last executing test programs: 1.313816295s ago: executing program 2 (id=10163): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x7, 0x8000, 0x1, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f", 0x1}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xb, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x9}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51]}}, &(0x7f0000000080)=""/159, 0x57, 0x9f, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) 1.297994776s ago: executing program 4 (id=10159): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x25, 0x80000, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 1.157817019s ago: executing program 4 (id=10159): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x25, 0x80000, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 1.097984844s ago: executing program 3 (id=10158): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x1c8a1, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0xfffffffc}, 0x0, 0xaffffffdfffffffd, 0xffffffffffffffff, 0x3) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x10, &(0x7f00000000c0)={@cgroup=r0, r1, 0x0, 0x0, 0x0, @prog_id}, 0x20) 987.291643ms ago: executing program 1 (id=10160): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0xf, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYRES32=0x0], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x17, 0x2000000000000266, &(0x7f0000000400)=ANY=[@ANYRES32=r2, @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x884, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xffffa539, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r6}, 0x11) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0xbb, 0x0, 0x41000, 0x66, '\x00', 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r8}, &(0x7f0000000080), &(0x7f0000000240)=r7}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r9, &(0x7f0000000000), 0x2a979d) 978.714274ms ago: executing program 2 (id=10163): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x7, 0x8000, 0x1, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f", 0x1}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xb, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x9}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51]}}, &(0x7f0000000080)=""/159, 0x57, 0x9f, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) 914.707629ms ago: executing program 3 (id=10158): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x1c8a1, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0xfffffffc}, 0x0, 0xaffffffdfffffffd, 0xffffffffffffffff, 0x3) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x10, &(0x7f00000000c0)={@cgroup=r0, r1, 0x0, 0x0, 0x0, @prog_id}, 0x20) 907.49905ms ago: executing program 4 (id=10159): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x25, 0x80000, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 831.256287ms ago: executing program 1 (id=10160): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0xf, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYRES32=0x0], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x17, 0x2000000000000266, &(0x7f0000000400)=ANY=[@ANYRES32=r2, @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x884, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xffffa539, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r6}, 0x11) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0xbb, 0x0, 0x41000, 0x66, '\x00', 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r8}, &(0x7f0000000080), &(0x7f0000000240)=r7}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r9, &(0x7f0000000000), 0x2a979d) 785.412731ms ago: executing program 2 (id=10163): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x7, 0x8000, 0x1, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f", 0x1}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xb, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x9}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51]}}, &(0x7f0000000080)=""/159, 0x57, 0x9f, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) 742.213755ms ago: executing program 3 (id=10158): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x1c8a1, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0xfffffffc}, 0x0, 0xaffffffdfffffffd, 0xffffffffffffffff, 0x3) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x10, &(0x7f00000000c0)={@cgroup=r0, r1, 0x0, 0x0, 0x0, @prog_id}, 0x20) 696.080589ms ago: executing program 1 (id=10160): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0xf, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYRES32=0x0], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x17, 0x2000000000000266, &(0x7f0000000400)=ANY=[@ANYRES32=r2, @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x884, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xffffa539, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r6}, 0x11) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0xbb, 0x0, 0x41000, 0x66, '\x00', 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r8}, &(0x7f0000000080), &(0x7f0000000240)=r7}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r9, &(0x7f0000000000), 0x2a979d) 648.455953ms ago: executing program 4 (id=10159): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x25, 0x80000, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 631.160974ms ago: executing program 0 (id=10162): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001cc0)=ANY=[], 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3, 0x0, &(0x7f00000000c0)="b9ff03", 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) close(0xffffffffffffffff) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x1ff, 0xc0239, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100, 0x1ff, 0x0, 0x0, 0x0, 0x2, 0x1000}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000ba000000b7000000000000009500000000000000"], &(0x7f0000001a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa10000000000006948c863d976b864018af89207010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000027000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 582.891779ms ago: executing program 2 (id=10163): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x7, 0x8000, 0x1, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f", 0x1}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xb, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x9}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51]}}, &(0x7f0000000080)=""/159, 0x57, 0x9f, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) 568.26482ms ago: executing program 3 (id=10158): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x1c8a1, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0xfffffffc}, 0x0, 0xaffffffdfffffffd, 0xffffffffffffffff, 0x3) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x10, &(0x7f00000000c0)={@cgroup=r0, r1, 0x0, 0x0, 0x0, @prog_id}, 0x20) 516.162055ms ago: executing program 0 (id=10162): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001cc0)=ANY=[], 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3, 0x0, &(0x7f00000000c0)="b9ff03", 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) close(0xffffffffffffffff) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x1ff, 0xc0239, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100, 0x1ff, 0x0, 0x0, 0x0, 0x2, 0x1000}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000ba000000b7000000000000009500000000000000"], &(0x7f0000001a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa10000000000006948c863d976b864018af89207010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000027000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 495.468086ms ago: executing program 1 (id=10160): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0xf, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYRES32=0x0], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x17, 0x2000000000000266, &(0x7f0000000400)=ANY=[@ANYRES32=r2, @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x884, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xffffa539, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r6}, 0x11) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0xbb, 0x0, 0x41000, 0x66, '\x00', 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r8}, &(0x7f0000000080), &(0x7f0000000240)=r7}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r9, &(0x7f0000000000), 0x2a979d) 450.50463ms ago: executing program 2 (id=10163): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x7, 0x8000, 0x1, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f", 0x1}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xb, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x9}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51]}}, &(0x7f0000000080)=""/159, 0x57, 0x9f, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) 428.819352ms ago: executing program 4 (id=10159): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x25, 0x80000, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 383.164976ms ago: executing program 0 (id=10162): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001cc0)=ANY=[], 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3, 0x0, &(0x7f00000000c0)="b9ff03", 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) close(0xffffffffffffffff) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x1ff, 0xc0239, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100, 0x1ff, 0x0, 0x0, 0x0, 0x2, 0x1000}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000ba000000b7000000000000009500000000000000"], &(0x7f0000001a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa10000000000006948c863d976b864018af89207010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000027000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 363.666048ms ago: executing program 1 (id=10160): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0xf, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYRES32=0x0], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x17, 0x2000000000000266, &(0x7f0000000400)=ANY=[@ANYRES32=r2, @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x884, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xffffa539, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r6}, 0x11) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0xbb, 0x0, 0x41000, 0x66, '\x00', 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r8}, &(0x7f0000000080), &(0x7f0000000240)=r7}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r9, &(0x7f0000000000), 0x2a979d) 309.649083ms ago: executing program 3 (id=10158): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x1c8a1, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0xfffffffc}, 0x0, 0xaffffffdfffffffd, 0xffffffffffffffff, 0x3) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x10, &(0x7f00000000c0)={@cgroup=r0, r1, 0x0, 0x0, 0x0, @prog_id}, 0x20) 299.163754ms ago: executing program 0 (id=10162): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001cc0)=ANY=[], 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3, 0x0, &(0x7f00000000c0)="b9ff03", 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) close(0xffffffffffffffff) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x1ff, 0xc0239, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100, 0x1ff, 0x0, 0x0, 0x0, 0x2, 0x1000}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000ba000000b7000000000000009500000000000000"], &(0x7f0000001a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa10000000000006948c863d976b864018af89207010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 231.37784ms ago: executing program 4 (id=10159): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x25, 0x80000, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 142.900057ms ago: executing program 0 (id=10162): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001cc0)=ANY=[], 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3, 0x0, &(0x7f00000000c0)="b9ff03", 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) close(0xffffffffffffffff) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x1ff, 0xc0239, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100, 0x1ff, 0x0, 0x0, 0x0, 0x2, 0x1000}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000ba000000b7000000000000009500000000000000"], &(0x7f0000001a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa10000000000006948c863d976b864018af89207010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 125.091268ms ago: executing program 1 (id=10160): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0xf, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYRES32=0x0], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00'}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x17, 0x2000000000000266, &(0x7f0000000400)=ANY=[@ANYRES32=r2, @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r4}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x884, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0xffffa539, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r6}, 0x11) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0xbb, 0x0, 0x41000, 0x66, '\x00', 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r8}, &(0x7f0000000080), &(0x7f0000000240)=r7}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r9, &(0x7f0000000000), 0x2a979d) 61.860914ms ago: executing program 2 (id=10163): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x7, 0x8000, 0x1, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f", 0x1}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xb, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x9}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51]}}, &(0x7f0000000080)=""/159, 0x57, 0x9f, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) 7.363419ms ago: executing program 3 (id=10158): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x1c8a1, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0xfffffffc}, 0x0, 0xaffffffdfffffffd, 0xffffffffffffffff, 0x3) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x10, &(0x7f00000000c0)={@cgroup=r0, r1, 0x0, 0x0, 0x0, @prog_id}, 0x20) 0s ago: executing program 0 (id=10162): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001cc0)=ANY=[], 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x3, 0x0, &(0x7f00000000c0)="b9ff03", 0x0, 0x100, 0x2000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) close(0xffffffffffffffff) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x4, 0x0, 0x1ff, 0xc0239, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100, 0x1ff, 0x0, 0x0, 0x0, 0x2, 0x1000}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000ba000000b7000000000000009500000000000000"], &(0x7f0000001a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa10000000000006948c863d976b864018af89207010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) kernel console output (not intermixed with test programs): link becomes ready [ 848.860018][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 848.868229][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 848.876622][ T2803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 849.786619][T23992] device veth0_vlan left promiscuous mode [ 849.846356][T23992] device veth0_vlan entered promiscuous mode [ 849.853132][T20183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 849.879370][T20183] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 849.946382][T20183] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 850.161926][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 850.296976][ T311] device bridge_slave_0 left promiscuous mode [ 850.387298][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 850.398725][ T311] device veth1_macvtap left promiscuous mode [ 850.404536][ T311] device veth0_vlan left promiscuous mode [ 851.248001][T23993] bridge0: port 1(bridge_slave_0) entered blocking state [ 851.254853][T23993] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.270120][T23993] device bridge_slave_0 entered promiscuous mode [ 851.285639][T24022] tun0: tun_chr_ioctl cmd 1074812118 [ 851.296305][T23993] bridge0: port 2(bridge_slave_1) entered blocking state [ 851.303147][T23993] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.317080][T23993] device bridge_slave_1 entered promiscuous mode [ 851.455067][T23993] bridge0: port 2(bridge_slave_1) entered blocking state [ 851.461917][T23993] bridge0: port 2(bridge_slave_1) entered forwarding state [ 851.469015][T23993] bridge0: port 1(bridge_slave_0) entered blocking state [ 851.475799][T23993] bridge0: port 1(bridge_slave_0) entered forwarding state [ 851.940554][ T6469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 851.961974][ T6469] bridge0: port 1(bridge_slave_0) entered disabled state [ 852.032394][ T6469] bridge0: port 2(bridge_slave_1) entered disabled state [ 852.111653][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 852.150156][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 852.233540][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 852.240403][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 852.362151][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 852.375839][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 852.384760][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 852.391614][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 852.476359][T24069] syz.4.6852[24069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 852.476415][T24069] syz.4.6852[24069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 852.550442][T24065] device syzkaller0 entered promiscuous mode [ 852.811180][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 852.869541][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 852.945323][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 852.953255][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 852.992923][T23993] device veth0_vlan entered promiscuous mode [ 853.005988][T23993] device veth1_macvtap entered promiscuous mode [ 853.053213][ T6469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 853.065848][ T6469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 853.074152][ T6469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 853.085944][ T6469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 853.093978][ T6469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 853.116036][ T6469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 853.135893][ T6469] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 853.149592][T24075] device veth0_vlan left promiscuous mode [ 853.207772][T24075] device veth0_vlan entered promiscuous mode [ 853.347678][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 853.373687][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 853.386109][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 853.394254][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 853.402630][ T676] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 853.429310][ T6469] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 853.439899][ T6469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 853.448861][ T6469] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 853.457820][ T6469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 853.506169][T24107] device pim6reg1 entered promiscuous mode [ 853.587296][ T311] device veth0_to_batadv left promiscuous mode [ 853.607905][ T311] bridge0: port 3(veth0_to_batadv) entered disabled state [ 853.625958][ T311] device bridge_slave_1 left promiscuous mode [ 853.655672][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 853.684084][ T311] device bridge_slave_0 left promiscuous mode [ 853.724467][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 853.746437][ T311] device veth0_vlan left promiscuous mode [ 855.263470][T24184] device syzkaller0 entered promiscuous mode [ 855.409759][T24198] bridge0: port 3(veth0_to_batadv) entered blocking state [ 855.417539][T24198] bridge0: port 3(veth0_to_batadv) entered disabled state [ 855.425200][T24198] device veth0_to_batadv entered promiscuous mode [ 855.435349][T24198] bridge0: port 3(veth0_to_batadv) entered blocking state [ 855.442312][T24198] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 855.601867][T24202] device veth1_macvtap left promiscuous mode [ 856.258297][T24222] device pim6reg1 entered promiscuous mode [ 856.635576][T24241] bridge0: port 2(bridge_slave_1) entered disabled state [ 856.642668][T24241] bridge0: port 1(bridge_slave_0) entered disabled state [ 857.180851][T24245] bridge0: port 2(bridge_slave_1) entered blocking state [ 857.187720][T24245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 857.194794][T24245] bridge0: port 1(bridge_slave_0) entered blocking state [ 857.201607][T24245] bridge0: port 1(bridge_slave_0) entered forwarding state [ 857.569321][T24245] device bridge0 entered promiscuous mode [ 857.759701][T24278] device pim6reg1 entered promiscuous mode [ 858.048715][T24295] 8ûÅ: renamed from syzkaller0 [ 861.282394][T24389] device sit0 entered promiscuous mode [ 861.594663][T24396] syz.3.6946[24396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 861.594718][T24396] syz.3.6946[24396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 862.970282][T24448] device syzkaller0 entered promiscuous mode [ 863.321150][T24457] : renamed from ipvlan1 [ 864.035710][T24486] device sit0 left promiscuous mode [ 865.783345][T24544] device syzkaller0 entered promiscuous mode [ 866.371304][T24565] device pim6reg1 entered promiscuous mode [ 866.929942][T24575] device syzkaller0 entered promiscuous mode [ 867.786738][T24582] device syzkaller0 entered promiscuous mode [ 868.938301][T24642] device syzkaller0 entered promiscuous mode [ 868.972753][T24656] device pim6reg1 entered promiscuous mode [ 869.382090][T24682] bridge0: port 2(bridge_slave_1) entered disabled state [ 869.389076][T24682] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.394272][T24704] device veth0_vlan left promiscuous mode [ 870.405978][T24704] device veth0_vlan entered promiscuous mode [ 870.428408][T18837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 870.445811][T18837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 870.457439][T18837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 871.455098][T24745] device syzkaller0 entered promiscuous mode [ 871.616531][T24762] device syzkaller0 entered promiscuous mode [ 873.223367][T24814] device pim6reg1 entered promiscuous mode [ 873.619274][T24844] device pim6reg1 entered promiscuous mode [ 873.680579][T24853] device pim6reg1 entered promiscuous mode [ 875.125266][T24895] device veth0_vlan left promiscuous mode [ 875.228120][T24895] device veth0_vlan entered promiscuous mode [ 876.092941][T24904] device syzkaller0 entered promiscuous mode [ 876.592192][T24935] device wg2 entered promiscuous mode [ 877.151720][T24959] device syzkaller0 entered promiscuous mode [ 877.166656][T24962] device veth0_vlan left promiscuous mode [ 877.173145][T24962] device veth0_vlan entered promiscuous mode [ 877.188159][T24972] device pim6reg1 entered promiscuous mode [ 877.194202][T24968] device veth0_vlan left promiscuous mode [ 877.200949][T24968] device veth0_vlan entered promiscuous mode [ 877.208130][T16272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 877.217125][T16272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 877.224298][T16272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 877.234023][T24968] device pim6reg1 entered promiscuous mode [ 877.362310][T24976] device veth1_to_bond entered promiscuous mode [ 877.445960][T24986] device veth1_macvtap left promiscuous mode [ 877.451796][T24986] device macsec0 entered promiscuous mode [ 877.493072][T24996] device pim6reg1 entered promiscuous mode [ 877.537744][T25001] device syzkaller0 entered promiscuous mode [ 878.610096][T25050] device syzkaller0 entered promiscuous mode [ 878.644889][T25069] device syzkaller0 entered promiscuous mode [ 878.654706][T20174] syzkaller0: tun_net_xmit 48 [ 878.663822][T25069] syzkaller0: create flow: hash 1529671446 index 3 [ 878.691762][T25069] syzkaller0: delete flow: hash 1529671446 index 3 [ 878.723878][T25077] device pim6reg1 entered promiscuous mode [ 879.947705][T25113] device syzkaller0 entered promiscuous mode [ 880.931776][T25166] device syzkaller0 entered promiscuous mode [ 883.175972][T25241] syz.0.7215[25241] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 883.563855][T25244] device syzkaller0 entered promiscuous mode [ 885.043123][T25320] device syzkaller0 entered promiscuous mode [ 886.794432][ T24] audit: type=1400 audit(1725672167.160:180): avc: denied { create } for pid=25392 comm="syz.2.7260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 887.178771][T25405] device syzkaller0 entered promiscuous mode [ 887.420914][T25430] bridge0: port 2(bridge_slave_1) entered disabled state [ 887.427914][T25430] bridge0: port 1(bridge_slave_0) entered disabled state [ 887.434980][T25430] device bridge0 left promiscuous mode [ 887.456070][T25430] bridge0: port 2(bridge_slave_1) entered blocking state [ 887.462921][T25430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 887.470022][T25430] bridge0: port 1(bridge_slave_0) entered blocking state [ 887.476800][T25430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 887.486678][T25430] device bridge0 entered promiscuous mode [ 888.499455][T25469] device syzkaller0 entered promiscuous mode [ 889.300994][T25512] syz.1.7294[25512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 889.301047][T25512] syz.1.7294[25512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 890.292600][T25517] device syzkaller0 entered promiscuous mode [ 890.369436][T25529] device pim6reg1 entered promiscuous mode [ 890.499294][T25557] device syzkaller0 entered promiscuous mode [ 891.169614][T25579] device syzkaller0 entered promiscuous mode [ 891.210491][T25597] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.217373][T25597] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.245577][T25597] device bridge0 left promiscuous mode [ 891.265591][T25597] device bridge_slave_1 left promiscuous mode [ 891.271630][T25597] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.279317][T25597] device bridge_slave_0 left promiscuous mode [ 891.285345][T25597] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.544281][T25632] device veth0_vlan left promiscuous mode [ 891.551245][T25632] device veth0_vlan entered promiscuous mode [ 891.559597][T20176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 891.567550][T20176] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 891.574769][T20176] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 891.584416][T25635] ªªªªªª: renamed from vlan0 [ 900.642390][T25650] device syzkaller0 entered promiscuous mode [ 900.653780][T25653] device veth0_vlan left promiscuous mode [ 900.666207][T25653] device veth0_vlan entered promiscuous mode [ 901.180664][T25719] device veth0_vlan left promiscuous mode [ 901.294620][T25719] device veth0_vlan entered promiscuous mode [ 901.919726][T25756] device syzkaller0 entered promiscuous mode [ 901.927371][T25760] device pim6reg1 entered promiscuous mode [ 902.595381][T25771] device syzkaller0 entered promiscuous mode [ 903.012263][T25800] device veth0_vlan left promiscuous mode [ 903.025899][T25800] device veth0_vlan entered promiscuous mode [ 903.412231][T25816] device syzkaller0 entered promiscuous mode [ 904.050909][T25830] device syzkaller0 entered promiscuous mode [ 904.216735][T25853] device syzkaller0 entered promiscuous mode [ 904.361499][T25859] device syzkaller0 entered promiscuous mode [ 907.303012][T25992] device syzkaller0 entered promiscuous mode [ 908.522108][T26033] device syzkaller0 entered promiscuous mode [ 908.723564][T26043] device syzkaller0 entered promiscuous mode [ 909.169534][T26100] device sit0 entered promiscuous mode [ 916.844812][T26112] device syzkaller0 entered promiscuous mode [ 916.978657][T26130] device syzkaller0 entered promiscuous mode [ 916.990722][T26127] device sit0 left promiscuous mode [ 917.450952][T26165] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 917.489667][T26165] pim6reg0: linktype set to 0 [ 918.918871][T26185] device syzkaller0 entered promiscuous mode [ 918.938957][T26219] bridge0: port 2(bridge_slave_1) entered disabled state [ 918.945925][T26219] bridge0: port 1(bridge_slave_0) entered disabled state [ 918.952904][T26219] device bridge0 left promiscuous mode [ 919.097888][T26238] device veth1_macvtap entered promiscuous mode [ 919.124227][T26238] device macsec0 entered promiscuous mode [ 919.146295][T20174] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 919.747950][T26256] device syzkaller0 entered promiscuous mode [ 920.590184][T26290] device veth0_vlan left promiscuous mode [ 921.331366][T26290] device veth0_vlan entered promiscuous mode [ 922.328594][T26324] device syzkaller0 entered promiscuous mode [ 922.371279][T26342] device syzkaller0 entered promiscuous mode [ 923.024723][T26396] syz.1.7557[26396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 923.024779][T26396] syz.1.7557[26396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 923.721471][T26429] device syzkaller0 entered promiscuous mode [ 923.743472][T26442] tap0: tun_chr_ioctl cmd 1074025677 [ 923.749944][T26442] tap0: linktype set to 778 [ 923.800300][T26449] device veth1_macvtap left promiscuous mode [ 924.300815][T26459] device veth1_macvtap left promiscuous mode [ 924.448234][T26459] device veth1_macvtap entered promiscuous mode [ 924.542485][T26461] device pim6reg1 entered promiscuous mode [ 925.215785][T26482] device syzkaller0 entered promiscuous mode [ 925.286813][T26513] syz.4.7594[26513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 925.286863][T26513] syz.4.7594[26513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 926.119059][T26581] device syzkaller0 entered promiscuous mode [ 926.160317][T26585] device syzkaller0 entered promiscuous mode [ 926.982762][T26607] device syzkaller0 entered promiscuous mode [ 927.535783][T26663] device syzkaller0 entered promiscuous mode [ 927.683503][T26661] device syzkaller0 entered promiscuous mode [ 928.032952][T26680] device pim6reg1 entered promiscuous mode [ 928.111291][T26686] device syzkaller0 entered promiscuous mode [ 928.702012][T26737] bridge_slave_0: mtu greater than device maximum [ 929.044810][T26726] device syzkaller0 entered promiscuous mode [ 929.611540][T26761] tap0: tun_chr_ioctl cmd 1074025692 [ 929.633816][T26778] device macsec0 left promiscuous mode [ 929.842397][T26777] device syzkaller0 entered promiscuous mode [ 929.855446][T26778] device veth1_macvtap entered promiscuous mode [ 929.861779][T26778] device macsec0 entered promiscuous mode [ 929.883784][ T2811] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 930.063764][T26805] device syzkaller0 entered promiscuous mode [ 930.650139][T26810] device syzkaller0 entered promiscuous mode [ 931.160372][T26844] device wg2 entered promiscuous mode [ 931.180015][T26847] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 931.212114][T26847] pim6reg0: linktype set to 769 [ 931.231109][T26851] device pim6reg1 entered promiscuous mode [ 931.449401][T26874] device veth1_macvtap left promiscuous mode [ 931.456037][T26874] device macsec0 entered promiscuous mode [ 931.530352][T26892] bridge0: port 3(veth0_to_batadv) entered disabled state [ 931.537386][T26892] bridge0: port 2(bridge_slave_1) entered disabled state [ 931.544239][T26892] bridge0: port 1(bridge_slave_0) entered disabled state [ 931.561280][T26892] bridge0: port 3(veth0_to_batadv) entered blocking state [ 931.568234][T26892] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 931.575377][T26892] bridge0: port 2(bridge_slave_1) entered blocking state [ 931.582222][T26892] bridge0: port 2(bridge_slave_1) entered forwarding state [ 931.589285][T26892] bridge0: port 1(bridge_slave_0) entered blocking state [ 931.596087][T26892] bridge0: port 1(bridge_slave_0) entered forwarding state [ 931.603813][T26892] device bridge0 entered promiscuous mode [ 933.033794][ T24] audit: type=1400 audit(1725672213.400:181): avc: denied { attach_queue } for pid=26993 comm="syz.3.7741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 961.898466][T27045] bridge0: port 1(bridge_slave_0) entered blocking state [ 961.905308][T27045] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.912552][T27045] device bridge_slave_0 entered promiscuous mode [ 961.919312][T27045] bridge0: port 2(bridge_slave_1) entered blocking state [ 961.926162][T27045] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.933331][T27045] device bridge_slave_1 entered promiscuous mode [ 961.944571][T27046] bridge0: port 1(bridge_slave_0) entered blocking state [ 961.951438][T27046] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.958646][T27046] device bridge_slave_0 entered promiscuous mode [ 961.965240][T27046] bridge0: port 2(bridge_slave_1) entered blocking state [ 961.972108][T27046] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.979398][T27046] device bridge_slave_1 entered promiscuous mode [ 962.013573][T27047] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.020517][T27047] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.027654][T27047] device bridge_slave_0 entered promiscuous mode [ 962.034225][T27047] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.041225][T27047] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.048474][T27047] device bridge_slave_1 entered promiscuous mode [ 962.098816][T27049] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.105680][T27049] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.112903][T27049] device bridge_slave_0 entered promiscuous mode [ 962.121515][T27049] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.128393][T27049] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.135424][T27049] device bridge_slave_1 entered promiscuous mode [ 962.151577][T27048] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.158511][T27048] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.165744][T27048] device bridge_slave_0 entered promiscuous mode [ 962.174242][T27048] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.181325][T27048] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.188467][T27048] device bridge_slave_1 entered promiscuous mode [ 962.281146][T27046] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.287994][T27046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 962.295058][T27046] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.301901][T27046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 962.322332][T27045] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.329186][T27045] bridge0: port 2(bridge_slave_1) entered forwarding state [ 962.336272][T27045] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.343052][T27045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 962.356689][T27047] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.363526][T27047] bridge0: port 2(bridge_slave_1) entered forwarding state [ 962.370644][T27047] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.377436][T27047] bridge0: port 1(bridge_slave_0) entered forwarding state [ 962.391283][T27049] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.398138][T27049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 962.405209][T27049] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.412033][T27049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 962.450714][T27048] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.457570][T27048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 962.464644][T27048] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.471464][T27048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 962.489031][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 962.496261][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 962.503466][T20163] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.510908][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 962.519182][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 962.527354][T20163] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.534297][T20163] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.541249][T20163] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.548384][T20163] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.555332][T20163] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.562606][T20163] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.569591][T20163] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.596002][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 962.603817][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 962.612210][T16271] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.619049][T16271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 962.626382][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 962.634263][T16271] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.641038][T16271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 962.648217][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 962.655956][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 962.663593][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 962.671245][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 962.686640][ T311] device bridge_slave_1 left promiscuous mode [ 962.692552][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.700041][ T311] device bridge_slave_0 left promiscuous mode [ 962.706356][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.713676][ T311] device veth1_macvtap left promiscuous mode [ 962.780158][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 962.796802][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 962.804729][T16271] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.811564][T16271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 962.820255][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 962.828557][T16271] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.835367][T16271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 962.842576][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 962.850614][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 962.858633][T16271] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.865467][T16271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 962.872561][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 962.880828][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 962.888841][T16271] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.895672][T16271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 962.902777][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 962.910621][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 962.918720][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 962.931148][T27045] device veth0_vlan entered promiscuous mode [ 962.940649][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 962.948644][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 962.956510][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 962.964227][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 962.972288][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 962.980007][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 962.987698][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 962.995384][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 963.002612][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 963.024522][T27049] device veth0_vlan entered promiscuous mode [ 963.038505][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 963.046282][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 963.053549][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 963.061626][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 963.069087][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 963.076250][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 963.084230][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 963.092080][ T571] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.098905][ T571] bridge0: port 1(bridge_slave_0) entered forwarding state [ 963.106279][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 963.114293][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 963.122309][ T571] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.129221][ T571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 963.136395][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 963.144213][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 963.152251][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 963.160129][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 963.167955][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 963.175978][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 963.183939][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 963.192093][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 963.204737][T27049] device veth1_macvtap entered promiscuous mode [ 963.212759][T27046] device veth0_vlan entered promiscuous mode [ 963.220990][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 963.228944][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 963.236994][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 963.244645][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 963.252189][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 963.268542][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 963.276572][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 963.284540][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 963.292666][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 963.300781][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 963.309297][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 963.320496][T27047] device veth0_vlan entered promiscuous mode [ 963.330544][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 963.338497][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 963.346279][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 963.353483][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 963.363479][T27045] device veth1_macvtap entered promiscuous mode [ 963.384344][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 963.394859][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 963.403344][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 963.415758][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 963.423675][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 963.443786][T27046] device veth1_macvtap entered promiscuous mode [ 963.453549][T27048] device veth0_vlan entered promiscuous mode [ 963.461139][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 963.469537][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 963.478262][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 963.485384][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 963.493167][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 963.500746][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 963.508983][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 963.517244][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 963.525249][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 963.533393][T16271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 963.544409][T27047] device veth1_macvtap entered promiscuous mode [ 963.571552][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 963.580184][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 963.588644][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 963.596965][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 963.605032][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 963.615408][T27048] device veth1_macvtap entered promiscuous mode [ 963.652721][ T2811] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 963.692544][ T2811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 963.821818][ T2811] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 963.888119][ T2811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 963.979039][ T2811] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 963.990719][ T2811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 964.062872][ T2811] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 964.150085][ T2811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 964.677410][T27099] device syzkaller0 entered promiscuous mode [ 965.957172][T27126] device syzkaller0 entered promiscuous mode [ 965.973429][T27131] device sit0 entered promiscuous mode [ 966.469276][ T311] device bridge_slave_1 left promiscuous mode [ 966.573588][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 966.590017][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 966.664723][ T311] device bridge_slave_1 left promiscuous mode [ 966.671385][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 966.741713][ T311] device bridge_slave_0 left promiscuous mode [ 966.810765][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 966.832225][ T311] device veth0_to_batadv left promiscuous mode [ 966.865539][ T311] bridge0: port 3(veth0_to_batadv) entered disabled state [ 966.873651][ T311] device bridge_slave_1 left promiscuous mode [ 966.884117][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 966.894694][ T311] device bridge_slave_0 left promiscuous mode [ 966.901863][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 966.958639][ T311] device veth0_vlan left promiscuous mode [ 966.971669][ T311] device veth1_macvtap left promiscuous mode [ 966.984867][ T311] device veth1_macvtap left promiscuous mode [ 966.997408][ T311] device veth0_vlan left promiscuous mode [ 968.612687][T27221] device pim6reg1 entered promiscuous mode [ 969.044020][T27249] device syzkaller0 entered promiscuous mode [ 969.297631][T27249] device pim6reg1 entered promiscuous mode [ 970.157098][T27342] device pim6reg1 entered promiscuous mode [ 970.192771][T27347] device syzkaller0 entered promiscuous mode [ 970.211612][T27347] tap0: tun_chr_ioctl cmd 2147767511 [ 970.260165][T27350] device syzkaller0 entered promiscuous mode [ 970.293825][T27355] device sit0 entered promiscuous mode [ 970.381497][T27365] device syzkaller0 entered promiscuous mode [ 970.424032][T27367] device pim6reg1 entered promiscuous mode [ 970.598150][T27409] device pim6reg1 entered promiscuous mode [ 970.632277][T27412] bridge0: port 1(bridge_slave_0) entered disabled state [ 970.677475][T27418] device pim6reg1 entered promiscuous mode [ 970.689449][ T24] audit: type=1400 audit(1725672251.060:182): avc: denied { create } for pid=27420 comm="syz.1.7871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 971.308034][T27423] device syzkaller0 entered promiscuous mode [ 991.396206][T27437] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.403127][T27437] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.410439][T27437] device bridge_slave_0 entered promiscuous mode [ 991.426360][T27437] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.433851][T27437] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.441032][T27437] device bridge_slave_1 entered promiscuous mode [ 991.447393][T27438] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.454215][T27438] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.461507][T27438] device bridge_slave_0 entered promiscuous mode [ 991.468251][T27438] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.475073][T27438] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.482306][T27438] device bridge_slave_1 entered promiscuous mode [ 991.512721][T27439] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.519597][T27439] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.526868][T27439] device bridge_slave_0 entered promiscuous mode [ 991.533479][T27439] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.540445][T27439] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.547594][T27439] device bridge_slave_1 entered promiscuous mode [ 991.601186][T27440] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.608138][T27440] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.615215][T27440] device bridge_slave_0 entered promiscuous mode [ 991.635952][T27440] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.642835][T27440] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.649995][T27440] device bridge_slave_1 entered promiscuous mode [ 991.687701][T27441] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.694527][T27441] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.701960][T27441] device bridge_slave_0 entered promiscuous mode [ 991.726831][T27441] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.733660][T27441] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.740965][T27441] device bridge_slave_1 entered promiscuous mode [ 991.790055][T27437] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.796902][T27437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 991.803960][T27437] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.810799][T27437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 991.822768][T27440] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.829607][T27440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 991.836712][T27440] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.843479][T27440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 991.855285][T27438] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.862130][T27438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 991.869223][T27438] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.876012][T27438] bridge0: port 1(bridge_slave_0) entered forwarding state [ 991.897790][T27439] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.904628][T27439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 991.911742][T27439] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.918524][T27439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 991.962657][T16281] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.969898][T16281] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.977035][T16281] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.984003][T16281] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.991269][T16281] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.998649][T16281] bridge0: port 2(bridge_slave_1) entered disabled state [ 992.005633][T16281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 992.012856][T16281] bridge0: port 1(bridge_slave_0) entered disabled state [ 992.019917][T16281] bridge0: port 2(bridge_slave_1) entered disabled state [ 992.035634][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 992.044074][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 992.052036][T20172] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.058867][T20172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.066492][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 992.074383][T20172] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.081152][T20172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.088297][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 992.096274][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 992.129262][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 992.137211][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 992.145033][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 992.153232][T20172] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.160070][T20172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.168157][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 992.176122][T20172] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.182933][T20172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.190131][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 992.197820][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 992.205831][T20172] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.212642][T20172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.219851][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 992.227639][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 992.235611][T20172] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.242427][T20172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.249622][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 992.257548][T20172] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.264356][T20172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.280425][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 992.288523][T20160] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.295334][T20160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.303076][ T311] device bridge_slave_1 left promiscuous mode [ 992.309154][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 992.316777][ T311] device bridge_slave_0 left promiscuous mode [ 992.322678][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 992.330184][ T311] device veth1_macvtap left promiscuous mode [ 992.403449][T27440] device veth0_vlan entered promiscuous mode [ 992.415858][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 992.423889][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 992.431786][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 992.439755][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 992.453157][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 992.461361][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 992.469515][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 992.477170][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 992.497034][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 992.504234][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 992.511529][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 992.519630][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 992.527360][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 992.534485][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 992.541602][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 992.549348][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 992.557110][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 992.565094][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 992.573018][T27109] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.579840][T27109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.587070][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 992.595100][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 992.603472][T27109] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.610308][T27109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.617557][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 992.625305][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 992.633945][T27438] device veth0_vlan entered promiscuous mode [ 992.649463][T27438] device veth1_macvtap entered promiscuous mode [ 992.657470][T16281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 992.664792][T16281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 992.672949][T16281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 992.681024][T16281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 992.689981][T16281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 992.697851][T16281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 992.705831][T16281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 992.713629][T16281] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 992.721219][T16281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 992.730744][T27440] device veth1_macvtap entered promiscuous mode [ 992.742656][T27437] device veth0_vlan entered promiscuous mode [ 992.751334][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 992.759459][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 992.767476][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 992.774804][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 992.783219][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 992.791369][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 992.799143][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 992.807081][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 992.814256][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 992.830306][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 992.839019][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 992.847218][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 992.855229][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 992.863718][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 992.871795][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 992.880012][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 992.888053][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 992.902803][T27441] device veth0_vlan entered promiscuous mode [ 992.918491][T27437] device veth1_macvtap entered promiscuous mode [ 992.938295][ T6475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 992.950424][ T6475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 992.958603][ T6475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 992.966336][ T6475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 992.979486][ T6475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 992.987596][ T6475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 992.995522][ T6475] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 993.002933][ T6475] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 993.011157][ T6475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 993.037303][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 993.045386][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 993.053898][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 993.062931][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 993.071051][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 993.079579][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 993.088156][T27439] device veth0_vlan entered promiscuous mode [ 993.094747][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 993.103447][T20160] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 993.130897][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 993.141562][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 993.167128][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 993.190304][T27439] device veth1_macvtap entered promiscuous mode [ 993.255322][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 993.273054][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 993.293260][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 993.303312][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 993.328572][T20163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 993.360217][T27441] device veth1_macvtap entered promiscuous mode [ 993.413538][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 993.427721][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 993.527885][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 993.591244][T20172] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 994.017059][T27491] device veth1_macvtap left promiscuous mode [ 994.045707][T27491] device macsec0 entered promiscuous mode [ 994.287008][T27494] device syzkaller0 entered promiscuous mode [ 996.154568][T27531] syz.4.7897[27531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 996.154622][T27531] syz.4.7897[27531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 996.769066][ T311] device bridge_slave_1 left promiscuous mode [ 996.952588][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.036681][ T311] device bridge_slave_0 left promiscuous mode [ 997.075866][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.110969][ T311] device bridge_slave_1 left promiscuous mode [ 997.121341][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.134253][ T311] device bridge_slave_0 left promiscuous mode [ 997.144632][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.157661][ T311] device bridge_slave_1 left promiscuous mode [ 997.168019][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.226537][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.242599][ T311] device bridge_slave_1 left promiscuous mode [ 997.255591][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.270530][ T311] device bridge_slave_0 left promiscuous mode [ 997.283078][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.300438][ T311] device veth1_macvtap left promiscuous mode [ 997.312792][ T311] device veth0_vlan left promiscuous mode [ 997.325343][ T311] device veth1_macvtap left promiscuous mode [ 997.338988][ T311] device veth1_macvtap left promiscuous mode [ 997.350276][ T311] device veth0_vlan left promiscuous mode [ 997.366965][ T311] device veth1_macvtap left promiscuous mode [ 1000.815453][T27678] device syzkaller0 entered promiscuous mode [ 1001.670516][T27706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1001.677513][T27706] bridge0: port 1(bridge_slave_0) entered disabled state [ 1001.769812][T27707] device bridge_slave_1 left promiscuous mode [ 1001.796456][T27707] bridge0: port 2(bridge_slave_1) entered disabled state [ 1001.814000][T27707] device bridge_slave_0 left promiscuous mode [ 1001.835563][T27707] bridge0: port 1(bridge_slave_0) entered disabled state [ 1002.064601][T27729] device syzkaller0 entered promiscuous mode [ 1002.964472][T27742] device syzkaller0 entered promiscuous mode [ 1003.061729][T27752] syz.4.7963[27752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1003.061784][T27752] syz.4.7963[27752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1003.380958][T27787] syz.2.7974[27787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1003.381628][T27786] syz.2.7974[27786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1004.066346][T27794] device syzkaller0 entered promiscuous mode [ 1004.108324][T27802] device syzkaller0 entered promiscuous mode [ 1004.908424][T27859] syz.4.7995[27859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1004.908472][T27859] syz.4.7995[27859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1007.155155][T27921] device sit0 entered promiscuous mode [ 1008.708376][T27985] device veth0_vlan left promiscuous mode [ 1008.806087][T27985] device veth0_vlan entered promiscuous mode [ 1008.813138][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1008.868310][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1009.035769][ T571] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1009.493141][T28012] device syzkaller0 entered promiscuous mode [ 1009.627875][T28026] syz.4.8045[28026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1009.627932][T28026] syz.4.8045[28026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1009.853094][T28058] device syzkaller0 entered promiscuous mode [ 1010.863720][T28122] device syzkaller0 entered promiscuous mode [ 1011.258543][T28143] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 1011.305478][T28143] pim6reg0: linktype set to 773 [ 1011.320978][T28143] pim6reg0: tun_chr_ioctl cmd 2147767520 [ 1011.955877][T28156] device syzkaller0 entered promiscuous mode [ 1011.977605][T28158] device vxcan1 entered promiscuous mode [ 1012.020286][T28164] device syzkaller0 entered promiscuous mode [ 1012.105485][T28169] device syzkaller0 entered promiscuous mode [ 1012.161894][T28173] device pim6reg1 entered promiscuous mode [ 1012.187242][T28178] tap0: tun_chr_ioctl cmd 21731 [ 1012.351963][T28203] device sit0 entered promiscuous mode [ 1013.593860][T28226] device pim6reg1 entered promiscuous mode [ 1013.955797][T28232] device syzkaller0 entered promiscuous mode [ 1014.602694][T28279] syz.3.8120[28279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1014.602746][T28279] syz.3.8120[28279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1016.683922][T28355] device syzkaller0 entered promiscuous mode [ 1016.749307][T28370] syz.3.8148[28370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1016.749359][T28370] syz.3.8148[28370] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1017.680084][T28402] device pim6reg1 entered promiscuous mode [ 1018.396997][T28455] device pim6reg1 entered promiscuous mode [ 1019.144796][T28485] device pim6reg1 entered promiscuous mode [ 1019.641891][T28537] device sit0 entered promiscuous mode [ 1020.203078][T28542] device syzkaller0 entered promiscuous mode [ 1021.271878][T28637] device pim6reg1 entered promiscuous mode [ 1023.482641][T28740] device syzkaller0 entered promiscuous mode [ 1024.669276][T28759] device pim6reg1 entered promiscuous mode [ 1025.234544][T28775] device syzkaller0 entered promiscuous mode [ 1027.174707][T28817] device syzkaller0 entered promiscuous mode [ 1027.658292][T28832] device veth1_macvtap left promiscuous mode [ 1027.664160][T28832] device macsec0 entered promiscuous mode [ 1028.315979][T28857] device syzkaller0 entered promiscuous mode [ 1028.411095][T28853] device sit0 entered promiscuous mode [ 1031.000452][T28954] device pim6reg1 entered promiscuous mode [ 1058.612848][T28973] bridge0: port 1(bridge_slave_0) entered blocking state [ 1058.619868][T28973] bridge0: port 1(bridge_slave_0) entered disabled state [ 1058.627013][T28973] device bridge_slave_0 entered promiscuous mode [ 1058.643682][T28970] bridge0: port 1(bridge_slave_0) entered blocking state [ 1058.650540][T28970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1058.657822][T28970] device bridge_slave_0 entered promiscuous mode [ 1058.664196][T28973] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.671146][T28973] bridge0: port 2(bridge_slave_1) entered disabled state [ 1058.678304][T28973] device bridge_slave_1 entered promiscuous mode [ 1058.694981][T28971] bridge0: port 1(bridge_slave_0) entered blocking state [ 1058.701886][T28971] bridge0: port 1(bridge_slave_0) entered disabled state [ 1058.708998][T28971] device bridge_slave_0 entered promiscuous mode [ 1058.715551][T28970] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.722374][T28970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1058.729679][T28970] device bridge_slave_1 entered promiscuous mode [ 1058.741344][T28971] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.748239][T28971] bridge0: port 2(bridge_slave_1) entered disabled state [ 1058.755257][T28971] device bridge_slave_1 entered promiscuous mode [ 1058.795865][T28972] bridge0: port 1(bridge_slave_0) entered blocking state [ 1058.802693][T28972] bridge0: port 1(bridge_slave_0) entered disabled state [ 1058.810046][T28972] device bridge_slave_0 entered promiscuous mode [ 1058.818652][T28972] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.825499][T28972] bridge0: port 2(bridge_slave_1) entered disabled state [ 1058.832670][T28972] device bridge_slave_1 entered promiscuous mode [ 1058.875202][T28974] bridge0: port 1(bridge_slave_0) entered blocking state [ 1058.882245][T28974] bridge0: port 1(bridge_slave_0) entered disabled state [ 1058.890043][T28974] device bridge_slave_0 entered promiscuous mode [ 1058.898848][T28974] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.905691][T28974] bridge0: port 2(bridge_slave_1) entered disabled state [ 1058.912751][T28974] device bridge_slave_1 entered promiscuous mode [ 1058.984748][T28971] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.991605][T28971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1058.998689][T28971] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.005485][T28971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1059.043327][T28973] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.050174][T28973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.057290][T28973] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.064048][T28973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1059.089611][T28970] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.096460][T28970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.103534][T28970] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.110366][T28970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1059.133993][T28972] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.140832][T28972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.147933][T28972] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.154712][T28972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1059.167335][T28974] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.174166][T28974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.181285][T28974] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.188065][T28974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1059.207790][T20164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1059.215132][T20164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1059.222178][T20164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1059.229226][T20164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1059.236358][T20164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1059.243314][T20164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1059.251275][T20164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1059.258239][T20164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1059.265135][T20164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1059.272112][T20164] bridge0: port 1(bridge_slave_0) entered disabled state [ 1059.279188][T20164] bridge0: port 2(bridge_slave_1) entered disabled state [ 1059.311050][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1059.318832][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1059.335953][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1059.343841][T28527] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.350622][T28527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.358142][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1059.366300][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1059.373931][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1059.381955][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1059.389824][T28527] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.396598][T28527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1059.403704][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1059.411739][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1059.419608][T28527] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.426382][T28527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.433481][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1059.440664][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1059.447803][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1059.456123][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1059.463980][T28527] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.470775][T28527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1059.477874][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1059.485880][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1059.493743][T28527] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.500530][T28527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.536605][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1059.543761][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1059.550956][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1059.561535][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1059.569903][T28527] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.576742][T28527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1059.583910][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1059.592092][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1059.600015][T28527] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.606835][T28527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.614011][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1059.621895][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1059.629596][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1059.636752][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1059.643938][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1059.651614][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1059.659264][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1059.667205][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1059.674866][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1059.682660][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1059.695561][T28971] device veth0_vlan entered promiscuous mode [ 1059.708918][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1059.717668][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1059.725892][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1059.733932][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1059.741991][T28527] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.748828][T28527] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1059.756402][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1059.764371][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1059.772253][T28527] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.779078][T28527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.794047][T28973] device veth0_vlan entered promiscuous mode [ 1059.810721][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1059.819026][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1059.827698][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1059.834870][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1059.842889][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1059.850593][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1059.858582][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1059.866352][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1059.874318][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1059.882380][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1059.890085][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1059.897844][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1059.905960][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1059.913955][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1059.922215][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1059.930269][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1059.938355][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1059.945786][T28517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1059.958255][T28974] device veth0_vlan entered promiscuous mode [ 1059.973430][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1059.981447][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1059.988822][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1059.996120][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1060.003742][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1060.010925][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1060.018102][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1060.026038][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1060.036011][T28971] device veth1_macvtap entered promiscuous mode [ 1060.044498][T28970] device veth0_vlan entered promiscuous mode [ 1060.052512][T28973] device veth1_macvtap entered promiscuous mode [ 1060.059129][T28972] device veth0_vlan entered promiscuous mode [ 1060.068483][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1060.076656][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1060.083785][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1060.091226][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1060.098748][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1060.108716][T28974] device veth1_macvtap entered promiscuous mode [ 1060.124379][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1060.132384][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1060.142044][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1060.150243][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1060.158408][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1060.171720][T28970] device veth1_macvtap entered promiscuous mode [ 1060.190778][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1060.204660][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1060.213015][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1060.221400][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1060.229568][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1060.238109][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1060.246296][T20173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1060.262788][ T311] device bridge_slave_1 left promiscuous mode [ 1060.268849][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1060.276291][ T311] device bridge_slave_0 left promiscuous mode [ 1060.282183][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1060.290866][ T311] device bridge_slave_1 left promiscuous mode [ 1060.296831][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1060.303864][ T311] device bridge_slave_0 left promiscuous mode [ 1060.309917][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1060.317594][ T311] device veth1_macvtap left promiscuous mode [ 1060.428586][T28991] device veth1_macvtap left promiscuous mode [ 1060.435731][T28972] device veth1_macvtap entered promiscuous mode [ 1060.442536][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1060.450937][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1060.459180][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1060.467504][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1060.475799][T28527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1060.537726][T20193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1060.550045][T20193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1060.559588][T20193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1060.568443][T20193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1060.633370][T29008] syz.2.8317[29008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1060.633421][T29008] syz.2.8317[29008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1061.896436][T29046] device pim6reg1 entered promiscuous mode [ 1062.584288][ T311] device bridge_slave_1 left promiscuous mode [ 1062.603732][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1062.635930][ T311] device bridge_slave_0 left promiscuous mode [ 1062.641838][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1062.649927][ T311] device bridge_slave_1 left promiscuous mode [ 1062.655908][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1062.663133][ T311] device bridge_slave_0 left promiscuous mode [ 1062.669134][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1062.680906][ T311] device veth1_macvtap left promiscuous mode [ 1062.686853][ T311] device veth0_vlan left promiscuous mode [ 1062.692516][ T311] device veth1_macvtap left promiscuous mode [ 1062.698424][ T311] device veth0_vlan left promiscuous mode [ 1062.704002][ T311] device veth0_vlan left promiscuous mode [ 1062.867591][T29067] device wg2 entered promiscuous mode [ 1062.878940][T29071] bridge0: port 3(veth1_macvtap) entered blocking state [ 1062.885777][T29071] bridge0: port 3(veth1_macvtap) entered disabled state [ 1062.894071][T29072] device wg2 entered promiscuous mode [ 1064.962683][T29101] device syzkaller0 entered promiscuous mode [ 1065.010477][T29101] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 1065.017278][T29101] pim6reg0: linktype set to 773 [ 1065.111126][T29110] syz.2.8350[29110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1065.111182][T29110] syz.2.8350[29110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1065.474227][T29113] device veth1_macvtap left promiscuous mode [ 1065.616709][T29131] bridge0: port 2(bridge_slave_1) entered disabled state [ 1065.624047][T29131] bridge0: port 1(bridge_slave_0) entered disabled state [ 1066.880983][T29158] FAULT_INJECTION: forcing a failure. [ 1066.880983][T29158] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1066.894068][T29158] CPU: 0 PID: 29158 Comm: syz.2.8366 Tainted: G W 5.10.223-syzkaller-00011-g1c5354a314ea #0 [ 1066.905176][T29158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1066.915065][T29158] Call Trace: [ 1066.918205][T29158] dump_stack_lvl+0x1e2/0x24b [ 1066.922705][T29158] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1066.928074][T29158] ? down_read_trylock+0x179/0x1d0 [ 1066.932951][T29158] ? __init_rwsem+0x1c0/0x1c0 [ 1066.937461][T29158] dump_stack+0x15/0x17 [ 1066.941452][T29158] should_fail+0x3c6/0x510 [ 1066.945744][T29158] should_fail_alloc_page+0x52/0x60 [ 1066.950739][T29158] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1066.955953][T29158] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1066.961354][T29158] ? copy_user_enhanced_fast_string+0xe/0x40 [ 1066.967156][T29158] pipe_write+0x551/0x18c0 [ 1066.971415][T29158] ? pipe_read+0x1040/0x1040 [ 1066.975825][T29158] ? fsnotify_perm+0x67/0x4e0 [ 1066.980334][T29158] ? security_file_permission+0x7b/0xb0 [ 1066.985730][T29158] ? security_file_permission+0x86/0xb0 [ 1066.991103][T29158] ? iov_iter_init+0x3f/0x120 [ 1066.995613][T29158] vfs_write+0xb4c/0xe70 [ 1066.999693][T29158] ? kernel_write+0x3d0/0x3d0 [ 1067.004211][T29158] ? __fdget_pos+0x209/0x3a0 [ 1067.008631][T29158] ? ksys_write+0x77/0x2c0 [ 1067.012881][T29158] ksys_write+0x199/0x2c0 [ 1067.017050][T29158] ? __ia32_sys_read+0x90/0x90 [ 1067.021651][T29158] ? debug_smp_processor_id+0x17/0x20 [ 1067.026946][T29158] __x64_sys_write+0x7b/0x90 [ 1067.031371][T29158] do_syscall_64+0x34/0x70 [ 1067.035629][T29158] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1067.041353][T29158] RIP: 0033:0x7fd2cfd0fef9 [ 1067.045607][T29158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1067.065051][T29158] RSP: 002b:00007fd2ce98a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1067.073289][T29158] RAX: ffffffffffffffda RBX: 00007fd2cfec8f80 RCX: 00007fd2cfd0fef9 [ 1067.081098][T29158] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 0000000000000000 [ 1067.088907][T29158] RBP: 00007fd2ce98a090 R08: 0000000000000000 R09: 0000000000000000 [ 1067.096732][T29158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1067.104536][T29158] R13: 0000000000000000 R14: 00007fd2cfec8f80 R15: 00007ffe91f731a8 [ 1067.633375][T29180] device wg2 entered promiscuous mode [ 1067.826686][T29190] syz.1.8376[29190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1067.826737][T29190] syz.1.8376[29190] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1068.968800][T29225] device pim6reg1 entered promiscuous mode [ 1070.932940][T29304] device syzkaller0 entered promiscuous mode [ 1070.998786][T29313] -: renamed from syzkaller0 [ 1071.983505][T29339] device sit0 entered promiscuous mode [ 1075.050742][T29427] device pim6reg1 entered promiscuous mode [ 1075.129139][T29449] device wg2 left promiscuous mode [ 1075.154814][T29457] syz.1.8456[29457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1075.154842][T29457] syz.1.8456[29457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1100.470578][T29489] bridge0: port 1(bridge_slave_0) entered blocking state [ 1100.488711][T29489] bridge0: port 1(bridge_slave_0) entered disabled state [ 1100.495852][T29489] device bridge_slave_0 entered promiscuous mode [ 1100.503405][T29489] bridge0: port 2(bridge_slave_1) entered blocking state [ 1100.510632][T29489] bridge0: port 2(bridge_slave_1) entered disabled state [ 1100.519107][T29489] device bridge_slave_1 entered promiscuous mode [ 1100.573159][T29492] bridge0: port 1(bridge_slave_0) entered blocking state [ 1100.580152][T29492] bridge0: port 1(bridge_slave_0) entered disabled state [ 1100.587286][T29492] device bridge_slave_0 entered promiscuous mode [ 1100.601884][T29492] bridge0: port 2(bridge_slave_1) entered blocking state [ 1100.608763][T29492] bridge0: port 2(bridge_slave_1) entered disabled state [ 1100.615955][T29492] device bridge_slave_1 entered promiscuous mode [ 1100.622577][T29494] bridge0: port 1(bridge_slave_0) entered blocking state [ 1100.629454][T29494] bridge0: port 1(bridge_slave_0) entered disabled state [ 1100.636717][T29494] device bridge_slave_0 entered promiscuous mode [ 1100.656391][T29494] bridge0: port 2(bridge_slave_1) entered blocking state [ 1100.663224][T29494] bridge0: port 2(bridge_slave_1) entered disabled state [ 1100.670486][T29494] device bridge_slave_1 entered promiscuous mode [ 1100.683491][T29493] bridge0: port 1(bridge_slave_0) entered blocking state [ 1100.690514][T29493] bridge0: port 1(bridge_slave_0) entered disabled state [ 1100.697669][T29493] device bridge_slave_0 entered promiscuous mode [ 1100.712067][T29495] bridge0: port 1(bridge_slave_0) entered blocking state [ 1100.718932][T29495] bridge0: port 1(bridge_slave_0) entered disabled state [ 1100.726150][T29495] device bridge_slave_0 entered promiscuous mode [ 1100.733797][T29495] bridge0: port 2(bridge_slave_1) entered blocking state [ 1100.740724][T29495] bridge0: port 2(bridge_slave_1) entered disabled state [ 1100.747716][T29495] device bridge_slave_1 entered promiscuous mode [ 1100.754143][T29493] bridge0: port 2(bridge_slave_1) entered blocking state [ 1100.761321][T29493] bridge0: port 2(bridge_slave_1) entered disabled state [ 1100.768479][T29493] device bridge_slave_1 entered promiscuous mode [ 1100.856227][T29489] bridge0: port 2(bridge_slave_1) entered blocking state [ 1100.863064][T29489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1100.870175][T29489] bridge0: port 1(bridge_slave_0) entered blocking state [ 1100.876964][T29489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1100.932620][T29494] bridge0: port 2(bridge_slave_1) entered blocking state [ 1100.939471][T29494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1100.946561][T29494] bridge0: port 1(bridge_slave_0) entered blocking state [ 1100.953340][T29494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1100.961919][T29493] bridge0: port 2(bridge_slave_1) entered blocking state [ 1100.968758][T29493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1100.975850][T29493] bridge0: port 1(bridge_slave_0) entered blocking state [ 1100.982631][T29493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1100.998887][T29495] bridge0: port 2(bridge_slave_1) entered blocking state [ 1101.005729][T29495] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1101.012812][T29495] bridge0: port 1(bridge_slave_0) entered blocking state [ 1101.019623][T29495] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1101.027572][T28514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1101.034785][T28514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1101.043129][T28514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1101.051700][T28514] bridge0: port 1(bridge_slave_0) entered disabled state [ 1101.060320][T28514] bridge0: port 2(bridge_slave_1) entered disabled state [ 1101.067319][T28514] bridge0: port 1(bridge_slave_0) entered disabled state [ 1101.074243][T28514] bridge0: port 2(bridge_slave_1) entered disabled state [ 1101.081300][T28514] bridge0: port 1(bridge_slave_0) entered disabled state [ 1101.088311][T28514] bridge0: port 2(bridge_slave_1) entered disabled state [ 1101.118079][T27158] device bridge_slave_1 left promiscuous mode [ 1101.123980][T27158] bridge0: port 2(bridge_slave_1) entered disabled state [ 1101.131265][T27158] device bridge_slave_0 left promiscuous mode [ 1101.137671][T27158] bridge0: port 1(bridge_slave_0) entered disabled state [ 1101.146264][T27158] device veth1_macvtap left promiscuous mode [ 1101.152057][T27158] device veth0_vlan left promiscuous mode [ 1101.221343][T28514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1101.229030][T28514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1101.258694][T28516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1101.266101][T28516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1101.274724][T28516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1101.282688][T28516] bridge0: port 1(bridge_slave_0) entered blocking state [ 1101.289603][T28516] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1101.297784][T28516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1101.305691][T28516] bridge0: port 2(bridge_slave_1) entered blocking state [ 1101.312406][T28516] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1101.325837][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1101.333421][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1101.340664][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1101.348645][T20185] bridge0: port 1(bridge_slave_0) entered blocking state [ 1101.355376][T20185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1101.362536][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1101.370749][T20185] bridge0: port 1(bridge_slave_0) entered blocking state [ 1101.377585][T20185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1101.384698][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1101.392586][T20185] bridge0: port 2(bridge_slave_1) entered blocking state [ 1101.399408][T20185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1101.406607][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1101.414507][T20185] bridge0: port 2(bridge_slave_1) entered blocking state [ 1101.421255][T20185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1101.429133][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1101.444737][T29489] device veth0_vlan entered promiscuous mode [ 1101.456386][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1101.463589][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1101.471362][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1101.479445][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1101.487314][T20185] bridge0: port 1(bridge_slave_0) entered blocking state [ 1101.494065][T20185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1101.501263][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1101.508846][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1101.516632][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1101.524610][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1101.532474][T20185] bridge0: port 2(bridge_slave_1) entered blocking state [ 1101.539297][T20185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1101.546574][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1101.553758][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1101.565754][T20190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1101.573562][T20190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1101.585451][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1101.593209][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1101.601478][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1101.609308][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1101.625377][T29489] device veth1_macvtap entered promiscuous mode [ 1101.641255][T29495] device veth0_vlan entered promiscuous mode [ 1101.654242][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1101.662319][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1101.670774][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1101.678673][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1101.686483][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1101.694305][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1101.702125][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1101.709511][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1101.717386][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1101.725018][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1101.732848][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1101.740596][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1101.748686][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1101.756850][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1101.764389][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1101.772089][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1101.780245][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1101.788409][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1101.796235][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1101.815185][T29492] device veth0_vlan entered promiscuous mode [ 1101.826692][T29493] device veth0_vlan entered promiscuous mode [ 1101.834704][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1101.842500][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1101.850571][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1101.858324][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1101.866292][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1101.873413][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1101.880686][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1101.887947][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1101.895040][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1101.902917][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1101.910794][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1101.918839][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1101.927006][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1101.934948][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1101.943056][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1101.951189][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1101.965064][T29492] device veth1_macvtap entered promiscuous mode [ 1101.983654][T29495] device veth1_macvtap entered promiscuous mode [ 1101.996459][T28521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1102.007517][T29493] device veth1_macvtap entered promiscuous mode [ 1102.016428][T28516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1102.024326][T28516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1102.032688][T28516] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1102.040520][T28516] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1102.049076][T28516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1102.066176][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1102.074194][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1102.083075][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1102.091301][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1102.100342][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1102.108663][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1102.149600][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1102.158004][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1102.167154][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1102.175335][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1102.186147][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1102.193711][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1102.201949][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1102.210244][T20189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1102.218669][T20190] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1102.226171][T20190] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1102.235948][T29494] device veth0_vlan entered promiscuous mode [ 1102.264000][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1102.281450][T29494] device veth1_macvtap entered promiscuous mode [ 1102.327416][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1102.338667][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1102.356367][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1102.368051][T20185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1103.339007][T29555] bridge0: port 2(bridge_slave_1) entered disabled state [ 1103.345994][T29555] bridge0: port 1(bridge_slave_0) entered disabled state [ 1103.360964][T29558] bridge0: port 2(bridge_slave_1) entered blocking state [ 1103.367832][T29558] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1103.374952][T29558] bridge0: port 1(bridge_slave_0) entered blocking state [ 1103.381722][T29558] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1103.394542][T29558] device bridge0 entered promiscuous mode [ 1104.813740][T27158] device bridge_slave_1 left promiscuous mode [ 1104.933339][T27158] bridge0: port 2(bridge_slave_1) entered disabled state [ 1105.087493][T27158] device bridge_slave_0 left promiscuous mode [ 1105.093448][T27158] bridge0: port 1(bridge_slave_0) entered disabled state [ 1105.334341][T27158] device bridge_slave_1 left promiscuous mode [ 1105.430852][T27158] bridge0: port 2(bridge_slave_1) entered disabled state [ 1105.525497][T27158] device bridge_slave_0 left promiscuous mode [ 1105.557540][T27158] bridge0: port 1(bridge_slave_0) entered disabled state [ 1105.617438][T27158] device bridge_slave_1 left promiscuous mode [ 1105.683618][T27158] bridge0: port 2(bridge_slave_1) entered disabled state [ 1105.763127][T27158] device bridge_slave_0 left promiscuous mode [ 1105.826570][T27158] bridge0: port 1(bridge_slave_0) entered disabled state [ 1105.904355][T27158] device bridge_slave_1 left promiscuous mode [ 1105.964180][T27158] bridge0: port 2(bridge_slave_1) entered disabled state [ 1106.061220][T27158] device bridge_slave_0 left promiscuous mode [ 1106.151370][T27158] bridge0: port 1(bridge_slave_0) entered disabled state [ 1106.245576][T27158] device veth1_macvtap left promiscuous mode [ 1106.251404][T27158] device veth0_vlan left promiscuous mode [ 1106.352558][T27158] device veth0_vlan left promiscuous mode [ 1106.365285][T27158] device veth1_macvtap left promiscuous mode [ 1106.371438][T27158] device veth0_vlan left promiscuous mode [ 1106.377668][T27158] device veth0_vlan left promiscuous mode [ 1107.638211][T29656] device wg2 entered promiscuous mode [ 1118.835814][T29755] device pim6reg1 entered promiscuous mode [ 1119.207644][T29777] device pim6reg1 entered promiscuous mode [ 1120.340411][T29806] syz.4.8546[29806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1120.344412][T29806] syz.4.8546[29806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1120.610489][T29820] device veth1_macvtap left promiscuous mode [ 1120.750322][T29820] device veth1_macvtap entered promiscuous mode [ 1120.855075][T29820] device macsec0 entered promiscuous mode [ 1121.922493][T29886] device pim6reg1 entered promiscuous mode [ 1122.878864][T29920] syzkaller0: refused to change device tx_queue_len [ 1123.152045][T29958] 8ûÅ: renamed from syzkaller0 [ 1123.193689][T29966] device pim6reg1 entered promiscuous mode [ 1124.241853][T29993] syz.4.8604[29993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1124.241907][T29993] syz.4.8604[29993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1124.395298][T29993] syz.4.8604[29993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1124.410155][T29993] syz.4.8604[29993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1124.554544][T30003] device pim6reg1 entered promiscuous mode [ 1124.694204][T30016] device veth1_macvtap left promiscuous mode [ 1129.920991][T30182] device sit0 entered promiscuous mode [ 1131.433526][T30230] syz.2.8671[30230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1131.438521][T30230] syz.2.8671[30230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1131.755649][T30255] ªªªªªª: renamed from vlan0 [ 1132.102494][T30276] device wg2 entered promiscuous mode [ 1133.525522][ T24] audit: type=1400 audit(1725672413.890:183): avc: denied { create } for pid=30335 comm="syz.4.8704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1134.899894][T30392] syz.1.8722[30392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1138.354320][T30466] device syzkaller0 entered promiscuous mode [ 1138.372263][T30464] : port 1(gretap0) entered blocking state [ 1138.378352][T30464] : port 1(gretap0) entered disabled state [ 1138.384468][T30464] device gretap0 entered promiscuous mode [ 1144.057221][T30605] FAULT_INJECTION: forcing a failure. [ 1144.057221][T30605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1144.070261][T30605] CPU: 1 PID: 30605 Comm: syz.2.8783 Tainted: G W 5.10.223-syzkaller-00011-g1c5354a314ea #0 [ 1144.081429][T30605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1144.091322][T30605] Call Trace: [ 1144.094455][T30605] dump_stack_lvl+0x1e2/0x24b [ 1144.098961][T30605] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1144.104251][T30605] ? __alloc_pages_nodemask+0x435/0xaf0 [ 1144.109637][T30605] dump_stack+0x15/0x17 [ 1144.113622][T30605] should_fail+0x3c6/0x510 [ 1144.117877][T30605] should_fail_usercopy+0x1a/0x20 [ 1144.122738][T30605] copy_page_from_iter+0x398/0x6e0 [ 1144.127687][T30605] pipe_write+0x92b/0x18c0 [ 1144.131948][T30605] ? pipe_read+0x1040/0x1040 [ 1144.136366][T30605] ? fsnotify_perm+0x67/0x4e0 [ 1144.140876][T30605] ? security_file_permission+0x7b/0xb0 [ 1144.146259][T30605] ? security_file_permission+0x86/0xb0 [ 1144.151638][T30605] ? iov_iter_init+0x3f/0x120 [ 1144.156155][T30605] vfs_write+0xb4c/0xe70 [ 1144.160233][T30605] ? kernel_write+0x3d0/0x3d0 [ 1144.164748][T30605] ? __fdget_pos+0x209/0x3a0 [ 1144.169169][T30605] ? ksys_write+0x77/0x2c0 [ 1144.173421][T30605] ksys_write+0x199/0x2c0 [ 1144.177591][T30605] ? __ia32_sys_read+0x90/0x90 [ 1144.182189][T30605] ? debug_smp_processor_id+0x17/0x20 [ 1144.187400][T30605] __x64_sys_write+0x7b/0x90 [ 1144.191821][T30605] do_syscall_64+0x34/0x70 [ 1144.196077][T30605] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1144.201800][T30605] RIP: 0033:0x7f591139bef9 [ 1144.206057][T30605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1144.225494][T30605] RSP: 002b:00007f5910016038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1144.233742][T30605] RAX: ffffffffffffffda RBX: 00007f5911554f80 RCX: 00007f591139bef9 [ 1144.241551][T30605] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 0000000000000000 [ 1144.249362][T30605] RBP: 00007f5910016090 R08: 0000000000000000 R09: 0000000000000000 [ 1144.257171][T30605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1144.264984][T30605] R13: 0000000000000000 R14: 00007f5911554f80 R15: 00007ffed7701b98 [ 1145.774341][T30663] FAULT_INJECTION: forcing a failure. [ 1145.774341][T30663] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1145.787174][T30663] CPU: 0 PID: 30663 Comm: syz.1.8796 Tainted: G W 5.10.223-syzkaller-00011-g1c5354a314ea #0 [ 1145.798355][T30663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1145.808248][T30663] Call Trace: [ 1145.811384][T30663] dump_stack_lvl+0x1e2/0x24b [ 1145.815890][T30663] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1145.821187][T30663] ? __kasan_check_write+0x14/0x20 [ 1145.826133][T30663] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1145.831425][T30663] dump_stack+0x15/0x17 [ 1145.835417][T30663] should_fail+0x3c6/0x510 [ 1145.839671][T30663] should_fail_usercopy+0x1a/0x20 [ 1145.844531][T30663] strncpy_from_user+0x24/0x2d0 [ 1145.849221][T30663] ? stack_map_peek_elem+0x216/0x310 [ 1145.854401][T30663] strncpy_from_user_nofault+0x73/0x150 [ 1145.859720][T30663] bpf_probe_read_compat_str+0xec/0x180 [ 1145.865107][T30663] bpf_prog_c1796171ffc7efef+0x35/0xb8 [ 1145.870396][T30663] bpf_trace_run3+0x121/0x2c0 [ 1145.874908][T30663] ? bpf_trace_run2+0x280/0x280 [ 1145.879595][T30663] ? __this_cpu_preempt_check+0x13/0x20 [ 1145.884976][T30663] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 1145.891487][T30663] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 1145.897646][T30663] __bpf_trace_sched_switch+0xb/0x10 [ 1145.902768][T30663] __traceiter_sched_switch+0x85/0xc0 [ 1145.907975][T30663] __schedule+0x10be/0x1330 [ 1145.912314][T30663] ? release_firmware_map_entry+0x18d/0x18d [ 1145.918042][T30663] ? default_wake_function+0x43/0x50 [ 1145.923164][T30663] ? pollwake+0x1d0/0x280 [ 1145.927328][T30663] ? preempt_schedule+0xd9/0xe0 [ 1145.932017][T30663] preempt_schedule_common+0x9b/0xf0 [ 1145.937137][T30663] preempt_schedule+0xd9/0xe0 [ 1145.941649][T30663] ? schedule_preempt_disabled+0x20/0x20 [ 1145.947117][T30663] ? __kasan_check_write+0x14/0x20 [ 1145.952065][T30663] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 1145.957360][T30663] preempt_schedule_thunk+0x16/0x18 [ 1145.962393][T30663] ? tracing_record_taskinfo+0x50/0x230 [ 1145.967774][T30663] _raw_spin_unlock_irqrestore+0x74/0x80 [ 1145.973242][T30663] __wake_up_sync_key+0x1b1/0x3d0 [ 1145.978102][T30663] ? __wake_up_locked_key_bookmark+0x20/0x20 [ 1145.983919][T30663] ? copy_page_from_iter+0x48b/0x6e0 [ 1145.989039][T30663] pipe_write+0x1222/0x18c0 [ 1145.993380][T30663] ? pipe_read+0x1040/0x1040 [ 1145.997803][T30663] ? fsnotify_perm+0x67/0x4e0 [ 1146.002317][T30663] ? security_file_permission+0x7b/0xb0 [ 1146.007699][T30663] ? security_file_permission+0x86/0xb0 [ 1146.013078][T30663] ? iov_iter_init+0x3f/0x120 [ 1146.017593][T30663] vfs_write+0xb4c/0xe70 [ 1146.021672][T30663] ? kernel_write+0x3d0/0x3d0 [ 1146.026193][T30663] ? __fdget_pos+0x209/0x3a0 [ 1146.030609][T30663] ? ksys_write+0x77/0x2c0 [ 1146.034863][T30663] ksys_write+0x199/0x2c0 [ 1146.039612][T30663] ? __ia32_sys_read+0x90/0x90 [ 1146.044155][T30663] ? debug_smp_processor_id+0x17/0x20 [ 1146.049357][T30663] __x64_sys_write+0x7b/0x90 [ 1146.053784][T30663] do_syscall_64+0x34/0x70 [ 1146.058037][T30663] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1146.063798][T30663] RIP: 0033:0x7f7b55eeeef9 [ 1146.068028][T30663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1146.087467][T30663] RSP: 002b:00007f7b54b69038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1146.095702][T30663] RAX: ffffffffffffffda RBX: 00007f7b560a7f80 RCX: 00007f7b55eeeef9 [ 1146.103514][T30663] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 0000000000000000 [ 1146.111325][T30663] RBP: 00007f7b54b69090 R08: 0000000000000000 R09: 0000000000000000 [ 1146.119137][T30663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1146.126949][T30663] R13: 0000000000000000 R14: 00007f7b560a7f80 R15: 00007ffe7563aac8 [ 1146.401806][T30676] device syzkaller0 entered promiscuous mode [ 1146.858113][T30708] FAULT_INJECTION: forcing a failure. [ 1146.858113][T30708] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1146.871363][T30708] CPU: 1 PID: 30708 Comm: syz.0.8811 Tainted: G W 5.10.223-syzkaller-00011-g1c5354a314ea #0 [ 1146.882530][T30708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1146.892417][T30708] Call Trace: [ 1146.895556][T30708] dump_stack_lvl+0x1e2/0x24b [ 1146.900197][T30708] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1146.905482][T30708] dump_stack+0x15/0x17 [ 1146.909468][T30708] should_fail+0x3c6/0x510 [ 1146.913724][T30708] should_fail_usercopy+0x1a/0x20 [ 1146.918585][T30708] _copy_to_user+0x20/0x90 [ 1146.922835][T30708] simple_read_from_buffer+0xc7/0x150 [ 1146.928044][T30708] proc_fail_nth_read+0x1a3/0x210 [ 1146.932898][T30708] ? proc_fault_inject_write+0x390/0x390 [ 1146.938368][T30708] ? security_file_permission+0x86/0xb0 [ 1146.943748][T30708] ? rw_verify_area+0x1c3/0x360 [ 1146.948435][T30708] ? proc_fault_inject_write+0x390/0x390 [ 1146.953903][T30708] vfs_read+0x200/0xba0 [ 1146.957897][T30708] ? kernel_read+0x70/0x70 [ 1146.962149][T30708] ? __kasan_check_write+0x14/0x20 [ 1146.967096][T30708] ? mutex_lock+0xa5/0x110 [ 1146.971346][T30708] ? mutex_trylock+0xa0/0xa0 [ 1146.975777][T30708] ? __fdget_pos+0x2e7/0x3a0 [ 1146.980199][T30708] ? ksys_read+0x77/0x2c0 [ 1146.984365][T30708] ksys_read+0x199/0x2c0 [ 1146.988446][T30708] ? vfs_write+0xe70/0xe70 [ 1146.992787][T30708] ? fpu__clear_all+0x20/0x20 [ 1146.997298][T30708] ? __kasan_check_read+0x11/0x20 [ 1147.002157][T30708] __x64_sys_read+0x7b/0x90 [ 1147.006498][T30708] do_syscall_64+0x34/0x70 [ 1147.010751][T30708] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1147.016479][T30708] RIP: 0033:0x7f3280a7e93c [ 1147.020770][T30708] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 1147.040179][T30708] RSP: 002b:00007f327f6fa030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1147.048415][T30708] RAX: ffffffffffffffda RBX: 00007f3280c38f80 RCX: 00007f3280a7e93c [ 1147.056230][T30708] RDX: 000000000000000f RSI: 00007f327f6fa0a0 RDI: 0000000000000006 [ 1147.064038][T30708] RBP: 00007f327f6fa090 R08: 0000000000000000 R09: 0000000000000000 [ 1147.071850][T30708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1147.079662][T30708] R13: 0000000000000000 R14: 00007f3280c38f80 R15: 00007ffee4917528 [ 1148.272676][T30767] device lo entered promiscuous mode [ 1148.417386][T30779] syz.1.8833[30779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1148.417453][T30779] syz.1.8833[30779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1149.166138][T30793] device pim6reg1 entered promiscuous mode [ 1149.293243][T30804] bridge0: port 2(bridge_slave_1) entered disabled state [ 1149.300245][T30804] bridge0: port 1(bridge_slave_0) entered disabled state [ 1149.334085][T30807] device syzkaller0 entered promiscuous mode [ 1149.758464][T30846] device pim6reg1 entered promiscuous mode [ 1149.821412][T30853] : renamed from ipvlan1 [ 1150.109089][T30858] device sit0 entered promiscuous mode [ 1150.347359][T30870] device pim6reg1 entered promiscuous mode [ 1150.520478][T30890] device syzkaller0 entered promiscuous mode [ 1150.622899][T30897] device syzkaller0 entered promiscuous mode [ 1150.631852][T30897] device syzkaller0 left promiscuous mode [ 1150.760461][T30927] device pim6reg1 entered promiscuous mode [ 1150.876107][T30936] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1151.349609][T30983] device syzkaller0 entered promiscuous mode [ 1151.985331][T30997] device sit0 entered promiscuous mode [ 1154.671317][T31116] device sit0 left promiscuous mode [ 1154.948859][T31116] device sit0 entered promiscuous mode [ 1157.743074][T31211] device sit0 left promiscuous mode [ 1158.020988][T31216] Â: renamed from pim6reg1 [ 1158.041193][T31220] device bridge_slave_1 left promiscuous mode [ 1158.047822][T31220] bridge0: port 2(bridge_slave_1) entered disabled state [ 1158.055067][T31220] device bridge_slave_0 left promiscuous mode [ 1158.061081][T31220] bridge0: port 1(bridge_slave_0) entered disabled state [ 1158.162063][T31223] device pim6reg1 entered promiscuous mode [ 1158.171945][T31225] device pim6reg1 entered promiscuous mode [ 1158.434715][T31249] 8ûÅ: renamed from syzkaller0 [ 1160.402645][T31339] device pim6reg1 entered promiscuous mode [ 1162.485032][T31395] device sit0 entered promiscuous mode [ 1163.205988][T31408] device macsec0 entered promiscuous mode [ 1164.725537][T31442] device syzkaller0 entered promiscuous mode [ 1169.807472][T31666] syz.1.9095[31666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1169.807529][T31666] syz.1.9095[31666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1169.810478][T31665] syz.1.9095[31665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1170.741976][T31712] device veth1_macvtap left promiscuous mode [ 1171.138662][T31751] syz.2.9117[31751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1171.138693][T31750] syz.2.9117[31750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1171.138713][T31751] syz.2.9117[31751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1173.686828][T31948] device wg2 left promiscuous mode [ 1173.942546][T31948] device wg2 entered promiscuous mode [ 1178.499690][T32139] syz.3.9236[32139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1178.501527][T32139] syz.3.9236[32139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1181.080569][T32240] syz.0.9265[32240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1181.243193][T32240] syz.0.9265[32240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1183.118008][T32295] bond_slave_1: mtu less than device minimum [ 1183.636288][T32341] device sit0 left promiscuous mode [ 1183.706854][T32344] device sit0 entered promiscuous mode [ 1184.170106][T32348] device veth0_vlan left promiscuous mode [ 1184.250785][T32348] device veth0_vlan entered promiscuous mode [ 1184.512338][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1184.550804][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1184.575762][T32353] syz.4.9297[32353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1184.575816][T32353] syz.4.9297[32353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1184.588650][T27109] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1184.966271][T32387] syz.4.9305[32387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1184.966324][T32387] syz.4.9305[32387] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1186.513868][T32437] syz.3.9321[32437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1186.777621][T32437] syz.3.9321[32437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1188.479078][T32477] device sit0 left promiscuous mode [ 1189.541746][T32515] device veth0_vlan left promiscuous mode [ 1189.575740][T32515] device veth0_vlan entered promiscuous mode [ 1189.613071][T31745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1189.631199][T31745] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1189.695833][T31745] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1190.260547][T32535] device wg2 left promiscuous mode [ 1190.313640][T32535] device wg2 entered promiscuous mode [ 1190.858119][T32567] device sit0 entered promiscuous mode [ 1192.974032][T32675] device sit0 left promiscuous mode [ 1193.069402][T32676] device sit0 entered promiscuous mode [ 1193.395332][T32689] syz.1.9402[32689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1193.395436][T32689] syz.1.9402[32689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1194.136383][T32703] device sit0 left promiscuous mode [ 1194.199841][T32703] device sit0 entered promiscuous mode [ 1194.967501][T32728] syz.0.9416[32728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1194.967550][T32728] syz.0.9416[32728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1196.275337][ T306] device veth0_vlan left promiscuous mode [ 1196.293696][ T306] device veth0_vlan entered promiscuous mode [ 1196.306351][T31745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1196.316489][T31745] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1196.333376][T31745] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1196.925440][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 1196.932423][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 1198.069165][ T387] device sit0 left promiscuous mode [ 1199.937432][ T446] device veth0_vlan left promiscuous mode [ 1200.053370][ T446] device veth0_vlan entered promiscuous mode [ 1200.475423][T31746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1200.483430][T31746] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1200.525823][T31746] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1204.637752][ T604] device sit0 entered promiscuous mode [ 1213.364938][ T756] device veth1_macvtap left promiscuous mode [ 1213.370800][ T756] device macsec0 entered promiscuous mode [ 1215.330113][ T848] syz.0.9594[848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1215.330162][ T848] syz.0.9594[848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1216.863887][ T911] device sit0 left promiscuous mode [ 1222.350668][ T989] device sit0 entered promiscuous mode [ 1225.980048][ T1110] bridge0: port 2(bridge_slave_1) entered blocking state [ 1225.986984][ T1110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1226.006440][ T1110] bridge0: port 1(bridge_slave_0) entered blocking state [ 1226.014292][ T1110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1226.055377][ T1110] device bridge0 entered promiscuous mode [ 1226.287821][T16281] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1233.281551][ T1285] syz.1.9738[1285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1233.281595][ T1285] syz.1.9738[1285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1234.390554][ T1333] device sit0 entered promiscuous mode [ 1234.845772][ T1365] device veth0_vlan left promiscuous mode [ 1234.897012][ T1365] device veth0_vlan entered promiscuous mode [ 1234.903723][T31784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1234.935916][T31784] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1234.943225][T31784] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1237.354310][ T1399] device sit0 left promiscuous mode [ 1237.362202][ T1400] device sit0 entered promiscuous mode [ 1241.938787][ T1533] device veth0_vlan left promiscuous mode [ 1242.006756][ T1533] device veth0_vlan entered promiscuous mode [ 1242.165908][T28520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1242.173806][T28520] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1242.191238][T28520] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1242.792484][ T1629] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.799389][ T1629] bridge0: port 1(bridge_slave_0) entered disabled state [ 1242.829999][ T1629] device bridge0 left promiscuous mode [ 1242.840942][ T1622] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.858908][ T1622] bridge0: port 1(bridge_slave_0) entered disabled state [ 1243.004418][ T1629] bridge0: port 2(bridge_slave_1) entered blocking state [ 1243.011288][ T1629] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1243.018384][ T1629] bridge0: port 1(bridge_slave_0) entered blocking state [ 1243.025155][ T1629] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1243.033054][ T1629] device bridge0 entered promiscuous mode [ 1243.754296][ T1676] device macsec0 left promiscuous mode [ 1246.853057][ T1821] device veth0_vlan left promiscuous mode [ 1246.904489][ T1821] device veth0_vlan entered promiscuous mode [ 1247.249702][T31784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1247.272555][T31784] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1247.357567][T31784] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1247.558682][ T1838] bridge0: port 2(bridge_slave_1) entered disabled state [ 1247.568020][ T1838] bridge0: port 1(bridge_slave_0) entered disabled state [ 1247.592877][ T1838] device bridge0 left promiscuous mode [ 1248.720316][ T1859] device wg2 left promiscuous mode [ 1248.976643][ T1863] device wg2 entered promiscuous mode [ 1249.920240][ T1887] device macsec0 left promiscuous mode [ 1249.977999][ T1887] device macsec0 entered promiscuous mode [ 1249.997328][T28509] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1250.087495][ T1895] device xfrm0 entered promiscuous mode [ 1250.119834][ T1895] device wg2 entered promiscuous mode [ 1251.773374][ T1979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1251.780460][ T1979] bridge0: port 1(bridge_slave_0) entered disabled state [ 1253.933258][ T2016] FAULT_INJECTION: forcing a failure. [ 1253.933258][ T2016] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1253.946099][ T2016] CPU: 0 PID: 2016 Comm: syz.3.9960 Tainted: G W 5.10.223-syzkaller-00011-g1c5354a314ea #0 [ 1253.957199][ T2016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1253.967086][ T2016] Call Trace: [ 1253.970228][ T2016] dump_stack_lvl+0x1e2/0x24b [ 1253.974730][ T2016] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1253.980047][ T2016] ? ex_handler_uaccess+0x3e/0xc0 [ 1253.984882][ T2016] ? fixup_exception+0x94/0xd0 [ 1253.989480][ T2016] dump_stack+0x15/0x17 [ 1253.993473][ T2016] should_fail+0x3c6/0x510 [ 1253.997724][ T2016] should_fail_usercopy+0x1a/0x20 [ 1254.002585][ T2016] strncpy_from_user+0x24/0x2d0 [ 1254.007273][ T2016] ? update_load_avg+0x541/0x1690 [ 1254.012132][ T2016] strncpy_from_user_nofault+0x73/0x150 [ 1254.017513][ T2016] bpf_probe_read_compat_str+0xec/0x180 [ 1254.022898][ T2016] bpf_prog_c1796171ffc7efef+0x35/0x240 [ 1254.028274][ T2016] bpf_trace_run3+0x121/0x2c0 [ 1254.032875][ T2016] ? bpf_trace_run2+0x280/0x280 [ 1254.037567][ T2016] ? __this_cpu_preempt_check+0x13/0x20 [ 1254.042941][ T2016] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 1254.049457][ T2016] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 1254.055635][ T2016] __bpf_trace_sched_switch+0xb/0x10 [ 1254.060755][ T2016] __traceiter_sched_switch+0x85/0xc0 [ 1254.065942][ T2016] __schedule+0x10be/0x1330 [ 1254.070282][ T2016] ? release_firmware_map_entry+0x18d/0x18d [ 1254.076012][ T2016] ? kvm_sched_clock_read+0x18/0x40 [ 1254.081043][ T2016] ? sched_clock+0x3a/0x40 [ 1254.085315][ T2016] preempt_schedule_irq+0xc7/0x140 [ 1254.090245][ T2016] ? preempt_schedule_notrace+0x140/0x140 [ 1254.095875][ T2016] ? __irq_exit_rcu+0x40/0x150 [ 1254.100403][ T2016] irqentry_exit+0x4f/0x60 [ 1254.104655][ T2016] sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1254.110118][ T2016] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1254.115938][ T2016] RIP: 0010:avtab_search_node+0x7f/0x5c0 [ 1254.121401][ T2016] Code: c1 e8 03 42 0f b6 04 20 84 c0 0f 85 ad 04 00 00 8b 1b 31 ff 89 de e8 c0 cc 39 ff 85 db 0f 84 3a 04 00 00 49 8d 5e 10 48 89 d8 <48> c1 e8 03 42 0f b6 04 20 84 c0 0f 85 9f 04 00 00 48 63 13 49 8d [ 1254.140839][ T2016] RSP: 0018:ffffc90000c378a8 EFLAGS: 00000206 [ 1254.146742][ T2016] RAX: ffff88810b96a9a0 RBX: ffff88810b96a9a0 RCX: ffff888135554f00 [ 1254.154553][ T2016] RDX: ffff888135554f00 RSI: 0000000000000800 RDI: 0000000000000000 [ 1254.162365][ T2016] RBP: ffffc90000c378f0 R08: ffffffff8230dff0 R09: ffffffff82336c1c [ 1254.170290][ T2016] R10: 0000000000000002 R11: ffff888135554f00 R12: dffffc0000000000 [ 1254.178094][ T2016] R13: dffffc0000000000 R14: ffff88810b96a990 R15: ffffc90000c37b80 [ 1254.185954][ T2016] ? security_compute_sid+0x81c/0x1f30 [ 1254.191198][ T2016] ? avtab_search_node+0x70/0x5c0 [ 1254.196065][ T2016] ? avtab_search_node+0x70/0x5c0 [ 1254.200923][ T2016] security_compute_sid+0xa60/0x1f30 [ 1254.206044][ T2016] ? security_transition_sid+0x90/0x90 [ 1254.211336][ T2016] ? kvm_sched_clock_read+0x18/0x40 [ 1254.216367][ T2016] ? sched_clock+0x3a/0x40 [ 1254.220619][ T2016] ? sched_clock_cpu+0x1b/0x3b0 [ 1254.225305][ T2016] ? sched_clock+0x3a/0x40 [ 1254.229564][ T2016] ? irq_exit_rcu+0x9/0x10 [ 1254.233812][ T2016] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1254.239457][ T2016] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1254.245442][ T2016] ? socket_type_to_security_class+0x39/0x380 [ 1254.251344][ T2016] security_transition_sid+0x7d/0x90 [ 1254.256470][ T2016] selinux_socket_create+0x204/0x330 [ 1254.261585][ T2016] ? selinux_socket_unix_may_send+0x2f0/0x2f0 [ 1254.267493][ T2016] ? __irq_exit_rcu+0x40/0x150 [ 1254.272090][ T2016] security_socket_create+0x77/0xb0 [ 1254.277169][ T2016] __sock_create+0xd6/0x760 [ 1254.281466][ T2016] ? __sys_socketpair+0x1a4/0x6e0 [ 1254.286323][ T2016] __sys_socketpair+0x29f/0x6e0 [ 1254.291010][ T2016] ? __ia32_sys_socket+0x90/0x90 [ 1254.295790][ T2016] ? debug_smp_processor_id+0x17/0x20 [ 1254.300988][ T2016] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1254.306891][ T2016] __x64_sys_socketpair+0x9b/0xb0 [ 1254.311752][ T2016] do_syscall_64+0x34/0x70 [ 1254.316012][ T2016] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1254.321732][ T2016] RIP: 0033:0x7fc5ee9e1ef9 [ 1254.325987][ T2016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1254.345424][ T2016] RSP: 002b:00007fc5ed65c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1254.353671][ T2016] RAX: ffffffffffffffda RBX: 00007fc5eeb9af80 RCX: 00007fc5ee9e1ef9 [ 1254.361480][ T2016] RDX: 0000000000000001 RSI: 0000000000000005 RDI: 0000000000000008 [ 1254.369292][ T2016] RBP: 00007fc5ed65c090 R08: 0000000000000000 R09: 0000000000000000 [ 1254.377103][ T2016] R10: 0000000020000200 R11: 0000000000000246 R12: 0000000000000001 [ 1254.384913][ T2016] R13: 0000000000000000 R14: 00007fc5eeb9af80 R15: 00007ffffc70e198 [ 1254.889673][ T2069] FAULT_INJECTION: forcing a failure. [ 1254.889673][ T2069] name failslab, interval 1, probability 0, space 0, times 0 [ 1255.002831][ T2069] CPU: 0 PID: 2069 Comm: syz.3.9978 Tainted: G W 5.10.223-syzkaller-00011-g1c5354a314ea #0 [ 1255.013929][ T2069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1255.023823][ T2069] Call Trace: [ 1255.026960][ T2069] dump_stack_lvl+0x1e2/0x24b [ 1255.031470][ T2069] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1255.036767][ T2069] ? wake_up_klogd+0xb8/0xf0 [ 1255.041184][ T2069] ? dump_stack+0x9/0x17 [ 1255.045264][ T2069] dump_stack+0x15/0x17 [ 1255.049257][ T2069] should_fail+0x3c6/0x510 [ 1255.053513][ T2069] ? security_inode_alloc+0x29/0x120 [ 1255.058640][ T2069] __should_failslab+0xa4/0xe0 [ 1255.063251][ T2069] should_failslab+0x9/0x20 [ 1255.067573][ T2069] kmem_cache_alloc+0x3d/0x2e0 [ 1255.072167][ T2069] security_inode_alloc+0x29/0x120 [ 1255.077112][ T2069] inode_init_always+0x767/0x9f0 [ 1255.081893][ T2069] ? sockfs_init_fs_context+0xb0/0xb0 [ 1255.087091][ T2069] new_inode_pseudo+0x93/0x220 [ 1255.091690][ T2069] __sock_create+0x135/0x760 [ 1255.096124][ T2069] ? __sys_socketpair+0x1a4/0x6e0 [ 1255.100988][ T2069] __sys_socketpair+0x29f/0x6e0 [ 1255.105674][ T2069] ? __ia32_sys_socket+0x90/0x90 [ 1255.110467][ T2069] ? debug_smp_processor_id+0x17/0x20 [ 1255.115656][ T2069] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1255.121555][ T2069] __x64_sys_socketpair+0x9b/0xb0 [ 1255.126416][ T2069] do_syscall_64+0x34/0x70 [ 1255.130670][ T2069] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1255.136403][ T2069] RIP: 0033:0x7fc5ee9e1ef9 [ 1255.140644][ T2069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1255.160174][ T2069] RSP: 002b:00007fc5ed65c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1255.168501][ T2069] RAX: ffffffffffffffda RBX: 00007fc5eeb9af80 RCX: 00007fc5ee9e1ef9 [ 1255.176314][ T2069] RDX: 0000000000000001 RSI: 0000000000000005 RDI: 0000000000000008 [ 1255.184123][ T2069] RBP: 00007fc5ed65c090 R08: 0000000000000000 R09: 0000000000000000 [ 1255.191933][ T2069] R10: 0000000020000200 R11: 0000000000000246 R12: 0000000000000001 [ 1255.199744][ T2069] R13: 0000000000000000 R14: 00007fc5eeb9af80 R15: 00007ffffc70e198 [ 1255.218370][ T2069] socket: no more sockets [ 1257.378410][ T2219] FAULT_INJECTION: forcing a failure. [ 1257.378410][ T2219] name failslab, interval 1, probability 0, space 0, times 0 [ 1257.465445][ T2219] CPU: 0 PID: 2219 Comm: syz.1.10028 Tainted: G W 5.10.223-syzkaller-00011-g1c5354a314ea #0 [ 1257.476626][ T2219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 1257.486525][ T2219] Call Trace: [ 1257.489653][ T2219] dump_stack_lvl+0x1e2/0x24b [ 1257.494160][ T2219] ? panic+0x812/0x812 [ 1257.498072][ T2219] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1257.503364][ T2219] ? __irq_exit_rcu+0x40/0x150 [ 1257.507960][ T2219] dump_stack+0x15/0x17 [ 1257.511951][ T2219] should_fail+0x3c6/0x510 [ 1257.516205][ T2219] ? __request_module+0x2ad/0x8d0 [ 1257.521070][ T2219] __should_failslab+0xa4/0xe0 [ 1257.525665][ T2219] should_failslab+0x9/0x20 [ 1257.530010][ T2219] __kmalloc_track_caller+0x5f/0x320 [ 1257.535130][ T2219] ? kmem_cache_alloc_trace+0x193/0x2e0 [ 1257.540507][ T2219] kstrdup+0x34/0x70 [ 1257.544242][ T2219] __request_module+0x2ad/0x8d0 [ 1257.548923][ T2219] ? sched_clock_cpu+0x1b/0x3b0 [ 1257.553604][ T2219] ? sched_clock+0x3a/0x40 [ 1257.557945][ T2219] ? get_next_ino+0xe5/0x190 [ 1257.562373][ T2219] ? copy_regset_to_user+0x210/0x210 [ 1257.567501][ T2219] ? irq_exit_rcu+0x9/0x10 [ 1257.571746][ T2219] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1257.577397][ T2219] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1257.583388][ T2219] __sock_create+0x31f/0x760 [ 1257.587814][ T2219] __sys_socketpair+0x29f/0x6e0 [ 1257.592499][ T2219] ? __ia32_sys_socket+0x90/0x90 [ 1257.597268][ T2219] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 1257.602911][ T2219] __x64_sys_socketpair+0x9b/0xb0 [ 1257.607773][ T2219] do_syscall_64+0x34/0x70 [ 1257.612027][ T2219] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1257.617748][ T2219] RIP: 0033:0x7f7b55eeeef9 [ 1257.622002][ T2219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1257.641444][ T2219] RSP: 002b:00007f7b54b69038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1257.649682][ T2219] RAX: ffffffffffffffda RBX: 00007f7b560a7f80 RCX: 00007f7b55eeeef9 [ 1257.657500][ T2219] RDX: 0000000000000001 RSI: 0000000000000005 RDI: 0000000000000008 [ 1257.665303][ T2219] RBP: 00007f7b54b69090 R08: 0000000000000000 R09: 0000000000000000 [ 1257.673117][ T2219] R10: 0000000020000200 R11: 0000000000000246 R12: 0000000000000001 [ 1257.680924][ T2219] R13: 0000000000000000 R14: 00007f7b560a7f80 R15: 00007ffe7563aac8 [ 1257.847803][ T2227] device sit0 entered promiscuous mode [ 1259.761192][ T2321] device macsec0 entered promiscuous mode [ 1260.337640][ T2358] bridge0: port 1(bridge_slave_0) entered disabled state [ 1261.861657][ T2415] syz.1.10088[2415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1261.861710][ T2415] syz.1.10088[2415] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1262.125406][ T24] audit: type=1400 audit(1725672542.490:184): avc: denied { create } for pid=2414 comm="syz.1.10088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1264.973041][ T2445] bridge0: port 2(bridge_slave_1) entered blocking state [ 1264.979912][ T2445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1264.987021][ T2445] bridge0: port 1(bridge_slave_0) entered blocking state [ 1264.993772][ T2445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1265.001705][ T2445] device bridge0 entered promiscuous mode [ 1265.008445][T28516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1266.256880][ T2522] syz.4.10120[2522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1266.256939][ T2522] syz.4.10120[2522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1268.305428][ T2605] device macsec0 left promiscuous mode [ 1268.381064][ T2605] device veth1_macvtap entered promiscuous mode [ 1268.432665][ T2605] device macsec0 entered promiscuous mode [ 1268.490550][T28514] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1270.098987][ T311] device gretap0 left promiscuous mode [ 1270.111107][ T311] : port 1(gretap0) entered disabled state [ 1270.217356][ T311] device bridge_slave_1 left promiscuous mode [ 1270.223370][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.230724][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.239189][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1270.246600][ T311] device bridge_slave_0 left promiscuous mode [ 1270.252542][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1270.260354][ T311] device veth1_macvtap left promiscuous mode [ 1270.266357][ T311] device veth0_vlan left promiscuous mode [ 1270.271965][ T311] device veth1_macvtap left promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=0 req=10162 state=3 status=67 (errno 32: Broken pipe) [ 1273.157212][ T311] device bridge_slave_1 left promiscuous mode [ 1273.163124][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1273.170410][ T311] device bridge_slave_0 left promiscuous mode [ 1273.176375][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1273.183765][ T311] device bridge_slave_1 left promiscuous mode [ 1273.189749][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1273.196760][ T311] device bridge_slave_0 left promiscuous mode [ 1273.202644][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1273.210470][ T311] device veth0_vlan left promiscuous mode