last executing test programs: 24.811135151s ago: executing program 4 (id=835): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb010018000000000001001400000014000000070000000500000001000006040000000100000008000000002e7b2e1e2e"], 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 19.517047605s ago: executing program 4 (id=835): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb010018000000000001001400000014000000070000000500000001000006040000000100000008000000002e7b2e1e2e"], 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 15.583223882s ago: executing program 4 (id=835): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb010018000000000001001400000014000000070000000500000001000006040000000100000008000000002e7b2e1e2e"], 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 10.720172561s ago: executing program 4 (id=835): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb010018000000000001001400000014000000070000000500000001000006040000000100000008000000002e7b2e1e2e"], 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 5.172265648s ago: executing program 1 (id=1299): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="001300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="1600"], 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000340)={&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x40004) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0b00000000010000000100000900000001000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000e1ffffff00000000020000000000000000000000007e79520e56d7"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000005c0), &(0x7f00000005c0), 0x208, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r6}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r5, &(0x7f0000000580)="c7557fed286c4008bea0125dc86a2a711bc8a1ce2dae83f494f277863a7445d96cb36632720953183dd040ffd01152495b69bb46224d", &(0x7f00000007c0)=""/100}, 0x20) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r9, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x10, 0x1, 0x29a, 0x7, 0x40000, 0xffffffffffffffff, 0x5, '\x00', r9, 0xffffffffffffffff, 0x1, 0x2, 0x1, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r8}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1813752d50a5242007003210000077da1f8b000074623195"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 5.048396159s ago: executing program 1 (id=1302): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0fe60000040000000409000000000000000000002a63f8353e0cda151794c8b97d7cc0b26e6af936be8b268fdea22d8dfa57a7a46925a42c006940ea6aef7c5eb7b7c0a39ab26248f596e3911dde450579ac28a28492bfc6dad95d59b4ea27b41bd6f35a41652981e9cc14109b451c782f102cd205d53b93cfa055f10c5c41944cf7f3943ff3f3b6c8bbf080c366", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10320, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20040018}, 0x0) sendmsg$inet(r5, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) (async) setsockopt$sock_attach_bpf(r4, 0x1, 0x21, &(0x7f0000000040), 0x4) recvmsg(r4, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) (async) close(r5) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1e000000ffff0000070000000000000000060200", @ANYRES32, @ANYBLOB="0e00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010004000000040000000e00000000000044b72fa17b6baec5c5"], 0x50) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000280)={0x8}, 0x8) (async) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000800000000500000000100000", @ANYRES32, @ANYBLOB="deffffffffffffff000000e21e00000008000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000002a0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6, @ANYRESDEC=r3], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r7, &(0x7f0000000000), 0x2a979d) (async) write$cgroup_type(r7, 0x0, 0x0) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000840)='locks_get_lock_context\x00', r8}, 0x18) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000a40)=ANY=[@ANYRES32=r2, @ANYRES32=r9, @ANYBLOB="0500"/12, @ANYRES32, @ANYBLOB="26cb71105974f3d4a499587e2e0e815e5096d69356e742cf585fcd0a427223db931c0aacfa50bd3479d9a216f4106920e461bf1489b2600a1c29cd8fa3a2d71e92bdabce91e2b187f80db5365e714627f82574d1c920f728c1770ba1113375b7", @ANYRES64=0x0], 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) (async) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 4.950996671s ago: executing program 1 (id=1305): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000018000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r4}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0679e5ebdd7afaa8f300000012000000000000000b82ce8fd79db3bf16b6bf5e5ba2f32ce72daaebdcc30509e717b12be7346dd39c69c8b7478ff25caaf21d9d0a33d8a0f4ef8459fe59db9e6a20d8657402a208b64a226262c65d1320fd9e0db9092f20818a08ae0219a6d6ba3b36db208e245b517dceb3d9ac4fb500e504438dc9f29eed042859a10a1676e57a1c373f610be9127998e895252898a14067345b044ef6ece1355ba7bdc63c4791a15f2130b237e9567cfb5bfa62431f98c88faf7706eeb3f196d9a3", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@map=r6, r2, 0x26, 0x0, 0x0, @void, @value=r5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000b01300000000000000007f00000b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYRES8=r1, @ANYRES64=r0, @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)) 4.950495731s ago: executing program 3 (id=1306): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfffffffb, 0x18}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], 0x0, 0x45, &(0x7f00000001c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000340), 0x8, 0x30, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3a, 0x3a, 0x5, [@datasec={0x10, 0x2, 0x0, 0xf, 0x2, [{0x2, 0x3, 0x2}, {0x5, 0xb2e8, 0x4}], "bd05"}, @enum={0x6, 0x1, 0x0, 0x6, 0x4, [{0x10, 0xc}]}]}, {0x0, [0x0, 0x5f, 0x61]}}, &(0x7f0000000780)=""/182, 0x59, 0xb6, 0x1, 0x42ab, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@bloom_filter={0x1e, 0x0, 0x7c9, 0x10000, 0x810, r7, 0x7, '\x00', r8, r9, 0x5, 0x0, 0x5, 0xe, @void, @value, @void, @value}, 0x50) close(r2) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f00000002c0), 0x20000000}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="2fd0ff0006094f492faff2f173e1ac871d48eef87bb90a19da77ed4bb5ae2e86f7b0cf112203043f022f05c93af58dc47d13e4ed9d9426f7db4e53422cbc58b6b2e48d2a7570b19a5bdcded6dfa976c4bce46e30294d29a8f2bbfa35a756c52f5861fc73de3cd1c8f287a49685e7518b86f45801c10da574d850fd5c2ad8f247931b3c139b7fa61e4af791a289f6f3f4e63a92f6a1f5") 4.830443782s ago: executing program 1 (id=1307): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000200)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_ext={0x1c, 0x15, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x59df}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@exit, @call={0x85, 0x0, 0x0, 0x25}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41000, 0x1d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x7, 0x6, 0x496}, 0x10, 0x260ef, r1, 0x4, &(0x7f0000000340)=[r0, r0, r0, r0, r0, r1], &(0x7f0000000400)=[{0x1, 0x3, 0x10, 0x9}, {0x4, 0x4, 0x1, 0x9}, {0x1, 0x4, 0xc}, {0x3, 0x3, 0x2, 0x2}], 0x10, 0x380, @void, @value}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000580)={0xffffffffffffffff, r2, 0x0, r1}, 0x10) r3 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='cpu&\'\'\t|\t') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r5}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) 4.767503023s ago: executing program 4 (id=835): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb010018000000000001001400000014000000070000000500000001000006040000000100000008000000002e7b2e1e2e"], 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 2.655479798s ago: executing program 1 (id=1309): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @broadcast}}}], 0x20}, 0x0) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, @fallback=0xb3e605705fcfdbf4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0200000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000004000000000000f3", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000006000000070000000900000008490300", @ANYRES32=r4, @ANYBLOB="01800000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0100000001001000000000000b00000000002200000000009b4750b59368a74878ee6f3072cb2cb85da79f5d1f2b40f5db9d8c5342ec05735eaf8150da5f95fda3d86791d146794de163d726b66dc3ca5ca492d98ff10e080941de1205f5e62efd8718669be1cd53381822", @ANYRES32, @ANYBLOB], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r6) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r9) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x8}, 0x0, 0x0, r2, 0x8) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000540)='\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1b, 0x26, &(0x7f0000000dc0)=ANY=[], 0x0, 0x5, 0x7a, &(0x7f0000000280)=""/122, 0x40f00, 0x28, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000c40)={0x2, 0xc, 0x7fffffff, 0x7}, 0x10, 0x0, r7, 0x1, &(0x7f0000000c80)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000c00)=[{0x0, 0x1, 0xb, 0x5}], 0x10, 0xe, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.647223748s ago: executing program 3 (id=1318): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000018000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r4}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0679e5ebdd7afaa8f300000012000000000000000b82ce8fd79db3bf16b6bf5e5ba2f32ce72daaebdcc30509e717b12be7346dd39c69c8b7478ff25caaf21d9d0a33d8a0f4ef8459fe59db9e6a20d8657402a208b64a226262c65d1320fd9e0db9092f20818a08ae0219a6d6ba3b36db208e245b517dceb3d9ac4fb500e504438dc9f29eed042859a10a1676e57a1c373f610be9127998e895252898a14067345b044ef6ece1355ba7bdc63c4791a15f2130b237e9567cfb5bfa62431f98c88faf7706eeb3f196d9a3", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@map=r6, r2, 0x26, 0x0, 0x0, @void, @value=r5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000b01300000000000000007f00000b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYRES8=r1, @ANYRES64=r0, @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)) 2.287001743s ago: executing program 3 (id=1312): socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000002000000000c0000000c00000007000000040000000000000802000000006100002e2e00"], &(0x7f0000000700)=""/4096, 0x2b, 0x1000, 0x1, 0x0, 0x0, @void, @value}, 0x28) (async) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x0, 0xf, &(0x7f0000000d40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x588f, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000dc0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000380)=""/99, 0x63}}, 0x10) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="070000000400000000070000000746212c"], 0x50) (rerun: 64) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) close(r1) (async, rerun: 32) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000019c0)={r2, 0xe0, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0], 0x0, 0x13, &(0x7f0000000680)=[{}, {}], 0x10, 0x10, &(0x7f00000006c0), &(0x7f0000001840), 0x8, 0x82, 0x8, 0x8, &(0x7f0000001880)}}, 0x10) (async, rerun: 64) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x1d}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r8, 0x0, 0xe, 0xfeff, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001b00)=@bpf_ext={0x1c, 0x21, &(0x7f0000001700)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1ff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_query, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fffffff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000300)='GPL\x00', 0x2, 0xa0, &(0x7f0000000480)=""/160, 0x41000, 0x8, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a40)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000001a80)={0x4, 0xc, 0x7fff, 0xfffffffa}, 0x10, 0x2e07c, r8, 0x2, 0x0, &(0x7f0000001ac0)=[{0x5, 0x3, 0xc, 0x2}, {0x4, 0x4, 0xd, 0x9}], 0x10, 0x1, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0500000004000000040000000400000000000000", @ANYRES32, @ANYBLOB="0000102000004e078e9f4b000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf09000000000000e6090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000083060000005c93000000000000b5030200000000008500000000000000b70000000000000095000000000000007f184eee04858af1797e0e2fb9ea8e5f7d69f60f1c2c5ae53886170b3047a05d2244912ffb9e7c6d2100"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.214583173s ago: executing program 3 (id=1325): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r3, 0x0, 0xffff}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0xffffffffffffffd9, &(0x7f0000000200)=[{&(0x7f00000002c0)="fc", 0x1}], 0x1, 0x0, 0xfffffd24}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$tipc(r2, &(0x7f0000000400)={&(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x1, {0x0, 0x0, 0x3}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000380)="01ed77909fcba506d0d29f", 0xb}, {&(0x7f0000000680)="0c5807c4d62976819977af52c1f0d4bc19e32bda04d332c1f1c62cb0bd93ee97503e32899d1f7ab63c92d675b85a7b6b0a85582ffac6108e22d733cad1e3547df59c93e2a81b3f9a66d8e688b4d5eddd0bf68bba148eb5a180969614ff74be4fca8a845aa45826ae8b68cbb90caf6319844f4c889a2d0e79e13ad52ba28c4b40958d512273ddf6fa12e654fe82437d956e3aa77147481a64ee1f106b78080611b619c608aba6abab0aeee128bb836686ac56dcd72bd0b4593c80983fde40c24c716d213e2ca1de39", 0xc8}, {&(0x7f0000002280)="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", 0xf80}], 0x3, &(0x7f0000003280)="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", 0x800, 0x4044804}, 0x4044010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={0x0, r5}, 0xb) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x1, 0xef, 0x0, 0x0, 0x3, 0x20080, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77, 0x0, @perf_config_ext={0x80000000, 0xf}, 0x10121, 0x0, 0xe69, 0x1, 0x0, 0xf, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB="63202a3acaa07700849660a6f84b2dd1c2647a7bba27bd228c6bd72dda7220942a2367bce4213f8d773f00fed49bdecd41468cef5850276dbf347348d27f29a7a95122d344d2a78fe210fcac5c12a31990f473c5a123b8331dc5f044d536521fa7631465ff39ef4b287ea395c396b075178976ab54c00368079baa27bfde506f09226fc3b5febc10de51ce0e7b33cf3db197dfba12d41e55e92e9be4eb14cdb52b560d69b1b7fd17c0d7487e9a11830436fed220bae7af1be3eec413586fd2c7fa31a6e899cd265309132582051c638a683cbd8815000000000000001735f1"], 0x8) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unlink(&(0x7f0000000200)='./cgroup\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.969017036s ago: executing program 0 (id=1315): bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1900000004000000040000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/17, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) unlink(&(0x7f0000000000)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x7b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e0000181100", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYBLOB, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @generic={0x45}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000000000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r4, r5}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000000)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1240, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49a8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x7f, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000800"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x15}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r10, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0857f9f582f0300000000001000", 0x0, 0x2e00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000050d2db7159563211b0aac0f2b95c622f263f7dfdc19c913ec62c6263cc0cc17a816909169e"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3d) 1.590466971s ago: executing program 3 (id=1316): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000fa0c00000000000000000000000000100000"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x73, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000b40), 0x0, 0x0) close(r1) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/user\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e8000000000040d900008500000023000000850000000f00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0xc2002011, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="180800001b000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b5090000000000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018260000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf980000000005000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.585844221s ago: executing program 0 (id=1317): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x3, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x502, 0x2, @perf_config_ext={0x0, 0xb}, 0xf1851f0fc0bbd394, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xf}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="00b05304e84671fd3f000095000000000000008630bd11772bc24f40570e7683fc9e63ad373a6093aecbc59614b5a3508a6fa144960d17ae7a4731312984fbb18a05758a43856cfc88f36237e1308339a66d"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000280)={0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x4000000) close(r3) close(r2) mkdir(0x0, 0x8) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x1, 0xef, 0x0, 0x0, 0x3, 0x20080, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77, 0x0, @perf_config_ext={0x80000000, 0xf}, 0x10121, 0x0, 0xe69, 0x1, 0x0, 0xf, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)=0xe, 0x12) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x9180, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'rose0\x00', 0x8000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r7, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) recvmsg(r6, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r10}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1.168428356s ago: executing program 3 (id=1319): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xa5, 0x7fff, 0x4, 0x4, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x2, 0xa, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x8001}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB], 0x50) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) sendmsg$inet(r4, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x5fc, r11}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.167438456s ago: executing program 0 (id=1330): mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000001080), 0x2, 0x0) (async) r1 = openat$cgroup_subtree(r0, &(0x7f0000001080), 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0xfffffffffffffcee) 1.108834797s ago: executing program 0 (id=1321): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 978.708579ms ago: executing program 2 (id=1322): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="17000000000000000084000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000faffffffffffffff0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x2, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffdfff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40}, 0x0, 0xf, r2, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffd4) unlink(&(0x7f0000000180)='./cgroup/../file0\x00') openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x43) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000195059f96daba4bb5c9ec68d1ea122a5736b18474bb98542afa4be9c90e095e019068fa9c5db9ed85"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r7}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r9}, 0x10) close(r8) write$cgroup_subtree(r4, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="2b63707520424acde2c98660a23bdb90c7dd7a52f539dd5e7ae9491e89ea6b8be48e3d07c08aa29f6365fc5f043631"], 0x5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 658.570652ms ago: executing program 2 (id=1323): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000018000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r4}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0679e5ebdd7afaa8f300000012000000000000000b82ce8fd79db3bf16b6bf5e5ba2f32ce72daaebdcc30509e717b12be7346dd39c69c8b7478ff25caaf21d9d0a33d8a0f4ef8459fe59db9e6a20d8657402a208b64a226262c65d1320fd9e0db9092f20818a08ae0219a6d6ba3b36db208e245b517dceb3d9ac4fb500e504438dc9f29eed042859a10a1676e57a1c373f610be9127998e895252898a14067345b044ef6ece1355ba7bdc63c4791a15f2130b237e9567cfb5bfa62431f98c88faf7706eeb3f196d9a3", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@map=r6, r2, 0x26, 0x0, 0x0, @void, @value=r5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000b01300000000000000007f00000b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYRES8=r1, @ANYRES64=r0, @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)) 352.614366ms ago: executing program 0 (id=1324): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000018000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r4}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0679e5ebdd7afaa8f300000012000000000000000b82ce8fd79db3bf16b6bf5e5ba2f32ce72daaebdcc30509e717b12be7346dd39c69c8b7478ff25caaf21d9d0a33d8a0f4ef8459fe59db9e6a20d8657402a208b64a226262c65d1320fd9e0db9092f20818a08ae0219a6d6ba3b36db208e245b517dceb3d9ac4fb500e504438dc9f29eed042859a10a1676e57a1c373f610be9127998e895252898a14067345b044ef6ece1355ba7bdc63c4791a15f2130b237e9567cfb5bfa62431f98c88faf7706eeb3f196d9a3", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@map=r6, r2, 0x26, 0x0, 0x0, @void, @value=r5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000b01300000000000000007f00000b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYRES8=r1, @ANYRES64=r0, @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) unlink(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)) 352.087476ms ago: executing program 2 (id=1326): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{0x1, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1588, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x10, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7672, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@ldst={0x0, 0x0, 0x4, 0x4, 0x9, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x12, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x0, 0x10000, 0x1}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000004c0)=[r0, 0xffffffffffffffff, r1, 0x1], &(0x7f0000000500)=[{0x1, 0x5, 0x2, 0xb}, {0x5, 0x3, 0x0, 0x7}], 0x10, 0x1, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x2, &(0x7f0000000040)=@raw=[@cb_func={0x18, 0x5, 0x4, 0x0, 0x2}], &(0x7f0000000080)='GPL\x00', 0x0, 0xa5, &(0x7f00000000c0)=""/165, 0x41000, 0x22, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000001c0)=[{0x1, 0x2, 0xb, 0xa}, {0x4, 0x2, 0x3, 0x6}, {0x3, 0x1, 0xf, 0x9}, {0x1, 0x4, 0xf, 0x8}], 0x10, 0x1, @void, @value}, 0x94) 339.032876ms ago: executing program 2 (id=1327): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0xc8, 0x0, 0x2, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r4, 0x0, 0x12, 0x6e, &(0x7f0000000040)="6d62f7ce7da770165426f00f3d7fed93446f", &(0x7f0000000180)=""/110, 0xe, 0x0, 0x15, 0x35, &(0x7f0000000200)="0ae1ba8d16d1418372bb6611958caa1c37f70f5a8e", &(0x7f0000000280)="00ff14d8b67fa4e04e52bfb148591f6aeb83c04c93077b9b281713ce28e157b0b949fdb5a0d4b374e0db3ff46804576750c854dd8b", 0x0, 0x0, 0x8}, 0x50) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) 243.035657ms ago: executing program 2 (id=1328): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005800000030000000000000c000000000000005f00333f47d8c5aa"], 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="020019df04f379625ff12b7909acbda1ae9c0b1600000008000000ae1f000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000900)="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", 0xfffffd10}], 0x1}, 0x800) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1}, 0x4) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x2e]}}, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) unlink(0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) unlink(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = getpid() perf_event_open(&(0x7f0000000800)={0x1, 0x80, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x65e, 0x0, 0x1}, r7, 0x1, r6, 0x0) syz_open_procfs$namespace(r7, &(0x7f0000000080)='ns/net\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000070a00006a0a00fe0000000c850000005b000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 235.355907ms ago: executing program 0 (id=1329): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="05010004000a000052f38df0438b0008"], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd63"], 0xfdef) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_tracing={0x1a, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}}]}, &(0x7f0000000340)='GPL\x00', 0x76, 0xe6, &(0x7f00000004c0)=""/230, 0x40f00, 0xb, '\x00', 0x0, 0x18, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x5, 0xa, 0x10, 0x8}, 0x10, 0x2409a, 0xffffffffffffffff, 0x0, &(0x7f00000005c0)=[0x1, r2], 0x0, 0x10, 0x29e97caa, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r3, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000700)=[0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0], 0x0, 0xb1, &(0x7f0000000780)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0xeb, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000100), &(0x7f0000000140)='%pK \x00'}, 0x20) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000300), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x9, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000240)={'syzkaller0\x00', @link_local}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xd, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f008", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(r7, &(0x7f0000000100)=ANY=[], 0x36) 13.74938ms ago: executing program 2 (id=1331): bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYRESHEX, @ANYRESOCT], 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x11, 0xb, &(0x7f0000001380)=ANY=[@ANYRESHEX=r2, @ANYRESOCT=r2, @ANYRESDEC, @ANYRESHEX, @ANYRES8=0xffffffffffffffff, @ANYRESDEC=r0], &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r5 = perf_event_open(&(0x7f00000010c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0xe}, 0x0, 0x0, 0x40, 0x0, 0x0, 0x3, 0xdaa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRESHEX, @ANYRES32=r5, @ANYRESHEX, @ANYRESHEX=r4], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='selinux_audited\x00', r6}, 0x18) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110c23003f) write$cgroup_type(r7, &(0x7f0000000080), 0xfffffed8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0e00000004000000080000000b"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002300000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='contention_end\x00', r10, 0xe4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1802"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r11) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r12, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r11, 0x4010744d, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000010100)=ANY=[@ANYBLOB="0200000004000000040000000900000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000006c0f00"/28], 0x50) 5.85765ms ago: executing program 1 (id=1332): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300)=r0, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000006c0f00000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4e50a0a0500feff"], &(0x7f0000000000)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x88, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x1, 0x9e, &(0x7f0000000980)=""/158, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x1000, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000180)=[{0x3, 0x1, 0x7}, {0x4, 0x3, 0x4, 0x7}], 0x10, 0x10001, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, 0x0, 0x305500, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) 0s ago: executing program 4 (id=835): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb010018000000000001001400000014000000070000000500000001000006040000000100000008000000002e7b2e1e2e"], 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) kernel console output (not intermixed with test programs): eady [ 28.529200][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 28.538420][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.547330][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 28.561888][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.573142][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.581303][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.602015][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 28.612058][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.620972][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.629371][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.652008][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.661290][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.669650][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.678051][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.688093][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.697968][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.708011][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.718398][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.730032][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.742904][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.769508][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.789436][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.802370][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.825769][ T283] device veth0_vlan entered promiscuous mode [ 28.843089][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 28.852826][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.868182][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.882494][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 28.891705][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.902361][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 28.912269][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.922136][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.935720][ T283] device veth1_macvtap entered promiscuous mode [ 28.962622][ T282] device veth0_vlan entered promiscuous mode [ 28.974861][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.985940][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.996009][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.998462][ C0] hrtimer: interrupt took 27191 ns [ 29.008518][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.026550][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.037179][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.049048][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 29.057840][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 29.072081][ T281] device veth0_vlan entered promiscuous mode [ 29.088258][ T282] device veth1_macvtap entered promiscuous mode [ 29.113198][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.121664][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.134001][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 29.142158][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 29.153910][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.165241][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.176031][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.195273][ T281] device veth1_macvtap entered promiscuous mode [ 29.259720][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 29.280885][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 29.290856][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 29.301170][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.311407][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.322313][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.332207][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.388765][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 29.422338][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 29.482585][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 29.540742][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 30.571146][ T309] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.579736][ T309] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.592397][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 30.592417][ T30] audit: type=1400 audit(1748139088.509:110): avc: denied { create } for pid=333 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 30.624359][ T339] device veth1_macvtap left promiscuous mode [ 30.656023][ T30] audit: type=1400 audit(1748139088.559:111): avc: denied { write } for pid=340 comm="syz.3.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.687908][ T30] audit: type=1400 audit(1748139088.589:112): avc: denied { tracepoint } for pid=330 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.805183][ T30] audit: type=1400 audit(1748139088.669:113): avc: denied { write } for pid=330 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 30.806358][ T348] syz.4.11[348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.828494][ T30] audit: type=1400 audit(1748139088.729:114): avc: denied { read } for pid=347 comm="syz.4.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.853768][ T348] syz.4.11[348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 31.633369][ T30] audit: type=1400 audit(1748139089.549:115): avc: denied { ioctl } for pid=391 comm="syz.4.24" path="socket:[16586]" dev="sockfs" ino=16586 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.756676][ T387] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.766558][ T387] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.545932][ T424] device sit0 entered promiscuous mode [ 34.281589][ T454] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.290698][ T454] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.399341][ T466] device syzkaller0 entered promiscuous mode [ 34.459511][ T485] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 34.553492][ T30] audit: type=1400 audit(1748139092.449:116): avc: denied { create } for pid=491 comm="syz.2.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 34.578219][ T492] device veth1_macvtap left promiscuous mode [ 34.774649][ T30] audit: type=1400 audit(1748139092.699:117): avc: denied { relabelfrom } for pid=508 comm="syz.3.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.953287][ T30] audit: type=1400 audit(1748139092.719:118): avc: denied { relabelto } for pid=508 comm="syz.3.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 35.080918][ T30] audit: type=1400 audit(1748139092.799:119): avc: denied { create } for pid=508 comm="syz.3.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 35.411917][ T531] device pim6reg1 entered promiscuous mode [ 35.697185][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 35.697205][ T30] audit: type=1400 audit(1748139093.609:121): avc: denied { create } for pid=542 comm="syz.2.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 35.871212][ T548] device wg2 entered promiscuous mode [ 36.182231][ T30] audit: type=1400 audit(1748139094.109:122): avc: denied { write } for pid=551 comm="syz.1.70" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.550863][ T30] audit: type=1400 audit(1748139094.479:123): avc: denied { create } for pid=581 comm="syz.3.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 36.597376][ T580] device syzkaller0 entered promiscuous mode [ 36.812435][ T30] audit: type=1400 audit(1748139094.739:124): avc: denied { create } for pid=609 comm="syz.2.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 38.649776][ T702] device syzkaller0 entered promiscuous mode [ 39.278486][ T30] audit: type=1400 audit(1748139097.199:125): avc: denied { create } for pid=715 comm="syz.2.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 39.321352][ T30] audit: type=1400 audit(1748139097.239:126): avc: denied { create } for pid=716 comm="syz.3.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 39.602184][ T30] audit: type=1400 audit(1748139097.519:127): avc: denied { create } for pid=745 comm="syz.3.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 39.956441][ T791] syz.1.136[791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.956523][ T791] syz.1.136[791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.787101][ T858] device pim6reg1 entered promiscuous mode [ 41.883490][ T862] syz.0.152[862] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.452522][ T881] device wg2 entered promiscuous mode [ 42.976489][ T30] audit: type=1400 audit(1748139100.899:128): avc: denied { create } for pid=904 comm="syz.4.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 43.194235][ T927] device veth0_vlan left promiscuous mode [ 43.200625][ T927] device veth0_vlan entered promiscuous mode [ 43.244321][ T938] device pim6reg1 entered promiscuous mode [ 43.811949][ T973] device sit0 entered promiscuous mode [ 44.840898][ T1002] ref_ctr_offset mismatch. inode: 0xd0 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 44.985898][ T1002] GPL: port 1(erspan0) entered blocking state [ 45.003296][ T1002] GPL: port 1(erspan0) entered disabled state [ 45.028452][ T1002] device erspan0 entered promiscuous mode [ 45.078796][ T1013] GPL: port 1(erspan0) entered blocking state [ 45.086483][ T1013] GPL: port 1(erspan0) entered forwarding state [ 45.660575][ T1057] syz.2.204[1057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.660649][ T1057] syz.2.204[1057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.103580][ T1091] device sit0 left promiscuous mode [ 46.580611][ T30] audit: type=1400 audit(1748139104.469:129): avc: denied { append } for pid=1115 comm="syz.3.215" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 46.828753][ T30] audit: type=1400 audit(1748139104.469:130): avc: denied { create } for pid=1115 comm="syz.3.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 47.085679][ T30] audit: type=1400 audit(1748139105.009:131): avc: denied { create } for pid=1130 comm="syz.4.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 47.520478][ T1140] ªªªªª7: renamed from pim6reg1 [ 47.665805][ T30] audit: type=1400 audit(1748139105.589:132): avc: denied { create } for pid=1151 comm="syz.1.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 49.261625][ T1217] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 50.914976][ T1271] ------------[ cut here ]------------ [ 51.007507][ T1271] trace type BPF program uses run-time allocation [ 51.062139][ T1271] WARNING: CPU: 1 PID: 1271 at kernel/bpf/verifier.c:11701 check_map_prog_compatibility+0x6cd/0x870 [ 51.088852][ T1271] Modules linked in: [ 51.093453][ T1271] CPU: 0 PID: 1271 Comm: syz.1.255 Not tainted 5.15.184-syzkaller-00118-g4b77ae0e7f58 #0 [ 51.117915][ T1271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 51.140234][ T1271] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 51.148989][ T1271] Code: ee ff 48 c7 c6 40 e2 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 f6 4b ee ff c6 05 e3 6e 6b 05 01 48 c7 c7 a0 de 47 85 e8 33 c4 21 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 51.177040][ T1271] RSP: 0018:ffffc900011ff428 EFLAGS: 00010246 [ 51.184616][ T1271] RAX: a071658babd7d000 RBX: 0000000000000001 RCX: 0000000000080000 [ 51.194010][ T1271] RDX: ffffc9000132b000 RSI: 00000000000031f1 RDI: 00000000000031f2 [ 51.229357][ T1271] RBP: ffffc900011ff470 R08: dffffc0000000000 R09: ffffed103ee265e8 [ 51.265071][ T1271] R10: ffffed103ee265e8 R11: 1ffff1103ee265e7 R12: ffff88811007c000 [ 51.337326][ T1271] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811cf7f800 [ 51.367580][ T1271] FS: 00007f8a621a06c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 51.386800][ T1271] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 51.419934][ T1271] CR2: 00007fd76e935810 CR3: 000000010efa2000 CR4: 00000000003506b0 [ 51.436919][ T1271] DR0: 0000000000000000 DR1: 00000000000000fd DR2: 0000000000000000 [ 51.465257][ T1271] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 51.481119][ T1271] Call Trace: [ 51.508852][ T1271] [ 51.512476][ T1271] resolve_pseudo_ldimm64+0x685/0x11d0 [ 51.525311][ T30] audit: type=1400 audit(1748139109.449:133): avc: denied { create } for pid=1288 comm="syz.4.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 51.548374][ T1271] ? check_attach_btf_id+0xde0/0xde0 [ 51.561218][ T1271] ? __mark_reg_known+0x1b0/0x1b0 [ 51.578564][ T1271] ? security_capable+0x87/0xb0 [ 51.588683][ T1271] bpf_check+0x2c44/0xf330 [ 51.596781][ T1271] ? 0xffffffffa0028000 [ 51.604700][ T1271] ? is_bpf_text_address+0x177/0x190 [ 51.620917][ T1271] ? bpf_get_btf_vmlinux+0x60/0x60 [ 51.631904][ T1271] ? unwind_get_return_address+0x4d/0x90 [ 51.643675][ T1271] ? stack_trace_save+0xe0/0xe0 [ 51.658739][ T1271] ? arch_stack_walk+0xee/0x140 [ 51.678785][ T1271] ? stack_trace_save+0x98/0xe0 [ 51.684755][ T1271] ? __stack_depot_save+0x34/0x480 [ 51.695010][ T1271] ? __kasan_slab_alloc+0x69/0xf0 [ 51.705373][ T1271] ? _find_next_bit+0x1fa/0x200 [ 51.725114][ T1271] ? __kasan_kmalloc+0xec/0x110 [ 51.735763][ T1271] ? __kasan_kmalloc+0xda/0x110 [ 51.742111][ T1271] ? kmem_cache_alloc_trace+0x119/0x270 [ 51.748782][ T1271] ? selinux_bpf_prog_alloc+0x51/0x140 [ 51.755353][ T1271] ? security_bpf_prog_alloc+0x62/0x90 [ 51.762745][ T1271] ? bpf_prog_load+0x97c/0x1550 [ 51.768221][ T1271] ? __sys_bpf+0x4c3/0x730 [ 51.779649][ T1271] ? __x64_sys_bpf+0x7c/0x90 [ 51.784924][ T1271] ? x64_sys_call+0x4b9/0x9a0 [ 51.791019][ T1271] ? do_syscall_64+0x4c/0xa0 [ 51.796132][ T1271] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 51.818845][ T1271] ? check_stack_object+0x81/0x140 [ 51.835013][ T1271] ? memset+0x35/0x40 [ 51.850514][ T1271] ? bpf_obj_name_cpy+0x193/0x1e0 [ 51.863990][ T1271] bpf_prog_load+0x1042/0x1550 [ 51.878834][ T1271] ? __anon_inode_getfd+0x34b/0x3b0 [ 51.889204][ T1271] ? map_freeze+0x360/0x360 [ 51.894883][ T1271] ? selinux_bpf+0xc7/0xf0 [ 51.909812][ T1271] ? security_bpf+0x82/0xa0 [ 51.918758][ T1271] __sys_bpf+0x4c3/0x730 [ 51.923438][ T1271] ? bpf_link_show_fdinfo+0x310/0x310 [ 51.938790][ T1271] ? __kasan_check_write+0x14/0x20 [ 51.944737][ T1271] ? switch_fpu_return+0x15d/0x2c0 [ 51.963670][ T1271] __x64_sys_bpf+0x7c/0x90 [ 51.970693][ T1271] x64_sys_call+0x4b9/0x9a0 [ 51.987312][ T1271] do_syscall_64+0x4c/0xa0 [ 51.998720][ T1271] ? clear_bhb_loop+0x50/0xa0 [ 52.014217][ T1271] ? clear_bhb_loop+0x50/0xa0 [ 52.024356][ T1271] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 52.038717][ T1271] RIP: 0033:0x7f8a63b37969 [ 52.044023][ T1271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.117673][ T1271] RSP: 002b:00007f8a621a0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 52.158482][ T1271] RAX: ffffffffffffffda RBX: 00007f8a63d5efa0 RCX: 00007f8a63b37969 [ 52.188759][ T1271] RDX: 0000000000000080 RSI: 0000200000000580 RDI: 0000000000000005 [ 52.198092][ T1271] RBP: 00007f8a63bb9ab1 R08: 0000000000000000 R09: 0000000000000000 [ 52.278807][ T1271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 52.287537][ T1271] R13: 0000000000000000 R14: 00007f8a63d5efa0 R15: 00007fffc85e8658 [ 52.327402][ T1271] [ 52.331145][ T1271] ---[ end trace 5003e92e94e39a4c ]--- [ 52.469083][ T1325] device sit0 entered promiscuous mode [ 54.567504][ T1387] device pim6reg1 entered promiscuous mode [ 54.835718][ T1412] device syzkaller0 entered promiscuous mode [ 55.119134][ T1424] device wg2 left promiscuous mode [ 55.171556][ T1422] device wg2 entered promiscuous mode [ 55.534105][ T30] audit: type=1400 audit(1748139113.459:134): avc: denied { create } for pid=1435 comm="syz.1.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 55.829368][ T1450] device sit0 entered promiscuous mode [ 56.347530][ T1469] device pim6reg1 entered promiscuous mode [ 57.154888][ T1503] device pim6reg1 entered promiscuous mode [ 57.272691][ T1513] device veth0_vlan left promiscuous mode [ 57.290405][ T1513] device veth0_vlan entered promiscuous mode [ 57.333446][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.343200][ T30] audit: type=1400 audit(1748139115.269:135): avc: denied { ioctl } for pid=1514 comm="syz.1.327" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5460 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 57.345426][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.419954][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.625364][ T1531] device veth0_vlan left promiscuous mode [ 57.634984][ T1531] device veth0_vlan entered promiscuous mode [ 57.665528][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 57.694790][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 57.729315][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 57.746344][ T30] audit: type=1400 audit(1748139115.669:136): avc: denied { create } for pid=1547 comm="syz.2.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 58.711431][ T30] audit: type=1400 audit(1748139116.639:137): avc: denied { create } for pid=1591 comm="syz.4.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 58.761959][ T1598] device veth1_macvtap left promiscuous mode [ 59.048873][ T1626] device sit0 left promiscuous mode [ 60.163865][ T30] audit: type=1400 audit(1748139118.089:138): avc: denied { create } for pid=1653 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 60.207127][ T1649] device pim6reg1 entered promiscuous mode [ 60.614237][ T1667] ªªªªªª: renamed from vlan0 [ 63.629283][ T1801] device sit0 entered promiscuous mode [ 63.823375][ T1800] device syzkaller0 entered promiscuous mode [ 64.407292][ T1840] device wg2 left promiscuous mode [ 64.693433][ T1840] device wg2 entered promiscuous mode [ 65.190557][ T1855] device veth0_vlan left promiscuous mode [ 65.202287][ T1855] device veth0_vlan entered promiscuous mode [ 65.239476][ T1861] device sit0 entered promiscuous mode [ 65.441449][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.452048][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.462514][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 65.574236][ T1871] device syzkaller0 entered promiscuous mode [ 66.572146][ T1897] -: renamed from syzkaller0 [ 66.621081][ T1902] device sit0 entered promiscuous mode [ 68.865784][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 68.954534][ T2015] device sit0 left promiscuous mode [ 69.148184][ T2024] device pim6reg1 entered promiscuous mode [ 69.967038][ T2040] device syzkaller0 entered promiscuous mode [ 70.760764][ T2071] ------------[ cut here ]------------ [ 70.767136][ T2071] WARNING: CPU: 1 PID: 2071 at kernel/trace/bpf_trace.c:1411 bpf_get_stack_raw_tp+0x196/0x1d0 [ 70.780278][ T2071] Modules linked in: [ 70.784830][ T2071] CPU: 1 PID: 2071 Comm: syz.4.491 Tainted: G W 5.15.184-syzkaller-00118-g4b77ae0e7f58 #0 [ 70.797020][ T2071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 70.807742][ T2071] RIP: 0010:bpf_get_stack_raw_tp+0x196/0x1d0 [ 70.814148][ T2071] Code: c8 45 31 c0 e8 7b c7 13 00 65 ff 0d 0c 73 8f 7e 4c 63 e0 4c 89 e0 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 aa e8 f4 ff <0f> 0b 65 ff 0d e9 72 8f 7e 49 c7 c4 f0 ff ff ff eb d7 e8 93 e8 f4 [ 70.836083][ T2071] RSP: 0018:ffffc900010f6318 EFLAGS: 00010293 [ 70.842474][ T2071] RAX: ffffffff8173bc36 RBX: ffff8881f7100000 RCX: ffff888117123b40 [ 70.850816][ T2071] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000fffffffc [ 70.859575][ T2071] RBP: ffffc900010f6350 R08: 0000000000000001 R09: fffffbfff0dd1bd6 [ 70.868554][ T2071] R10: fffffbfff0dd1bd6 R11: 1ffffffff0dd1bd5 R12: 0000000000000000 [ 70.877433][ T2071] R13: dffffc0000000000 R14: 0000000000000003 R15: 0000000000000000 [ 70.886220][ T2071] FS: 00007f7039d706c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 70.895532][ T2071] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 70.902577][ T2071] CR2: 0000200000001000 CR3: 000000012bd0c000 CR4: 00000000003506a0 [ 70.910861][ T2071] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 70.919044][ T2071] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 70.927559][ T2071] Call Trace: [ 70.930881][ T2071] [ 70.933836][ T2071] bpf_prog_ec3b2eefa702d8d3+0x3a/0xa04 [ 70.939418][ T2071] bpf_trace_run4+0xd4/0x1f0 [ 70.944046][ T2071] ? bpf_trace_run3+0x1e0/0x1e0 [ 70.948982][ T2071] ? get_mem_cgroup_from_mm+0x18f/0x230 [ 70.954564][ T2071] __bpf_trace_mmap_lock_acquire_returned+0x35/0x40 [ 70.961336][ T2071] __mmap_lock_do_trace_acquire_returned+0x17d/0x1d0 [ 70.968046][ T2071] ? get_mm_memcg_path+0x230/0x230 [ 70.973236][ T2071] stack_map_get_build_id_offset+0x821/0x840 [ 70.979920][ T2071] ? debug_smp_processor_id+0x17/0x20 [ 70.985412][ T2071] ? get_perf_callchain+0x3b1/0x480 [ 70.990747][ T2071] ? put_callchain_entry+0xb0/0xb0 [ 70.996481][ T2071] ? __bpf_get_stackid+0x960/0x960 [ 71.002179][ T2071] __bpf_get_stack+0x44a/0x4f0 [ 71.007972][ T2071] ? stack_map_get_build_id_offset+0x840/0x840 [ 71.015039][ T2071] ? __kasan_check_write+0x14/0x20 [ 71.020707][ T2071] bpf_get_stack+0x31/0x40 [ 71.026561][ T2071] ? bpf_prog_ec3b2eefa702d8d3+0x3a/0xa04 [ 71.033501][ T2071] bpf_get_stack_raw_tp+0x175/0x1d0 [ 71.040047][ T2071] bpf_prog_ec3b2eefa702d8d3+0x3a/0xa04 [ 71.046451][ T2071] bpf_trace_run4+0xd4/0x1f0 [ 71.051999][ T2071] ? bpf_trace_run3+0x1e0/0x1e0 [ 71.057705][ T2071] ? get_mem_cgroup_from_mm+0x18f/0x230 [ 71.063921][ T2071] __bpf_trace_mmap_lock_acquire_returned+0x35/0x40 [ 71.071708][ T2071] __mmap_lock_do_trace_acquire_returned+0x17d/0x1d0 [ 71.078602][ T2071] ? get_mm_memcg_path+0x230/0x230 [ 71.084516][ T2071] ? check_stack_access_within_bounds+0x49f/0x5c0 [ 71.091283][ T2071] stack_map_get_build_id_offset+0x821/0x840 [ 71.097592][ T2071] ? debug_smp_processor_id+0x17/0x20 [ 71.103198][ T2071] ? get_perf_callchain+0x3b1/0x480 [ 71.108461][ T2071] ? put_callchain_entry+0xb0/0xb0 [ 71.113770][ T2071] ? __bpf_get_stackid+0x960/0x960 [ 71.119028][ T2071] __bpf_get_stack+0x44a/0x4f0 [ 71.124271][ T2071] ? stack_map_get_build_id_offset+0x840/0x840 [ 71.130691][ T2071] ? __kasan_check_write+0x14/0x20 [ 71.136363][ T2071] bpf_get_stack+0x31/0x40 [ 71.141577][ T2071] ? bpf_prog_ec3b2eefa702d8d3+0x3a/0xa04 [ 71.147612][ T2071] bpf_get_stack_raw_tp+0x175/0x1d0 [ 71.153323][ T2071] bpf_prog_ec3b2eefa702d8d3+0x3a/0xa04 [ 71.159433][ T2071] bpf_trace_run4+0xd4/0x1f0 [ 71.164255][ T2071] ? bpf_trace_run3+0x1e0/0x1e0 [ 71.169935][ T2071] ? get_mem_cgroup_from_mm+0x18f/0x230 [ 71.176344][ T2071] __bpf_trace_mmap_lock_acquire_returned+0x35/0x40 [ 71.183448][ T2071] __mmap_lock_do_trace_acquire_returned+0x17d/0x1d0 [ 71.190763][ T2071] ? get_mm_memcg_path+0x230/0x230 [ 71.196327][ T2071] ? page_ext_put+0x1c/0x30 [ 71.200892][ T2071] stack_map_get_build_id_offset+0x821/0x840 [ 71.207660][ T2071] ? debug_smp_processor_id+0x17/0x20 [ 71.214155][ T2071] ? get_perf_callchain+0x3b1/0x480 [ 71.219945][ T2071] ? put_callchain_entry+0xb0/0xb0 [ 71.225527][ T2071] ? __bpf_get_stackid+0x960/0x960 [ 71.230981][ T2071] ? get_page_from_freelist+0x2cc5/0x2d50 [ 71.237181][ T2071] __bpf_get_stack+0x44a/0x4f0 [ 71.242028][ T2071] ? stack_map_get_build_id_offset+0x840/0x840 [ 71.248284][ T2071] ? perf_event_read_local+0x5ea/0x710 [ 71.253794][ T2071] ? __kasan_check_write+0x14/0x20 [ 71.259128][ T2071] bpf_get_stack+0x31/0x40 [ 71.263995][ T2071] ? bpf_prog_ec3b2eefa702d8d3+0x3a/0xa04 [ 71.270576][ T2071] bpf_get_stack_raw_tp+0x175/0x1d0 [ 71.276076][ T2071] bpf_prog_ec3b2eefa702d8d3+0x3a/0xa04 [ 71.281982][ T2071] bpf_trace_run4+0xd4/0x1f0 [ 71.287378][ T2071] ? bpf_trace_run3+0x1e0/0x1e0 [ 71.293044][ T2071] ? __alloc_pages+0x18f/0x440 [ 71.298987][ T2071] ? get_mem_cgroup_from_mm+0x18f/0x230 [ 71.305004][ T2071] __bpf_trace_mmap_lock_acquire_returned+0x35/0x40 [ 71.312415][ T2071] __mmap_lock_do_trace_acquire_returned+0x17d/0x1d0 [ 71.319180][ T2071] ? get_mm_memcg_path+0x230/0x230 [ 71.324601][ T2071] do_user_addr_fault+0x108b/0x1180 [ 71.330724][ T2071] ? do_kern_addr_fault+0x80/0x80 [ 71.335866][ T2071] ? shmem_add_to_page_cache+0xa60/0xc30 [ 71.342019][ T2071] ? lru_cache_add+0x268/0x4d0 [ 71.347098][ T2071] exc_page_fault+0x51/0xb0 [ 71.351710][ T2071] asm_exc_page_fault+0x27/0x30 [ 71.356841][ T2071] RIP: 0010:__get_user_nocheck_1+0x6/0x10 [ 71.363263][ T2071] Code: d0 73 64 48 19 d2 48 21 d0 0f 01 cb 48 8b 10 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 01 cb 0f ae e8 <0f> b6 10 31 c0 0f 01 ca c3 90 0f 01 cb 0f ae e8 0f b7 10 31 c0 0f [ 71.384994][ T2071] RSP: 0018:ffffc900010f79f0 EFLAGS: 00050287 [ 71.392155][ T2071] RAX: 0000200000001000 RBX: 0000000000001000 RCX: ffff888117123b40 [ 71.400998][ T2071] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 71.409388][ T2071] RBP: ffffc900010f7a30 R08: dffffc0000000000 R09: fffff940009742b7 [ 71.417579][ T2071] R10: fffff940009742b7 R11: 1ffffd40009742b6 R12: 0000000000001000 [ 71.425608][ T2071] R13: 0000200000002000 R14: 00000000ffffffff R15: 0000200000001000 [ 71.433857][ T2071] ? fault_in_readable+0xd5/0x160 [ 71.439066][ T2071] fault_in_iov_iter_readable+0x12d/0x280 [ 71.444938][ T2071] generic_perform_write+0x1a5/0x670 [ 71.450528][ T2071] ? grab_cache_page_write_begin+0xb0/0xb0 [ 71.456376][ T2071] ? file_remove_privs+0x590/0x590 [ 71.461975][ T2071] ? rwsem_write_trylock+0x130/0x300 [ 71.467649][ T2071] ? clear_nonspinnable+0x60/0x60 [ 71.473073][ T2071] ? avc_policy_seqno+0x1b/0x70 [ 71.477968][ T2071] __generic_file_write_iter+0x268/0x480 [ 71.483667][ T2071] generic_file_write_iter+0xa9/0x1d0 [ 71.489260][ T2071] vfs_write+0x802/0xf70 [ 71.493885][ T2071] ? file_end_write+0x1b0/0x1b0 [ 71.499383][ T2071] ? wait_for_completion_killable_timeout+0x10/0x10 [ 71.506431][ T2071] ? __fget_files+0x2c4/0x320 [ 71.511339][ T2071] ? __fdget_pos+0x2d2/0x380 [ 71.515955][ T2071] ? ksys_write+0x71/0x240 [ 71.520622][ T2071] ksys_write+0x140/0x240 [ 71.524990][ T2071] ? __ia32_sys_read+0x90/0x90 [ 71.530050][ T2071] ? __kasan_check_write+0x14/0x20 [ 71.535198][ T2071] ? switch_fpu_return+0x15d/0x2c0 [ 71.540386][ T2071] __x64_sys_write+0x7b/0x90 [ 71.545311][ T2071] x64_sys_call+0x8ef/0x9a0 [ 71.550221][ T2071] do_syscall_64+0x4c/0xa0 [ 71.554671][ T2071] ? clear_bhb_loop+0x50/0xa0 [ 71.559520][ T2071] ? clear_bhb_loop+0x50/0xa0 [ 71.564599][ T2071] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 71.570653][ T2071] RIP: 0033:0x7f703b707969 [ 71.575275][ T2071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 71.596382][ T2071] RSP: 002b:00007f7039d70038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 71.604830][ T2071] RAX: ffffffffffffffda RBX: 00007f703b92efa0 RCX: 00007f703b707969 [ 71.612946][ T2071] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000007 [ 71.620954][ T2071] RBP: 00007f703b789ab1 R08: 0000000000000000 R09: 0000000000000000 [ 71.629097][ T2071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 71.637272][ T2071] R13: 0000000000000000 R14: 00007f703b92efa0 R15: 00007ffe50970a78 [ 71.645484][ T2071] [ 71.648969][ T2071] ---[ end trace 5003e92e94e39a4d ]--- [ 71.770483][ T2071] syz.4.491 (2071) used greatest stack depth: 21360 bytes left [ 72.135466][ T2096] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.143517][ T2096] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.557835][ T2111] tun0: tun_chr_ioctl cmd 1074025673 [ 74.201174][ T2163] device wg2 left promiscuous mode [ 74.440370][ T2165] device syzkaller0 entered promiscuous mode [ 74.447260][ T2172] device sit0 left promiscuous mode [ 74.649283][ T2172] device sit0 entered promiscuous mode [ 77.478822][ T30] audit: type=1400 audit(1748139135.409:139): avc: denied { create } for pid=2240 comm="syz.0.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 77.896881][ T2254] ref_ctr_offset mismatch. inode: 0x206 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 78.006147][ T2254] GPL: port 1(erspan0) entered blocking state [ 78.013890][ T2254] GPL: port 1(erspan0) entered disabled state [ 78.085977][ T2254] device erspan0 entered promiscuous mode [ 78.195202][ T2259] GPL: port 1(erspan0) entered blocking state [ 78.201906][ T2259] GPL: port 1(erspan0) entered forwarding state [ 79.109482][ T2294] device sit0 entered promiscuous mode [ 79.374348][ T2302] device pim6reg1 entered promiscuous mode [ 79.719730][ T2326] device wg2 left promiscuous mode [ 79.732008][ T2326] device wg2 entered promiscuous mode [ 79.907369][ T2328] device pim6reg1 entered promiscuous mode [ 79.957317][ T2343] device sit0 left promiscuous mode [ 80.038455][ T2347] device wg2 left promiscuous mode [ 80.046037][ T2343] device sit0 entered promiscuous mode [ 80.171469][ T2346] device wg2 entered promiscuous mode [ 82.165027][ T2422] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.172350][ T2422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.180400][ T2422] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.187748][ T2422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.198000][ T2422] device bridge0 entered promiscuous mode [ 82.550869][ T2446] device sit0 left promiscuous mode [ 82.651433][ T2446] device sit0 entered promiscuous mode [ 82.854550][ T2457] device syzkaller0 entered promiscuous mode [ 82.869508][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.910939][ T2503] syzkaller: port 1(erspan0) entered blocking state [ 83.917646][ T2503] syzkaller: port 1(erspan0) entered disabled state [ 83.925442][ T2503] device erspan0 entered promiscuous mode [ 85.792871][ T2576] device sit0 left promiscuous mode [ 85.810121][ T2576] device sit0 entered promiscuous mode [ 87.159071][ T2636] device syzkaller0 entered promiscuous mode [ 87.501568][ T2646] device veth1_macvtap left promiscuous mode [ 89.278631][ C1] sched: RT throttling activated [ 91.111513][ T2710] device syzkaller0 entered promiscuous mode [ 91.536777][ T2720] device syzkaller0 entered promiscuous mode [ 92.557858][ T30] audit: type=1400 audit(1748139150.479:140): avc: denied { create } for pid=2747 comm="syz.0.687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 93.413200][ T2767] device syzkaller0 entered promiscuous mode [ 98.557214][ T2850] FAULT_INJECTION: forcing a failure. [ 98.557214][ T2850] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 98.618959][ T2850] CPU: 1 PID: 2850 Comm: syz.2.712 Tainted: G W 5.15.184-syzkaller-00118-g4b77ae0e7f58 #0 [ 98.637324][ T2850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 98.647474][ T2850] Call Trace: [ 98.650770][ T2850] [ 98.653708][ T2850] __dump_stack+0x21/0x30 [ 98.658038][ T2850] dump_stack_lvl+0xee/0x150 [ 98.662666][ T2850] ? show_regs_print_info+0x20/0x20 [ 98.667952][ T2850] ? vfs_write+0xc17/0xf70 [ 98.672370][ T2850] dump_stack+0x15/0x20 [ 98.676535][ T2850] should_fail+0x3c1/0x510 [ 98.680955][ T2850] should_fail_usercopy+0x1a/0x20 [ 98.685977][ T2850] _copy_from_user+0x20/0xd0 [ 98.690588][ T2850] __sys_bpf+0x233/0x730 [ 98.695068][ T2850] ? bpf_link_show_fdinfo+0x310/0x310 [ 98.700489][ T2850] ? debug_smp_processor_id+0x17/0x20 [ 98.706504][ T2850] __x64_sys_bpf+0x7c/0x90 [ 98.710931][ T2850] x64_sys_call+0x4b9/0x9a0 [ 98.715860][ T2850] do_syscall_64+0x4c/0xa0 [ 98.720291][ T2850] ? clear_bhb_loop+0x50/0xa0 [ 98.725069][ T2850] ? clear_bhb_loop+0x50/0xa0 [ 98.729940][ T2850] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 98.735956][ T2850] RIP: 0033:0x7fd76e718969 [ 98.741006][ T2850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.760959][ T2850] RSP: 002b:00007fd76cd81038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 98.769638][ T2850] RAX: ffffffffffffffda RBX: 00007fd76e93ffa0 RCX: 00007fd76e718969 [ 98.777703][ T2850] RDX: 0000000000000028 RSI: 0000200000000740 RDI: 0000000000000012 [ 98.786315][ T2850] RBP: 00007fd76cd81090 R08: 0000000000000000 R09: 0000000000000000 [ 98.794307][ T2850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.802464][ T2850] R13: 0000000000000001 R14: 00007fd76e93ffa0 R15: 00007ffdddb91168 [ 98.810469][ T2850] [ 98.879810][ T2846] device syzkaller0 entered promiscuous mode [ 99.037066][ T2839] device syzkaller0 entered promiscuous mode [ 99.366564][ T1088] syzkaller0: tun_net_xmit 76 [ 99.371690][ T1088] syzkaller0: tun_net_xmit 48 [ 99.376664][ T2864] syz.3.719[2864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.376737][ T2864] syz.3.719[2864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.389580][ T1088] syzkaller0: tun_net_xmit 76 [ 99.389793][ T2865] syzkaller0: create flow: hash 4139560537 index 1 [ 99.429227][ T1088] syzkaller0: tun_net_xmit 76 [ 100.816058][ T1088] syzkaller0: tun_net_xmit 76 [ 100.999616][ T2859] syzkaller0: delete flow: hash 4139560537 index 1 [ 101.224537][ T2890] FAULT_INJECTION: forcing a failure. [ 101.224537][ T2890] name failslab, interval 1, probability 0, space 0, times 1 [ 101.292801][ T2890] CPU: 1 PID: 2890 Comm: syz.0.728 Tainted: G W 5.15.184-syzkaller-00118-g4b77ae0e7f58 #0 [ 101.304139][ T2890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 101.314301][ T2890] Call Trace: [ 101.317591][ T2890] [ 101.320543][ T2890] __dump_stack+0x21/0x30 [ 101.324895][ T2890] dump_stack_lvl+0xee/0x150 [ 101.329512][ T2890] ? show_regs_print_info+0x20/0x20 [ 101.334729][ T2890] ? putname+0x111/0x160 [ 101.338988][ T2890] dump_stack+0x15/0x20 [ 101.343146][ T2890] should_fail+0x3c1/0x510 [ 101.347563][ T2890] __should_failslab+0xa4/0xe0 [ 101.352341][ T2890] should_failslab+0x9/0x20 [ 101.356849][ T2890] slab_pre_alloc_hook+0x3b/0xe0 [ 101.361783][ T2890] kmem_cache_alloc_trace+0x48/0x270 [ 101.367073][ T2890] ? btf_new_fd+0x115/0x920 [ 101.371574][ T2890] btf_new_fd+0x115/0x920 [ 101.375905][ T2890] ? security_capable+0x87/0xb0 [ 101.380750][ T2890] bpf_btf_load+0x6f/0x90 [ 101.385076][ T2890] __sys_bpf+0x515/0x730 [ 101.389309][ T2890] ? bpf_link_show_fdinfo+0x310/0x310 [ 101.394679][ T2890] ? debug_smp_processor_id+0x17/0x20 [ 101.400047][ T2890] __x64_sys_bpf+0x7c/0x90 [ 101.404459][ T2890] x64_sys_call+0x4b9/0x9a0 [ 101.409089][ T2890] do_syscall_64+0x4c/0xa0 [ 101.413525][ T2890] ? clear_bhb_loop+0x50/0xa0 [ 101.418242][ T2890] ? clear_bhb_loop+0x50/0xa0 [ 101.422915][ T2890] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 101.429329][ T2890] RIP: 0033:0x7f62d4780969 [ 101.433740][ T2890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.453339][ T2890] RSP: 002b:00007f62d2de9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 101.461746][ T2890] RAX: ffffffffffffffda RBX: 00007f62d49a7fa0 RCX: 00007f62d4780969 [ 101.469718][ T2890] RDX: 0000000000000028 RSI: 0000200000000740 RDI: 0000000000000012 [ 101.477685][ T2890] RBP: 00007f62d2de9090 R08: 0000000000000000 R09: 0000000000000000 [ 101.485644][ T2890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.493607][ T2890] R13: 0000000000000001 R14: 00007f62d49a7fa0 R15: 00007ffcb8c97b18 [ 101.501601][ T2890] [ 102.494833][ T2935] FAULT_INJECTION: forcing a failure. [ 102.494833][ T2935] name failslab, interval 1, probability 0, space 0, times 0 [ 102.638747][ T2935] CPU: 0 PID: 2935 Comm: syz.0.741 Tainted: G W 5.15.184-syzkaller-00118-g4b77ae0e7f58 #0 [ 102.650000][ T2935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 102.660073][ T2935] Call Trace: [ 102.663361][ T2935] [ 102.666300][ T2935] __dump_stack+0x21/0x30 [ 102.670641][ T2935] dump_stack_lvl+0xee/0x150 [ 102.675235][ T2935] ? show_regs_print_info+0x20/0x20 [ 102.680448][ T2935] dump_stack+0x15/0x20 [ 102.684612][ T2935] should_fail+0x3c1/0x510 [ 102.689036][ T2935] __should_failslab+0xa4/0xe0 [ 102.693809][ T2935] should_failslab+0x9/0x20 [ 102.698341][ T2935] slab_pre_alloc_hook+0x3b/0xe0 [ 102.703294][ T2935] kmem_cache_alloc_trace+0x48/0x270 [ 102.708588][ T2935] ? btf_new_fd+0x1b2/0x920 [ 102.713101][ T2935] btf_new_fd+0x1b2/0x920 [ 102.717443][ T2935] bpf_btf_load+0x6f/0x90 [ 102.721776][ T2935] __sys_bpf+0x515/0x730 [ 102.726024][ T2935] ? bpf_link_show_fdinfo+0x310/0x310 [ 102.731402][ T2935] ? bpf_trace_run2+0xb5/0x1b0 [ 102.736186][ T2935] ? __bpf_trace_sys_enter+0x62/0x70 [ 102.741480][ T2935] __x64_sys_bpf+0x7c/0x90 [ 102.745902][ T2935] x64_sys_call+0x4b9/0x9a0 [ 102.750410][ T2935] do_syscall_64+0x4c/0xa0 [ 102.754834][ T2935] ? clear_bhb_loop+0x50/0xa0 [ 102.759514][ T2935] ? clear_bhb_loop+0x50/0xa0 [ 102.764195][ T2935] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 102.770107][ T2935] RIP: 0033:0x7f62d4780969 [ 102.774537][ T2935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.794153][ T2935] RSP: 002b:00007f62d2de9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 102.802579][ T2935] RAX: ffffffffffffffda RBX: 00007f62d49a7fa0 RCX: 00007f62d4780969 [ 102.810557][ T2935] RDX: 0000000000000028 RSI: 0000200000000740 RDI: 0000000000000012 [ 102.818627][ T2935] RBP: 00007f62d2de9090 R08: 0000000000000000 R09: 0000000000000000 [ 102.826629][ T2935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.834606][ T2935] R13: 0000000000000001 R14: 00007f62d49a7fa0 R15: 00007ffcb8c97b18 [ 102.842588][ T2935] [ 103.072858][ T30] audit: type=1400 audit(1748139160.999:141): avc: denied { create } for pid=2942 comm="syz.0.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 104.627703][ T2982] FAULT_INJECTION: forcing a failure. [ 104.627703][ T2982] name failslab, interval 1, probability 0, space 0, times 0 [ 104.661009][ T2982] CPU: 0 PID: 2982 Comm: syz.1.754 Tainted: G W 5.15.184-syzkaller-00118-g4b77ae0e7f58 #0 [ 104.672256][ T2982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 104.682333][ T2982] Call Trace: [ 104.685624][ T2982] [ 104.688562][ T2982] __dump_stack+0x21/0x30 [ 104.693014][ T2982] dump_stack_lvl+0xee/0x150 [ 104.697615][ T2982] ? show_regs_print_info+0x20/0x20 [ 104.702822][ T2982] ? kmem_cache_alloc_trace+0x119/0x270 [ 104.708382][ T2982] ? bpf_btf_load+0x6f/0x90 [ 104.712895][ T2982] ? __sys_bpf+0x515/0x730 [ 104.717315][ T2982] ? __x64_sys_bpf+0x7c/0x90 [ 104.721912][ T2982] ? do_syscall_64+0x4c/0xa0 [ 104.726515][ T2982] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 104.732595][ T2982] dump_stack+0x15/0x20 [ 104.736801][ T2982] should_fail+0x3c1/0x510 [ 104.741239][ T2982] __should_failslab+0xa4/0xe0 [ 104.746017][ T2982] should_failslab+0x9/0x20 [ 104.750530][ T2982] slab_pre_alloc_hook+0x3b/0xe0 [ 104.755488][ T2982] __kmalloc+0x6d/0x2c0 [ 104.759693][ T2982] ? kvmalloc_node+0x242/0x330 [ 104.764487][ T2982] kvmalloc_node+0x242/0x330 [ 104.769196][ T2982] ? vm_mmap+0xb0/0xb0 [ 104.773283][ T2982] ? btf_new_fd+0x1b2/0x920 [ 104.777801][ T2982] btf_new_fd+0x1ee/0x920 [ 104.782147][ T2982] bpf_btf_load+0x6f/0x90 [ 104.787205][ T2982] __sys_bpf+0x515/0x730 [ 104.791904][ T2982] ? bpf_link_show_fdinfo+0x310/0x310 [ 104.797303][ T2982] ? debug_smp_processor_id+0x17/0x20 [ 104.802758][ T2982] __x64_sys_bpf+0x7c/0x90 [ 104.807299][ T2982] x64_sys_call+0x4b9/0x9a0 [ 104.811820][ T2982] do_syscall_64+0x4c/0xa0 [ 104.816401][ T2982] ? clear_bhb_loop+0x50/0xa0 [ 104.821155][ T2982] ? clear_bhb_loop+0x50/0xa0 [ 104.825849][ T2982] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 104.831768][ T2982] RIP: 0033:0x7f8a63b37969 [ 104.836201][ T2982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.855828][ T2982] RSP: 002b:00007f8a621a0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 104.864295][ T2982] RAX: ffffffffffffffda RBX: 00007f8a63d5efa0 RCX: 00007f8a63b37969 [ 104.872396][ T2982] RDX: 0000000000000028 RSI: 0000200000000740 RDI: 0000000000000012 [ 104.880383][ T2982] RBP: 00007f8a621a0090 R08: 0000000000000000 R09: 0000000000000000 [ 104.888366][ T2982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 104.896349][ T2982] R13: 0000000000000001 R14: 00007f8a63d5efa0 R15: 00007fffc85e8658 [ 104.904436][ T2982] [ 107.146134][ T3050] device wg2 entered promiscuous mode [ 107.298753][ T3059] device wg2 entered promiscuous mode [ 109.628582][ T30] audit: type=1400 audit(1748139167.549:142): avc: denied { create } for pid=3149 comm="syz.3.803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 112.392907][ T3192] device sit0 left promiscuous mode [ 113.798645][ T3252] device sit0 left promiscuous mode [ 114.752049][ T3275] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.792380][ T3275] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.812668][ T3275] device bridge_slave_0 entered promiscuous mode [ 114.860083][ T3275] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.900836][ T3275] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.919149][ T3275] device bridge_slave_1 entered promiscuous mode [ 115.049920][ T3295] device pim6reg1 entered promiscuous mode [ 115.180861][ T30] audit: type=1400 audit(1748139173.109:143): avc: denied { create } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 115.203988][ T8] GPL: port 1(erspan0) entered disabled state [ 115.224022][ T8] device erspan0 left promiscuous mode [ 115.281321][ T8] GPL: port 1(erspan0) entered disabled state [ 115.288707][ T30] audit: type=1400 audit(1748139173.109:144): avc: denied { write } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 115.322409][ T3275] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.327383][ T30] audit: type=1400 audit(1748139173.109:145): avc: denied { read } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 115.329485][ T3275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.329579][ T3275] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.364034][ T3275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.483594][ T3311] device sit0 left promiscuous mode [ 115.596358][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.603751][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.623550][ T3315] device veth1_macvtap entered promiscuous mode [ 115.638870][ T3315] device macsec0 entered promiscuous mode [ 115.649616][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 115.690603][ T3320] FAULT_INJECTION: forcing a failure. [ 115.690603][ T3320] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 115.707291][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 115.715321][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.749921][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.758401][ T3320] CPU: 0 PID: 3320 Comm: syz.0.851 Tainted: G W 5.15.184-syzkaller-00118-g4b77ae0e7f58 #0 [ 115.769611][ T3320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 115.779674][ T3320] Call Trace: [ 115.782955][ T3320] [ 115.785883][ T3320] __dump_stack+0x21/0x30 [ 115.790210][ T3320] dump_stack_lvl+0xee/0x150 [ 115.794817][ T3320] ? show_regs_print_info+0x20/0x20 [ 115.800011][ T3320] ? __kasan_check_write+0x14/0x20 [ 115.805118][ T3320] ? proc_fail_nth_write+0x17a/0x1f0 [ 115.810399][ T3320] ? proc_fail_nth_read+0x210/0x210 [ 115.815595][ T3320] dump_stack+0x15/0x20 [ 115.819831][ T3320] should_fail+0x3c1/0x510 [ 115.824241][ T3320] should_fail_usercopy+0x1a/0x20 [ 115.829263][ T3320] _copy_from_user+0x20/0xd0 [ 115.833848][ T3320] perf_copy_attr+0x154/0x870 [ 115.838536][ T3320] __se_sys_perf_event_open+0xcb/0x1b80 [ 115.844074][ T3320] ? __kasan_check_write+0x14/0x20 [ 115.849180][ T3320] ? mutex_unlock+0x89/0x220 [ 115.853771][ T3320] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 115.859398][ T3320] ? __ia32_sys_read+0x90/0x90 [ 115.864149][ T3320] __x64_sys_perf_event_open+0xbf/0xd0 [ 115.869603][ T3320] x64_sys_call+0x50d/0x9a0 [ 115.874097][ T3320] do_syscall_64+0x4c/0xa0 [ 115.878507][ T3320] ? clear_bhb_loop+0x50/0xa0 [ 115.883183][ T3320] ? clear_bhb_loop+0x50/0xa0 [ 115.887859][ T3320] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 115.893747][ T3320] RIP: 0033:0x7f62d4780969 [ 115.898152][ T3320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.917753][ T3320] RSP: 002b:00007f62d2de9038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 115.926186][ T3320] RAX: ffffffffffffffda RBX: 00007f62d49a7fa0 RCX: 00007f62d4780969 [ 115.934158][ T3320] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000012c0 [ 115.942117][ T3320] RBP: 00007f62d2de9090 R08: 0000000000000000 R09: 0000000000000000 [ 115.950076][ T3320] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 115.958038][ T3320] R13: 0000000000000000 R14: 00007f62d49a7fa0 R15: 00007ffcb8c97b18 [ 115.966004][ T3320] [ 115.978826][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.987213][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.994310][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.007166][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 116.016520][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.025061][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.032213][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.041094][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 116.058546][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 116.089829][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 116.119580][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.151193][ T8] device bridge_slave_1 left promiscuous mode [ 116.157354][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.175734][ T8] device bridge_slave_0 left promiscuous mode [ 116.181958][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.191576][ T8] device veth1_macvtap left promiscuous mode [ 116.360463][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 116.371715][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 116.459761][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 116.468317][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.484674][ T3275] device veth0_vlan entered promiscuous mode [ 116.501313][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.512984][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.538500][ T3275] device veth1_macvtap entered promiscuous mode [ 116.549443][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 116.557655][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.673248][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 116.692385][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.700963][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.710011][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 116.718283][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.884281][ T3384] FAULT_INJECTION: forcing a failure. [ 116.884281][ T3384] name failslab, interval 1, probability 0, space 0, times 0 [ 116.953072][ T3384] CPU: 1 PID: 3384 Comm: syz.3.867 Tainted: G W 5.15.184-syzkaller-00118-g4b77ae0e7f58 #0 [ 116.964313][ T3384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 116.974377][ T3384] Call Trace: [ 116.977666][ T3384] [ 116.980604][ T3384] __dump_stack+0x21/0x30 [ 116.984956][ T3384] dump_stack_lvl+0xee/0x150 [ 116.989556][ T3384] ? show_regs_print_info+0x20/0x20 [ 116.994773][ T3384] ? avc_has_perm_noaudit+0x2f4/0x460 [ 117.000160][ T3384] dump_stack+0x15/0x20 [ 117.004329][ T3384] should_fail+0x3c1/0x510 [ 117.008761][ T3384] __should_failslab+0xa4/0xe0 [ 117.013533][ T3384] should_failslab+0x9/0x20 [ 117.018075][ T3384] slab_pre_alloc_hook+0x3b/0xe0 [ 117.023031][ T3384] ? perf_event_alloc+0x116/0x1a20 [ 117.026140][ T30] audit: type=1400 audit(1748139174.939:146): avc: denied { read } for pid=3394 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 117.028161][ T3384] kmem_cache_alloc+0x44/0x260 [ 117.028188][ T3384] perf_event_alloc+0x116/0x1a20 [ 117.059010][ T3384] ? _raw_spin_unlock+0x4d/0x70 [ 117.063878][ T3384] ? alloc_fd+0x4ba/0x570 [ 117.068223][ T3384] __se_sys_perf_event_open+0x6c5/0x1b80 [ 117.073870][ T3384] ? __kasan_check_write+0x14/0x20 [ 117.078032][ T30] audit: type=1400 audit(1748139174.939:147): avc: denied { open } for pid=3394 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 117.078990][ T3384] ? mutex_unlock+0x89/0x220 [ 117.079015][ T3384] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 117.079041][ T3384] ? __ia32_sys_read+0x90/0x90 [ 117.079060][ T3384] __x64_sys_perf_event_open+0xbf/0xd0 [ 117.079082][ T3384] x64_sys_call+0x50d/0x9a0 [ 117.127281][ T3384] do_syscall_64+0x4c/0xa0 [ 117.131704][ T3384] ? clear_bhb_loop+0x50/0xa0 [ 117.136381][ T3384] ? clear_bhb_loop+0x50/0xa0 [ 117.141052][ T3384] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 117.147049][ T3384] RIP: 0033:0x7f4caa79a969 [ 117.151459][ T3384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 117.171058][ T3384] RSP: 002b:00007f4ca8e03038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 117.179474][ T3384] RAX: ffffffffffffffda RBX: 00007f4caa9c1fa0 RCX: 00007f4caa79a969 [ 117.187457][ T3384] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000012c0 [ 117.195418][ T3384] RBP: 00007f4ca8e03090 R08: 0000000000000000 R09: 0000000000000000 [ 117.203391][ T3384] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 117.211352][ T3384] R13: 0000000000000000 R14: 00007f4caa9c1fa0 R15: 00007ffc5f3b2828 [ 117.219326][ T3384] [ 117.277036][ T30] audit: type=1400 audit(1748139175.169:148): avc: denied { create } for pid=3392 comm="syz.0.870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 117.442403][ T3394] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.508695][ T3394] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.549127][ T3394] device bridge_slave_0 entered promiscuous mode [ 117.678840][ T3394] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.686128][ T3394] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.694220][ T3394] device bridge_slave_1 entered promiscuous mode [ 118.220207][ T8] device bridge_slave_1 left promiscuous mode [ 118.226504][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.234424][ T8] device bridge_slave_0 left promiscuous mode [ 118.240721][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.256199][ T8] device veth1_macvtap left promiscuous mode [ 118.268894][ T8] device veth0_vlan left promiscuous mode [ 118.457001][ T3425] device veth1_macvtap entered promiscuous mode [ 118.463520][ T3425] device macsec0 entered promiscuous mode [ 118.482566][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 118.519655][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 118.548963][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 118.568872][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.582763][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.591303][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.598346][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.605955][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.614353][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.622875][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.629966][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.637487][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 118.684593][ T3428] device pim6reg1 entered promiscuous mode [ 118.706421][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 118.744700][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 118.832213][ T3394] device veth0_vlan entered promiscuous mode [ 118.838949][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 118.847263][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 118.896284][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 118.906487][ T3442] FAULT_INJECTION: forcing a failure. [ 118.906487][ T3442] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.929382][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.938700][ T3442] CPU: 0 PID: 3442 Comm: syz.3.882 Tainted: G W 5.15.184-syzkaller-00118-g4b77ae0e7f58 #0 [ 118.949920][ T3442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 118.959983][ T3442] Call Trace: [ 118.963268][ T3442] [ 118.966202][ T3442] __dump_stack+0x21/0x30 [ 118.970540][ T3442] dump_stack_lvl+0xee/0x150 [ 118.975135][ T3442] ? show_regs_print_info+0x20/0x20 [ 118.980346][ T3442] dump_stack+0x15/0x20 [ 118.984512][ T3442] should_fail+0x3c1/0x510 [ 118.988939][ T3442] should_fail_usercopy+0x1a/0x20 [ 118.993971][ T3442] _copy_to_user+0x20/0x90 [ 118.998395][ T3442] simple_read_from_buffer+0xe9/0x160 [ 119.003776][ T3442] proc_fail_nth_read+0x19a/0x210 [ 119.008812][ T3442] ? proc_fault_inject_write+0x2f0/0x2f0 [ 119.014468][ T3442] ? security_file_permission+0x83/0xa0 [ 119.020041][ T3442] ? proc_fault_inject_write+0x2f0/0x2f0 [ 119.025683][ T3442] vfs_read+0x282/0xbe0 [ 119.029827][ T3442] ? kernel_read+0x1f0/0x1f0 [ 119.034399][ T3442] ? put_unused_fd+0x141/0x180 [ 119.039151][ T3442] ? __kasan_check_write+0x14/0x20 [ 119.044252][ T3442] ? mutex_lock+0x95/0x1a0 [ 119.048664][ T3442] ? wait_for_completion_killable_timeout+0x10/0x10 [ 119.055259][ T3442] ? __fget_files+0x2c4/0x320 [ 119.059954][ T3442] ? __fdget_pos+0x2d2/0x380 [ 119.064556][ T3442] ? ksys_read+0x71/0x240 [ 119.068879][ T3442] ksys_read+0x140/0x240 [ 119.073117][ T3442] ? vfs_write+0xf70/0xf70 [ 119.077533][ T3442] ? debug_smp_processor_id+0x17/0x20 [ 119.082922][ T3442] __x64_sys_read+0x7b/0x90 [ 119.087425][ T3442] x64_sys_call+0x96d/0x9a0 [ 119.091925][ T3442] do_syscall_64+0x4c/0xa0 [ 119.096338][ T3442] ? clear_bhb_loop+0x50/0xa0 [ 119.101037][ T3442] ? clear_bhb_loop+0x50/0xa0 [ 119.105706][ T3442] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 119.111592][ T3442] RIP: 0033:0x7f4caa79937c [ 119.116000][ T3442] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 119.135595][ T3442] RSP: 002b:00007f4ca8e03030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 119.144004][ T3442] RAX: ffffffffffffffda RBX: 00007f4caa9c1fa0 RCX: 00007f4caa79937c [ 119.151975][ T3442] RDX: 000000000000000f RSI: 00007f4ca8e030a0 RDI: 0000000000000006 [ 119.159933][ T3442] RBP: 00007f4ca8e03090 R08: 0000000000000000 R09: 0000000000000000 [ 119.167890][ T3442] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 119.175848][ T3442] R13: 0000000000000000 R14: 00007f4caa9c1fa0 R15: 00007ffc5f3b2828 [ 119.183816][ T3442] [ 119.217343][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 119.243013][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 119.263781][ T3394] device veth1_macvtap entered promiscuous mode [ 119.271583][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 119.301461][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 119.321909][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 119.406446][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 119.414747][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 119.423142][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 119.431534][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 119.599185][ T3458] device pim6reg1 entered promiscuous mode [ 119.884617][ T3462] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.891766][ T3462] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.899467][ T3462] device bridge_slave_0 entered promiscuous mode [ 119.906734][ T3462] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.914028][ T3462] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.921735][ T3462] device bridge_slave_1 entered promiscuous mode [ 120.063209][ T3479] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.071839][ T3479] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.078947][ T3479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.272610][ T3462] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.279684][ T3462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.451140][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.459836][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.467478][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.500331][ T3494] device veth0_vlan left promiscuous mode [ 120.517101][ T3494] device veth0_vlan entered promiscuous mode [ 120.623783][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 120.654182][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 120.678920][ T1391] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.686072][ T1391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 120.713326][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 120.730761][ T1391] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.737926][ T1391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 120.839685][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 120.854142][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 121.058058][ T3462] device veth0_vlan entered promiscuous mode [ 121.064732][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 121.073888][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.082189][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.095328][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.206330][ T8] device bridge_slave_1 left promiscuous mode [ 121.218827][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.233140][ T8] device bridge_slave_0 left promiscuous mode [ 121.249657][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.275311][ T8] device veth1_macvtap left promiscuous mode [ 121.298678][ T8] device veth0_vlan left promiscuous mode [ 121.633569][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 121.646990][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 121.776373][ T3542] device syzkaller0 entered promiscuous mode [ 121.810089][ T3462] device veth1_macvtap entered promiscuous mode [ 121.829942][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 121.837670][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 121.846184][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 121.873712][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 121.882025][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 122.756276][ T3558] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.764499][ T3558] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.772514][ T3558] device bridge_slave_0 entered promiscuous mode [ 122.779784][ T3566] device sit0 entered promiscuous mode [ 122.850216][ T3558] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.868665][ T3558] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.876345][ T3558] device bridge_slave_1 entered promiscuous mode [ 122.953072][ T3558] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.960161][ T3558] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.967458][ T3558] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.974508][ T3558] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.003566][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.011745][ T1391] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.028999][ T1391] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.038187][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 123.046689][ T1391] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.053763][ T1391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.062564][ T8] device bridge_slave_1 left promiscuous mode [ 123.068915][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.076461][ T8] device bridge_slave_0 left promiscuous mode [ 123.082698][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.091005][ T8] device veth1_macvtap left promiscuous mode [ 123.097049][ T8] device veth0_vlan left promiscuous mode [ 123.209733][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 123.218047][ T1391] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.225127][ T1391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.233393][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.243773][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.257426][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 123.265927][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 123.283574][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 123.291776][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.301660][ T3558] device veth0_vlan entered promiscuous mode [ 123.313079][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 123.321598][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 123.335497][ T3558] device veth1_macvtap entered promiscuous mode [ 123.342589][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 123.351359][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 123.359960][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 123.379775][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 123.388142][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 123.397875][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 123.407142][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 124.046731][ T30] audit: type=1400 audit(1748139181.969:149): avc: denied { create } for pid=3604 comm="syz.1.930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 124.425478][ T3612] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.432616][ T3612] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.440608][ T3612] device bridge_slave_0 entered promiscuous mode [ 124.477473][ T3612] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.484673][ T3612] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.509313][ T3612] device bridge_slave_1 entered promiscuous mode [ 124.663002][ T8] device bridge_slave_1 left promiscuous mode [ 124.670173][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.678372][ T8] device bridge_slave_0 left promiscuous mode [ 124.684825][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.694707][ T8] device veth1_macvtap left promiscuous mode [ 124.700943][ T8] device veth0_vlan left promiscuous mode [ 125.647073][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 125.654974][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 125.684615][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.693631][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.704250][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.711315][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.748821][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 125.879240][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.887673][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.988781][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.995854][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.012422][ T3681] device sit0 left promiscuous mode [ 126.024837][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 126.033093][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.049611][ T3682] device sit0 entered promiscuous mode [ 126.198978][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 126.207309][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.241678][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 126.259018][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 126.279207][ T3612] device veth0_vlan entered promiscuous mode [ 129.340945][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 129.365215][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.400270][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.513024][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.980675][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 129.999253][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.009364][ T3612] device veth1_macvtap entered promiscuous mode [ 130.020205][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 130.094799][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 130.119437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.228168][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 130.239226][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.575021][ T3763] device wg2 left promiscuous mode [ 133.625737][ T3746] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.673815][ T3746] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.709193][ T3746] device bridge_slave_0 entered promiscuous mode [ 133.723910][ T3764] device wg2 entered promiscuous mode [ 133.739940][ T3746] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.782625][ T3746] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.842917][ T3746] device bridge_slave_1 entered promiscuous mode [ 133.959487][ T3746] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.966560][ T3746] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.973858][ T3746] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.980904][ T3746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.142269][ T1391] device bridge_slave_1 left promiscuous mode [ 134.148445][ T1391] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.209134][ T1391] device bridge_slave_0 left promiscuous mode [ 134.220661][ T1391] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.237872][ T1391] device veth1_macvtap left promiscuous mode [ 134.254015][ T1391] device veth0_vlan left promiscuous mode [ 134.410162][ T3792] device sit0 entered promiscuous mode [ 134.549786][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.557211][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.639005][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.667057][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.773880][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.788170][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.831130][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.838201][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.856870][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.871949][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.886768][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.893861][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.904730][ T30] audit: type=1400 audit(1748139192.829:150): avc: denied { create } for pid=3825 comm="syz.0.989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 135.007776][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.029833][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.072608][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.084340][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.093725][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.102723][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.126518][ T3746] device veth0_vlan entered promiscuous mode [ 135.133235][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 135.141929][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.157622][ T3746] device veth1_macvtap entered promiscuous mode [ 135.165556][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.174840][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.182904][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.191542][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.200138][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.216088][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.224728][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.233802][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.242570][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.424116][ T3849] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.438789][ T3849] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.446589][ T3849] device bridge_slave_0 entered promiscuous mode [ 136.506215][ T3849] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.524756][ T3849] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.539147][ T3849] device bridge_slave_1 entered promiscuous mode [ 137.020278][ T3871] device sit0 left promiscuous mode [ 137.111011][ T1391] device bridge_slave_1 left promiscuous mode [ 137.117276][ T1391] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.126400][ T1391] device bridge_slave_0 left promiscuous mode [ 137.132761][ T1391] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.198815][ T1391] device veth1_macvtap left promiscuous mode [ 137.225253][ T1391] device veth0_vlan left promiscuous mode [ 137.363487][ T3871] device sit0 entered promiscuous mode [ 137.607664][ T3886] device syzkaller0 entered promiscuous mode [ 137.619040][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.636742][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.652942][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.663620][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.685446][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.692517][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.699980][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.708252][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.716437][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.723470][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.730838][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.742798][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.750920][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.769691][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.777813][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.822834][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 137.838079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 137.851194][ T3849] device veth0_vlan entered promiscuous mode [ 137.867119][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 137.875262][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.888173][ T3849] device veth1_macvtap entered promiscuous mode [ 137.935609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 137.943856][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.952446][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 137.961380][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 137.969765][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 138.082010][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 138.094905][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.105975][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.148422][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 139.449657][ T3927] tap0: tun_chr_ioctl cmd 1074025677 [ 139.476553][ T3927] tap0: linktype set to 769 [ 139.857743][ T30] audit: type=1400 audit(1748139197.779:151): avc: denied { attach_queue } for pid=3942 comm="syz.2.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 139.938680][ T1391] device bridge_slave_1 left promiscuous mode [ 139.949097][ T1391] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.995221][ T1391] device bridge_slave_0 left promiscuous mode [ 140.038826][ T1391] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.086512][ T1391] device veth1_macvtap left promiscuous mode [ 140.094033][ T1391] device veth0_vlan left promiscuous mode [ 140.447879][ T3937] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.455575][ T3937] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.467550][ T3937] device bridge_slave_0 entered promiscuous mode [ 140.525379][ T3937] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.532689][ T3937] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.540639][ T3937] device bridge_slave_1 entered promiscuous mode [ 140.906518][ T3986] device syzkaller0 entered promiscuous mode [ 141.095423][ T3996] device syzkaller0 entered promiscuous mode [ 141.171609][ T4003] bond_slave_1: mtu less than device minimum [ 141.201397][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 141.223953][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.241215][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 141.249786][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.257966][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.265023][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.340340][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 141.358088][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 141.373919][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.387799][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.394872][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.415644][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.451054][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.477391][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.518525][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.533210][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.547059][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.599258][ T3937] device veth0_vlan entered promiscuous mode [ 141.675281][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.790394][ T4037] device syzkaller0 entered promiscuous mode [ 141.814228][ T3937] device veth1_macvtap entered promiscuous mode [ 141.954134][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 141.979358][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 142.030588][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 142.071251][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.049825][ T1391] device bridge_slave_1 left promiscuous mode [ 143.056024][ T1391] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.063502][ T1391] device bridge_slave_0 left promiscuous mode [ 143.070694][ T1391] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.078722][ T1391] device veth1_macvtap left promiscuous mode [ 143.084720][ T1391] device veth0_vlan left promiscuous mode [ 143.222810][ T4057] device wg2 left promiscuous mode [ 143.513513][ T4057] device wg2 entered promiscuous mode [ 143.796803][ T4067] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.803901][ T4067] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.811445][ T4067] device bridge_slave_0 entered promiscuous mode [ 143.880187][ T4067] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.887278][ T4067] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.963619][ T4067] device bridge_slave_1 entered promiscuous mode [ 144.579575][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 144.587242][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.598745][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 144.607875][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.616604][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.623687][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.631988][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 144.640438][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.648944][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.656003][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.663649][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 144.683450][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.713525][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.805837][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 144.861991][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.887549][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.895570][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.904156][ T4067] device veth0_vlan entered promiscuous mode [ 145.161221][ T4067] device veth1_macvtap entered promiscuous mode [ 145.182277][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 145.193303][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 145.202383][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 145.359711][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 145.389273][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 145.519203][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 145.549100][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 145.596722][ T4139] device pim6reg1 entered promiscuous mode [ 147.459403][ T8] device bridge_slave_1 left promiscuous mode [ 147.472835][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.482469][ T8] device bridge_slave_0 left promiscuous mode [ 147.494970][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.503948][ T8] device veth1_macvtap left promiscuous mode [ 147.510124][ T8] device veth0_vlan left promiscuous mode [ 147.623090][ T4165] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.630219][ T4165] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.642044][ T4165] device bridge_slave_0 entered promiscuous mode [ 147.709080][ T4165] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.721266][ T4165] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.744202][ T4165] device bridge_slave_1 entered promiscuous mode [ 147.857194][ T4203] device sit0 left promiscuous mode [ 148.214121][ T4165] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.221235][ T4165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.228554][ T4165] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.235605][ T4165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.383592][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.392200][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.558307][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.569067][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.618184][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.630626][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.648817][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.655876][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.666255][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.682705][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.691352][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.698395][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.749733][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.760014][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.768084][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.790529][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.834631][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 148.846870][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 148.870578][ T4165] device veth0_vlan entered promiscuous mode [ 148.927744][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 148.938517][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.947151][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.954849][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.965657][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 148.973935][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.984037][ T4165] device veth1_macvtap entered promiscuous mode [ 148.994332][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 149.002301][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 149.012028][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 149.022553][ T4262] device pim6reg1 entered promiscuous mode [ 149.108792][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 149.139117][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 150.753660][ T8] device bridge_slave_1 left promiscuous mode [ 150.770687][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.811727][ T8] device bridge_slave_0 left promiscuous mode [ 150.823961][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.837487][ T8] device veth1_macvtap left promiscuous mode [ 150.850373][ T8] device veth0_vlan left promiscuous mode [ 151.364543][ T4310] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.384686][ T4310] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.409340][ T4310] device bridge_slave_0 entered promiscuous mode [ 151.436545][ T4310] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.478646][ T4310] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.489745][ T4310] device bridge_slave_1 entered promiscuous mode [ 151.899531][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.926549][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.936073][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.944718][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.953290][ T1391] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.960341][ T1391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.968148][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 152.120567][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 152.202816][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.248876][ T1391] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.255948][ T1391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.263419][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.271384][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.365604][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 152.426483][ T4310] device veth0_vlan entered promiscuous mode [ 152.450935][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.479705][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.539079][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.693094][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 152.702485][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.731523][ T4310] device veth1_macvtap entered promiscuous mode [ 152.888955][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 152.909569][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 152.931426][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 153.005674][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 153.039945][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 153.173943][ T4362] device pim6reg1 entered promiscuous mode [ 154.459806][ T8] device bridge_slave_1 left promiscuous mode [ 154.465941][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.473471][ T8] device bridge_slave_0 left promiscuous mode [ 154.479626][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.487532][ T8] device veth1_macvtap left promiscuous mode [ 154.493587][ T8] device veth0_vlan left promiscuous mode [ 154.649971][ T4378] device pim6reg1 entered promiscuous mode [ 154.781386][ T4384] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.788524][ T4384] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.796082][ T4384] device bridge_slave_0 entered promiscuous mode [ 154.804976][ T4384] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.840394][ T4384] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.847833][ T4384] device bridge_slave_1 entered promiscuous mode [ 154.861297][ T4393] device veth0_vlan left promiscuous mode [ 154.895794][ T4393] device veth0_vlan entered promiscuous mode [ 154.926445][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.952162][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.979349][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.068141][ T4384] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.075267][ T4384] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.082586][ T4384] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.089732][ T4384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.157997][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.185584][ T1391] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.245607][ T1391] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.387163][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.416022][ T1391] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.423108][ T1391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.491750][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.523512][ T1391] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.530593][ T1391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.539097][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.600237][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.623784][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.669097][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.690493][ T4384] device veth0_vlan entered promiscuous mode [ 155.705382][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.719004][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.740817][ T4384] device veth1_macvtap entered promiscuous mode [ 155.751161][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 155.769332][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.788927][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.809289][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.820498][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.829404][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.837662][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 158.827145][ T4452] device syzkaller0 entered promiscuous mode [ 158.891265][ T8] device bridge_slave_1 left promiscuous mode [ 158.898818][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.929070][ T8] device bridge_slave_0 left promiscuous mode [ 158.935215][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.943700][ T8] device veth1_macvtap left promiscuous mode [ 158.949760][ T8] device veth0_vlan left promiscuous mode [ 159.062947][ T4465] device veth0_vlan left promiscuous mode [ 159.092178][ T4465] device veth0_vlan entered promiscuous mode [ 159.110343][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.121130][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.129896][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.162406][ T4456] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.170190][ T4456] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.177710][ T4456] device bridge_slave_0 entered promiscuous mode [ 159.189282][ T4456] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.196413][ T4456] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.204341][ T4456] device bridge_slave_1 entered promiscuous mode [ 159.466055][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 159.475209][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.519876][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 159.547882][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.612151][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.619245][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.699296][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 159.707718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.715953][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.722998][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.730689][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.789328][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.797608][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.805704][ T4486] device macsec0 entered promiscuous mode [ 159.842464][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.855091][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.935784][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 159.954606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 160.041587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 160.049862][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.164744][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.192429][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 160.218222][ T4456] device veth0_vlan entered promiscuous mode [ 160.384607][ T4456] device veth1_macvtap entered promiscuous mode [ 160.391896][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 160.400646][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 160.408935][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 160.447434][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 160.474220][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.052687][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.062590][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 162.722586][ T4527] syz.2.1175[4527] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.859962][ T8] device bridge_slave_1 left promiscuous mode [ 162.931874][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.953614][ T8] device bridge_slave_0 left promiscuous mode [ 162.959938][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.011247][ T8] device veth1_macvtap left promiscuous mode [ 163.026694][ T8] device veth0_vlan left promiscuous mode [ 163.253059][ T4533] device wg2 left promiscuous mode [ 163.377407][ T4532] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.384608][ T4532] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.392214][ T4532] device bridge_slave_0 entered promiscuous mode [ 163.399447][ T4532] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.406493][ T4532] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.414230][ T4532] device bridge_slave_1 entered promiscuous mode [ 163.610502][ T4540] device veth0_vlan left promiscuous mode [ 163.633704][ T4540] device veth0_vlan entered promiscuous mode [ 163.710752][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.739462][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.791858][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.049452][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.078091][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.110636][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.131353][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.230207][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.237287][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.260713][ T4557] syz.2.1183 uses obsolete (PF_INET,SOCK_PACKET) [ 164.291900][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.478761][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.487111][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.529262][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.536344][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.650019][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.713939][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.763036][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.779945][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.797548][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.922718][ T4532] device veth0_vlan entered promiscuous mode [ 164.979320][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 165.000283][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.021458][ T4532] device veth1_macvtap entered promiscuous mode [ 165.112850][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.121288][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.129012][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 165.137307][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.145764][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 165.167264][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.175631][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.193925][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.208997][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.324290][ T4578] device veth0_vlan left promiscuous mode [ 165.369699][ T4578] device veth0_vlan entered promiscuous mode [ 165.950438][ T302] device bridge_slave_1 left promiscuous mode [ 165.956616][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.979493][ T302] device bridge_slave_0 left promiscuous mode [ 165.985654][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.009667][ T302] device veth1_macvtap left promiscuous mode [ 166.015698][ T302] device veth0_vlan left promiscuous mode [ 167.245139][ T4616] device macsec0 entered promiscuous mode [ 167.435532][ T4610] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.442702][ T4610] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.450411][ T4610] device bridge_slave_0 entered promiscuous mode [ 167.488664][ T4610] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.495701][ T4610] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.519138][ T4610] device bridge_slave_1 entered promiscuous mode [ 167.824793][ T4610] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.831964][ T4610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.839317][ T4610] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.846341][ T4610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.871593][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.880946][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.888300][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.907320][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.922434][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.929504][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.953691][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.979065][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.986104][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.040864][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.055527][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.072664][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.087738][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.106044][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 168.136347][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 168.163598][ T4610] device veth0_vlan entered promiscuous mode [ 168.181198][ T4626] device sit0 left promiscuous mode [ 168.404246][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 168.413788][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.422222][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.429726][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.457649][ T4610] device veth1_macvtap entered promiscuous mode [ 168.476555][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 168.485924][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 168.499024][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 168.523465][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 168.538969][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 168.576420][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 168.616595][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 168.652904][ T4636] device wg2 entered promiscuous mode [ 169.090423][ T4645] device syzkaller0 entered promiscuous mode [ 170.181173][ T302] device bridge_slave_1 left promiscuous mode [ 170.187272][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.194770][ T302] device bridge_slave_0 left promiscuous mode [ 170.200932][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.208765][ T302] device veth1_macvtap left promiscuous mode [ 170.214806][ T302] device veth0_vlan left promiscuous mode [ 172.262596][ T4678] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.292158][ T4678] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.319144][ T4678] device bridge_slave_0 entered promiscuous mode [ 172.329921][ T4678] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.357687][ T4678] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.373454][ T4678] device bridge_slave_1 entered promiscuous mode [ 173.006952][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 173.101261][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.200347][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.275398][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.289346][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.297013][ T101] udevd[101]: worker [3952] terminated by signal 33 (Unknown signal 33) [ 173.304297][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.312694][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.331086][ T101] udevd[101]: worker [3952] failed while handling '/devices/virtual/block/loop1' [ 173.367648][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.377716][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.386988][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.394053][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.409876][ T4729] device veth0_vlan left promiscuous mode [ 173.440625][ T4729] device veth0_vlan entered promiscuous mode [ 173.470592][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.478963][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.487320][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 173.495032][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 173.519581][ T4678] device veth0_vlan entered promiscuous mode [ 173.533585][ T4678] device veth1_macvtap entered promiscuous mode [ 173.616913][ T4726] device syzkaller0 entered promiscuous mode [ 173.630051][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.648383][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 173.699052][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 173.726932][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 173.735636][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.744525][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.759140][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.767203][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.777103][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 173.786859][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 173.838443][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 173.849459][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 173.895835][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 173.904335][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 175.539442][ T1391] device bridge_slave_1 left promiscuous mode [ 175.545659][ T1391] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.553064][ T1391] device bridge_slave_0 left promiscuous mode [ 175.559291][ T1391] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.566966][ T1391] device veth1_macvtap left promiscuous mode [ 175.573001][ T1391] device veth0_vlan left promiscuous mode [ 175.892627][ T4761] device sit0 left promiscuous mode [ 176.172351][ T4769] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.221284][ T4769] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.233951][ T4769] device bridge_slave_0 entered promiscuous mode [ 176.280545][ T4769] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.287686][ T4769] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.379103][ T4769] device bridge_slave_1 entered promiscuous mode [ 176.694509][ T4769] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.701593][ T4769] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.708900][ T4769] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.715925][ T4769] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.014640][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.026445][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.078874][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 177.098788][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.118803][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.127305][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.146100][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.153297][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.187792][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.210328][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.226127][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.233209][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.360198][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 177.371815][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.388883][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.397159][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.441774][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 177.466132][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 177.545605][ T4769] device veth0_vlan entered promiscuous mode [ 177.552218][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 177.560568][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.576454][ T4769] device veth1_macvtap entered promiscuous mode [ 177.583432][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.592027][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.636093][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 177.664923][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.674641][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 177.717862][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.726474][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.787374][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.818432][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 179.019510][ T1391] device bridge_slave_1 left promiscuous mode [ 179.025627][ T1391] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.033251][ T1391] device bridge_slave_0 left promiscuous mode [ 179.039414][ T1391] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.047253][ T1391] device veth1_macvtap left promiscuous mode [ 179.053302][ T1391] device veth0_vlan left promiscuous mode [ 180.883429][ T4852] device veth0_vlan left promiscuous mode [ 180.891127][ T4852] device veth0_vlan entered promiscuous mode [ 181.335452][ T4857] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.359099][ T4857] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.366399][ T4857] device bridge_slave_0 entered promiscuous mode [ 181.482205][ T4857] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.489909][ T4857] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.497434][ T4857] device bridge_slave_1 entered promiscuous mode [ 182.084606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.114367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.158811][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.172345][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.181804][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.188860][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.201622][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.256763][ T4885] device syzkaller0 entered promiscuous mode [ 182.264674][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.277765][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.287689][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.294766][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.371785][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.382084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.402615][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.410878][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.427448][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 182.437031][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.451028][ T4857] device veth0_vlan entered promiscuous mode [ 182.492034][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.500329][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.507938][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.522764][ T4857] device veth1_macvtap entered promiscuous mode [ 182.576825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 182.592392][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 182.601041][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 182.698893][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 182.730891][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 184.079374][ T332] device bridge_slave_1 left promiscuous mode [ 184.085548][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.093084][ T332] device bridge_slave_0 left promiscuous mode [ 184.099273][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.107262][ T332] device veth1_macvtap left promiscuous mode [ 184.113344][ T332] device veth0_vlan left promiscuous mode [ 185.291643][ T4919] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.318970][ T4919] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.343580][ T4919] device bridge_slave_0 entered promiscuous mode [ 185.397401][ T4919] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.513955][ T4919] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.539149][ T4919] device bridge_slave_1 entered promiscuous mode [ 186.004377][ T4919] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.011471][ T4919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.018754][ T4919] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.025774][ T4919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.129996][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.140802][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.262979][ T4974] device syzkaller0 entered promiscuous mode [ 186.463892][ T4982] syz.3.1301[4982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.463967][ T4982] syz.3.1301[4982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.464582][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.511501][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.529944][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.548472][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.557041][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.564101][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.584134][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.595553][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.608819][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.615876][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.797171][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.816331][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.839464][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.862337][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.909986][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 186.934473][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.331044][ T4919] device veth0_vlan entered promiscuous mode [ 188.350813][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 188.360295][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.383576][ T4919] device veth1_macvtap entered promiscuous mode [ 188.393903][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.402716][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.421003][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 188.451006][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 188.479050][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 188.504505][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 188.529199][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 188.565786][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 188.576156][ T1391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 190.499621][ T8] device bridge_slave_1 left promiscuous mode [ 190.505728][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.513237][ T8] device bridge_slave_0 left promiscuous mode [ 190.519414][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.527279][ T8] device veth1_macvtap left promiscuous mode [ 190.533306][ T8] device veth0_vlan left promiscuous mode [ 191.035119][ T5046] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.042339][ T5046] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.049829][ T5046] device bridge_slave_0 entered promiscuous mode [ 191.056903][ T5046] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.064158][ T5046] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.071705][ T5046] device bridge_slave_1 entered promiscuous mode [ 191.413789][ T5060] device sit0 entered promiscuous mode [ 191.553334][ T5046] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.560404][ T5046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.567676][ T5046] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.574729][ T5046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.598330][ T5070] syz.0.1315[5070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.598391][ T5070] syz.0.1315[5070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.674360][ T5065] tun0: tun_chr_ioctl cmd 1074812117 [ 191.736276][ T5066] device macsec0 left promiscuous mode [ 191.879926][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.902141][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.995743][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.004714][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.058126][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.066755][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.075157][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.082265][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.093461][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.101914][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.112144][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.119178][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.266164][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.274355][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.322191][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.330489][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.365764][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 192.374402][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 192.390962][ T5046] device veth0_vlan entered promiscuous mode [ 192.401301][ T30] audit: type=1400 audit(1748139250.329:152): avc: denied { read write } for pid=5080 comm="syz.0.1330" name="cgroup.subtree_control" dev="cgroup2" ino=354 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 192.436756][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 192.549491][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.583933][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.591500][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.599183][ T30] audit: type=1400 audit(1748139250.329:153): avc: denied { open } for pid=5080 comm="syz.0.1330" path="" dev="cgroup2" ino=354 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 192.667858][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 192.708887][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 192.726513][ T5089] device sit0 left promiscuous mode [ 192.764032][ T5046] device veth1_macvtap entered promiscuous mode [ 192.835893][ T5092] device sit0 entered promiscuous mode [ 193.105021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 193.122878][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 193.169021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 193.219033][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 193.268763][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=835 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 193.564435][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 193.584850][ T30] audit: type=1400 audit(1748139251.509:154): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14501]" dev="pipefs" ino=14501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 193.899236][ T282] syz-executor (282) used greatest stack depth: 20960 bytes left [ 194.810940][ T302] GPL: port 1(erspan0) entered disabled state [ 194.819584][ T302] device erspan0 left promiscuous mode [ 194.825038][ T302] GPL: port 1(erspan0) entered disabled state [ 195.179431][ T302] device bridge_slave_1 left promiscuous mode [ 195.185665][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.193283][ T302] device bridge_slave_0 left promiscuous mode [ 195.199394][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.207200][ T302] device bridge_slave_1 left promiscuous mode [ 195.213350][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.220703][ T302] device bridge_slave_0 left promiscuous mode [ 195.226820][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.235160][ T302] device bridge_slave_1 left promiscuous mode [ 195.241277][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.248780][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.256574][ T302] device bridge_slave_1 left promiscuous mode [ 195.262786][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.270244][ T302] device bridge_slave_0 left promiscuous mode [ 195.276331][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.285053][ T302] device veth1_macvtap left promiscuous mode [ 195.291076][ T302] device veth0_vlan left promiscuous mode [ 195.297102][ T302] device veth0_vlan left promiscuous mode [ 195.303129][ T302] device veth0_vlan left promiscuous mode [ 195.309210][ T302] device veth1_macvtap left promiscuous mode [ 195.315220][ T302] device veth0_vlan left promiscuous mode [ 196.599874][ T30] audit: type=1400 audit(1748139254.529:155): avc: denied { read } for pid=5116 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 194) OK Stopping crond: stopped /usr/sbin/crond (pid 185) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 139) [ 196.857860][ T30] audit: type=1400 audit(1748139254.779:156): avc: denied { search } for pid=5128 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 196.959128][ T30] audit: type=1400 audit(1748139254.889:157): avc: denied { write } for pid=140 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=482 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 196.993362][ T30] audit: type=1400 audit(1748139254.889:158): avc: denied { remove_name } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping iptable[ 197.015746][ T30] audit: type=1400 audit(1748139254.889:159): avc: denied { unlink } for pid=140 comm="dhcpcd" name="sock" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 s: [ 197.039080][ T30] audit: type=1400 audit(1748139254.909:160): avc: denied { unlink } for pid=140 comm="dhcpcd" name="pid" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK[ 197.060890][ T30] audit: type=1400 audit(1748139254.949:161): avc: denied { search } for pid=5142 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping system message bus: done [ 197.210371][ T302] device erspan0 left promiscuous mode [ 197.215868][ T302] syzkaller: port 1(erspan0) entered disabled state killall: udevd: no process killed Stopping klogd: OK Stopping acpid: [ 197.419978][ T302] device bridge_slave_1 left promiscuous mode [ 197.426096][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.433535][ T302] device bridge_slave_0 left promiscuous mode [ 197.439656][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.447600][ T302] device veth1_macvtap left promiscuous mode [ 197.453657][ T302] device veth0_vlan left promiscuous mode OK Stopping syslogd: stopped /sbin/syslogd (pid 83) OK umount: devtmpfs busy - remounted read-only [ 198.604137][ T5162] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. The system is going down NOW! Sent SIGKILL to all processes Requesting system poweroff [ 200.681407][ T5163] kvm: exiting hardware virtualization [ 200.687658][ T5163] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 200.694349][ T5163] ACPI: PM: Preparing to enter system sleep state S5 [ 200.701275][ T5163] reboot: Power down serialport: VM disconnected.