last executing test programs: 2m27.690790295s ago: executing program 2 (id=782): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffe00}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) 1m38.219741316s ago: executing program 2 (id=782): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffe00}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) 1m26.815935114s ago: executing program 2 (id=782): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffe00}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) 1m18.753010969s ago: executing program 2 (id=782): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffe00}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) 1m14.890405743s ago: executing program 3 (id=1280): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000188500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000480)={0x9}, 0x8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000"], 0x0, 0x4, 0xad, &(0x7f0000000300)=""/173}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='percpu_alloc_percpu\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000000000000000000000000000711042000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 1m14.234549346s ago: executing program 1 (id=1282): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r4}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7d}, @printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0x92}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x49) 1m13.230630738s ago: executing program 0 (id=1285): r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r0}, 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001180)={r1, 0x20, &(0x7f0000001140)={&(0x7f00000000c0)=""/117, 0x75, 0x0, &(0x7f0000000140)=""/4096, 0x1000}}, 0x10) openat$cgroup_type(r1, &(0x7f00000011c0), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001380)={r2, 0x58, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001480)={0x18, 0x14, &(0x7f0000001200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x7d0}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x98}, @cb_func={0x18, 0xa}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000012c0)='GPL\x00', 0x80000001, 0x0, 0x0, 0x100, 0x4, '\x00', r4, 0x0, r2, 0x8, &(0x7f00000013c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000001400)={0x0, 0xc, 0xa, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001440)=[r1, r2, r2], 0x0, 0x10, 0xd}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0xfffffffffffffffc, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001540)={'vcan0\x00', 0x200}) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001580)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x2, '\x00', r4, r1, 0x3, 0x7, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001840)={r1, 0xffffffffffffffff}, 0x4) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001900)={0x18, 0xd, &(0x7f0000001600)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @map_idx, @alu={0x4, 0x0, 0x8, 0x2, 0xb, 0xc, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x9, 0x1, 0x1, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_fd={0x18, 0xa, 0x1, 0x0, r6}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xe}], &(0x7f0000001680)='syzkaller\x00', 0x9, 0xd8, &(0x7f00000016c0)=""/216, 0x40f00, 0x10, '\x00', r4, 0x0, r1, 0x8, &(0x7f00000017c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000001800)={0x3, 0x10, 0x1, 0xa}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001880)=[r7, r1, r1, r1, r1, r1, r2, r2], &(0x7f00000018c0), 0x10, 0x74}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001ac0)={@cgroup=r1, 0x1f, 0x1, 0xffffffff, &(0x7f00000019c0)=[0x0], 0x1, 0x0, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001a80)=[0x0, 0x0, 0x0]}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001f40)={r2, 0xe0, &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001c80)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000001cc0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001d00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x6c, &(0x7f0000001d40)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000001d80), &(0x7f0000001dc0), 0x8, 0x1c, 0x8, 0x8, &(0x7f0000001e00)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x1, 0x6, &(0x7f0000001b00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x45c}, [@call={0x85, 0x0, 0x0, 0xd1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xdc5, 0x0, 0x0, 0x0, 0x400}]}, &(0x7f0000001b40)='syzkaller\x00', 0x2, 0xc8, &(0x7f0000001b80)=""/200, 0x41100, 0x776b67d63b714085, '\x00', r9, 0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x1, &(0x7f0000001f80)=[r6, r6, r7, r6, r1, r6, r1], &(0x7f0000001fc0)=[{0x0, 0x3, 0x5, 0xb}], 0x10, 0x10001}, 0x90) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002180)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x9, '\x00', r9, r2, 0x2, 0x2, 0x4}, 0x48) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002200)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x9, '\x00', r9, r1, 0x5, 0x0, 0x2}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000002300)={0xc, 0x2, &(0x7f00000020c0)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x4}], &(0x7f0000002100)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x2, '\x00', r4, 0x1e, r1, 0x8, &(0x7f0000002140)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, r3, r5, 0x1, &(0x7f0000002280)=[r7, r10, r6, r11], &(0x7f00000022c0)=[{0x5, 0x2, 0xb, 0xa}], 0x10, 0x6fb}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002440)={{r1, 0xffffffffffffffff}, &(0x7f00000023c0), &(0x7f0000002400)=r1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002640)={0x18, 0xe, &(0x7f0000002480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, [@generic={0x1, 0x5, 0x8, 0x6, 0x100}, @tail_call={{0x18, 0x2, 0x1, 0x0, r13}}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x39}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}]}, &(0x7f0000002500)='syzkaller\x00', 0x77, 0x0, 0x0, 0x41100, 0x10, '\x00', r4, 0x0, r1, 0x8, &(0x7f0000002540)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000002580)={0x2, 0xe, 0x0, 0xc}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000025c0)=[r6, r11, r8, r1], &(0x7f0000002600)=[{0x1, 0x1, 0xa}, {0x5, 0x3, 0x9}, {0x4, 0x3, 0x4, 0xb}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000028c0)={0x18, 0x17, &(0x7f0000002700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x455e}, [@cb_func={0x18, 0x8, 0x4, 0x0, 0x1}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xd}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f00000027c0)='syzkaller\x00', 0x60000000, 0x0, &(0x7f0000002800), 0x41000, 0x5a, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000002840)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000002880)=[{0x1, 0x1, 0x5, 0x4}, {0x2, 0x4, 0xa, 0x3}, {0x1, 0x2, 0x9, 0x4}], 0x10, 0x9}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000029c0)={&(0x7f0000002980)='rxrpc_tx_fail\x00', r12}, 0x10) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002b80)={&(0x7f0000002a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfa, 0xfa, 0x5, [@const={0x9, 0x0, 0x0, 0xa, 0x2}, @const={0x0, 0x0, 0x0, 0xa, 0x1}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x1}, {0xa, 0x4}, {0x5, 0x4}]}, @const={0xa, 0x0, 0x0, 0xa, 0x2}, @datasec={0xf, 0x6, 0x0, 0xf, 0x2, [{0x3, 0x7, 0x2}, {0x2, 0x10, 0x2}, {0x3, 0x5, 0xfffffeff}, {0x5, 0x4}, {0x5, 0x401, 0x1}, {0x3, 0xffffff51, 0xf7}], "f684"}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x4, 0x1}, {0xe, 0x4}, {0x6, 0x3}, {0x6, 0x4}, {0x2, 0x4}]}, @var={0x1, 0x0, 0x0, 0xe, 0x1}, @union={0x8, 0x1, 0x0, 0x5, 0x0, 0x2, [{0xc, 0x1, 0xd9}]}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000002b40)=""/30, 0x119, 0x1e, 0x0, 0x2}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002d00)={r14, 0x20, &(0x7f0000002cc0)={&(0x7f0000002bc0)=""/159, 0x9f, 0x0, &(0x7f0000002c80)=""/30, 0x1e}}, 0x10) r15 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002d40)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003040)={r1, 0xe0, &(0x7f0000002f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000002d80)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000002dc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002e00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xe6, &(0x7f0000002e40)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000002e80), &(0x7f0000002ec0), 0x8, 0x4b, 0x8, 0x8, &(0x7f0000002f00)}}, 0x10) ioctl$TUNSETIFINDEX(r15, 0x400454da, &(0x7f0000003080)=r16) close(r12) openat$cgroup_ro(r5, &(0x7f00000030c0)='pids.events\x00', 0x0, 0x0) 1m13.225747138s ago: executing program 0 (id=1286): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000605222327b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.events\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) (async) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x800, 0x7, 0xffff0000, 0x200, r2, 0xfff, '\x00', 0x0, r2, 0x3, 0x2, 0x3, 0xc}, 0x7048e4e025db87f0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="b7fbd5980000000000040005ca4eb600e7fe000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x9, 0x4, 0x2, 0x8}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8}, 0x0, &(0x7f0000000040)}, 0x20) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x13, 0x4, 0xfff, 0x5}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="5300000000000000b7080000000000007b8af8ff000000e4bea200000000000007020000f8ffffffb7030000b8ab8a77a637340800000000850000002400000095e225ff5c39ebc130193917567ce1a10f9da84761d016b8c48bbc67677cfc903d54fac59c47973a7ce26bda0957f1bf6531df4b52f79626b893989c07498c1dd6f183c5adcfb819285e93471a3e4fce6287dd2bfe08020a7cb820ce67304f3d0ed4bf5c47009092567eb583bf98f1144fe25c626e7f927b714112656f5ea52090e9146c4fe20d8d6c6a36bce9c29b87de34da287638ab631e6a7a59be14f67307591e1d333282051e8fd1d564f7706ac26bb2174e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000200000000000000000073012b00000000009500009c06000000e1f9386e9df76af0d4cea09b70be1a7de3f6eca03596d7551d5c44a6448865c48e8561f4309a1f0a3d08d44d97512914279f5ef44a0f7c3702f1a87bb9b3aa425318d91ab738bd046e627c4fd1b5ce46c37375b15fc354802e39470f454d09e9959bdfa1ebac1a60715b31724ae833ce57de9902d5c21c29f2b3d5a6666c2aca3fb6c2b1cef3b56b4af450c760052a7d3547c6dd73a887b74dc30049ca1b0c0000cd718a77958a5aa89c7b95c20d034bb6f60bcfc0c801de03128956334706322949a008f37dcde60685fc2706dfb02d471b0167cf2f5e9c10ff3e75fbf8206f7a6d9e87e0bb6998556a88c4d6e62e71a8cb07ea02c2bbb4433a56edcec31fdeb1e9be3482573c2948282f9c911737b192ee73d653333916ac1b6d7dcdf55f72f69a74ae292645775a402a4e8f4f9058977e8599b6ee923bf27b0d30e3d391f6abc007c1c17c83fab7df47f9132ddbf9b182f5f4b1e669bd53726e4ec05ebe51"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x80) (async) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000100)='jbd2_handle_stats\x00', r7}, 0x10) 1m13.150162764s ago: executing program 1 (id=1287): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x5, 0x3, 0x5, 0x204, 0x1, 0xffffffff, '\x00', r0, r1, 0x4, 0x0, 0x4, 0xc}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={0x0}, 0x10) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000003c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 47.145392488s ago: executing program 4 (id=1294): mkdir(&(0x7f0000000440)='./file0\x00', 0x2) r0 = perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x99, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x8, 0x0, 0x8, 0x7fffffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000007910a800000000005500ffff000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x9, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xa}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) r1 = gettid() perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0x1}}, r1, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f00000005c0)={0x4, 0x80, 0xf, 0x7, 0x9, 0x5, 0x0, 0x4, 0x200, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000380), 0x2}, 0x8a92, 0xa6, 0x9, 0x2, 0x80000001, 0xfffeffff, 0x8000, 0x0, 0x2, 0x0, 0x9}, 0xffffffffffffffff, 0x9, r0, 0x0) r3 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xfd, 0x3, 0x65, 0xb4, 0x0, 0xb, 0x0, 0x6, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={&(0x7f0000000180)}, 0x10, 0x6fda, 0x80000001, 0x7, 0x1, 0x0, 0xe, 0x0, 0x2, 0x0, 0x9}, r1, 0x8000000f, r2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x280000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.rsvd.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[], 0x31) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004ffffffff0000000003000000fcffffff000000000000000d00000000000000000000000902"], 0x0, 0x4a}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000640)=ANY=[@ANYRES32=r3], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xe, 0x16, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x25, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000009c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xffffff7f, '\x00', 0x0, r4, 0x1, 0x2, 0x1}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffebd) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x8000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0xe0, 0x0, 0x20000000, 0x0, 0x0, 0xfffffffe, 0xc49}, 0x0, 0xffffffffffffbfff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x280, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r8 = openat$cgroup_procs(r6, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000880), 0x12) write$cgroup_int(r7, &(0x7f0000000040), 0x1) 46.855980641s ago: executing program 2 (id=782): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffe00}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) 38.589897964s ago: executing program 4 (id=1295): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x200000b, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{}, &(0x7f0000000a00), &(0x7f0000000a40)=r4}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x0, 0x7fe2}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 33.665485116s ago: executing program 4 (id=1296): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85100000010000009500000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0xa6, &(0x7f0000000340)=""/166}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x5, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe8a}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003280)={0x18, 0x4, &(0x7f0000002ec0)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x10}]}, &(0x7f0000002fc0)='GPL\x00', 0x1, 0xfd, &(0x7f0000003000)=""/253}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000002c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='syzkaller\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00'}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000880)={0x5, &(0x7f0000000580)=[{0x401, 0x4, 0x0, 0xe}, {0x0, 0xd, 0x9, 0x8}, {0x8, 0x10, 0x4}, {0x0, 0xa, 0x2, 0x5a74}, {0x4, 0x0, 0x0, 0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 30.43374698s ago: executing program 4 (id=1297): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xfdef) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800000067a4e3db6c000000000c0000006638590c0000000200000000"], 0x0, 0x26}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x8}, @ldst={0x3, 0x3, 0x3, 0xa, 0x0, 0xffffffffffffffe0}]}, &(0x7f0000000100)='GPL\x00', 0x4, 0xd2, &(0x7f00000002c0)=""/210}, 0x80) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x0, 0x4, 0x9, 0x0, r2}, 0x48) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@generic={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x9, 0x81, 0x8, 0x1080, r3, 0x4, '\x00', 0x0, r0, 0x3, 0x1, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x20000000}, @generic, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x5, 0xa, &(0x7f0000000c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffb}, [@map_idx={0x18, 0x8, 0x5, 0x0, 0x1}, @func, @ringbuf_query]}, &(0x7f0000000d00)='GPL\x00', 0x200, 0x6f, &(0x7f0000000d40)=""/111, 0x40f00, 0x0, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000dc0)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r6, 0x7, 0x0, &(0x7f0000000e80)=[{0x3, 0x4, 0x6, 0x8}, {0x4, 0x1, 0x9, 0x5}, {0x2, 0x5, 0xc, 0xc}, {0x0, 0x3, 0xe, 0x3}, {0x1, 0x0, 0xe}, {0x2, 0x1, 0xa, 0xb}, {0x4, 0x3}]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)=0x8000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580)={[{0x0, 'blkio'}]}, 0x7) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) 27.60621765s ago: executing program 4 (id=1298): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000000200000002000000006000000040000000000000c020000000000000001a72227bf0bd34f7c000000feffffff000000006100"], 0x0, 0x3e}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f00000001c0)=ANY=[@ANYRES32=r0, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0xcf9, 0x1}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0011, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4023, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 6.633948029s ago: executing program 1 (id=1292): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={0x0, 0x0, 0x31, 0xfffffffffffffe84, 0x7}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000010240)=r4, 0x5a) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x58, &(0x7f0000000380)}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000280)={0x5, 0x80, 0xd, 0xe, 0x55, 0x3, 0x0, 0x1, 0x8840, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x4, 0x1000}, 0x104c, 0x8, 0x3, 0x4, 0x1, 0xfffffffd, 0xc54, 0x0, 0x8001, 0x0, 0x9}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8922, &(0x7f0000000080)) 6.457995854s ago: executing program 1 (id=1300): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0xd3, &(0x7f00000005c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0xbb, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x75, 0x75, 0x9, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x4, 0x1}, {0x2, 0x5}, {0xd, 0x2}, {0x0, 0x1}]}, @restrict={0xb, 0x0, 0x0, 0xb, 0x4}, @ptr={0x10, 0x0, 0x0, 0x2, 0x1}, @func={0xb, 0x0, 0x0, 0xc, 0x4}, @datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x9, 0xff}, {0x5, 0x2, 0x5}], "c5"}]}, {0x0, [0x5f, 0x5f, 0x0, 0x5f, 0x0, 0x2e, 0x0]}}, &(0x7f0000000e40)=""/229, 0x99, 0xe5, 0x1, 0x5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0], 0x0, 0x3f, &(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000600), 0x8, 0x8c4, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x75324cc7ada9, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f80)=ANY=[@ANYBLOB="b702000026f90000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f17e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b534dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b6fbce3f897226c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a0806000000020000000000000048f941b13d924bcf334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3964663e88535c063f7130856f756436303767d2e24f29e5dad9796edb697a6ea1182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964e4beba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570d338f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a411f450f173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75ee905000000d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c328615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef660200a99b5c0c20b378065fac4ef9ac2d00000060e5d3f1749feaecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982b951fb058fd3c7b6341c4580376b6c16bd94d2da66059de81abfa15eeeb88b6ae5882ad341032c73f1285e21fff5a1d138e061b1dc7bbda199b5fab8e0719e9cd69b47dcb52b0be6a3a73afdf328132e1d4f21065716be0c53a23940d07188b015fa341dbc92231c8b5e5717eac184f46c9f61b69f55cd2231bcf821052429a1f250e8b734be0605a15f25923d599544b319319ff0a32621019347df460a098119a6f47eb1bac47946d7a009cbc6ec74c19a93cc7c7138b28c95270116181fd5f553573c48104d2ad0e10d3663488e664401453f22f0d76d2162635365258af61ae1f46f4a7862f302d91e3f7c2781f602220522e84602a939a8d5e4137ae31ccd397404dc72e06715a6503d4d865182803ee6725da7293b23daeebefd6fce7411c9624a7e8d5ba5a13e1c32adc4f3274497c6882a72475e4280a4d9a47c003c6ed3071330c58145be498ca2b42496c479a0a71e2f6f9bad8c84bc6be20281bde0b348cd2c60538a505ad4a0510eebb023e4954c9eb6cd70627f5c03d867dbf3ad5d1f1dc852064dd0efafc3df20ed65af3d194db76127f88f284fa1b71ab964fdd2474471da76373e65e9a8bf844bdfdd348bc7d00c4c7e7afe8a1f8cde79b7a6c5aafe954b8ba37818e40c14b37c23f9f614576b689436fef2f27f8b1e756e00262e22bca49c43fd73e7e99b2fa44a8c1db99c2cf2735ad6c5fabf082e0df0f8ba7e24272165f2f5b28230c02b53d44bd84bf6770157e96bbb96b5e1f165c87e7ad68a3600b3d357fa9a7d53c281d88ebb175a4dbb82130e6870982947913110f091d21760d985afd3163f2e6880682432f9b3b97d57a9f980edfa1116a3d04d58872a07d6a7e12db673acd2f7b8988d833e71943fe2c1c65a3cf36b955c56b55bfd3ecf0af694c71a03f2996c15b1ba971de1cb9c7e6a0000000000000014783ef54c51199317413f98dca8ff3d0bda50f6c0af58dbd6c031b1a5a7512c5896514adfa17d31429c68db50a93d88199defd3b4625fea426ff9293a28a544a6a9e2a79b55daa1b3c6b14c4ec6d164e902ce4913843d65d841973468729ea12bf6d3499036dbb66718f3497855c3baa6cc07c0fa388ec9df0617c1a28ef5a595ee267a76175b8a057e6efaf4fefe46def451f2858fe71a53e77b1a44e98843bb3a40102da3703dfb9f61bdcea2fb810b32d52e2157a150a63ea6135d1cf6f864c2e68884d7245bc5d61dc5a114d10ffb22e76678bbfc1e3865d17d128306d1b81884a934cb00000000000000000098a4526e6468987dbc63bff7590eb388afaba43d811996333eef7e9f472bee293f0c40d434b8be07cbd52325296e22802493edb5c590ad208bac683a8b2d4c9d2d57ff846ae8c422e0b28546671f11d8157bb762c91f3fbcca8e21589c92446ae65d408c0637ffcc2d44d715ce003dd1e12b085e186d069a55c2e96efbe5024d61a56a36d988c0f51a973a6c238e545b28211a92000000001501aed8d72af0fcd540a9d4e293690c5e697b3a1480e46df5371bca1cfb28a57c1b3c956ec81397e81fbf870a67385fea04220423f52ad8178b9fd04bdc7e5fee4bd52db996e633792118efdb6b88023e80da74fdf723c7f0b2e9f3bb90613508c00a292a0c5b87a4f8ff35eba73ce9ebf77d0c842063a7b42c757d828678d38e6a868eaead4f19cdeb7cfc100ceabb4a3999cce5d36ecfe80def20f7187bab75515226f4d9b30e0567612210d492468781999ce795522b726bdf37b15e9afde32a7052cc909efe6ae7804e5044f9f7ae2d8cb08cca312c557bff04cf1fbb0dcfe8ac00"/2832], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff4f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r7, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd", 0x0, 0x14000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d40)={0xffffffffffffffff, 0x20, &(0x7f0000000b00)={&(0x7f0000000f40)=""/4096, 0x1000, 0x0, &(0x7f0000001f40)=""/171, 0xab}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000002040)={0x4, 0x35, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x200}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7ff}}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x322}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x20}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x88}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x4c}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfff}}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}]}, &(0x7f0000000280)='syzkaller\x00', 0x1, 0x53, &(0x7f00000004c0)=""/83, 0x41100, 0x12, '\x00', r3, 0x1, r4, 0x8, &(0x7f0000000a40)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000ac0)={0x1, 0x10, 0x1000, 0xffff8001}, 0x10, r8, 0xffffffffffffffff, 0x1, 0x0, &(0x7f0000002000)=[{0x2, 0x1, 0x1, 0x1}], 0x10, 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 5.938399666s ago: executing program 3 (id=1290): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000680)="7666673eba42ec608efb6547617c1095fd1f078b8c4205a6e3b47333f627d3771fdbc8ae3fbe450d78f7b8b26fb46d7fc4db03c5bda01c8cbd83e6e79e15ae8cec23614ab406005b5528397e7bdb0a3d3aa873932e7845cb4b8fb792539ccda71c37c9ab4d7c45da9e25008f66f6e8de9a099c1ad1b180f9e6dfb12e423877e04b157b0b30c2039814acaa441cfa7fd3e11a52abaf921ae59e50fbb5a33cf51d5c2cb5c8601c2d6770507472a79e5958304f81e7694483a911e9", &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r4}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7d}, @printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0x92}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x49) 5.801220117s ago: executing program 1 (id=1301): bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb9, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='mmap_lock_acquire_returned\x00', r0}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.434270298s ago: executing program 3 (id=1302): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5670}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x0, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x400004, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x5, 0xff}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x17, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x13, 0x4, 0x0, 0x0, 0x570}, 0x48) 4.777000911s ago: executing program 0 (id=1291): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='mmap_lock_acquire_returned\x00', r0}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.595475506s ago: executing program 3 (id=1303): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000079104800000000006104000f0000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x5, 0x1008}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000077b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(r6) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x9, 0x6, 0x2, 0x0, 0x0, 0x3, 0x10800, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x9}, 0x1000, 0x6, 0x0, 0x8, 0x0, 0xfff, 0x0, 0x0, 0x5810c9b3}, 0xffffffffffffffff, 0x8, r6, 0x9) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r3, 0x58, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000004000000080000000000000e020000000100000000176100371a23eb2ee938b7ecc383aff45317408a485b24dc20d180bcf4b30da5d31b2dcc6c66b89cc23acee8bd69af3234458b24d6cad74a18d1f5b736ea1e15003d3720191e5fc3f49bf9870edf98759090aea2f21541d811d23b88fdb5adee"], &(0x7f0000000340)=""/109, 0x2c, 0x6d, 0x0, 0x9}, 0x20) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={0x0, 0x10001, 0x2e5e715bee8b96f2}, 0xc) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x5}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@ptr={0x0, 0x0, 0x0, 0x2, 0x3}, @struct={0x5, 0x8, 0x0, 0x4, 0x1, 0x4, [{0x3, 0x4, 0xe00b}, {0x10, 0x4, 0x5}, {0xb, 0x1, 0x2}, {0x6, 0x2, 0x80}, {0x3, 0x3, 0x6}, {0xd, 0x0, 0x6}, {0x3, 0x1, 0x4}, {0x1, 0x3}]}]}, {0x0, [0x0, 0x30, 0x2e, 0x0]}}, &(0x7f0000000740)=""/242, 0x96, 0xf2, 0x0, 0x80000000}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x6, 0x11, &(0x7f0000000b40)=ANY=[@ANYBLOB="1841000004000000000000000000000064320200f0ffffff18110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702005283cc65d923fe8b44ce8a04000000008500000086000000071305000800000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7020000000000008500000086000000"], &(0x7f00000001c0)='GPL\x00', 0x7, 0x1d, &(0x7f0000000200)=""/29, 0x41000, 0x62, '\x00', r8, 0x25, r9, 0x8, &(0x7f0000000400)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[r10, r7, r11], &(0x7f0000000580)=[{0x3, 0x2, 0xe}], 0x10, 0x4}, 0x90) 4.284951911s ago: executing program 0 (id=1304): bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb9, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000f2ff8500000004000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='mmap_lock_acquire_returned\x00', r0}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.747513196s ago: executing program 3 (id=1305): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000680)="7666673eba42ec608efb6547617c1095fd1f078b8c4205a6e3b47333f627d3771fdbc8ae3fbe450d78f7b8b26fb46d7fc4db03c5bda01c8cbd83e6e79e15ae8cec23614ab406005b5528397e7bdb0a3d3aa873932e7845cb4b8fb792539ccda71c37c9ab4d7c45da9e25008f66f6e8de9a099c1ad1b180f9e6dfb12e423877e04b157b0b30c2039814acaa441cfa7fd3e11a52abaf921ae59e50fbb5a33cf51d5c2cb5c8601c2d6770507472a79e5958304f81e7694483a911e9", &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r4}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7d}, @printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0x92}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x49) 2.406651564s ago: executing program 0 (id=1306): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r0, @ANYRES32=r0, @ANYRESHEX=0x0], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}]}}, 0x0, 0x4a}, 0x20) r2 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefffffd}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000001740)=ANY=[@ANYBLOB="9feb0100180000000000000030000000300000000000000003000000030000000000000000000006040000000000000000000001000000000000000000"], &(0x7f0000000300)=""/4082, 0x4d, 0xff2, 0x3, 0x10000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=0xffffffffffffffff, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000001380)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32=r4, @ANYRES64=r1, @ANYRESOCT, @ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x58000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x9}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, r2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000e5ffffffffffffffc900000000000000ddd48cd0cf8761600000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e}, 0x90) socketpair(0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x4, [@enum={0x7, 0x5, 0x0, 0x6, 0x4, [{0x2, 0x80000001}, {0xd, 0xfffffffe}, {0xb, 0x80}, {0xf, 0x14de}, {0xb, 0x9}]}]}, {0x0, [0x5f, 0x0]}}, &(0x7f0000000240)=""/31, 0x50, 0x1f, 0x0, 0x8}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000008700000000000000a6000000ffffff8595"], &(0x7f0000000100)='GPL\x00', 0x3, 0x105, &(0x7f0000000580)=""/261}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x7, 0xf4c, 0x8, 0x0, 0xffffffffffffffff, 0x46, '\x00', 0x0, r5, 0x3, 0x2, 0x3, 0xd}, 0x48) 1.979609569s ago: executing program 2 (id=782): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffe00}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) 15.313859ms ago: executing program 0 (id=1307): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6e2300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x26c, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r2, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0], 0x0, 0x83, &(0x7f0000000500)=[{}], 0x8, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x8, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000280)='mem_connect\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'wg2\x00', @multicast}) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f0000000040)=ANY=[@ANYRESDEC=r4], &(0x7f0000000140)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r6, 0x10, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{r1}, &(0x7f00000003c0), &(0x7f0000000780)='%pS \x00'}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 14.446209ms ago: executing program 1 (id=1308): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180)={0x0, r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r2) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xe, 0x4, 0x4, 0xc}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r9}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002d40)={0x6, 0xa, 0x0, 0x0, 0x0, 0x1000, &(0x7f0000001cc0)=""/4096}, 0x90) r10 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40082404, &(0x7f0000000200)=0x7fff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r11, 0x0, 0x0) 5.56843ms ago: executing program 3 (id=1309): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000500)}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x27, 0xffffffff, 0x6, 0x9, 0x4108, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}, 0x80000020) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) sendmsg(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="a54bdf200715c4febcc1fa6910615f137e38213cedb15b8c653165b2a6bd6629def0cfa20780aaee0b96ac3ee61936a95b45bdd953903ae5b559ef", 0x3b}, {&(0x7f0000000a40)="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", 0x1000}], 0x2, &(0x7f0000001a40)=ANY=[@ANYBLOB], 0x328}, 0x40800) close(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 0s ago: executing program 4 (id=1299): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000680)="7666673eba42ec608efb6547617c1095fd1f078b8c4205a6e3b47333f627d3771fdbc8ae3fbe450d78f7b8b26fb46d7fc4db03c5bda01c8cbd83e6e79e15ae8cec23614ab406005b5528397e7bdb0a3d3aa873932e7845cb4b8fb792539ccda71c37c9ab4d7c45da9e25008f66f6e8de9a099c1ad1b180f9e6dfb12e423877e04b157b0b30c2039814acaa441cfa7fd3e11a52abaf921ae59e50fbb5a33cf51d5c2cb5c8601c2d6770507472a79e5958304f81e7694483a911e9", &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r3}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7d}, @printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x11, 0x92}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x49) kernel console output (not intermixed with test programs): that may corrupt user memory! [ 707.161018][ T4444] syz.4.842[4444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 707.440900][ T4444] syz.4.842[4444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 707.852274][ T4452] device pim6reg1 entered promiscuous mode [ 709.191119][ T4447] bridge0: port 1(bridge_slave_0) entered blocking state [ 709.231505][ T4447] bridge0: port 1(bridge_slave_0) entered disabled state [ 709.402821][ T4447] device bridge_slave_0 entered promiscuous mode [ 709.428332][ T4479] bridge0: port 3(veth1_macvtap) entered blocking state [ 709.443647][ T4479] bridge0: port 3(veth1_macvtap) entered disabled state [ 709.496667][ T4447] bridge0: port 2(bridge_slave_1) entered blocking state [ 709.505475][ T4447] bridge0: port 2(bridge_slave_1) entered disabled state [ 709.516875][ T4447] device bridge_slave_1 entered promiscuous mode [ 709.528345][ T4483] device pim6reg1 entered promiscuous mode [ 711.896085][ T4509] device pim6reg1 entered promiscuous mode [ 712.593209][ T4517] syz.0.860[4517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 712.593429][ T4517] syz.0.860[4517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 712.838080][ T4511] syz.0.860[4511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 712.991277][ T4511] syz.0.860[4511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 713.370969][ T4532] device pim6reg1 entered promiscuous mode [ 713.401931][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 713.419589][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 713.427489][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 713.446450][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 713.458921][ T1477] bridge0: port 1(bridge_slave_0) entered blocking state [ 713.465825][ T1477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 713.480719][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 713.489745][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 713.498919][ T1477] bridge0: port 2(bridge_slave_1) entered blocking state [ 713.505806][ T1477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 713.513592][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 713.523662][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 714.006935][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 714.035554][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 714.048295][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 714.148324][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 714.161796][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 714.199678][ T324] device bridge_slave_1 left promiscuous mode [ 714.210738][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 714.223075][ T324] device bridge_slave_0 left promiscuous mode [ 714.232519][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.246697][ T324] device bridge_slave_1 left promiscuous mode [ 714.254384][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 714.274494][ T324] device bridge_slave_0 left promiscuous mode [ 714.280600][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.298184][ T324] device veth1_macvtap left promiscuous mode [ 714.304150][ T324] device veth0_vlan left promiscuous mode [ 714.327829][ T324] device veth1_macvtap left promiscuous mode [ 714.333829][ T324] device veth0_vlan left promiscuous mode [ 714.755187][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 714.768687][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 714.781012][ T4447] device veth0_vlan entered promiscuous mode [ 714.824132][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 714.832859][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 714.868868][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 714.877259][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 714.901637][ T4447] device veth1_macvtap entered promiscuous mode [ 714.942598][ T4571] device wg2 entered promiscuous mode [ 714.973501][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 714.989285][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 715.001932][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 715.098712][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 715.108953][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 715.267088][ T4589] device pim6reg1 entered promiscuous mode [ 719.730808][ T4624] device bridge0 entered promiscuous mode [ 719.868945][ T4642] syz.4.890[4642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 719.869172][ T4642] syz.4.890[4642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 719.941856][ T4644] device pim6reg1 entered promiscuous mode [ 722.198276][ T4614] bridge0: port 1(bridge_slave_0) entered blocking state [ 722.205615][ T4614] bridge0: port 1(bridge_slave_0) entered disabled state [ 722.216639][ T4614] device bridge_slave_0 entered promiscuous mode [ 722.241568][ T4614] bridge0: port 2(bridge_slave_1) entered blocking state [ 722.248783][ T4614] bridge0: port 2(bridge_slave_1) entered disabled state [ 722.256949][ T4614] device bridge_slave_1 entered promiscuous mode [ 723.021957][ T324] device bridge_slave_1 left promiscuous mode [ 723.194713][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 723.411575][ T324] device bridge_slave_0 left promiscuous mode [ 723.417661][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 723.427107][ T324] device veth1_macvtap left promiscuous mode [ 723.433108][ T324] device veth0_vlan left promiscuous mode [ 723.861320][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 723.869124][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 723.880296][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 723.889649][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 723.909153][ T1477] bridge0: port 1(bridge_slave_0) entered blocking state [ 723.916038][ T1477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 723.940810][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 723.965876][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 723.975131][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 723.986009][ T4172] bridge0: port 2(bridge_slave_1) entered blocking state [ 723.992943][ T4172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.026186][ T4690] syz.0.903[4690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 724.026398][ T4690] syz.0.903[4690] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 724.040041][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 724.071757][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 724.130737][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 724.158358][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 724.167009][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 724.187019][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 724.203899][ T4614] device veth0_vlan entered promiscuous mode [ 724.215626][ T4701] device pim6reg1 entered promiscuous mode [ 724.240367][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 724.251813][ T4614] device veth1_macvtap entered promiscuous mode [ 724.267008][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 724.276158][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 724.295300][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 724.304780][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 725.325372][ T4710] device sit0 entered promiscuous mode [ 726.559386][ T4737] syz.3.914[4737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 726.559615][ T4737] syz.3.914[4737] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 726.673634][ T4742] device pim6reg1 entered promiscuous mode [ 726.767789][ T4726] bridge0: port 1(bridge_slave_0) entered blocking state [ 726.785641][ T4726] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.798553][ T4726] device bridge_slave_0 entered promiscuous mode [ 726.820043][ T4726] bridge0: port 2(bridge_slave_1) entered blocking state [ 726.835986][ T4726] bridge0: port 2(bridge_slave_1) entered disabled state [ 726.846817][ T4726] device bridge_slave_1 entered promiscuous mode [ 726.891054][ T10] device bridge_slave_1 left promiscuous mode [ 726.901256][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 726.909573][ T10] device bridge_slave_0 left promiscuous mode [ 726.915637][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.925523][ T10] device veth1_macvtap left promiscuous mode [ 726.931626][ T10] device veth0_vlan left promiscuous mode [ 727.201026][ T4761] device veth0_vlan left promiscuous mode [ 727.208703][ T4761] device veth0_vlan entered promiscuous mode [ 727.538836][ T4764] device pim6reg1 entered promiscuous mode [ 728.199275][ T4782] syz.1.926[4782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 728.199496][ T4782] syz.1.926[4782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 728.756166][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 728.797095][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 729.023857][ T4799] device pim6reg1 entered promiscuous mode [ 729.040712][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 729.058640][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 729.588691][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 729.597223][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 729.773487][ T4838] syz.1.938[4838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 729.773710][ T4838] syz.1.938[4838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 730.008523][ T4600] bridge0: port 1(bridge_slave_0) entered blocking state [ 730.026459][ T4600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 730.238348][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 730.247087][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 730.256040][ T4600] bridge0: port 2(bridge_slave_1) entered blocking state [ 730.262954][ T4600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 730.270708][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 730.279540][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 730.288707][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 730.369813][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 730.404381][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 730.426875][ T4726] device veth0_vlan entered promiscuous mode [ 730.458954][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 730.477431][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 730.516134][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 730.538735][ T299] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 730.565841][ T4726] device veth1_macvtap entered promiscuous mode [ 731.057134][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 731.065657][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 731.074519][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 731.628541][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 731.637048][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 731.896549][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 731.915833][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 732.669780][ T4876] device pim6reg1 entered promiscuous mode [ 734.605276][ T4893] syz.3.949[4893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 734.605496][ T4893] syz.3.949[4893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 735.592067][ T4904] syz.3.951[4904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 735.754363][ T4904] syz.3.951[4904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 735.850689][ T4895] bridge0: port 1(bridge_slave_0) entered blocking state [ 735.903254][ T4895] bridge0: port 1(bridge_slave_0) entered disabled state [ 735.920493][ T4895] device bridge_slave_0 entered promiscuous mode [ 735.937345][ T4895] bridge0: port 2(bridge_slave_1) entered blocking state [ 735.953422][ T4895] bridge0: port 2(bridge_slave_1) entered disabled state [ 735.985400][ T4895] device bridge_slave_1 entered promiscuous mode [ 736.655669][ T37] device bridge_slave_1 left promiscuous mode [ 736.661786][ T37] bridge0: port 2(bridge_slave_1) entered disabled state [ 736.740542][ T37] device bridge_slave_0 left promiscuous mode [ 736.767628][ T37] bridge0: port 1(bridge_slave_0) entered disabled state [ 736.857739][ T37] device veth1_macvtap left promiscuous mode [ 736.872761][ T37] device veth0_vlan left promiscuous mode [ 737.490048][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 737.507848][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 737.548001][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 737.556607][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 737.578561][ T4600] bridge0: port 1(bridge_slave_0) entered blocking state [ 737.585490][ T4600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 737.600145][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 737.608876][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 737.617139][ T4600] bridge0: port 2(bridge_slave_1) entered blocking state [ 737.624108][ T4600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 737.838950][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 737.893825][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 737.998801][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 738.045161][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 738.064644][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 738.160841][ T4895] device veth0_vlan entered promiscuous mode [ 738.333625][ T4950] syz.1.963[4950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 738.366371][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 738.386398][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 738.433645][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 738.450905][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 738.536902][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 738.710262][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 738.953502][ T4895] device veth1_macvtap entered promiscuous mode [ 739.307401][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 739.316644][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 739.326835][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 739.357064][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 739.377352][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 739.407049][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 739.417791][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 739.504389][ T4982] syz.1.969 uses obsolete (PF_INET,SOCK_PACKET) [ 739.927716][ T4986] device syzkaller0 entered promiscuous mode [ 740.699725][ T1136] device bridge_slave_1 left promiscuous mode [ 740.705734][ T1136] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.713736][ T1136] device bridge_slave_0 left promiscuous mode [ 740.719894][ T1136] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.729141][ T1136] device veth1_macvtap left promiscuous mode [ 740.735041][ T1136] device veth0_vlan left promiscuous mode [ 741.434712][ T5008] sock: sock_set_timeout: `syz.1.975' (pid 5008) tries to set negative timeout [ 741.928965][ T5012] device pim6reg1 entered promiscuous mode [ 746.140309][ T5016] syz.1.978[5016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 746.140595][ T5016] syz.1.978[5016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 748.360589][ T5129] syz.4.995[5129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 748.524577][ T5129] syz.4.995[5129] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 748.653730][ T5017] bridge0: port 1(bridge_slave_0) entered blocking state [ 748.671735][ T5017] bridge0: port 1(bridge_slave_0) entered disabled state [ 748.679869][ T5017] device bridge_slave_0 entered promiscuous mode [ 748.694669][ T5133] device pim6reg1 entered promiscuous mode [ 748.702449][ T5017] bridge0: port 2(bridge_slave_1) entered blocking state [ 748.710806][ T5017] bridge0: port 2(bridge_slave_1) entered disabled state [ 748.719056][ T5017] device bridge_slave_1 entered promiscuous mode [ 750.679210][ T5162] device pim6reg1 entered promiscuous mode [ 751.685360][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 751.693530][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 751.708154][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 751.716632][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 751.725151][ T607] bridge0: port 1(bridge_slave_0) entered blocking state [ 751.732059][ T607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 751.739488][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 751.760713][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 751.769178][ T607] bridge0: port 2(bridge_slave_1) entered blocking state [ 751.776080][ T607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 751.813781][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 751.854605][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 751.863654][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 751.877917][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 751.886793][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 752.048097][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 752.078773][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 752.126150][ T5017] device veth0_vlan entered promiscuous mode [ 752.262652][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 752.270997][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 752.280177][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 752.287791][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 752.339058][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 752.348820][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 752.388526][ T5017] device veth1_macvtap entered promiscuous mode [ 752.468433][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 752.493574][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 752.522554][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 752.548731][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 752.577443][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 753.546446][ T5195] syz.4.1011[5195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 753.546669][ T5195] syz.4.1011[5195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.882552][ T5201] device pim6reg1 entered promiscuous mode [ 756.155155][ T5215] syz.4.1017[5215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 756.155344][ T5215] syz.4.1017[5215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 756.318146][ T28] audit: type=1400 audit(1723245068.209:157): avc: denied { create } for pid=5214 comm="syz.4.1017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 758.089131][ T5202] bridge0: port 1(bridge_slave_0) entered blocking state [ 758.106305][ T5202] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.169714][ T5202] device bridge_slave_0 entered promiscuous mode [ 758.208835][ T5202] bridge0: port 2(bridge_slave_1) entered blocking state [ 758.218127][ T5202] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.226184][ T5202] device bridge_slave_1 entered promiscuous mode [ 758.463548][ T5239] syz.4.1022[5239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 758.463764][ T5239] syz.4.1022[5239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 759.562869][ T5257] device pim6reg1 entered promiscuous mode [ 759.818769][ T5056] device bridge_slave_1 left promiscuous mode [ 759.825853][ T5056] bridge0: port 2(bridge_slave_1) entered disabled state [ 760.191249][ T5056] device bridge_slave_0 left promiscuous mode [ 760.198852][ T5056] bridge0: port 1(bridge_slave_0) entered disabled state [ 760.217642][ T5056] device veth1_macvtap left promiscuous mode [ 760.223687][ T5056] device veth0_vlan left promiscuous mode [ 761.425807][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 761.449001][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 761.500669][ T5308] syz.0.1034[5308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.539655][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 761.601621][ T5308] syz.0.1034[5308] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 761.631740][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 761.667767][ T4600] bridge0: port 1(bridge_slave_0) entered blocking state [ 761.674716][ T4600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 761.682569][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 761.691857][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 761.700344][ T4600] bridge0: port 2(bridge_slave_1) entered blocking state [ 761.707225][ T4600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 761.725535][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 761.739413][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 761.748502][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 761.763818][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 761.772626][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 761.799592][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 761.809068][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 761.828491][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 761.837103][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 761.847376][ T5202] device veth0_vlan entered promiscuous mode [ 761.859208][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 761.867918][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 761.890586][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 761.899680][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 761.911501][ T5202] device veth1_macvtap entered promiscuous mode [ 761.929431][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 761.937299][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 761.946915][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 761.962814][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 761.971519][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 762.650709][ T5325] device pim6reg1 entered promiscuous mode [ 763.764732][ T5343] tun0: tun_chr_ioctl cmd 21731 [ 765.370311][ T5056] device bridge_slave_1 left promiscuous mode [ 765.376390][ T5056] bridge0: port 2(bridge_slave_1) entered disabled state [ 765.488628][ T5056] device bridge_slave_0 left promiscuous mode [ 765.494694][ T5056] bridge0: port 1(bridge_slave_0) entered disabled state [ 765.581672][ T5056] device veth1_macvtap left promiscuous mode [ 765.625799][ T5056] device veth0_vlan left promiscuous mode [ 765.682798][ T5375] syz.0.1048[5375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 765.683032][ T5375] syz.0.1048[5375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 766.250303][ T5387] device pim6reg1 entered promiscuous mode [ 766.464716][ T5388] device pim6reg1 entered promiscuous mode [ 766.715838][ T5402] FAULT_INJECTION: forcing a failure. [ 766.715838][ T5402] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 766.729999][ T5380] bridge0: port 1(bridge_slave_0) entered blocking state [ 766.738165][ T5402] CPU: 0 PID: 5402 Comm: syz.4.1056 Not tainted 6.1.90-syzkaller-00003-gbe8ff39d2e99 #0 [ 766.744146][ T5380] bridge0: port 1(bridge_slave_0) entered disabled state [ 766.747931][ T5402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 766.747973][ T5402] Call Trace: [ 766.757404][ T5380] device bridge_slave_0 entered promiscuous mode [ 766.764692][ T5402] [ 766.764722][ T5402] dump_stack_lvl+0x151/0x1b7 [ 766.781551][ T5402] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 766.786845][ T5402] ? vfs_write+0xbb3/0xeb0 [ 766.789689][ T5380] bridge0: port 2(bridge_slave_1) entered blocking state [ 766.791173][ T5402] ? __kasan_slab_free+0x11/0x20 [ 766.800612][ T5380] bridge0: port 2(bridge_slave_1) entered disabled state [ 766.802808][ T5402] dump_stack+0x15/0x1a [ 766.811844][ T5380] device bridge_slave_1 entered promiscuous mode [ 766.813653][ T5402] should_fail_ex+0x3d0/0x520 [ 766.824342][ T5402] should_fail+0xb/0x10 [ 766.828326][ T5402] should_fail_usercopy+0x1a/0x20 [ 766.833206][ T5402] _copy_from_user+0x1e/0xc0 [ 766.837700][ T5402] __sys_bpf+0x23b/0x7f0 [ 766.841787][ T5402] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 766.846998][ T5402] ? __ia32_sys_read+0x90/0x90 [ 766.851588][ T5402] ? debug_smp_processor_id+0x17/0x20 [ 766.856793][ T5402] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 766.862696][ T5402] __x64_sys_bpf+0x7c/0x90 [ 766.867122][ T5402] x64_sys_call+0x87f/0x9a0 [ 766.871462][ T5402] do_syscall_64+0x3b/0xb0 [ 766.875711][ T5402] ? clear_bhb_loop+0x55/0xb0 [ 766.880227][ T5402] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 766.885959][ T5402] RIP: 0033:0x7ff3c5f779f9 [ 766.890207][ T5402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 766.909740][ T5402] RSP: 002b:00007ff3c6d3d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 766.917984][ T5402] RAX: ffffffffffffffda RBX: 00007ff3c6105f80 RCX: 00007ff3c5f779f9 [ 766.925795][ T5402] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 766.933606][ T5402] RBP: 00007ff3c6d3d090 R08: 0000000000000000 R09: 0000000000000000 [ 766.941690][ T5402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 766.949499][ T5402] R13: 0000000000000000 R14: 00007ff3c6105f80 R15: 00007ffcc27640a8 [ 766.957415][ T5402] [ 768.121465][ T5426] device veth1_macvtap left promiscuous mode [ 768.436884][ T5437] device pim6reg1 entered promiscuous mode [ 768.445626][ T5438] device pim6reg1 entered promiscuous mode [ 768.448632][ T5429] syz.3.1062[5429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 768.586423][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 768.605170][ T5429] syz.3.1062[5429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 768.615016][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 768.634293][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 768.643491][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 768.682315][ T317] bridge0: port 1(bridge_slave_0) entered blocking state [ 768.689255][ T317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 768.708724][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 768.727337][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 768.740467][ T317] bridge0: port 2(bridge_slave_1) entered blocking state [ 768.747356][ T317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 768.763458][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 768.778759][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 768.787025][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 768.809456][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 768.817716][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 768.999887][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 769.047002][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 769.261621][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 769.459742][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 769.964863][ T5380] device veth0_vlan entered promiscuous mode [ 770.398848][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 770.406518][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 772.113193][ T5380] device veth1_macvtap entered promiscuous mode [ 772.160411][ T5487] device pim6reg1 entered promiscuous mode [ 772.170197][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 772.345758][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 772.354239][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 772.778849][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 772.787359][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 772.935093][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 772.943909][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 774.879338][ T5056] device bridge_slave_1 left promiscuous mode [ 774.885339][ T5056] bridge0: port 2(bridge_slave_1) entered disabled state [ 774.893276][ T5056] device bridge_slave_0 left promiscuous mode [ 774.899706][ T5056] bridge0: port 1(bridge_slave_0) entered disabled state [ 774.908809][ T5056] device veth1_macvtap left promiscuous mode [ 774.914708][ T5056] device veth0_vlan left promiscuous mode [ 775.267220][ T5513] syz.0.1078[5513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 775.267444][ T5513] syz.0.1078[5513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 778.130438][ T5503] syz.0.1078[5503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 778.154592][ T5503] syz.0.1078[5503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 780.403764][ T5547] FAULT_INJECTION: forcing a failure. [ 780.403764][ T5547] name failslab, interval 1, probability 0, space 0, times 1 [ 780.428723][ T5547] CPU: 0 PID: 5547 Comm: syz.3.1088 Not tainted 6.1.90-syzkaller-00003-gbe8ff39d2e99 #0 [ 780.438335][ T5547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 780.448226][ T5547] Call Trace: [ 780.451349][ T5547] [ 780.454128][ T5547] dump_stack_lvl+0x151/0x1b7 [ 780.458649][ T5547] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 780.463946][ T5547] dump_stack+0x15/0x1a [ 780.467955][ T5547] should_fail_ex+0x3d0/0x520 [ 780.472444][ T5547] ? sk_prot_alloc+0xf9/0x330 [ 780.476975][ T5547] __should_failslab+0xaf/0xf0 [ 780.481561][ T5547] should_failslab+0x9/0x20 [ 780.485897][ T5547] __kmem_cache_alloc_node+0x3d/0x250 [ 780.491111][ T5547] ? sk_prot_alloc+0xf9/0x330 [ 780.495617][ T5547] __kmalloc+0xa3/0x1e0 [ 780.499616][ T5547] sk_prot_alloc+0xf9/0x330 [ 780.503955][ T5547] sk_alloc+0x38/0x440 [ 780.507852][ T5547] ? bpf_test_init+0x169/0x190 [ 780.512597][ T5547] bpf_prog_test_run_skb+0x384/0x13a0 [ 780.517821][ T5547] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 780.523629][ T5547] ? __kasan_check_write+0x14/0x20 [ 780.528590][ T5547] ? fput+0x15b/0x1b0 [ 780.532412][ T5547] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 780.538125][ T5547] bpf_prog_test_run+0x3b0/0x630 [ 780.542905][ T5547] ? bpf_prog_query+0x260/0x260 [ 780.547582][ T5547] ? selinux_bpf+0xd2/0x100 [ 780.551926][ T5547] ? security_bpf+0x82/0xb0 [ 780.556267][ T5547] __sys_bpf+0x59f/0x7f0 [ 780.560348][ T5547] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 780.565564][ T5547] ? __ia32_sys_read+0x90/0x90 [ 780.570155][ T5547] ? debug_smp_processor_id+0x17/0x20 [ 780.575357][ T5547] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 780.581264][ T5547] __x64_sys_bpf+0x7c/0x90 [ 780.585521][ T5547] x64_sys_call+0x87f/0x9a0 [ 780.589855][ T5547] do_syscall_64+0x3b/0xb0 [ 780.594111][ T5547] ? clear_bhb_loop+0x55/0xb0 [ 780.598621][ T5547] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 780.604349][ T5547] RIP: 0033:0x7f9854d779f9 [ 780.608602][ T5547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 780.628050][ T5547] RSP: 002b:00007f9855b93038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 780.636295][ T5547] RAX: ffffffffffffffda RBX: 00007f9854f05f80 RCX: 00007f9854d779f9 [ 780.644106][ T5547] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 780.651916][ T5547] RBP: 00007f9855b93090 R08: 0000000000000000 R09: 0000000000000000 [ 780.659724][ T5547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 780.667537][ T5547] R13: 0000000000000000 R14: 00007f9854f05f80 R15: 00007ffd8e730a38 [ 780.675380][ T5547] [ 781.170010][ T5564] device pim6reg1 entered promiscuous mode [ 781.186776][ T5514] bridge0: port 1(bridge_slave_0) entered blocking state [ 781.205410][ T5514] bridge0: port 1(bridge_slave_0) entered disabled state [ 781.213952][ T5514] device bridge_slave_0 entered promiscuous mode [ 781.315895][ T5514] bridge0: port 2(bridge_slave_1) entered blocking state [ 781.384812][ T5514] bridge0: port 2(bridge_slave_1) entered disabled state [ 781.489307][ T5514] device bridge_slave_1 entered promiscuous mode [ 784.788914][ T5586] device pim6reg1 entered promiscuous mode [ 785.233354][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 785.242162][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 785.278118][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 785.286643][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 785.303631][ T5610] FAULT_INJECTION: forcing a failure. [ 785.303631][ T5610] name failslab, interval 1, probability 0, space 0, times 0 [ 785.311855][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 785.322994][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 785.330749][ T5610] CPU: 1 PID: 5610 Comm: syz.4.1099 Not tainted 6.1.90-syzkaller-00003-gbe8ff39d2e99 #0 [ 785.340356][ T5610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 785.350249][ T5610] Call Trace: [ 785.353378][ T5610] [ 785.356156][ T5610] dump_stack_lvl+0x151/0x1b7 [ 785.360673][ T5610] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 785.365973][ T5610] dump_stack+0x15/0x1a [ 785.369963][ T5610] should_fail_ex+0x3d0/0x520 [ 785.374475][ T5610] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 785.380029][ T5610] __should_failslab+0xaf/0xf0 [ 785.384626][ T5610] should_failslab+0x9/0x20 [ 785.388968][ T5610] __kmem_cache_alloc_node+0x3d/0x250 [ 785.394179][ T5610] ? selinux_sk_alloc_security+0x7d/0x1a0 [ 785.399725][ T5610] kmalloc_trace+0x2a/0xa0 [ 785.403991][ T5610] selinux_sk_alloc_security+0x7d/0x1a0 [ 785.409367][ T5610] security_sk_alloc+0x72/0xb0 [ 785.413964][ T5610] sk_prot_alloc+0x114/0x330 [ 785.418390][ T5610] sk_alloc+0x38/0x440 [ 785.422299][ T5610] ? bpf_test_init+0x169/0x190 [ 785.426900][ T5610] bpf_prog_test_run_skb+0x384/0x13a0 [ 785.432126][ T5610] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 785.437937][ T5610] ? __kasan_check_write+0x14/0x20 [ 785.442883][ T5610] ? fput+0x15b/0x1b0 [ 785.446783][ T5610] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 785.452523][ T5610] bpf_prog_test_run+0x3b0/0x630 [ 785.457297][ T5610] ? bpf_prog_query+0x260/0x260 [ 785.461979][ T5610] ? selinux_bpf+0xd2/0x100 [ 785.466321][ T5610] ? security_bpf+0x82/0xb0 [ 785.470661][ T5610] __sys_bpf+0x59f/0x7f0 [ 785.474743][ T5610] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 785.479961][ T5610] ? __ia32_sys_read+0x90/0x90 [ 785.484551][ T5610] ? debug_smp_processor_id+0x17/0x20 [ 785.489749][ T5610] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 785.495660][ T5610] __x64_sys_bpf+0x7c/0x90 [ 785.499908][ T5610] x64_sys_call+0x87f/0x9a0 [ 785.504249][ T5610] do_syscall_64+0x3b/0xb0 [ 785.508502][ T5610] ? clear_bhb_loop+0x55/0xb0 [ 785.513016][ T5610] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 785.518743][ T5610] RIP: 0033:0x7ff3c5f779f9 [ 785.523002][ T5610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 785.542442][ T5610] RSP: 002b:00007ff3c6d3d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 785.550686][ T5610] RAX: ffffffffffffffda RBX: 00007ff3c6105f80 RCX: 00007ff3c5f779f9 [ 785.558495][ T5610] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 785.566305][ T5610] RBP: 00007ff3c6d3d090 R08: 0000000000000000 R09: 0000000000000000 [ 785.574122][ T5610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 785.581933][ T5610] R13: 0000000000000000 R14: 00007ff3c6105f80 R15: 00007ffcc27640a8 [ 785.589764][ T5610] [ 785.598428][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 785.607044][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 785.615929][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 785.622861][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 785.663498][ T5619] bond_slave_1: mtu less than device minimum [ 785.692358][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 785.708675][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 785.756762][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 785.771125][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 785.873016][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 785.918804][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 786.208330][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 786.237439][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 786.372903][ T5514] device veth0_vlan entered promiscuous mode [ 786.413410][ T5638] device pim6reg1 entered promiscuous mode [ 788.219755][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 788.237606][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 788.296073][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 788.309766][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 788.328195][ T5514] device veth1_macvtap entered promiscuous mode [ 788.359623][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 788.369744][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 788.381041][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 788.442284][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 788.451916][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 788.517836][ T5657] FAULT_INJECTION: forcing a failure. [ 788.517836][ T5657] name failslab, interval 1, probability 0, space 0, times 0 [ 788.549973][ T5657] CPU: 0 PID: 5657 Comm: syz.1.1111 Not tainted 6.1.90-syzkaller-00003-gbe8ff39d2e99 #0 [ 788.559586][ T5657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 788.569481][ T5657] Call Trace: [ 788.572609][ T5657] [ 788.575385][ T5657] dump_stack_lvl+0x151/0x1b7 [ 788.579902][ T5657] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 788.585199][ T5657] ? kasan_save_alloc_info+0x1f/0x30 [ 788.590317][ T5657] dump_stack+0x15/0x1a [ 788.594305][ T5657] should_fail_ex+0x3d0/0x520 [ 788.598829][ T5657] ? build_skb+0x2c/0x220 [ 788.602992][ T5657] __should_failslab+0xaf/0xf0 [ 788.607591][ T5657] should_failslab+0x9/0x20 [ 788.611932][ T5657] kmem_cache_alloc+0x3b/0x2c0 [ 788.616537][ T5657] build_skb+0x2c/0x220 [ 788.620530][ T5657] bpf_prog_test_run_skb+0x3ad/0x13a0 [ 788.625750][ T5657] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 788.631461][ T5657] ? __kasan_check_write+0x14/0x20 [ 788.636405][ T5657] ? fput+0x15b/0x1b0 [ 788.640222][ T5657] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 788.645959][ T5657] bpf_prog_test_run+0x3b0/0x630 [ 788.650734][ T5657] ? bpf_prog_query+0x260/0x260 [ 788.655419][ T5657] ? selinux_bpf+0xd2/0x100 [ 788.659757][ T5657] ? security_bpf+0x82/0xb0 [ 788.664098][ T5657] __sys_bpf+0x59f/0x7f0 [ 788.668176][ T5657] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 788.673397][ T5657] ? __ia32_sys_read+0x90/0x90 [ 788.678074][ T5657] ? debug_smp_processor_id+0x17/0x20 [ 788.683274][ T5657] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 788.689185][ T5657] __x64_sys_bpf+0x7c/0x90 [ 788.693434][ T5657] x64_sys_call+0x87f/0x9a0 [ 788.697771][ T5657] do_syscall_64+0x3b/0xb0 [ 788.702045][ T5657] ? clear_bhb_loop+0x55/0xb0 [ 788.706538][ T5657] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 788.712271][ T5657] RIP: 0033:0x7f87e79779f9 [ 788.716518][ T5657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 788.735965][ T5657] RSP: 002b:00007f87e8773038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 788.744211][ T5657] RAX: ffffffffffffffda RBX: 00007f87e7b05f80 RCX: 00007f87e79779f9 [ 788.752030][ T5657] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 788.759833][ T5657] RBP: 00007f87e8773090 R08: 0000000000000000 R09: 0000000000000000 [ 788.767646][ T5657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 788.775461][ T5657] R13: 0000000000000000 R14: 00007f87e7b05f80 R15: 00007ffc3a2cca98 [ 788.783289][ T5657] [ 789.979389][ T5056] device bridge_slave_1 left promiscuous mode [ 789.985389][ T5056] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.993374][ T5056] device bridge_slave_0 left promiscuous mode [ 789.999529][ T5056] bridge0: port 1(bridge_slave_0) entered disabled state [ 790.008770][ T5056] device veth1_macvtap left promiscuous mode [ 790.014682][ T5056] device veth0_vlan left promiscuous mode [ 791.276434][ T5692] device pim6reg1 entered promiscuous mode [ 792.431359][ T5697] bridge0: port 1(bridge_slave_0) entered blocking state [ 792.438691][ T5697] bridge0: port 1(bridge_slave_0) entered disabled state [ 792.446833][ T5697] device bridge_slave_0 entered promiscuous mode [ 792.457390][ T5697] bridge0: port 2(bridge_slave_1) entered blocking state [ 792.464985][ T5697] bridge0: port 2(bridge_slave_1) entered disabled state [ 792.473376][ T5697] device bridge_slave_1 entered promiscuous mode [ 796.241884][ T5731] FAULT_INJECTION: forcing a failure. [ 796.241884][ T5731] name failslab, interval 1, probability 0, space 0, times 0 [ 796.255900][ T5731] CPU: 0 PID: 5731 Comm: syz.3.1126 Not tainted 6.1.90-syzkaller-00003-gbe8ff39d2e99 #0 [ 796.265605][ T5731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 796.275598][ T5731] Call Trace: [ 796.278718][ T5731] [ 796.281490][ T5731] dump_stack_lvl+0x151/0x1b7 [ 796.286093][ T5731] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 796.291402][ T5731] dump_stack+0x15/0x1a [ 796.295376][ T5731] should_fail_ex+0x3d0/0x520 [ 796.299895][ T5731] ? skb_clone+0x1f8/0x380 [ 796.304151][ T5731] __should_failslab+0xaf/0xf0 [ 796.308745][ T5731] should_failslab+0x9/0x20 [ 796.313087][ T5731] kmem_cache_alloc+0x3b/0x2c0 [ 796.317689][ T5731] ? __kernel_text_address+0xd/0x40 [ 796.322727][ T5731] skb_clone+0x1f8/0x380 [ 796.326803][ T5731] bpf_clone_redirect+0xa6/0x390 [ 796.331771][ T5731] bpf_prog_e2f29814702bf05a+0x56/0x5e [ 796.337056][ T5731] ? module_enforce_rwx_sections+0x60/0x160 [ 796.342986][ T5731] ? __stack_depot_save+0x36/0x480 [ 796.347918][ T5731] ? kasan_set_track+0x60/0x70 [ 796.352502][ T5731] ? kasan_set_track+0x4b/0x70 [ 796.357107][ T5731] ? kasan_save_alloc_info+0x1f/0x30 [ 796.362231][ T5731] ? __kasan_slab_alloc+0x6c/0x80 [ 796.367093][ T5731] ? slab_post_alloc_hook+0x53/0x2c0 [ 796.372215][ T5731] ? kmem_cache_alloc+0x175/0x2c0 [ 796.377072][ T5731] ? build_skb+0x2c/0x220 [ 796.381239][ T5731] ? bpf_prog_test_run_skb+0x3ad/0x13a0 [ 796.386623][ T5731] ? bpf_prog_test_run+0x3b0/0x630 [ 796.391569][ T5731] ? __sys_bpf+0x59f/0x7f0 [ 796.395820][ T5731] ? __x64_sys_bpf+0x7c/0x90 [ 796.400244][ T5731] ? x64_sys_call+0x87f/0x9a0 [ 796.404755][ T5731] ? do_syscall_64+0x3b/0xb0 [ 796.409189][ T5731] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 796.415109][ T5731] ? kvm_sched_clock_read+0x18/0x40 [ 796.420129][ T5731] ? sched_clock+0x9/0x10 [ 796.424290][ T5731] bpf_test_run+0x6b0/0xa40 [ 796.428653][ T5731] ? convert___skb_to_skb+0x670/0x670 [ 796.433843][ T5731] ? eth_type_trans+0x342/0x710 [ 796.438703][ T5731] ? eth_get_headlen+0x240/0x240 [ 796.443465][ T5731] ? bpf_prog_test_run_skb+0x7ab/0x13a0 [ 796.448856][ T5731] ? convert___skb_to_skb+0x44/0x670 [ 796.453968][ T5731] ? memcpy+0x56/0x70 [ 796.457789][ T5731] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 796.463028][ T5731] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 796.468835][ T5731] ? __kasan_check_write+0x14/0x20 [ 796.473776][ T5731] ? fput+0x15b/0x1b0 [ 796.477589][ T5731] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 796.483329][ T5731] bpf_prog_test_run+0x3b0/0x630 [ 796.488097][ T5731] ? bpf_prog_query+0x260/0x260 [ 796.492801][ T5731] ? selinux_bpf+0xd2/0x100 [ 796.497130][ T5731] ? security_bpf+0x82/0xb0 [ 796.501468][ T5731] __sys_bpf+0x59f/0x7f0 [ 796.505549][ T5731] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 796.510771][ T5731] ? __ia32_sys_read+0x90/0x90 [ 796.515363][ T5731] ? debug_smp_processor_id+0x17/0x20 [ 796.520556][ T5731] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 796.526468][ T5731] __x64_sys_bpf+0x7c/0x90 [ 796.530717][ T5731] x64_sys_call+0x87f/0x9a0 [ 796.535057][ T5731] do_syscall_64+0x3b/0xb0 [ 796.539311][ T5731] ? clear_bhb_loop+0x55/0xb0 [ 796.543826][ T5731] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 796.549552][ T5731] RIP: 0033:0x7f9854d779f9 [ 796.553807][ T5731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 796.573247][ T5731] RSP: 002b:00007f9855b93038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 796.581494][ T5731] RAX: ffffffffffffffda RBX: 00007f9854f05f80 RCX: 00007f9854d779f9 [ 796.589307][ T5731] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 796.597115][ T5731] RBP: 00007f9855b93090 R08: 0000000000000000 R09: 0000000000000000 [ 796.604928][ T5731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 796.612740][ T5731] R13: 0000000000000000 R14: 00007f9854f05f80 R15: 00007ffd8e730a38 [ 796.620573][ T5731] [ 797.858861][ T5752] device pim6reg1 entered promiscuous mode [ 798.495381][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 798.506625][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 798.538826][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 798.572958][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 798.593355][ T19] bridge0: port 1(bridge_slave_0) entered blocking state [ 798.600275][ T19] bridge0: port 1(bridge_slave_0) entered forwarding state [ 798.610137][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 798.628710][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 798.637447][ T19] bridge0: port 2(bridge_slave_1) entered blocking state [ 798.644381][ T19] bridge0: port 2(bridge_slave_1) entered forwarding state [ 798.671071][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 798.698855][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 798.707305][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 798.716830][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 798.727869][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 798.760305][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 798.769529][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 798.791191][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 798.799732][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 798.810072][ T5697] device veth0_vlan entered promiscuous mode [ 798.817843][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 799.131952][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 799.288291][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 799.296690][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 799.319330][ T5697] device veth1_macvtap entered promiscuous mode [ 803.445648][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 803.454038][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 803.462611][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 803.471798][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 803.481120][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 803.585715][ T5786] syz.4.1142[5786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 803.585937][ T5786] syz.4.1142[5786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 804.493494][ T5809] device pim6reg1 entered promiscuous mode [ 805.509286][ T1136] device bridge_slave_1 left promiscuous mode [ 805.515284][ T1136] bridge0: port 2(bridge_slave_1) entered disabled state [ 805.523180][ T1136] device bridge_slave_0 left promiscuous mode [ 805.529332][ T1136] bridge0: port 1(bridge_slave_0) entered disabled state [ 805.538686][ T1136] device veth1_macvtap left promiscuous mode [ 805.544582][ T1136] device veth0_vlan left promiscuous mode [ 805.842294][ T5829] FAULT_INJECTION: forcing a failure. [ 805.842294][ T5829] name failslab, interval 1, probability 0, space 0, times 0 [ 805.854995][ T5829] CPU: 0 PID: 5829 Comm: syz.1.1150 Not tainted 6.1.90-syzkaller-00003-gbe8ff39d2e99 #0 [ 805.864597][ T5829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 805.874494][ T5829] Call Trace: [ 805.877619][ T5829] [ 805.880394][ T5829] dump_stack_lvl+0x151/0x1b7 [ 805.884910][ T5829] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 805.890208][ T5829] ? __kernel_text_address+0xd/0x40 [ 805.895236][ T5829] ? unwind_get_return_address+0x4d/0x90 [ 805.900714][ T5829] dump_stack+0x15/0x1a [ 805.904700][ T5829] should_fail_ex+0x3d0/0x520 [ 805.909216][ T5829] ? dst_alloc+0x164/0x1e0 [ 805.913610][ T5829] __should_failslab+0xaf/0xf0 [ 805.918212][ T5829] should_failslab+0x9/0x20 [ 805.922547][ T5829] kmem_cache_alloc+0x3b/0x2c0 [ 805.927156][ T5829] dst_alloc+0x164/0x1e0 [ 805.931229][ T5829] ip_route_output_key_hash_rcu+0x14ad/0x2040 [ 805.937299][ T5829] ip_route_output_flow+0x16b/0x340 [ 805.942318][ T5829] ? ipv4_sk_update_pmtu+0x1e60/0x1e60 [ 805.947626][ T5829] ip_tunnel_xmit+0xc46/0x2ac0 [ 805.952324][ T5829] ? arch_stack_walk+0xf3/0x140 [ 805.957000][ T5829] ? tnl_update_pmtu+0xba0/0xba0 [ 805.961783][ T5829] ? gre_build_header+0x260/0x8c0 [ 805.966741][ T5829] ipgre_xmit+0x8c1/0xc80 [ 805.970912][ T5829] dev_hard_start_xmit+0x1de/0x630 [ 805.975857][ T5829] __dev_queue_xmit+0x18a4/0x36e0 [ 805.980718][ T5829] ? __dev_queue_xmit+0x2a6/0x36e0 [ 805.985653][ T5829] ? netdev_core_pick_tx+0x350/0x350 [ 805.990779][ T5829] ? __kasan_check_write+0x14/0x20 [ 805.995724][ T5829] ? skb_release_data+0x19e/0x840 [ 806.000584][ T5829] ? __kasan_kmalloc+0x9c/0xb0 [ 806.005197][ T5829] ? __kasan_check_write+0x14/0x20 [ 806.010132][ T5829] ? pskb_expand_head+0x7a8/0x1380 [ 806.015087][ T5829] __bpf_redirect+0xa29/0x1180 [ 806.019687][ T5829] bpf_clone_redirect+0x24d/0x390 [ 806.024550][ T5829] bpf_prog_e2f29814702bf05a+0x56/0x5e [ 806.029835][ T5829] ? module_enforce_rwx_sections+0x60/0x160 [ 806.035563][ T5829] ? __stack_depot_save+0x36/0x480 [ 806.040515][ T5829] ? kasan_set_track+0x60/0x70 [ 806.045111][ T5829] ? kasan_set_track+0x4b/0x70 [ 806.049710][ T5829] ? kasan_save_alloc_info+0x1f/0x30 [ 806.054835][ T5829] ? __kasan_slab_alloc+0x6c/0x80 [ 806.059691][ T5829] ? slab_post_alloc_hook+0x53/0x2c0 [ 806.064812][ T5829] ? kmem_cache_alloc+0x175/0x2c0 [ 806.069674][ T5829] ? build_skb+0x2c/0x220 [ 806.073837][ T5829] ? bpf_prog_test_run_skb+0x3ad/0x13a0 [ 806.079219][ T5829] ? bpf_prog_test_run+0x3b0/0x630 [ 806.084165][ T5829] ? __sys_bpf+0x59f/0x7f0 [ 806.088421][ T5829] ? __x64_sys_bpf+0x7c/0x90 [ 806.092845][ T5829] ? x64_sys_call+0x87f/0x9a0 [ 806.097359][ T5829] ? do_syscall_64+0x3b/0xb0 [ 806.101788][ T5829] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 806.107711][ T5829] ? ktime_get+0x12f/0x160 [ 806.111944][ T5829] bpf_test_run+0x4ab/0xa40 [ 806.116315][ T5829] ? convert___skb_to_skb+0x670/0x670 [ 806.121497][ T5829] ? eth_type_trans+0x342/0x710 [ 806.126194][ T5829] ? eth_get_headlen+0x240/0x240 [ 806.130959][ T5829] ? bpf_prog_test_run_skb+0x7ab/0x13a0 [ 806.136336][ T5829] ? convert___skb_to_skb+0x44/0x670 [ 806.141454][ T5829] ? memcpy+0x56/0x70 [ 806.145284][ T5829] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 806.150502][ T5829] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 806.156215][ T5829] ? __kasan_check_write+0x14/0x20 [ 806.161157][ T5829] ? fput+0x15b/0x1b0 [ 806.164980][ T5829] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 806.170709][ T5829] bpf_prog_test_run+0x3b0/0x630 [ 806.175490][ T5829] ? bpf_prog_query+0x260/0x260 [ 806.180177][ T5829] ? selinux_bpf+0xd2/0x100 [ 806.184509][ T5829] ? security_bpf+0x82/0xb0 [ 806.188860][ T5829] __sys_bpf+0x59f/0x7f0 [ 806.192936][ T5829] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 806.198157][ T5829] ? __ia32_sys_read+0x90/0x90 [ 806.202741][ T5829] ? debug_smp_processor_id+0x17/0x20 [ 806.207945][ T5829] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 806.213850][ T5829] __x64_sys_bpf+0x7c/0x90 [ 806.218102][ T5829] x64_sys_call+0x87f/0x9a0 [ 806.222445][ T5829] do_syscall_64+0x3b/0xb0 [ 806.226695][ T5829] ? clear_bhb_loop+0x55/0xb0 [ 806.231212][ T5829] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 806.236935][ T5829] RIP: 0033:0x7f87e79779f9 [ 806.241194][ T5829] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 806.260633][ T5829] RSP: 002b:00007f87e8773038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 806.268880][ T5829] RAX: ffffffffffffffda RBX: 00007f87e7b05f80 RCX: 00007f87e79779f9 [ 806.276693][ T5829] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 806.284505][ T5829] RBP: 00007f87e8773090 R08: 0000000000000000 R09: 0000000000000000 [ 806.292318][ T5829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 806.300133][ T5829] R13: 0000000000000000 R14: 00007f87e7b05f80 R15: 00007ffc3a2cca98 [ 806.307953][ T5829] [ 809.510019][ T5887] device pim6reg1 entered promiscuous mode [ 809.528686][ T5836] bridge0: port 1(bridge_slave_0) entered blocking state [ 809.535591][ T5836] bridge0: port 1(bridge_slave_0) entered disabled state [ 809.549364][ T5836] device bridge_slave_0 entered promiscuous mode [ 809.648577][ T5836] bridge0: port 2(bridge_slave_1) entered blocking state [ 809.655489][ T5836] bridge0: port 2(bridge_slave_1) entered disabled state [ 809.689200][ T5836] device bridge_slave_1 entered promiscuous mode [ 809.972633][ T5898] device pim6reg1 entered promiscuous mode [ 810.006433][ T5900] FAULT_INJECTION: forcing a failure. [ 810.006433][ T5900] name failslab, interval 1, probability 0, space 0, times 0 [ 810.018995][ T5900] CPU: 0 PID: 5900 Comm: syz.3.1165 Not tainted 6.1.90-syzkaller-00003-gbe8ff39d2e99 #0 [ 810.028598][ T5900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 810.038502][ T5900] Call Trace: [ 810.041622][ T5900] [ 810.044398][ T5900] dump_stack_lvl+0x151/0x1b7 [ 810.048913][ T5900] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 810.054206][ T5900] ? kasan_set_track+0x60/0x70 [ 810.058809][ T5900] ? kasan_set_track+0x4b/0x70 [ 810.063406][ T5900] ? kasan_save_alloc_info+0x1f/0x30 [ 810.068530][ T5900] ? slab_post_alloc_hook+0x53/0x2c0 [ 810.073647][ T5900] ? kmem_cache_alloc+0x175/0x2c0 [ 810.078509][ T5900] ? dst_alloc+0x164/0x1e0 [ 810.082762][ T5900] ? ip_route_output_key_hash_rcu+0x14ad/0x2040 [ 810.088845][ T5900] dump_stack+0x15/0x1a [ 810.092832][ T5900] should_fail_ex+0x3d0/0x520 [ 810.097354][ T5900] ? ref_tracker_alloc+0x138/0x450 [ 810.102295][ T5900] __should_failslab+0xaf/0xf0 [ 810.106894][ T5900] should_failslab+0x9/0x20 [ 810.111230][ T5900] __kmem_cache_alloc_node+0x3d/0x250 [ 810.116453][ T5900] ? ref_tracker_alloc+0x138/0x450 [ 810.121388][ T5900] kmalloc_trace+0x2a/0xa0 [ 810.125647][ T5900] ref_tracker_alloc+0x138/0x450 [ 810.130420][ T5900] ? ref_tracker_dir_print+0x160/0x160 [ 810.135729][ T5900] ? slab_post_alloc_hook+0x72/0x2c0 [ 810.140830][ T5900] ? dst_alloc+0x164/0x1e0 [ 810.145092][ T5900] dst_init+0xe1/0x400 [ 810.148999][ T5900] dst_alloc+0x18a/0x1e0 [ 810.153081][ T5900] ip_route_output_key_hash_rcu+0x14ad/0x2040 [ 810.158996][ T5900] ip_route_output_flow+0x16b/0x340 [ 810.164108][ T5900] ? ipv4_sk_update_pmtu+0x1e60/0x1e60 [ 810.169419][ T5900] ip_tunnel_xmit+0xc46/0x2ac0 [ 810.174463][ T5900] ? arch_stack_walk+0xf3/0x140 [ 810.179124][ T5900] ? tnl_update_pmtu+0xba0/0xba0 [ 810.183912][ T5900] ? gre_build_header+0x260/0x8c0 [ 810.188767][ T5900] ipgre_xmit+0x8c1/0xc80 [ 810.192945][ T5900] dev_hard_start_xmit+0x1de/0x630 [ 810.197994][ T5900] __dev_queue_xmit+0x18a4/0x36e0 [ 810.202956][ T5900] ? __dev_queue_xmit+0x2a6/0x36e0 [ 810.207978][ T5900] ? netdev_core_pick_tx+0x350/0x350 [ 810.213104][ T5900] ? __kasan_check_write+0x14/0x20 [ 810.218046][ T5900] ? skb_release_data+0x19e/0x840 [ 810.222906][ T5900] ? __kasan_kmalloc+0x9c/0xb0 [ 810.227521][ T5900] ? __kasan_check_write+0x14/0x20 [ 810.232458][ T5900] ? pskb_expand_head+0x7a8/0x1380 [ 810.237413][ T5900] __bpf_redirect+0xa29/0x1180 [ 810.242016][ T5900] bpf_clone_redirect+0x24d/0x390 [ 810.246879][ T5900] bpf_prog_e2f29814702bf05a+0x56/0x5e [ 810.252161][ T5900] ? module_enforce_rwx_sections+0x60/0x160 [ 810.257894][ T5900] ? __stack_depot_save+0x36/0x480 [ 810.262846][ T5900] ? kasan_set_track+0x60/0x70 [ 810.267437][ T5900] ? kasan_set_track+0x4b/0x70 [ 810.272040][ T5900] ? kasan_save_alloc_info+0x1f/0x30 [ 810.277157][ T5900] ? __kasan_slab_alloc+0x6c/0x80 [ 810.282017][ T5900] ? slab_post_alloc_hook+0x53/0x2c0 [ 810.287138][ T5900] ? kmem_cache_alloc+0x175/0x2c0 [ 810.292000][ T5900] ? build_skb+0x2c/0x220 [ 810.296168][ T5900] ? bpf_prog_test_run_skb+0x3ad/0x13a0 [ 810.301546][ T5900] ? bpf_prog_test_run+0x3b0/0x630 [ 810.306494][ T5900] ? __sys_bpf+0x59f/0x7f0 [ 810.310752][ T5900] ? __x64_sys_bpf+0x7c/0x90 [ 810.315172][ T5900] ? x64_sys_call+0x87f/0x9a0 [ 810.319693][ T5900] ? do_syscall_64+0x3b/0xb0 [ 810.324120][ T5900] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 810.330044][ T5900] ? ktime_get+0x12f/0x160 [ 810.334377][ T5900] bpf_test_run+0x4ab/0xa40 [ 810.338736][ T5900] ? convert___skb_to_skb+0x670/0x670 [ 810.343938][ T5900] ? eth_type_trans+0x342/0x710 [ 810.348622][ T5900] ? eth_get_headlen+0x240/0x240 [ 810.353383][ T5900] ? bpf_prog_test_run_skb+0x7ab/0x13a0 [ 810.358761][ T5900] ? convert___skb_to_skb+0x44/0x670 [ 810.363882][ T5900] ? memcpy+0x56/0x70 [ 810.367709][ T5900] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 810.372941][ T5900] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 810.378743][ T5900] ? __kasan_check_write+0x14/0x20 [ 810.383691][ T5900] ? fput+0x15b/0x1b0 [ 810.387508][ T5900] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 810.393241][ T5900] bpf_prog_test_run+0x3b0/0x630 [ 810.398013][ T5900] ? bpf_prog_query+0x260/0x260 [ 810.402695][ T5900] ? selinux_bpf+0xd2/0x100 [ 810.407080][ T5900] ? security_bpf+0x82/0xb0 [ 810.411478][ T5900] __sys_bpf+0x59f/0x7f0 [ 810.415563][ T5900] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 810.420788][ T5900] ? __ia32_sys_read+0x90/0x90 [ 810.425469][ T5900] ? debug_smp_processor_id+0x17/0x20 [ 810.430679][ T5900] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 810.436582][ T5900] __x64_sys_bpf+0x7c/0x90 [ 810.440834][ T5900] x64_sys_call+0x87f/0x9a0 [ 810.445168][ T5900] do_syscall_64+0x3b/0xb0 [ 810.449418][ T5900] ? clear_bhb_loop+0x55/0xb0 [ 810.453948][ T5900] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 810.459666][ T5900] RIP: 0033:0x7f9854d779f9 [ 810.463916][ T5900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 810.483363][ T5900] RSP: 002b:00007f9855b93038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 810.491605][ T5900] RAX: ffffffffffffffda RBX: 00007f9854f05f80 RCX: 00007f9854d779f9 [ 810.499417][ T5900] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 810.507232][ T5900] RBP: 00007f9855b93090 R08: 0000000000000000 R09: 0000000000000000 [ 810.515040][ T5900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 810.522855][ T5900] R13: 0000000000000000 R14: 00007f9854f05f80 R15: 00007ffd8e730a38 [ 810.530688][ T5900] [ 810.533616][ T5900] memory allocation failure, unreliable refcount tracker. [ 815.293341][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 815.309503][ T300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 815.411747][ T5836] device veth0_vlan entered promiscuous mode [ 815.426022][ T5944] device pim6reg1 entered promiscuous mode [ 815.486993][ T5836] device veth1_macvtap entered promiscuous mode [ 815.523083][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 815.549319][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 815.557647][ T607] bridge0: port 1(bridge_slave_0) entered blocking state [ 815.564586][ T607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 815.571992][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 815.580637][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 815.589059][ T607] bridge0: port 2(bridge_slave_1) entered blocking state [ 815.595951][ T607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 815.612836][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 815.624133][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 815.642710][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 815.668858][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 815.677109][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 815.768846][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 815.787852][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 815.894891][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 815.904744][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 815.913567][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 815.922260][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 815.931313][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 815.948751][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 815.958936][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 816.001301][ T5961] FAULT_INJECTION: forcing a failure. [ 816.001301][ T5961] name failslab, interval 1, probability 0, space 0, times 0 [ 816.013829][ T5961] CPU: 1 PID: 5961 Comm: syz.0.1179 Not tainted 6.1.90-syzkaller-00003-gbe8ff39d2e99 #0 [ 816.023433][ T5961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 816.033323][ T5961] Call Trace: [ 816.036448][ T5961] [ 816.039224][ T5961] dump_stack_lvl+0x151/0x1b7 [ 816.043744][ T5961] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 816.049041][ T5961] ? fib6_table_lookup+0xa60/0xa80 [ 816.054161][ T5961] dump_stack+0x15/0x1a [ 816.058147][ T5961] should_fail_ex+0x3d0/0x520 [ 816.062666][ T5961] ? dst_alloc+0x164/0x1e0 [ 816.066917][ T5961] __should_failslab+0xaf/0xf0 [ 816.071523][ T5961] should_failslab+0x9/0x20 [ 816.075859][ T5961] kmem_cache_alloc+0x3b/0x2c0 [ 816.080457][ T5961] ? fib6_select_path+0x13c/0x5b0 [ 816.085325][ T5961] ? ipv6_sysctl_rtcache_flush+0x120/0x120 [ 816.091115][ T5961] dst_alloc+0x164/0x1e0 [ 816.095191][ T5961] ip6_pol_route+0xc60/0x14a0 [ 816.099700][ T5961] ? ip6_pol_route+0x583/0x14a0 [ 816.104390][ T5961] ? fib6_table_lookup+0xa80/0xa80 [ 816.109332][ T5961] ? __kasan_check_write+0x14/0x20 [ 816.114274][ T5961] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 816.119727][ T5961] ? _raw_spin_lock+0x1b0/0x1b0 [ 816.124411][ T5961] ? stack_trace_save+0x113/0x1c0 [ 816.129377][ T5961] ip6_pol_route_output+0x50/0x80 [ 816.134231][ T5961] fib6_rule_lookup+0x371/0x620 [ 816.139022][ T5961] ? ip6_route_output_flags_noref+0x350/0x350 [ 816.144920][ T5961] ? fib6_lookup+0x3f0/0x3f0 [ 816.149350][ T5961] ? skb_copy_bits+0x8d/0x7f0 [ 816.153878][ T5961] ? __ipv6_addr_type+0x116/0x2f0 [ 816.158859][ T5961] ip6_route_output_flags_noref+0x289/0x350 [ 816.164588][ T5961] ip6_route_output_flags+0x3f/0x220 [ 816.169702][ T5961] icmpv6_rt_has_prefsrc+0x4a/0x1f0 [ 816.174852][ T5961] icmp6_send+0xbaa/0x1e40 [ 816.179113][ T5961] ? icmp6_send+0x9c8/0x1e40 [ 816.183545][ T5961] ? icmpv6_push_pending_frames+0x490/0x490 [ 816.189259][ T5961] ? mpi_mul+0x730/0xa60 [ 816.193342][ T5961] ? dst_init+0xe1/0x400 [ 816.197451][ T5961] ? dst_alloc+0x18a/0x1e0 [ 816.201671][ T5961] ? ip_route_output_key_hash_rcu+0x14ad/0x2040 [ 816.207752][ T5961] ? ip_route_output_flow+0x16b/0x340 [ 816.212983][ T5961] ? ipgre_xmit+0x8c1/0xc80 [ 816.217292][ T5961] ? dev_hard_start_xmit+0x1de/0x630 [ 816.222419][ T5961] ? __dev_queue_xmit+0x18a4/0x36e0 [ 816.227458][ T5961] ? memset+0x35/0x40 [ 816.231272][ T5961] ? xfrm_lookup_with_ifid+0x1cb6/0x22b0 [ 816.236864][ T5961] icmpv6_ndo_send+0x131/0x4e0 [ 816.241447][ T5961] ? ip_route_output_key_hash_rcu+0x17b9/0x2040 [ 816.247529][ T5961] ? udp6_set_csum+0xef0/0xef0 [ 816.252132][ T5961] ? ip_route_output_flow+0x215/0x340 [ 816.257333][ T5961] ? ipv4_sk_update_pmtu+0x1e60/0x1e60 [ 816.262637][ T5961] tnl_update_pmtu+0x926/0xba0 [ 816.267237][ T5961] ip_tunnel_xmit+0x102a/0x2ac0 [ 816.271950][ T5961] ? tnl_update_pmtu+0xba0/0xba0 [ 816.276788][ T5961] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 816.282099][ T5961] ? gre_build_header+0x260/0x8c0 [ 816.286958][ T5961] ipgre_xmit+0x8c1/0xc80 [ 816.291125][ T5961] dev_hard_start_xmit+0x1de/0x630 [ 816.296075][ T5961] __dev_queue_xmit+0x18a4/0x36e0 [ 816.300937][ T5961] ? __dev_queue_xmit+0x2a6/0x36e0 [ 816.305873][ T5961] ? netdev_core_pick_tx+0x350/0x350 [ 816.311101][ T5961] ? __kasan_check_write+0x14/0x20 [ 816.316041][ T5961] ? skb_release_data+0x19e/0x840 [ 816.320894][ T5961] ? __kasan_kmalloc+0x9c/0xb0 [ 816.325506][ T5961] ? __kasan_check_write+0x14/0x20 [ 816.330445][ T5961] ? pskb_expand_head+0x7a8/0x1380 [ 816.335403][ T5961] __bpf_redirect+0xa29/0x1180 [ 816.340008][ T5961] bpf_clone_redirect+0x24d/0x390 [ 816.344860][ T5961] bpf_prog_e2f29814702bf05a+0x56/0x5e [ 816.350144][ T5961] ? module_enforce_rwx_sections+0x60/0x160 [ 816.355882][ T5961] ? __stack_depot_save+0x36/0x480 [ 816.360835][ T5961] ? kasan_set_track+0x60/0x70 [ 816.365427][ T5961] ? kasan_set_track+0x4b/0x70 [ 816.370022][ T5961] ? kasan_save_alloc_info+0x1f/0x30 [ 816.375142][ T5961] ? __kasan_slab_alloc+0x6c/0x80 [ 816.380039][ T5961] ? slab_post_alloc_hook+0x53/0x2c0 [ 816.385126][ T5961] ? kmem_cache_alloc+0x175/0x2c0 [ 816.389990][ T5961] ? build_skb+0x2c/0x220 [ 816.394154][ T5961] ? bpf_prog_test_run_skb+0x3ad/0x13a0 [ 816.399535][ T5961] ? bpf_prog_test_run+0x3b0/0x630 [ 816.404485][ T5961] ? __sys_bpf+0x59f/0x7f0 [ 816.408735][ T5961] ? __x64_sys_bpf+0x7c/0x90 [ 816.413165][ T5961] ? x64_sys_call+0x87f/0x9a0 [ 816.417675][ T5961] ? do_syscall_64+0x3b/0xb0 [ 816.422102][ T5961] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 816.428029][ T5961] ? ktime_get+0x12f/0x160 [ 816.432367][ T5961] bpf_test_run+0x4ab/0xa40 [ 816.436721][ T5961] ? convert___skb_to_skb+0x670/0x670 [ 816.441915][ T5961] ? eth_type_trans+0x342/0x710 [ 816.446604][ T5961] ? eth_get_headlen+0x240/0x240 [ 816.451367][ T5961] ? bpf_prog_test_run_skb+0x7ab/0x13a0 [ 816.456748][ T5961] ? convert___skb_to_skb+0x44/0x670 [ 816.461872][ T5961] ? memcpy+0x56/0x70 [ 816.465698][ T5961] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 816.470927][ T5961] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 816.476735][ T5961] ? __kasan_check_write+0x14/0x20 [ 816.481679][ T5961] ? fput+0x15b/0x1b0 [ 816.485495][ T5961] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 816.491231][ T5961] bpf_prog_test_run+0x3b0/0x630 [ 816.496008][ T5961] ? bpf_prog_query+0x260/0x260 [ 816.500691][ T5961] ? selinux_bpf+0xd2/0x100 [ 816.505036][ T5961] ? security_bpf+0x82/0xb0 [ 816.509376][ T5961] __sys_bpf+0x59f/0x7f0 [ 816.513450][ T5961] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 816.518675][ T5961] ? __ia32_sys_read+0x90/0x90 [ 816.523264][ T5961] ? debug_smp_processor_id+0x17/0x20 [ 816.528467][ T5961] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 816.534376][ T5961] __x64_sys_bpf+0x7c/0x90 [ 816.538632][ T5961] x64_sys_call+0x87f/0x9a0 [ 816.542972][ T5961] do_syscall_64+0x3b/0xb0 [ 816.547222][ T5961] ? clear_bhb_loop+0x55/0xb0 [ 816.551729][ T5961] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 816.557463][ T5961] RIP: 0033:0x7f02299779f9 [ 816.561718][ T5961] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 816.581158][ T5961] RSP: 002b:00007f022a683038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 816.589403][ T5961] RAX: ffffffffffffffda RBX: 00007f0229b05f80 RCX: 00007f02299779f9 [ 816.597214][ T5961] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 816.605114][ T5961] RBP: 00007f022a683090 R08: 0000000000000000 R09: 0000000000000000 [ 816.612922][ T5961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 816.620737][ T5961] R13: 0000000000000000 R14: 00007f0229b05f80 R15: 00007ffedca3e8e8 [ 816.628563][ T5961] [ 816.675844][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 816.694200][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 816.708774][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 816.717313][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 817.390657][ T5982] bridge0: port 2(bridge_slave_1) entered disabled state [ 817.397888][ T5982] bridge0: port 1(bridge_slave_0) entered disabled state [ 818.320478][ T5088] device bridge_slave_1 left promiscuous mode [ 818.326535][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 818.349011][ T5088] device bridge_slave_0 left promiscuous mode [ 818.355068][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 818.379993][ T5088] device veth1_macvtap left promiscuous mode [ 818.385970][ T5088] device veth0_vlan left promiscuous mode [ 819.348715][ T6001] device pim6reg1 entered promiscuous mode [ 824.987437][ T6012] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.298230][ T6012] bridge0: port 1(bridge_slave_0) entered disabled state [ 825.380960][ T6012] device bridge_slave_0 entered promiscuous mode [ 825.959013][ T6012] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.135002][ T6012] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.393361][ T6012] device bridge_slave_1 entered promiscuous mode [ 831.855864][ T6071] device pim6reg1 entered promiscuous mode [ 843.763133][ T6076] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.776842][ T6076] bridge0: port 1(bridge_slave_0) entered disabled state [ 844.080585][ T6076] device bridge_slave_0 entered promiscuous mode [ 844.581991][ T6076] bridge0: port 2(bridge_slave_1) entered blocking state [ 844.633562][ T6076] bridge0: port 2(bridge_slave_1) entered disabled state [ 844.641675][ T6076] device bridge_slave_1 entered promiscuous mode [ 844.882174][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 844.980912][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 846.000666][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 846.330805][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 846.590135][ T607] bridge0: port 1(bridge_slave_0) entered blocking state [ 846.597052][ T607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 846.913180][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 847.113228][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 847.291493][ T607] bridge0: port 2(bridge_slave_1) entered blocking state [ 847.298443][ T607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 848.028507][ T6089] bridge0: port 1(bridge_slave_0) entered blocking state [ 848.035424][ T6089] bridge0: port 1(bridge_slave_0) entered disabled state [ 848.480252][ T6089] device bridge_slave_0 entered promiscuous mode [ 848.488814][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 848.496687][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 849.020841][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 849.331221][ T6089] bridge0: port 2(bridge_slave_1) entered blocking state [ 849.358232][ T6089] bridge0: port 2(bridge_slave_1) entered disabled state [ 849.366389][ T6089] device bridge_slave_1 entered promiscuous mode [ 849.472331][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 849.481088][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 849.998311][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 850.006946][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 855.429148][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 855.437343][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 856.180581][ T6012] device veth0_vlan entered promiscuous mode [ 856.349950][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 856.378876][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 858.312263][ T6012] device veth1_macvtap entered promiscuous mode [ 858.447659][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 858.456496][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 858.467028][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 861.128475][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 861.136987][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 865.256593][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 865.529141][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 866.728274][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 866.735991][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 867.060405][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 867.099895][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 867.118366][ T607] bridge0: port 1(bridge_slave_0) entered blocking state [ 867.125264][ T607] bridge0: port 1(bridge_slave_0) entered forwarding state [ 867.204920][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 867.258808][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 867.267170][ T607] bridge0: port 2(bridge_slave_1) entered blocking state [ 867.274095][ T607] bridge0: port 2(bridge_slave_1) entered forwarding state [ 867.513546][ T6136] bridge0: port 1(bridge_slave_0) entered blocking state [ 867.520503][ T6136] bridge0: port 1(bridge_slave_0) entered disabled state [ 867.528658][ T6136] device bridge_slave_0 entered promiscuous mode [ 867.542448][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 867.568156][ T6136] bridge0: port 2(bridge_slave_1) entered blocking state [ 867.575057][ T6136] bridge0: port 2(bridge_slave_1) entered disabled state [ 867.585268][ T6136] device bridge_slave_1 entered promiscuous mode [ 867.662723][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 867.671262][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 867.772986][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 867.781635][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 867.865975][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 867.874352][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 867.882477][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 867.891344][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 867.899963][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 867.906846][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 867.914833][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 867.923482][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 867.932342][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 867.939256][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 867.998946][ T6089] device veth0_vlan entered promiscuous mode [ 868.028825][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 868.059215][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 868.067549][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 868.076350][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 868.085387][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 868.093874][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 868.102792][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 868.111690][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 868.120114][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 868.218838][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 868.226425][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 868.235453][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 868.244156][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 868.301631][ T6076] device veth0_vlan entered promiscuous mode [ 868.311348][ T6089] device veth1_macvtap entered promiscuous mode [ 868.361993][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 868.370502][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 868.378975][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 868.386896][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 868.395620][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 868.404441][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 868.413005][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 868.423729][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 868.454904][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 868.478968][ T5088] device bridge_slave_1 left promiscuous mode [ 868.485032][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 868.495140][ T5088] device bridge_slave_0 left promiscuous mode [ 868.502957][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 868.531463][ T5088] device veth0_vlan left promiscuous mode [ 868.755807][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 868.763713][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 868.788208][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 868.796677][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 868.835516][ T6076] device veth1_macvtap entered promiscuous mode [ 868.866221][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 868.874632][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 868.883615][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 868.997837][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 869.024343][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 869.148811][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 869.159677][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 869.299444][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 869.308478][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 869.316846][ T298] bridge0: port 1(bridge_slave_0) entered blocking state [ 869.323769][ T298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 869.331734][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 869.340398][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 869.349170][ T298] bridge0: port 2(bridge_slave_1) entered blocking state [ 869.356058][ T298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 869.378346][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 869.598658][ T6136] device veth0_vlan entered promiscuous mode [ 870.246615][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 870.255029][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 870.399851][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 870.468297][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 870.476491][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 870.538741][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 870.547274][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 870.555766][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 870.565760][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 870.574587][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 870.584103][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 870.592106][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 870.631098][ T6211] device pim6reg1 entered promiscuous mode [ 870.643361][ T6136] device veth1_macvtap entered promiscuous mode [ 870.768366][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 870.776808][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 870.786698][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 870.795488][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 870.828103][ T6194] bridge0: port 1(bridge_slave_0) entered blocking state [ 870.835005][ T6194] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.844471][ T6194] device bridge_slave_0 entered promiscuous mode [ 870.909995][ T6194] bridge0: port 2(bridge_slave_1) entered blocking state [ 870.916908][ T6194] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.925409][ T6194] device bridge_slave_1 entered promiscuous mode [ 875.043680][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 875.052397][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 875.086149][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 875.095194][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 875.114255][ T4172] bridge0: port 1(bridge_slave_0) entered blocking state [ 875.121169][ T4172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 875.128545][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 875.136919][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 875.145777][ T4172] bridge0: port 2(bridge_slave_1) entered blocking state [ 875.152683][ T4172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 875.302468][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 875.401600][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 875.410247][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 875.419490][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 875.430340][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 876.106309][ T6194] device veth0_vlan entered promiscuous mode [ 876.149988][ T6194] device veth1_macvtap entered promiscuous mode [ 876.217021][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 876.226298][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 876.264785][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 876.278452][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 876.287002][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 876.295456][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 876.303776][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 876.311703][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 876.320297][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 876.328796][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 876.337130][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 876.346702][ T5088] device bridge_slave_1 left promiscuous mode [ 876.352816][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.418987][ T5088] device bridge_slave_0 left promiscuous mode [ 876.435709][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.505825][ T5088] device bridge_slave_1 left promiscuous mode [ 876.515164][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.678758][ T5088] device bridge_slave_0 left promiscuous mode [ 876.684832][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.716738][ T5088] device veth1_macvtap left promiscuous mode [ 876.733818][ T5088] device veth0_vlan left promiscuous mode [ 877.527573][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 877.535831][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 879.240991][ T5088] device bridge_slave_1 left promiscuous mode [ 879.246993][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 879.254939][ T5088] device bridge_slave_0 left promiscuous mode [ 879.261090][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 879.270149][ T5088] device bridge_slave_1 left promiscuous mode [ 879.276134][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 879.284337][ T5088] device bridge_slave_0 left promiscuous mode [ 879.290357][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 879.300415][ T5088] device veth1_macvtap left promiscuous mode [ 879.306323][ T5088] device veth0_vlan left promiscuous mode [ 879.312631][ T5088] device veth1_macvtap left promiscuous mode [ 881.610670][ T6323] bridge0: port 1(bridge_slave_0) entered blocking state [ 881.617578][ T6323] bridge0: port 1(bridge_slave_0) entered disabled state [ 881.803655][ T6323] device bridge_slave_0 entered promiscuous mode [ 881.848783][ T6323] bridge0: port 2(bridge_slave_1) entered blocking state [ 881.855690][ T6323] bridge0: port 2(bridge_slave_1) entered disabled state [ 881.999189][ T6323] device bridge_slave_1 entered promiscuous mode [ 882.125330][ T6359] bridge0: port 2(bridge_slave_1) entered disabled state [ 882.132636][ T6359] bridge0: port 1(bridge_slave_0) entered disabled state [ 882.169362][ T6361] device bridge_slave_1 left promiscuous mode [ 882.212763][ T6361] bridge0: port 2(bridge_slave_1) entered disabled state [ 882.259355][ T6361] device bridge_slave_0 left promiscuous mode [ 882.265478][ T6361] bridge0: port 1(bridge_slave_0) entered disabled state [ 884.957272][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 884.968671][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 884.976295][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 884.994485][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 885.003631][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 885.010578][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 885.048381][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 885.063044][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 885.259336][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 885.266243][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 885.398496][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 885.468673][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 885.519981][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 885.528758][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 885.567590][ T607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 885.601128][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 885.610874][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 885.619620][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 885.627612][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 885.636366][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 885.644179][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 885.660945][ T6323] device veth0_vlan entered promiscuous mode [ 885.778523][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 885.790645][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 885.811195][ T6323] device veth1_macvtap entered promiscuous mode [ 885.840932][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 885.851412][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 885.861986][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 885.878378][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 885.887088][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 886.047534][ T6423] device syzkaller0 entered promiscuous mode [ 887.559607][ T5088] device bridge_slave_1 left promiscuous mode [ 887.565616][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 887.573637][ T5088] device bridge_slave_0 left promiscuous mode [ 887.579785][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 887.588889][ T5088] device veth1_macvtap left promiscuous mode [ 887.594785][ T5088] device veth0_vlan left promiscuous mode [ 889.886295][ T6475] device pim6reg1 entered promiscuous mode [ 889.966919][ T6482] bridge0: port 2(bridge_slave_1) entered disabled state [ 889.974208][ T6482] bridge0: port 1(bridge_slave_0) entered disabled state [ 890.759305][ T6471] bridge0: port 1(bridge_slave_0) entered blocking state [ 890.767542][ T6471] bridge0: port 1(bridge_slave_0) entered disabled state [ 890.956288][ T6471] device bridge_slave_0 entered promiscuous mode [ 891.014143][ T6471] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.021129][ T6471] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.029274][ T6471] device bridge_slave_1 entered promiscuous mode [ 898.378601][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 898.386318][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 898.971707][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 900.219108][ T1477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 900.227425][ T1477] bridge0: port 1(bridge_slave_0) entered blocking state [ 900.234361][ T1477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 902.375864][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 904.253791][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 904.493145][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 904.858618][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 904.865526][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 906.551374][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 906.839495][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 906.847753][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 906.856193][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 906.897222][ T6471] device veth0_vlan entered promiscuous mode [ 907.270757][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 907.279420][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 907.287959][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 907.296109][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 908.267630][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 908.330904][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 909.229729][ T6471] device veth1_macvtap entered promiscuous mode [ 911.048771][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 911.392114][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 911.908897][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 913.627155][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 913.789657][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 914.429284][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 914.437847][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 929.624433][ T6591] device veth0_vlan left promiscuous mode [ 929.816625][ T6591] device veth0_vlan entered promiscuous mode [ 930.279379][ T6559] bridge0: port 1(bridge_slave_0) entered blocking state [ 930.286294][ T6559] bridge0: port 1(bridge_slave_0) entered disabled state [ 930.764625][ T6559] device bridge_slave_0 entered promiscuous mode [ 930.979310][ T6554] bridge0: port 1(bridge_slave_0) entered blocking state [ 930.986237][ T6554] bridge0: port 1(bridge_slave_0) entered disabled state [ 931.709731][ T6554] device bridge_slave_0 entered promiscuous mode [ 932.649279][ T6550] bridge0: port 1(bridge_slave_0) entered blocking state [ 932.656192][ T6550] bridge0: port 1(bridge_slave_0) entered disabled state [ 933.349771][ T6550] device bridge_slave_0 entered promiscuous mode [ 933.678878][ T6559] bridge0: port 2(bridge_slave_1) entered blocking state [ 933.685794][ T6559] bridge0: port 2(bridge_slave_1) entered disabled state [ 934.300463][ T6559] device bridge_slave_1 entered promiscuous mode [ 934.307449][ T6554] bridge0: port 2(bridge_slave_1) entered blocking state [ 934.408098][ T6554] bridge0: port 2(bridge_slave_1) entered disabled state [ 934.416212][ T6554] device bridge_slave_1 entered promiscuous mode [ 935.317693][ T6550] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.369586][ T6550] bridge0: port 2(bridge_slave_1) entered disabled state [ 935.377646][ T6550] device bridge_slave_1 entered promiscuous mode [ 943.349254][ T5088] device bridge_slave_1 left promiscuous mode [ 943.355303][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 943.688618][ T5088] device bridge_slave_0 left promiscuous mode [ 943.695908][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 944.402044][ T5088] device veth1_macvtap left promiscuous mode [ 944.408049][ T5088] device veth0_vlan left promiscuous mode [ 956.012577][ T6605] bridge0: port 1(bridge_slave_0) entered blocking state [ 956.038131][ T6605] bridge0: port 1(bridge_slave_0) entered disabled state [ 956.046244][ T6605] device bridge_slave_0 entered promiscuous mode [ 956.124131][ T6605] bridge0: port 2(bridge_slave_1) entered blocking state [ 956.133003][ T6605] bridge0: port 2(bridge_slave_1) entered disabled state [ 956.141728][ T6605] device bridge_slave_1 entered promiscuous mode [ 956.518367][ T6627] bridge0: port 1(bridge_slave_0) entered blocking state [ 956.525286][ T6627] bridge0: port 1(bridge_slave_0) entered disabled state [ 956.534083][ T6627] device bridge_slave_0 entered promiscuous mode [ 956.542238][ T6627] bridge0: port 2(bridge_slave_1) entered blocking state [ 956.549347][ T6627] bridge0: port 2(bridge_slave_1) entered disabled state [ 956.557390][ T6627] device bridge_slave_1 entered promiscuous mode [ 956.795326][ T6559] device veth0_vlan entered promiscuous mode [ 956.820250][ T6559] device veth1_macvtap entered promiscuous mode [ 956.990411][ T6554] device veth0_vlan entered promiscuous mode [ 957.048911][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 957.057822][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 957.066625][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 957.108911][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 957.116548][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 957.124796][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 957.133623][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 957.141515][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 957.149401][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 957.157908][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 957.167625][ T4600] bridge0: port 1(bridge_slave_0) entered blocking state [ 957.174539][ T4600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 957.182292][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 957.190837][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 957.199654][ T4600] bridge0: port 2(bridge_slave_1) entered blocking state [ 957.206542][ T4600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 957.214482][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 957.222887][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 957.231485][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 957.239954][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 957.248338][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 957.256838][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 957.265682][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 957.273590][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 957.281509][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 957.290230][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 957.298789][ T4600] bridge0: port 1(bridge_slave_0) entered blocking state [ 957.305676][ T4600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 957.313390][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 957.321979][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 957.330682][ T4600] bridge0: port 2(bridge_slave_1) entered blocking state [ 957.337562][ T4600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 957.345283][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 957.353492][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 957.361641][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 957.370002][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 957.378553][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 957.386851][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 957.395400][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 957.402964][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 957.410598][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 957.418996][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 957.427179][ T4600] bridge0: port 1(bridge_slave_0) entered blocking state [ 957.434081][ T4600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 957.441356][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 957.449866][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 957.458130][ T4600] bridge0: port 2(bridge_slave_1) entered blocking state [ 957.465015][ T4600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 957.472405][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 957.480582][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 957.488728][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 957.496836][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 957.505016][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 957.513477][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 957.521967][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 957.529980][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 958.032878][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 958.041720][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 958.078749][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 958.090659][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 958.098569][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 958.106327][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 958.114129][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 958.121675][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 958.165663][ T6550] device veth0_vlan entered promiscuous mode [ 958.174572][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 958.183117][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 958.194529][ T6554] device veth1_macvtap entered promiscuous mode [ 958.327851][ T6640] bond_slave_1: mtu less than device minimum [ 958.358286][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 958.367800][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 958.379362][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 958.423339][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 958.432617][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 958.476462][ T6550] device veth1_macvtap entered promiscuous mode [ 958.489865][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 958.497708][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 958.506361][ T4600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 958.834010][ T6644] device syzkaller0 entered promiscuous mode [ 958.930076][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 958.942415][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 958.988755][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 958.999371][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 959.239475][ T5088] device bridge_slave_1 left promiscuous mode [ 959.260580][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 959.270427][ T5088] device bridge_slave_0 left promiscuous mode [ 959.277262][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 959.307194][ T5088] device bridge_slave_1 left promiscuous mode [ 959.313363][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 959.321577][ T5088] device bridge_slave_0 left promiscuous mode [ 959.327686][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 959.338671][ T5088] device bridge_slave_1 left promiscuous mode [ 959.344779][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 959.354698][ T5088] device bridge_slave_0 left promiscuous mode [ 959.360975][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 959.372605][ T5088] device veth1_macvtap left promiscuous mode [ 959.380326][ T5088] device veth1_macvtap left promiscuous mode [ 959.386261][ T5088] device veth0_vlan left promiscuous mode [ 959.392535][ T5088] device veth1_macvtap left promiscuous mode [ 959.399857][ T5088] device veth0_vlan left promiscuous mode [ 960.035863][ T6657] bridge0: port 3(team_slave_1) entered blocking state [ 960.042734][ T6657] bridge0: port 3(team_slave_1) entered disabled state [ 960.050726][ T6657] device team_slave_1 entered promiscuous mode [ 960.188127][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 960.196374][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 960.204312][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 960.213021][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 960.222390][ T317] bridge0: port 1(bridge_slave_0) entered blocking state [ 960.229344][ T317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 960.260495][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 960.270084][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 960.277674][ T317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 960.315684][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 960.325158][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 960.334120][ T4172] bridge0: port 1(bridge_slave_0) entered blocking state [ 960.341049][ T4172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 960.348527][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 960.357333][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 960.366167][ T4172] bridge0: port 2(bridge_slave_1) entered blocking state [ 960.373124][ T4172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 960.380668][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 960.389267][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 960.397506][ T4172] bridge0: port 2(bridge_slave_1) entered blocking state [ 960.404401][ T4172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 960.412633][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 961.941313][ T6664] device syzkaller0 entered promiscuous mode [ 962.038082][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 962.046324][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 962.054654][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 962.064573][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 962.076823][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 962.097368][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 962.129105][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 962.137297][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 962.213149][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 962.222067][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 962.231097][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 962.240000][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 962.286865][ T6605] device veth0_vlan entered promiscuous mode [ 962.314799][ T6605] device veth1_macvtap entered promiscuous mode [ 962.349016][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 962.357169][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 962.384518][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 962.403242][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 962.417928][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 962.447637][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 962.460074][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 962.468253][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 962.515993][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 962.524973][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 962.534444][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 962.550301][ T6627] device veth0_vlan entered promiscuous mode [ 962.578114][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 962.585794][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 962.615986][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 962.624279][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 962.678361][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 962.686824][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 962.746700][ T6627] device veth1_macvtap entered promiscuous mode [ 962.830795][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 962.842072][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 963.045482][ T4172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 963.112810][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 963.184674][ T298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 964.070873][ T5088] device bridge_slave_1 left promiscuous mode [ 964.076882][ T5088] bridge0: port 2(bridge_slave_1) entered disabled state [ 964.084868][ T5088] device bridge_slave_0 left promiscuous mode [ 964.091223][ T5088] bridge0: port 1(bridge_slave_0) entered disabled state [ 964.102064][ T5088] device veth1_macvtap left promiscuous mode [ 964.107974][ T5088] device veth0_vlan left promiscuous mode [ 964.115104][ T5088] device veth1_macvtap left promiscuous mode [ 964.121101][ T5088] device veth0_vlan left promiscuous mode [ 1066.098029][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1066.104516][ C1] rcu: 1-...!: (10001 ticks this GP) idle=6eb4/1/0x4000000000000000 softirq=38723/38723 fqs=0 [ 1066.114646][ C1] (t=10002 jiffies g=47441 q=448 ncpus=2) [ 1066.120294][ C1] rcu: rcu_preempt kthread starved for 10003 jiffies! g47441 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 1066.131319][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 1066.141116][ C1] rcu: RCU grace-period kthread stack dump: [ 1066.146853][ C1] task:rcu_preempt state:R running task stack:27720 pid:14 ppid:2 flags:0x00004000 [ 1066.157440][ C1] Call Trace: [ 1066.160568][ C1] [ 1066.163345][ C1] __schedule+0xca7/0x1550 [ 1066.167608][ C1] ? release_firmware_map_entry+0x191/0x191 [ 1066.173376][ C1] ? __kasan_check_write+0x14/0x20 [ 1066.178278][ C1] schedule+0xc3/0x180 [ 1066.182183][ C1] schedule_timeout+0x18c/0x380 [ 1066.186861][ C1] ? _raw_spin_unlock_irq+0x4d/0x70 [ 1066.191898][ C1] ? console_conditional_schedule+0x10/0x10 [ 1066.197624][ C1] ? update_process_times+0x1b0/0x1b0 [ 1066.202840][ C1] ? prepare_to_swait_event+0x308/0x320 [ 1066.208227][ C1] rcu_gp_fqs_loop+0x2ed/0x10a0 [ 1066.212912][ C1] ? _raw_spin_unlock_irq+0x4d/0x70 [ 1066.217937][ C1] ? rcu_gp_init+0xc7f/0xfa0 [ 1066.222379][ C1] ? rcu_gp_init+0xfa0/0xfa0 [ 1066.226793][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1066.232433][ C1] ? finish_swait+0x17d/0x1b0 [ 1066.236957][ C1] rcu_gp_kthread+0xa3/0x3a0 [ 1066.241382][ C1] ? queued_spin_lock_slowpath+0x50/0x50 [ 1066.246840][ C1] ? set_cpus_allowed_ptr+0xa4/0xe0 [ 1066.251884][ C1] ? __kasan_check_read+0x11/0x20 [ 1066.256736][ C1] ? __kthread_parkme+0x12d/0x180 [ 1066.261602][ C1] kthread+0x26d/0x300 [ 1066.265507][ C1] ? queued_spin_lock_slowpath+0x50/0x50 [ 1066.270974][ C1] ? kthread_blkcg+0xd0/0xd0 [ 1066.275403][ C1] ret_from_fork+0x1f/0x30 [ 1066.279665][ C1] [ 1066.282517][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 1066.288685][ C1] CPU: 1 PID: 6686 Comm: syz.1.1308 Not tainted 6.1.90-syzkaller-00003-gbe8ff39d2e99 #0 [ 1066.298227][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1066.308123][ C1] RIP: 0010:get_random_u32+0x1/0x650 [ 1066.313262][ C1] Code: e8 24 7c de fe e9 f5 fe ff ff e8 da 5d 97 fe 48 c7 c7 60 b2 25 87 4c 89 e6 e8 eb c7 c2 ff e9 37 fc ff ff 66 0f 1f 44 00 00 55 <48> 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec 00 01 00 [ 1066.332697][ C1] RSP: 0018:ffffc900001b0c28 EFLAGS: 00000246 [ 1066.338593][ C1] RAX: ffffffff84781083 RBX: 000000000000068f RCX: ffff888114bca880 [ 1066.346400][ C1] RDX: 0000000000000101 RSI: 0000000000057e40 RDI: 000000000000068f [ 1066.354214][ C1] RBP: ffffc900001b0c50 R08: dffffc0000000000 R09: 0000000000000003 [ 1066.362025][ C1] R10: ffffffffffffffff R11: dffffc0000000001 R12: 1ffff11021bb46a5 [ 1066.369925][ C1] R13: ffff88810dda34f0 R14: 0000000000057e40 R15: dffffc0000000000 [ 1066.377744][ C1] FS: 00007f15061af6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1066.386503][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1066.392931][ C1] CR2: 00007f735ed07a8c CR3: 00000001167ed000 CR4: 00000000003506a0 [ 1066.400741][ C1] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 1066.408548][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1066.416369][ C1] Call Trace: [ 1066.419495][ C1] [ 1066.422188][ C1] ? show_regs+0x58/0x60 [ 1066.426262][ C1] ? dump_cpu_task+0x3c/0x70 [ 1066.430684][ C1] ? rcu_check_gp_kthread_starvation+0x1d1/0x240 [ 1066.436853][ C1] ? _find_next_bit+0x126/0x130 [ 1066.441543][ C1] ? print_cpu_stall+0x2f3/0x590 [ 1066.446313][ C1] ? rcu_sched_clock_irq+0x9b5/0x1350 [ 1066.451525][ C1] ? rcu_boost_kthread_setaffinity+0x5a0/0x5a0 [ 1066.457511][ C1] ? hrtimer_run_queues+0x15f/0x440 [ 1066.462539][ C1] ? tick_setup_sched_timer+0x490/0x490 [ 1066.467930][ C1] ? update_process_times+0x149/0x1b0 [ 1066.473133][ C1] ? tick_sched_timer+0x188/0x240 [ 1066.477994][ C1] ? tick_setup_sched_timer+0x490/0x490 [ 1066.483378][ C1] ? __hrtimer_run_queues+0x41a/0xad0 [ 1066.488592][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 1066.493537][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 1066.499438][ C1] ? hrtimer_interrupt+0x40c/0xaa0 [ 1066.504493][ C1] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 1066.510377][ C1] ? sysvec_apic_timer_interrupt+0x44/0xc0 [ 1066.516118][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1066.522110][ C1] ? rfc3315_s14_backoff_update+0x13/0xc0 [ 1066.527667][ C1] ? get_random_u32+0x1/0x650 [ 1066.532180][ C1] ? rfc3315_s14_backoff_update+0x18/0xc0 [ 1066.537726][ C1] addrconf_rs_timer+0x322/0x600 [ 1066.542507][ C1] ? addrconf_disable_policy_idev+0x360/0x360 [ 1066.548404][ C1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 1066.553351][ C1] ? _raw_spin_lock_irqsave+0x210/0x210 [ 1066.558735][ C1] ? addrconf_disable_policy_idev+0x360/0x360 [ 1066.564633][ C1] call_timer_fn+0x3b/0x2d0 [ 1066.568982][ C1] ? addrconf_disable_policy_idev+0x360/0x360 [ 1066.574883][ C1] __run_timers+0x72a/0xa10 [ 1066.579230][ C1] ? calc_index+0x270/0x270 [ 1066.583554][ C1] ? __irq_exit_rcu+0x5c/0xf0 [ 1066.588074][ C1] ? asm_sysvec_irq_work+0x1b/0x20 [ 1066.593032][ C1] run_timer_softirq+0x69/0xf0 [ 1066.597621][ C1] __do_softirq+0x1d8/0x661 [ 1066.601976][ C1] __irq_exit_rcu+0x50/0xf0 [ 1066.606311][ C1] irq_exit_rcu+0x9/0x10 [ 1066.610386][ C1] sysvec_apic_timer_interrupt+0x9a/0xc0 [ 1066.615849][ C1] [ 1066.618620][ C1] [ 1066.621400][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1066.627217][ C1] RIP: 0010:do_syscall_64+0x25/0xb0 [ 1066.632249][ C1] Code: d2 0f 30 c3 cc 55 48 89 e5 41 56 53 48 83 e4 f0 48 89 e3 49 89 fe 66 90 48 63 f6 4c 89 f7 e8 72 36 00 00 3d c2 01 00 00 77 2b <89> c1 48 81 f9 c3 01 00 00 48 19 f6 21 c6 4c 89 f7 e8 65 87 e7 fb [ 1066.651700][ C1] RSP: 0018:ffffc90000e47f30 EFLAGS: 00000283 [ 1066.657604][ C1] RAX: 00000000000000ca RBX: ffffc90000e47f30 RCX: 0000000000000000 [ 1066.665493][ C1] RDX: 0000000000000000 RSI: 00000000000000ca RDI: ffffc90000e47f58 [ 1066.673325][ C1] RBP: ffffc90000e47f48 R08: 0000000000000000 R09: 0000000000000000 [ 1066.681137][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1066.688953][ C1] R13: 0000000000000000 R14: ffffc90000e47f58 R15: 0000000000000000 [ 1066.696784][ C1] ? clear_bhb_loop+0x55/0xb0 [ 1066.701276][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1066.707006][ C1] RIP: 0033:0x7f15053779f9 [ 1066.711262][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1066.730706][ C1] RSP: 002b:00007f15061af0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1066.738943][ C1] RAX: ffffffffffffffda RBX: 00007f1505505f88 RCX: 00007f15053779f9 [ 1066.746753][ C1] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f1505505f8c [ 1066.754566][ C1] RBP: 00007f1505505f80 R08: 00007ffd127790b0 R09: 0000000000000000 [ 1066.762390][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1505505f8c [ 1066.770193][ C1] R13: 0000000000000000 R14: 00007ffd1274e030 R15: 00007ffd1274e118 [ 1066.778024][ C1] [ 1066.780876][ C1] CPU: 1 PID: 6686 Comm: syz.1.1308 Not tainted 6.1.90-syzkaller-00003-gbe8ff39d2e99 #0 [ 1066.790475][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1066.800312][ C1] RIP: 0010:get_random_u32+0x1/0x650 [ 1066.805434][ C1] Code: e8 24 7c de fe e9 f5 fe ff ff e8 da 5d 97 fe 48 c7 c7 60 b2 25 87 4c 89 e6 e8 eb c7 c2 ff e9 37 fc ff ff 66 0f 1f 44 00 00 55 <48> 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec 00 01 00 [ 1066.824875][ C1] RSP: 0018:ffffc900001b0c28 EFLAGS: 00000246 [ 1066.830779][ C1] RAX: ffffffff84781083 RBX: 000000000000068f RCX: ffff888114bca880 [ 1066.838600][ C1] RDX: 0000000000000101 RSI: 0000000000057e40 RDI: 000000000000068f [ 1066.846402][ C1] RBP: ffffc900001b0c50 R08: dffffc0000000000 R09: 0000000000000003 [ 1066.854302][ C1] R10: ffffffffffffffff R11: dffffc0000000001 R12: 1ffff11021bb46a5 [ 1066.862115][ C1] R13: ffff88810dda34f0 R14: 0000000000057e40 R15: dffffc0000000000 [ 1066.869929][ C1] FS: 00007f15061af6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1066.878697][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1066.885121][ C1] CR2: 00007f735ed07a8c CR3: 00000001167ed000 CR4: 00000000003506a0 [ 1066.892940][ C1] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 1066.900752][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1066.908555][ C1] Call Trace: [ 1066.911699][ C1] [ 1066.914382][ C1] ? show_regs+0x58/0x60 [ 1066.918450][ C1] ? dump_cpu_task+0x3c/0x70 [ 1066.922876][ C1] ? rcu_dump_cpu_stacks+0x1db/0x370 [ 1066.928004][ C1] ? print_cpu_stall+0x2f8/0x590 [ 1066.932781][ C1] ? rcu_sched_clock_irq+0x9b5/0x1350 [ 1066.937982][ C1] ? rcu_boost_kthread_setaffinity+0x5a0/0x5a0 [ 1066.943974][ C1] ? hrtimer_run_queues+0x15f/0x440 [ 1066.949000][ C1] ? tick_setup_sched_timer+0x490/0x490 [ 1066.954395][ C1] ? update_process_times+0x149/0x1b0 [ 1066.959600][ C1] ? tick_sched_timer+0x188/0x240 [ 1066.964448][ C1] ? tick_setup_sched_timer+0x490/0x490 [ 1066.969836][ C1] ? __hrtimer_run_queues+0x41a/0xad0 [ 1066.975053][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 1066.979993][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 1066.985896][ C1] ? hrtimer_interrupt+0x40c/0xaa0 [ 1066.990863][ C1] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 1066.996752][ C1] ? sysvec_apic_timer_interrupt+0x44/0xc0 [ 1067.002387][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1067.008495][ C1] ? rfc3315_s14_backoff_update+0x13/0xc0 [ 1067.014304][ C1] ? get_random_u32+0x1/0x650 [ 1067.018822][ C1] ? rfc3315_s14_backoff_update+0x18/0xc0 [ 1067.024373][ C1] addrconf_rs_timer+0x322/0x600 [ 1067.029172][ C1] ? addrconf_disable_policy_idev+0x360/0x360 [ 1067.035043][ C1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 1067.039992][ C1] ? _raw_spin_lock_irqsave+0x210/0x210 [ 1067.045377][ C1] ? addrconf_disable_policy_idev+0x360/0x360 [ 1067.051277][ C1] call_timer_fn+0x3b/0x2d0 [ 1067.055618][ C1] ? addrconf_disable_policy_idev+0x360/0x360 [ 1067.061522][ C1] __run_timers+0x72a/0xa10 [ 1067.065874][ C1] ? calc_index+0x270/0x270 [ 1067.070196][ C1] ? __irq_exit_rcu+0x5c/0xf0 [ 1067.074731][ C1] ? asm_sysvec_irq_work+0x1b/0x20 [ 1067.079902][ C1] run_timer_softirq+0x69/0xf0 [ 1067.084495][ C1] __do_softirq+0x1d8/0x661 [ 1067.088838][ C1] __irq_exit_rcu+0x50/0xf0 [ 1067.093172][ C1] irq_exit_rcu+0x9/0x10 [ 1067.097245][ C1] sysvec_apic_timer_interrupt+0x9a/0xc0 [ 1067.102715][ C1] [ 1067.105491][ C1] [ 1067.108272][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1067.114188][ C1] RIP: 0010:do_syscall_64+0x25/0xb0 [ 1067.119206][ C1] Code: d2 0f 30 c3 cc 55 48 89 e5 41 56 53 48 83 e4 f0 48 89 e3 49 89 fe 66 90 48 63 f6 4c 89 f7 e8 72 36 00 00 3d c2 01 00 00 77 2b <89> c1 48 81 f9 c3 01 00 00 48 19 f6 21 c6 4c 89 f7 e8 65 87 e7 fb [ 1067.138662][ C1] RSP: 0018:ffffc90000e47f30 EFLAGS: 00000283 [ 1067.144679][ C1] RAX: 00000000000000ca RBX: ffffc90000e47f30 RCX: 0000000000000000 [ 1067.152489][ C1] RDX: 0000000000000000 RSI: 00000000000000ca RDI: ffffc90000e47f58 [ 1067.160312][ C1] RBP: ffffc90000e47f48 R08: 0000000000000000 R09: 0000000000000000 [ 1067.168116][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1067.175930][ C1] R13: 0000000000000000 R14: ffffc90000e47f58 R15: 0000000000000000 [ 1067.183763][ C1] ? clear_bhb_loop+0x55/0xb0 [ 1067.188257][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1067.193991][ C1] RIP: 0033:0x7f15053779f9 [ 1067.198245][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1067.217807][ C1] RSP: 002b:00007f15061af0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1067.226051][ C1] RAX: ffffffffffffffda RBX: 00007f1505505f88 RCX: 00007f15053779f9 [ 1067.233861][ C1] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f1505505f8c [ 1067.241672][ C1] RBP: 00007f1505505f80 R08: 00007ffd127790b0 R09: 0000000000000000 [ 1067.249484][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1505505f8c [ 1067.257299][ C1] R13: 0000000000000000 R14: 00007ffd1274e030 R15: 00007ffd1274e118 [ 1067.265123][ C1] [ 1101.177756][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 143s! [syz.0.1307:6697] [ 1101.185882][ C0] Modules linked in: [ 1101.189616][ C0] CPU: 0 PID: 6697 Comm: syz.0.1307 Not tainted 6.1.90-syzkaller-00003-gbe8ff39d2e99 #0 [ 1101.199167][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1101.209053][ C0] RIP: 0010:unwind_next_frame+0x319/0x700 [ 1101.214613][ C0] Code: 00 00 00 49 83 c6 48 4c 89 f0 48 c1 e8 03 80 3c 10 00 74 08 4c 89 f7 e8 95 ed 84 00 49 c7 06 00 00 00 00 b0 01 e9 8c 02 00 00 <4d> 8d 6e 50 4c 89 eb 48 c1 eb 03 80 3c 13 00 74 12 4c 89 ef e8 ce [ 1101.234666][ C0] RSP: 0000:ffffc90000007618 EFLAGS: 00000283 [ 1101.240648][ C0] RAX: ffffc90000faff30 RBX: ffffc90000007fd8 RCX: ffffffff877a1000 [ 1101.248462][ C0] RDX: dffffc0000000000 RSI: ffffffff81461599 RDI: ffffc90000faff48 [ 1101.256277][ C0] RBP: ffffc90000007690 R08: ffffc90000007788 R09: 000000000000000e [ 1101.264089][ C0] R10: ffffc90000007790 R11: dffffc0000000001 R12: 0000000000000000 [ 1101.271896][ C0] R13: ffffc90000fb0000 R14: ffffc900000076a0 R15: 1ffff92000000ed4 [ 1101.279717][ C0] FS: 00007fae2472a6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1101.288480][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1101.294897][ C0] CR2: 0000001b2cf18ff8 CR3: 000000012daa9000 CR4: 00000000003506b0 [ 1101.302718][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1101.310526][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1101.318333][ C0] Call Trace: [ 1101.321462][ C0] [ 1101.324158][ C0] ? show_regs+0x58/0x60 [ 1101.328233][ C0] ? watchdog_timer_fn+0x4b1/0x5f0 [ 1101.333178][ C0] ? proc_watchdog_cpumask+0xf0/0xf0 [ 1101.338302][ C0] ? __hrtimer_run_queues+0x41a/0xad0 [ 1101.343523][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 1101.348458][ C0] ? clockevents_program_event+0x236/0x300 [ 1101.354104][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 1101.360010][ C0] ? hrtimer_interrupt+0x40c/0xaa0 [ 1101.364975][ C0] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 1101.370854][ C0] ? sysvec_apic_timer_interrupt+0x44/0xc0 [ 1101.376492][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1101.382490][ C0] ? __init_begin+0x3a000/0x3a000 [ 1101.387343][ C0] ? irq_exit_rcu+0x9/0x10 [ 1101.391600][ C0] ? unwind_next_frame+0x319/0x700 [ 1101.396558][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 1101.401404][ C0] arch_stack_walk+0x10d/0x140 [ 1101.406012][ C0] ? irq_exit_rcu+0x9/0x10 [ 1101.410265][ C0] stack_trace_save+0x113/0x1c0 [ 1101.414951][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 1101.419909][ C0] kasan_set_track+0x4b/0x70 [ 1101.424322][ C0] ? kasan_set_track+0x4b/0x70 [ 1101.428920][ C0] ? kasan_save_alloc_info+0x1f/0x30 [ 1101.434048][ C0] ? __kasan_slab_alloc+0x6c/0x80 [ 1101.438908][ C0] ? slab_post_alloc_hook+0x53/0x2c0 [ 1101.444025][ C0] ? kmem_cache_alloc_node+0x18a/0x2d0 [ 1101.449321][ C0] ? __alloc_skb+0xcc/0x2d0 [ 1101.453655][ C0] ? ndisc_alloc_skb+0xf3/0x2d0 [ 1101.458342][ C0] ? ndisc_send_rs+0x264/0x5f0 [ 1101.462950][ C0] ? addrconf_rs_timer+0x2d1/0x600 [ 1101.467891][ C0] ? call_timer_fn+0x3b/0x2d0 [ 1101.472403][ C0] ? __run_timers+0x72a/0xa10 [ 1101.476918][ C0] ? run_timer_softirq+0x69/0xf0 [ 1101.481695][ C0] ? __do_softirq+0x1d8/0x661 [ 1101.486209][ C0] ? __irq_exit_rcu+0x50/0xf0 [ 1101.490723][ C0] ? irq_exit_rcu+0x9/0x10 [ 1101.495017][ C0] kasan_save_alloc_info+0x1f/0x30 [ 1101.500024][ C0] __kasan_slab_alloc+0x6c/0x80 [ 1101.504715][ C0] slab_post_alloc_hook+0x53/0x2c0 [ 1101.509660][ C0] ? __alloc_skb+0xcc/0x2d0 [ 1101.514012][ C0] ? __alloc_skb+0xcc/0x2d0 [ 1101.518344][ C0] kmem_cache_alloc_node+0x18a/0x2d0 [ 1101.523458][ C0] ? __alloc_skb+0xcc/0x2d0 [ 1101.527810][ C0] __alloc_skb+0xcc/0x2d0 [ 1101.531984][ C0] ndisc_alloc_skb+0xf3/0x2d0 [ 1101.536496][ C0] ndisc_send_rs+0x264/0x5f0 [ 1101.540917][ C0] addrconf_rs_timer+0x2d1/0x600 [ 1101.545708][ C0] ? addrconf_disable_policy_idev+0x360/0x360 [ 1101.551591][ C0] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 1101.556532][ C0] ? _raw_spin_lock_irqsave+0x210/0x210 [ 1101.561916][ C0] ? addrconf_disable_policy_idev+0x360/0x360 [ 1101.567815][ C0] call_timer_fn+0x3b/0x2d0 [ 1101.572163][ C0] ? addrconf_disable_policy_idev+0x360/0x360 [ 1101.578067][ C0] __run_timers+0x72a/0xa10 [ 1101.582425][ C0] ? calc_index+0x270/0x270 [ 1101.586735][ C0] ? __irq_exit_rcu+0x5c/0xf0 [ 1101.591259][ C0] ? asm_sysvec_irq_work+0x1b/0x20 [ 1101.596211][ C0] run_timer_softirq+0x69/0xf0 [ 1101.600799][ C0] __do_softirq+0x1d8/0x661 [ 1101.605156][ C0] ? irqtime_account_irq+0xdc/0x260 [ 1101.610188][ C0] __irq_exit_rcu+0x50/0xf0 [ 1101.614528][ C0] irq_exit_rcu+0x9/0x10 [ 1101.618598][ C0] sysvec_apic_timer_interrupt+0x9a/0xc0 [ 1101.624059][ C0] [ 1101.626839][ C0] [ 1101.629620][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1101.635444][ C0] RIP: 0010:__schedule+0xcaf/0x1550 [ 1101.640465][ C0] Code: 44 24 68 42 0f b6 04 28 84 c0 0f 85 83 02 00 00 41 80 24 24 fc 4c 89 f7 48 8b 74 24 20 e8 a9 c4 e2 fb 48 89 c7 e8 81 d7 32 fc <48> 8b 44 24 70 48 c7 84 24 80 00 00 00 0e 36 e0 45 49 c7 44 05 00 [ 1101.659910][ C0] RSP: 0000:ffffc90000fafd80 EFLAGS: 00000282 [ 1101.665897][ C0] RAX: 0000000080000001 RBX: 1ffff1103ee070fc RCX: 0000000000000002 [ 1101.673712][ C0] RDX: 0000000000000001 RSI: 0000000000000008 RDI: 0000000000000001 [ 1101.681524][ C0] RBP: ffffc90000fafe90 R08: dffffc0000000000 R09: ffffed1022264ca9 [ 1101.689334][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888111326540 [ 1101.697146][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881f70387e0 [ 1101.704996][ C0] ? release_firmware_map_entry+0x191/0x191 [ 1101.710697][ C0] schedule+0xc3/0x180 [ 1101.714596][ C0] exit_to_user_mode_loop+0x4e/0xa0 [ 1101.719636][ C0] exit_to_user_mode_prepare+0x5a/0xa0 [ 1101.724926][ C0] irqentry_exit_to_user_mode+0x9/0x10 [ 1101.730222][ C0] irqentry_exit+0x12/0x40 [ 1101.734478][ C0] sysvec_apic_timer_interrupt+0x55/0xc0 [ 1101.739944][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1101.745764][ C0] RIP: 0033:0x7fae239779f9 [ 1101.750012][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1101.769451][ C0] RSP: 002b:00007fae2472a038 EFLAGS: 00000246 [ 1101.775351][ C0] RAX: 0000000000000000 RBX: 00007fae23b062e0 RCX: 00007fae239779f9 [ 1101.783171][ C0] RDX: 00000000200006c0 RSI: 0000000000005452 RDI: 0000000000000005 [ 1101.791151][ C0] RBP: 00007fae239e58ee R08: 0000000000000000 R09: 0000000000000000 [ 1101.799575][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1101.807387][ C0] R13: 0000000000000000 R14: 00007fae23b062e0 R15: 00007fff5c6df9d8 [ 1101.815299][ C0] [ 1101.818165][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1101.823199][ C1] NMI backtrace for cpu 1 [ 1101.823219][ C1] CPU: 1 PID: 6686 Comm: syz.1.1308 Not tainted 6.1.90-syzkaller-00003-gbe8ff39d2e99 #0 [ 1101.823271][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1101.823299][ C1] RIP: 0010:asm_sysvec_irq_work+0x3/0x20 [ 1101.823359][ C1] Code: f8 ff e9 d0 03 00 00 0f 01 ca fc 6a ff e8 c5 02 00 00 48 89 c4 48 8d 6c 24 01 48 89 e7 e8 25 da f8 ff e9 b0 03 00 00 0f 01 ca 6a ff e8 a5 02 00 00 48 89 c4 48 8d 6c 24 01 48 89 e7 e8 f5 de [ 1101.823401][ C1] RSP: 0018:ffffc900001b08e8 EFLAGS: 00000046 [ 1101.823441][ C1] RAX: ffff88810d469b88 RBX: ffff88810d469b40 RCX: ffffffff840d00cd [ 1101.823481][ C1] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffff88810d469b88 [ 1101.823514][ C1] RBP: ffffc900001b0958 R08: dffffc0000000000 R09: ffffed1021a8d371 [ 1101.823562][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 1101.823598][ C1] R13: ffff8881171acbc0 R14: 00000001000138e0 R15: 0000000000000000 [ 1101.823633][ C1] FS: 00007f15061af6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1101.823679][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1101.823715][ C1] CR2: 00007f735ed07a8c CR3: 00000001167ed000 CR4: 00000000003506a0 [ 1101.823755][ C1] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 1101.823787][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1101.823820][ C1] Call Trace: [ 1101.823833][ C1] [ 1101.823849][ C1] ? show_regs+0x58/0x60 [ 1101.823900][ C1] ? nmi_cpu_backtrace+0x285/0x2f0 [ 1101.823959][ C1] ? nmi_trigger_cpumask_backtrace+0x3c0/0x3c0 [ 1101.824027][ C1] ? asm_sysvec_irq_work+0x3/0x20 [ 1101.824078][ C1] ? asm_sysvec_irq_work+0x3/0x20 [ 1101.824132][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 1101.824191][ C1] ? nmi_handle+0xa7/0x280 [ 1101.824245][ C1] ? asm_sysvec_irq_work+0x3/0x20 [ 1101.824299][ C1] ? default_do_nmi+0x69/0x160 [ 1101.824352][ C1] ? exc_nmi+0xad/0x100 [ 1101.824400][ C1] ? end_repeat_nmi+0x16/0x31 [ 1101.824460][ C1] ? dst_init+0x22d/0x400 [ 1101.824536][ C1] ? asm_sysvec_irq_work+0x3/0x20 [ 1101.824590][ C1] ? asm_sysvec_irq_work+0x3/0x20 [ 1101.824644][ C1] ? asm_sysvec_irq_work+0x3/0x20 [ 1101.824698][ C1] [ 1101.824713][ C1] [ 1101.824727][ C1] ? dst_init+0x292/0x400 [ 1101.824799][ C1] ? ipv6_sysctl_rtcache_flush+0x120/0x120 [ 1101.824851][ C1] dst_alloc+0x18a/0x1e0 [ 1101.824923][ C1] icmp6_dst_alloc+0xf8/0x510 [ 1101.824992][ C1] ? icmpv6_flow_init+0xce/0x130 [ 1101.825071][ C1] ndisc_send_skb+0x28b/0xdc0 [ 1101.825140][ C1] ? ndisc_mc_map+0x920/0x920 [ 1101.825212][ C1] ? memcpy+0x56/0x70 [ 1101.825257][ C1] ? __ndisc_fill_addr_option+0xdb/0x130 [ 1101.825322][ C1] ndisc_send_rs+0x47d/0x5f0 [ 1101.825386][ C1] addrconf_rs_timer+0x2d1/0x600 [ 1101.825451][ C1] ? addrconf_disable_policy_idev+0x360/0x360 [ 1101.825519][ C1] ? __run_timers+0x6ff/0xa10 [ 1101.825596][ C1] ? addrconf_disable_policy_idev+0x360/0x360 [ 1101.825660][ C1] call_timer_fn+0x3b/0x2d0 [ 1101.825731][ C1] ? addrconf_disable_policy_idev+0x360/0x360 [ 1101.825794][ C1] __run_timers+0x72a/0xa10 [ 1101.825878][ C1] ? calc_index+0x270/0x270 [ 1101.825944][ C1] ? __irq_exit_rcu+0x5c/0xf0 [ 1101.826007][ C1] ? asm_sysvec_irq_work+0x1b/0x20 [ 1101.826070][ C1] run_timer_softirq+0x69/0xf0 [ 1101.826139][ C1] __do_softirq+0x1d8/0x661 [ 1101.826207][ C1] __irq_exit_rcu+0x50/0xf0 [ 1101.826264][ C1] irq_exit_rcu+0x9/0x10 [ 1101.826318][ C1] sysvec_apic_timer_interrupt+0x9a/0xc0 [ 1101.826374][ C1] [ 1101.826388][ C1] [ 1101.826405][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1101.826460][ C1] RIP: 0010:do_syscall_64+0x25/0xb0 [ 1101.826545][ C1] Code: d2 0f 30 c3 cc 55 48 89 e5 41 56 53 48 83 e4 f0 48 89 e3 49 89 fe 66 90 48 63 f6 4c 89 f7 e8 72 36 00 00 3d c2 01 00 00 77 2b <89> c1 48 81 f9 c3 01 00 00 48 19 f6 21 c6 4c 89 f7 e8 65 87 e7 fb [ 1101.826588][ C1] RSP: 0018:ffffc90000e47f30 EFLAGS: 00000283 [ 1101.826627][ C1] RAX: 00000000000000ca RBX: ffffc90000e47f30 RCX: 0000000000000000 [ 1101.826661][ C1] RDX: 0000000000000000 RSI: 00000000000000ca RDI: ffffc90000e47f58 [ 1101.826695][ C1] RBP: ffffc90000e47f48 R08: 0000000000000000 R09: 0000000000000000 [ 1101.826728][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1101.826759][ C1] R13: 0000000000000000 R14: ffffc90000e47f58 R15: 0000000000000000 [ 1101.826810][ C1] ? clear_bhb_loop+0x55/0xb0 [ 1101.826864][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1101.826913][ C1] RIP: 0033:0x7f15053779f9 [ 1101.826949][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1101.826991][ C1] RSP: 002b:00007f15061af0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1101.827037][ C1] RAX: ffffffffffffffda RBX: 00007f1505505f88 RCX: 00007f15053779f9 [ 1101.827074][ C1] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f1505505f8c [ 1101.827107][ C1] RBP: 00007f1505505f80 R08: 00007ffd127790b0 R09: 0000000000000000 [ 1101.827142][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1505505f8c [ 1101.827176][ C1] R13: 0000000000000000 R14: 00007ffd1274e030 R15: 00007ffd1274e118 [ 1101.827227][ C1]