.536230][ T5532] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.637444][ T5532] device bridge_slave_0 entered promiscuous mode [ 146.655536][ T5532] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.675014][ T5532] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.694257][ T5532] device bridge_slave_1 entered promiscuous mode [ 147.199418][ T312] device bridge_slave_1 left promiscuous mode [ 147.215573][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.244482][ T312] device bridge_slave_0 left promiscuous mode [ 147.263051][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.282454][ T312] device veth1_macvtap left promiscuous mode [ 147.297705][ T312] device veth0_vlan left promiscuous mode [ 147.707451][ T5562] device pim6reg1 entered promiscuous mode [ 147.745408][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.760445][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.781781][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.795876][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.809678][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.816570][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.832618][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.846376][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.876150][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.883059][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.944120][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.988060][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.027479][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.078310][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 148.107443][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 148.127892][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 148.148528][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.169232][ T5532] device veth0_vlan entered promiscuous mode [ 148.190021][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.208342][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.239145][ T5532] device veth1_macvtap entered promiscuous mode [ 148.262997][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 148.272060][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.291688][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 148.338052][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 148.368123][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 148.379681][ T5568] bond_slave_1: mtu less than device minimum [ 148.397258][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 148.428167][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 148.831943][ T5579] ref_ctr_offset mismatch. inode: 0x5e2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 148.865139][ T5579] GPL: port 1(erspan0) entered blocking state [ 148.871669][ T5579] GPL: port 1(erspan0) entered disabled state [ 148.886344][ T5579] device erspan0 entered promiscuous mode [ 148.936264][ T5584] GPL: port 1(erspan0) entered blocking state [ 148.942212][ T5584] GPL: port 1(erspan0) entered forwarding state [ 149.040822][ T5581] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.083840][ T5581] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.101051][ T5581] device bridge_slave_0 entered promiscuous mode [ 149.119129][ T5581] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.128843][ T5581] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.136282][ T5581] device bridge_slave_1 entered promiscuous mode [ 149.176438][ T5596] device pim6reg1 entered promiscuous mode [ 149.316726][ T5581] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.323628][ T5581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.330748][ T5581] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.337610][ T5581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.367196][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.378007][ T4129] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.385403][ T4129] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.405137][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.413354][ T4129] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.420253][ T4129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.428486][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.436648][ T4129] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.443560][ T4129] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.475021][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.503212][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.568226][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 149.613190][ T5581] device veth0_vlan entered promiscuous mode [ 149.720634][ T5601] device syzkaller0 entered promiscuous mode [ 149.735369][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.747612][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.762780][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.795721][ T5581] device veth1_macvtap entered promiscuous mode [ 149.804073][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 149.854032][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 149.882728][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 150.208892][ T5616] device sit0 left promiscuous mode [ 150.336506][ T312] device bridge_slave_1 left promiscuous mode [ 150.342652][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.354606][ T312] device bridge_slave_0 left promiscuous mode [ 150.361014][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.377695][ T312] device veth1_macvtap left promiscuous mode [ 150.394263][ T312] device veth0_vlan left promiscuous mode [ 150.935590][ T5634] device syzkaller0 entered promiscuous mode [ 150.957305][ T5614] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.964235][ T5614] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.971510][ T5614] device bridge_slave_0 entered promiscuous mode [ 151.031497][ T5614] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.038521][ T5614] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.045860][ T5614] device bridge_slave_1 entered promiscuous mode [ 151.476362][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.483948][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.504188][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.512687][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.521853][ T4129] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.528746][ T4129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.536328][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 151.545114][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.554913][ T4129] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.561834][ T4129] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.572027][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 151.579622][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.656876][ T5614] device veth0_vlan entered promiscuous mode [ 151.664304][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 151.677681][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.685690][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 151.693388][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 151.700880][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.715824][ T5614] device veth1_macvtap entered promiscuous mode [ 151.745249][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 151.831104][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 151.866067][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 151.891149][ T5684] device sit0 left promiscuous mode [ 152.278320][ T5697] device veth0_vlan left promiscuous mode [ 152.297550][ T5697] device veth0_vlan entered promiscuous mode [ 152.305164][ T5697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.314150][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.322818][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.330103][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.348489][ T312] device bridge_slave_1 left promiscuous mode [ 152.354422][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.367824][ T312] device bridge_slave_0 left promiscuous mode [ 152.373841][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.381940][ T312] device veth1_macvtap left promiscuous mode [ 152.407360][ T312] device veth0_vlan left promiscuous mode [ 152.785951][ T5718] device veth1_macvtap left promiscuous mode [ 152.840155][ T5718] device veth1_macvtap entered promiscuous mode [ 152.869715][ T5708] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.876629][ T5708] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.890643][ T5708] device bridge_slave_0 entered promiscuous mode [ 152.898801][ T5710] device syzkaller0 entered promiscuous mode [ 152.916418][ T5708] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.923541][ T5708] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.931652][ T5708] device bridge_slave_1 entered promiscuous mode [ 153.164832][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.175914][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.217504][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.246036][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.307986][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.314853][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.368142][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 153.388815][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.417685][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.424671][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.467695][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 153.496085][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.504298][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 153.739389][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 153.747459][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.832958][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 153.860252][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 153.892394][ T5708] device veth0_vlan entered promiscuous mode [ 153.912490][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 153.925176][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.972549][ T5708] device veth1_macvtap entered promiscuous mode [ 153.990864][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.018398][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.037066][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 154.045796][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 154.055913][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 154.087453][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 154.133901][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 154.142632][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 154.157968][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 154.307990][ T5768] device syzkaller0 entered promiscuous mode [ 154.608246][ T312] device bridge_slave_1 left promiscuous mode [ 154.614232][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.655149][ T312] device bridge_slave_0 left promiscuous mode [ 154.683560][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.721913][ T312] device veth1_macvtap left promiscuous mode [ 154.752327][ T312] device veth0_vlan left promiscuous mode [ 155.700055][ T5797] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.706929][ T5797] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.714761][ T5797] device bridge_slave_0 entered promiscuous mode [ 155.721774][ T5797] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.728802][ T5797] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.736409][ T5797] device bridge_slave_1 entered promiscuous mode [ 155.808216][ T5832] device pim6reg1 entered promiscuous mode [ 156.381990][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.389386][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.468719][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.482915][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.496449][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.503322][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.510879][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.527589][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.535747][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.542624][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.559985][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.578316][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.605701][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.618911][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.670713][ T5797] device veth0_vlan entered promiscuous mode [ 156.680149][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.695107][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.703699][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.712190][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.723591][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.760417][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.814660][ T5797] device veth1_macvtap entered promiscuous mode [ 156.997501][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 157.005688][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.015065][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 157.023423][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.058209][ T312] device bridge_slave_1 left promiscuous mode [ 157.079890][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.120386][ T312] device bridge_slave_0 left promiscuous mode [ 157.154282][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.169588][ T312] device veth1_macvtap left promiscuous mode [ 157.175540][ T312] device veth0_vlan left promiscuous mode [ 158.284080][ T5911] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.291459][ T5911] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.318072][ T5911] device bridge_slave_0 entered promiscuous mode [ 158.361009][ T5911] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.380380][ T5911] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.412482][ T5911] device bridge_slave_1 entered promiscuous mode [ 158.421400][ T312] device bridge_slave_1 left promiscuous mode [ 158.439768][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.457732][ T312] device bridge_slave_0 left promiscuous mode [ 158.463884][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.472647][ T312] device veth1_macvtap left promiscuous mode [ 158.478759][ T312] device veth0_vlan left promiscuous mode [ 158.596334][ T5928] device veth1_macvtap left promiscuous mode [ 158.624882][ T5931] device veth1_macvtap entered promiscuous mode [ 158.708597][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.715952][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.737430][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.747850][ T30] audit: type=1400 audit(1742996084.582:176): avc: denied { setattr } for pid=5938 comm="syz.4.1720" path="/dev/ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 158.748168][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.784124][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.791037][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.798392][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.807088][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.816628][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.823491][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.832408][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.844258][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.855807][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.871189][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.884468][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.893239][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.900572][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.910780][ T5911] device veth0_vlan entered promiscuous mode [ 158.930493][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.942237][ T5911] device veth1_macvtap entered promiscuous mode [ 158.980257][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 158.991988][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 160.153609][ T312] device bridge_slave_1 left promiscuous mode [ 160.160387][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.188460][ T312] device bridge_slave_0 left promiscuous mode [ 160.229953][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.278160][ T312] device veth1_macvtap left promiscuous mode [ 160.326346][ T312] device veth0_vlan left promiscuous mode [ 160.663929][ T5967] device pim6reg1 entered promiscuous mode [ 160.809474][ T5963] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.816450][ T5963] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.824103][ T5963] device bridge_slave_0 entered promiscuous mode [ 160.831048][ T5963] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.837987][ T5963] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.846812][ T5963] device bridge_slave_1 entered promiscuous mode [ 161.006873][ T5963] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.013793][ T5963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.020890][ T5963] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.027749][ T5963] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.107054][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.119520][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.136969][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.188044][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.197457][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.204330][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.222347][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.232802][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.239699][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.248404][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.265822][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.282986][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.299897][ T5963] device veth0_vlan entered promiscuous mode [ 161.314031][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.334719][ T5963] device veth1_macvtap entered promiscuous mode [ 161.346161][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.355289][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.363141][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.387044][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.395500][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.562957][ T6018] device bond_slave_1 entered promiscuous mode [ 161.587751][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 161.597685][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.581190][ T6029] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.593646][ T6029] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.604107][ T6029] device bridge_slave_0 entered promiscuous mode [ 162.662605][ T6029] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.737263][ T6029] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.744782][ T6029] device bridge_slave_1 entered promiscuous mode [ 162.772671][ T312] device bridge_slave_1 left promiscuous mode [ 162.793848][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.811883][ T312] device bridge_slave_0 left promiscuous mode [ 162.817917][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.843625][ T312] device veth1_macvtap left promiscuous mode [ 162.855755][ T312] device veth0_vlan left promiscuous mode [ 163.375014][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.388024][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.398856][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.410420][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.418973][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.425960][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.469798][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.487979][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.496272][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.504621][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.511499][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.519214][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.582396][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.652245][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.661199][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.687370][ T6029] device veth0_vlan entered promiscuous mode [ 163.706665][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.719235][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.759970][ T6029] device veth1_macvtap entered promiscuous mode [ 163.767916][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.775472][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.784640][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.802566][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.832342][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 163.864816][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.876011][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.886203][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.902641][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 163.931517][ T6091] device sit0 entered promiscuous mode [ 165.337455][ T312] device bridge_slave_1 left promiscuous mode [ 165.349752][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.376313][ T312] device bridge_slave_0 left promiscuous mode [ 165.382838][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.408554][ T312] device veth1_macvtap left promiscuous mode [ 165.417951][ T312] device veth0_vlan left promiscuous mode [ 165.693814][ T6113] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.701989][ T6113] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.721388][ T6113] device bridge_slave_0 entered promiscuous mode [ 165.778569][ T6113] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.785550][ T6113] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.802507][ T6113] device bridge_slave_1 entered promiscuous mode [ 165.810190][ T6156] device veth1_macvtap left promiscuous mode [ 165.939637][ T6158] device veth1_macvtap left promiscuous mode [ 165.962528][ T6159] device veth1_macvtap entered promiscuous mode [ 165.972786][ T6160] device veth1_macvtap entered promiscuous mode [ 166.590877][ T6189] device veth0_vlan left promiscuous mode [ 166.596814][ T6189] device veth0_vlan entered promiscuous mode [ 166.603766][ T6189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.614034][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.625393][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.640311][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.824602][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.834065][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.862220][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.882362][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.902384][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.909276][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.946365][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.966519][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.025196][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.032128][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.125458][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.160775][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.177611][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.195730][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.212588][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.898305][ T6199] device veth1_macvtap left promiscuous mode [ 167.908154][ T6202] device veth1_macvtap entered promiscuous mode [ 167.922422][ T6113] device veth0_vlan entered promiscuous mode [ 167.942645][ T6113] device veth1_macvtap entered promiscuous mode [ 193.244196][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 193.252601][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.260989][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 193.268945][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.276869][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 193.285087][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.293222][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 193.300870][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 193.309058][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 193.317386][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 193.325478][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 193.343676][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.354113][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.823409][ T6268] device veth1_macvtap left promiscuous mode [ 208.830633][ T6269] device veth1_macvtap entered promiscuous mode [ 208.900314][ T6286] bridge0: port 3(veth0_to_batadv) entered blocking state [ 208.907624][ T6286] bridge0: port 3(veth0_to_batadv) entered disabled state [ 208.919520][ T6286] device veth0_to_batadv entered promiscuous mode [ 208.926721][ T6286] bridge0: port 3(veth0_to_batadv) entered blocking state [ 208.933952][ T6286] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 237.116781][ T4129] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 341.717724][ T17] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 0-... } 10240 jiffies s: 40537 root: 0x1/. [ 341.729641][ T17] rcu: blocking rcu_node structures (internal RCU debug): [ 341.736566][ T17] Task dump for CPU 0: [ 341.740494][ T17] task:syz.2.1793 state:R running task stack:22864 pid: 6191 ppid: 292 flags:0x0000400c [ 341.751088][ T17] Call Trace: [ 341.754182][ T17] [ 341.756966][ T17] __schedule+0xcd4/0x1590 [ 341.761231][ T17] ? irqentry_exit+0x30/0x40 [ 341.765642][ T17] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 341.771300][ T17] ? __this_cpu_preempt_check+0x13/0x20 [ 341.776661][ T17] ? sysvec_apic_timer_interrupt+0x89/0xc0 [ 341.782339][ T17] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 341.788315][ T17] ? _raw_spin_lock+0xc0/0x1b0 [ 341.792893][ T17] ? _raw_spin_trylock_bh+0x190/0x190 [ 341.798143][ T17] ? unmap_page_range+0xa6d/0x1ed0 [ 341.803062][ T17] ? mmu_notifier_invalidate_range_end+0xe0/0xe0 [ 341.809242][ T17] ? irqentry_exit+0x30/0x40 [ 341.813637][ T17] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 341.819291][ T17] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 341.825274][ T17] ? uprobe_munmap+0x18d/0x450 [ 341.829891][ T17] ? unmap_vmas+0x389/0x560 [ 341.834213][ T17] ? unmap_page_range+0x1ed0/0x1ed0 [ 341.839274][ T17] ? tlb_gather_mmu_fullmm+0x165/0x210 [ 341.844541][ T17] ? exit_mmap+0x458/0x990 [ 341.848801][ T17] ? exit_aio+0x25e/0x3c0 [ 341.852958][ T17] ? vm_brk+0x30/0x30 [ 341.856772][ T17] ? mutex_unlock+0xb2/0x260 [ 341.861221][ T17] ? uprobe_clear_state+0x2cd/0x320 [ 341.866235][ T17] ? __mmput+0x95/0x310 [ 341.870257][ T17] ? mmput+0x5b/0x170 [ 341.874049][ T17] ? do_exit+0xb9c/0x2ca0 [ 341.878226][ T17] ? __cond_resched+0x20/0x20 [ 341.882732][ T17] ? put_task_struct+0x80/0x80 [ 341.887339][ T17] ? irqentry_exit+0x30/0x40 [ 341.891752][ T17] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 341.897419][ T17] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 341.903384][ T17] ? do_group_exit+0x141/0x310 [ 341.907999][ T17] ? get_signal+0x7a3/0x1630 [ 341.912426][ T17] ? arch_do_signal_or_restart+0xbd/0x1680 [ 341.918067][ T17] ? irqentry_exit+0x30/0x40 [ 341.922479][ T17] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 341.928157][ T17] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 341.934109][ T17] ? get_sigframe_size+0x10/0x10 [ 341.938896][ T17] ? __se_sys_futex+0x37b/0x3e0 [ 341.943573][ T17] ? exit_to_user_mode_loop+0xa0/0xe0 [ 341.948792][ T17] ? exit_to_user_mode_prepare+0x5a/0xa0 [ 341.954243][ T17] ? syscall_exit_to_user_mode+0x26/0x160 [ 341.959828][ T17] ? do_syscall_64+0x47/0xb0 [ 341.964227][ T17] ? clear_bhb_loop+0x35/0x90 [ 341.968754][ T17] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 341.974644][ T17] [ 375.033609][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 144s! [syz.2.1793:6191] [ 375.041687][ C0] Modules linked in: [ 375.045418][ C0] CPU: 0 PID: 6191 Comm: syz.2.1793 Tainted: G W 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 375.056536][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 375.066708][ C0] RIP: 0010:__dev_queue_xmit+0x1e8/0x2e80 [ 375.072255][ C0] Code: c0 0f 85 38 1e 00 00 48 89 5c 24 78 8b 03 49 8d 5c 06 03 48 89 d8 48 c1 e8 03 42 0f b6 04 28 84 c0 0f 85 35 1e 00 00 0f b6 1b <89> de 83 e6 40 31 ff e8 ac e1 87 fd 83 e3 40 0f 85 b7 1a 00 00 e8 [ 375.092049][ C0] RSP: 0018:ffffc900000064a0 EFLAGS: 00000246 [ 375.097950][ C0] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 1ffff11024490cde [ 375.105888][ C0] RDX: ffff888122486640 RSI: 0000000000000000 RDI: ffff888122486640 [ 375.113919][ C0] RBP: ffffc90000006698 R08: ffffffff842649ea R09: ffffed1029b6ac22 [ 375.121738][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90000006620 [ 375.129537][ C0] R13: dffffc0000000000 R14: ffff88814db56000 R15: 1ffff11024490ce2 [ 375.137349][ C0] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 375.146121][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 375.152703][ C0] CR2: 00007f610564a8db CR3: 0000000006a0f000 CR4: 00000000003506b0 [ 375.160517][ C0] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 375.168325][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 375.176137][ C0] Call Trace: [ 375.179528][ C0] [ 375.182217][ C0] ? show_regs+0x58/0x60 [ 375.186293][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 375.191237][ C0] ? proc_watchdog_cpumask+0xd0/0xd0 [ 375.196665][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 375.201982][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 375.206924][ C0] ? clockevents_program_event+0x236/0x300 [ 375.212553][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 375.218462][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 375.223408][ C0] ? __sysvec_apic_timer_interrupt+0xfb/0x3f0 [ 375.229303][ C0] ? sysvec_apic_timer_interrupt+0x53/0xc0 [ 375.234949][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.240936][ C0] ? ip_finish_output2+0xb3a/0xf60 [ 375.246088][ C0] ? __dev_queue_xmit+0x1e8/0x2e80 [ 375.251023][ C0] ? debug_smp_processor_id+0x17/0x20 [ 375.256312][ C0] ? irqtime_account_irq+0xdc/0x3c0 [ 375.261348][ C0] ? dev_queue_xmit+0x20/0x20 [ 375.265862][ C0] ? __irq_exit_rcu+0x5e/0xf0 [ 375.270373][ C0] ? irqentry_exit+0x30/0x40 [ 375.274801][ C0] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 375.280441][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.286433][ C0] ? dev_queue_xmit+0xd/0x20 [ 375.290859][ C0] dev_queue_xmit+0x17/0x20 [ 375.295201][ C0] ip_finish_output2+0xb9f/0xf60 [ 375.299974][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.305960][ C0] ? ip_fragment+0x210/0x210 [ 375.310385][ C0] ? nf_hook_slow+0xd1/0x200 [ 375.314839][ C0] __ip_finish_output+0x162/0x360 [ 375.319696][ C0] ip_finish_output+0x31/0x210 [ 375.324281][ C0] ? ip_output+0x3e1/0x420 [ 375.328707][ C0] ip_output+0x1d6/0x420 [ 375.332813][ C0] ? ip_finish_output+0x210/0x210 [ 375.337643][ C0] ? ip_mc_finish_output+0x3c0/0x3c0 [ 375.342811][ C0] ? nf_hook_slow+0xd1/0x200 [ 375.347191][ C0] __ip_queue_xmit+0x1105/0x1c20 [ 375.351963][ C0] ip_queue_xmit+0x4c/0x70 [ 375.356212][ C0] __tcp_transmit_skb+0x1e84/0x3920 [ 375.361391][ C0] ? __tcp_send_ack+0x710/0x710 [ 375.366508][ C0] ? __kasan_kmalloc+0x9/0x10 [ 375.371009][ C0] ? __kmalloc_track_caller+0x13e/0x2c0 [ 375.376394][ C0] ? __kasan_check_write+0x14/0x20 [ 375.381340][ C0] ? __alloc_skb+0x355/0x550 [ 375.385780][ C0] __tcp_send_ack+0x303/0x710 [ 375.390281][ C0] tcp_send_ack+0x3b/0x60 [ 375.394535][ C0] __tcp_ack_snd_check+0x3fc/0x970 [ 375.399481][ C0] tcp_rcv_established+0x10f1/0x1ac0 [ 375.404605][ C0] ? tcp_check_space+0x9d0/0x9d0 [ 375.409380][ C0] ? __kasan_check_read+0x11/0x20 [ 375.414243][ C0] ? ipv4_dst_check+0xe3/0x150 [ 375.418980][ C0] tcp_v4_do_rcv+0x3d7/0xa00 [ 375.423406][ C0] tcp_v4_rcv+0x23dd/0x2a70 [ 375.427950][ C0] ? irqtime_account_irq+0xdc/0x3c0 [ 375.432956][ C0] ? tcp_filter+0x90/0x90 [ 375.437124][ C0] ip_protocol_deliver_rcu+0x32f/0x710 [ 375.442408][ C0] ip_local_deliver+0x2c6/0x590 [ 375.447097][ C0] ? ip_protocol_deliver_rcu+0x710/0x710 [ 375.452648][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.458637][ C0] ? sock_put+0x5c/0x80 [ 375.462628][ C0] ip_sublist_rcv+0x7e2/0x980 [ 375.467143][ C0] ? irqentry_exit+0x30/0x40 [ 375.471712][ C0] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 375.477335][ C0] ? ip_list_rcv+0x470/0x470 [ 375.481776][ C0] ? memset+0x35/0x40 [ 375.485724][ C0] ? ip_rcv_core+0x736/0xb50 [ 375.490347][ C0] ip_list_rcv+0x422/0x470 [ 375.494593][ C0] ? ip_rcv_finish+0xd0/0xd0 [ 375.499137][ C0] ? ip_rcv_finish+0xd0/0xd0 [ 375.503561][ C0] __netif_receive_skb_list_core+0x6b1/0x890 [ 375.509381][ C0] ? __netif_receive_skb+0x530/0x530 [ 375.514496][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.520484][ C0] ? napi_gro_receive+0x2bc/0x920 [ 375.525345][ C0] netif_receive_skb_list_internal+0x967/0xcc0 [ 375.531335][ C0] ? __kasan_check_read+0x11/0x20 [ 375.536197][ C0] ? netif_receive_skb_list+0x2d0/0x2d0 [ 375.541580][ C0] napi_gro_receive+0x45f/0x920 [ 375.546267][ C0] receive_buf+0x38c2/0x5860 [ 375.550780][ C0] ? irqentry_exit+0x30/0x40 [ 375.555451][ C0] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 375.561085][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.567085][ C0] ? virtnet_poll_tx+0x4d0/0x4d0 [ 375.571848][ C0] ? napi_gro_receive+0x2bc/0x920 [ 375.576708][ C0] ? detach_buf_split+0x5ff/0xae0 [ 375.581570][ C0] ? audit_tree_destroy_watch+0x20/0x20 [ 375.587175][ C0] ? detach_buf_split+0x71a/0xae0 [ 375.592011][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.597999][ C0] ? napi_gro_receive+0x2bc/0x920 [ 375.602941][ C0] ? dwc_tx_submit+0x81/0x210 [ 375.607457][ C0] ? virtqueue_get_buf_ctx+0x6de/0xe30 [ 375.612866][ C0] virtnet_poll+0x615/0x1250 [ 375.617269][ C0] ? refill_work+0x220/0x220 [ 375.621691][ C0] ? __irq_exit_rcu+0x5e/0xf0 [ 375.626199][ C0] ? irqentry_exit+0x30/0x40 [ 375.630629][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.636708][ C0] __napi_poll+0xc4/0x5a0 [ 375.640877][ C0] net_rx_action+0x47d/0xc50 [ 375.646059][ C0] ? net_tx_action+0x550/0x550 [ 375.650642][ C0] handle_softirqs+0x25e/0x5c0 [ 375.655259][ C0] __irq_exit_rcu+0x52/0xf0 [ 375.659573][ C0] irq_exit_rcu+0x9/0x10 [ 375.663655][ C0] sysvec_apic_timer_interrupt+0xa9/0xc0 [ 375.669124][ C0] [ 375.671898][ C0] [ 375.674676][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.680494][ C0] RIP: 0010:_raw_spin_lock+0xc0/0x1b0 [ 375.685916][ C0] Code: fc 4c 89 ff be 04 00 00 00 e8 3c be ca fc 43 0f b6 04 26 84 c0 0f 85 aa 00 00 00 8b 44 24 20 b9 01 00 00 00 f0 41 0f b1 4d 00 <75> 33 48 c7 04 24 0e 36 e0 45 49 c7 04 1c 00 00 00 00 65 48 8b 04 [ 375.705352][ C0] RSP: 0018:ffffc90000ac7400 EFLAGS: 00000246 [ 375.711254][ C0] RAX: 0000000000000000 RBX: 1ffff92000158e80 RCX: 0000000000000001 [ 375.719068][ C0] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffc90000ac7420 [ 375.726876][ C0] RBP: ffffc90000ac7490 R08: dffffc0000000000 R09: 0000000000000003 [ 375.734688][ C0] R10: fffff52000158e84 R11: dffffc0000000001 R12: dffffc0000000000 [ 375.742500][ C0] R13: ffffea00044982e8 R14: 1ffff92000158e84 R15: ffffc90000ac7420 [ 375.750321][ C0] ? _raw_spin_trylock_bh+0x190/0x190 [ 375.755526][ C0] unmap_page_range+0xa6d/0x1ed0 [ 375.760301][ C0] ? mmu_notifier_invalidate_range_end+0xe0/0xe0 [ 375.766464][ C0] ? irqentry_exit+0x30/0x40 [ 375.770880][ C0] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 375.776522][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.782549][ C0] ? uprobe_munmap+0x18d/0x450 [ 375.787114][ C0] unmap_vmas+0x389/0x560 [ 375.791280][ C0] ? unmap_page_range+0x1ed0/0x1ed0 [ 375.796313][ C0] ? tlb_gather_mmu_fullmm+0x165/0x210 [ 375.801606][ C0] exit_mmap+0x458/0x990 [ 375.805688][ C0] ? exit_aio+0x25e/0x3c0 [ 375.809853][ C0] ? vm_brk+0x30/0x30 [ 375.813669][ C0] ? mutex_unlock+0xb2/0x260 [ 375.818104][ C0] ? uprobe_clear_state+0x2cd/0x320 [ 375.823131][ C0] __mmput+0x95/0x310 [ 375.826950][ C0] mmput+0x5b/0x170 [ 375.830596][ C0] do_exit+0xb9c/0x2ca0 [ 375.834588][ C0] ? __cond_resched+0x20/0x20 [ 375.839213][ C0] ? put_task_struct+0x80/0x80 [ 375.843811][ C0] ? irqentry_exit+0x30/0x40 [ 375.848234][ C0] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 375.854058][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.860033][ C0] do_group_exit+0x141/0x310 [ 375.864473][ C0] get_signal+0x7a3/0x1630 [ 375.868719][ C0] arch_do_signal_or_restart+0xbd/0x1680 [ 375.874183][ C0] ? irqentry_exit+0x30/0x40 [ 375.878611][ C0] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 375.884422][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.890401][ C0] ? get_sigframe_size+0x10/0x10 [ 375.895175][ C0] ? __se_sys_futex+0x37b/0x3e0 [ 375.899865][ C0] exit_to_user_mode_loop+0xa0/0xe0 [ 375.904896][ C0] exit_to_user_mode_prepare+0x5a/0xa0 [ 375.910188][ C0] syscall_exit_to_user_mode+0x26/0x160 [ 375.915574][ C0] do_syscall_64+0x47/0xb0 [ 375.919824][ C0] ? clear_bhb_loop+0x35/0x90 [ 375.924336][ C0] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 375.930066][ C0] RIP: 0033:0x7f49bd842169 [ 375.934319][ C0] Code: Unable to access opcode bytes at RIP 0x7f49bd84213f. [ 375.941521][ C0] RSP: 002b:00007f49bbeac0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 375.949768][ C0] RAX: 0000000000000000 RBX: 00007f49bda5afa8 RCX: 00007f49bd842169 [ 375.957578][ C0] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f49bda5afa8 [ 375.965391][ C0] RBP: 00007f49bda5afa0 R08: 0000000000000000 R09: 0000000000000000 [ 375.973353][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49bda5afac [ 375.981166][ C0] R13: 0000000000000000 R14: 00007ffc7d0f47e0 R15: 00007ffc7d0f48c8 [ 375.988985][ C0] [ 375.991851][ C0] Sending NMI from CPU 0 to CPUs 1: [ 375.996899][ C1] NMI backtrace for cpu 1 [ 375.996911][ C1] CPU: 1 PID: 279 Comm: syz-executor Tainted: G W 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0 [ 375.996933][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 375.996943][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 375.996966][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 0b d9 12 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 375.996981][ C1] RSP: 0018:ffffc900007af5a0 EFLAGS: 00000246 [ 375.996997][ C1] RAX: 0000000000000003 RBX: 1ffff920000f5eb8 RCX: ffffffff81553c8f [ 375.997009][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88811b2a3148 [ 375.997022][ C1] RBP: ffffc900007af650 R08: dffffc0000000000 R09: ffffed102365462a [ 375.997036][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 375.997055][ C1] R13: ffff88811b2a3148 R14: 0000000000000003 R15: 1ffff920000f5ebc [ 375.997071][ C1] FS: 0000555579d39500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 375.997087][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 375.997100][ C1] CR2: 00007f7730dd2c58 CR3: 000000011cf02000 CR4: 00000000003506a0 [ 375.997116][ C1] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 375.997127][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 375.997138][ C1] Call Trace: [ 375.997143][ C1] [ 375.997149][ C1] ? show_regs+0x58/0x60 [ 375.997168][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 375.997186][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 375.997206][ C1] ? kvm_wait+0x147/0x180 [ 375.997221][ C1] ? kvm_wait+0x147/0x180 [ 375.997237][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 375.997258][ C1] ? nmi_handle+0xa8/0x280 [ 375.997276][ C1] ? kvm_wait+0x147/0x180 [ 375.997292][ C1] ? default_do_nmi+0x69/0x160 [ 375.997311][ C1] ? exc_nmi+0xad/0x100 [ 375.997327][ C1] ? end_repeat_nmi+0x16/0x31 [ 375.997347][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 375.997369][ C1] ? kvm_wait+0x147/0x180 [ 375.997385][ C1] ? kvm_wait+0x147/0x180 [ 375.997401][ C1] ? kvm_wait+0x147/0x180 [ 375.997417][ C1] [ 375.997422][ C1] [ 375.997427][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 375.997447][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 375.997465][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 375.997486][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 375.997509][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 375.997532][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 375.997548][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 375.997564][ C1] ? avc_has_perm_noaudit+0x2dd/0x430 [ 375.997586][ C1] lock_sock_nested+0x97/0x300 [ 375.997605][ C1] ? sock_init_data+0xc0/0xc0 [ 375.997627][ C1] tcp_recvmsg+0x226/0x7f0 [ 375.997646][ C1] ? avc_has_perm_noaudit+0x430/0x430 [ 375.997666][ C1] ? tcp_recv_timestamp+0x710/0x710 [ 375.997688][ C1] ? selinux_socket_sendmsg+0x340/0x340 [ 375.997708][ C1] inet_recvmsg+0x158/0x500 [ 375.997726][ C1] ? inet_sendpage+0x120/0x120 [ 375.997741][ C1] ? file_has_perm+0x508/0x6c0 [ 375.997759][ C1] ? security_socket_recvmsg+0x87/0xb0 [ 375.997776][ C1] ? inet_sendpage+0x120/0x120 [ 375.997793][ C1] sock_read_iter+0x353/0x480 [ 375.997811][ C1] ? kernel_sock_ip_overhead+0x280/0x280 [ 375.997831][ C1] ? iov_iter_init+0x53/0x190 [ 375.997851][ C1] vfs_read+0xa81/0xd40 [ 375.997868][ C1] ? kernel_read+0x1f0/0x1f0 [ 375.997885][ C1] ? sigprocmask+0x280/0x280 [ 375.997906][ C1] ? __kasan_check_read+0x11/0x20 [ 375.997924][ C1] ? __fdget_pos+0x209/0x3a0 [ 375.997941][ C1] ksys_read+0x199/0x2c0 [ 375.997958][ C1] ? vfs_write+0x1110/0x1110 [ 375.997975][ C1] ? debug_smp_processor_id+0x17/0x20 [ 375.997993][ C1] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 375.998014][ C1] __x64_sys_read+0x7b/0x90 [ 375.998030][ C1] x64_sys_call+0x28/0x9a0 [ 375.998054][ C1] do_syscall_64+0x3b/0xb0 [ 375.998070][ C1] ? clear_bhb_loop+0x35/0x90 [ 375.998086][ C1] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 375.998104][ C1] RIP: 0033:0x7f7732f1ab3d [ 375.998120][ C1] Code: a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb b5 e8 a8 48 00 00 0f 1f 84 00 00 00 00 00 80 3d 01 1a 1f 00 00 74 17 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 5b c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec [ 375.998134][ C1] RSP: 002b:00007ffc5a061ca8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 375.998151][ C1] RAX: ffffffffffffffda RBX: 00007ffc5a061db0 RCX: 00007f7732f1ab3d [ 375.998163][ C1] RDX: 0000000000000004 RSI: 00007ffc5a061cbc RDI: 0000000000000003 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 375.998174][ C1] RBP: 0000000000000000 R08: 00007ffc5a11c080 R09: 00007ffc5a11c0b0 [ 375.998186][ C1] R10: 00000000000119e8 R11: 0000000000000246 R12: 00007ffc5a0620d0 [ 375.998198][ C1] R13: 0000000000000004 R14: 00007ffc5a061cbc R15: 00007ffc5a061d50 [ 375.998214][ C1] [ 376.517159][ T30] audit: type=1400 audit(1742996302.302:177): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 376.539019][ T30] audit: type=1400 audit(1742996302.302:178): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 376.561098][ T30] audit: type=1400 audit(1742996302.302:179): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1