last executing test programs: 9.769958761s ago: executing program 0 (id=2716): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x10005, r1}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x157, 0x0, 0xfff, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x75}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[], 0x48) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r6) 9.709607531s ago: executing program 0 (id=2717): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x6, 0x40, 0x40, 0x41}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f00000008c0), 0x1003, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x2, [@volatile={0x3}, @func={0xb, 0x0, 0x0, 0xc, 0x2}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x23, 0x7}, @enum64={0x7, 0x2, 0x0, 0x13, 0x1, 0xc, [{0x6, 0x0, 0x8000000}, {0x5, 0x7ff, 0x3}]}]}}, &(0x7f0000000380)=""/81, 0x66, 0x51, 0x0, 0x1, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r3], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, r4}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r5}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100"], 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 9.296237225s ago: executing program 0 (id=2725): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7040000000000007b8af8ff000000f0bea200071d0007ffffb72d7a3a24a7c803000008000000b7000000000000000000000000050000060d8aeb2431cf8d576c20194121fa2d05432c085eb5611a7b090f76feaba7d76b75a1a36683df56b432a4ba252264c04ed94d7410149a31bdccff5f50d58c729b43ec80802500ed15faee9775090a13e2804fdda4b44606008aa3d3000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2309, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="11146ec698ee71c10000010000000100000000d6", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value=0x1000000}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {}]}) (rerun: 64) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8940, &(0x7f0000000080)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000079ae645fbf24a679000000ee0000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0xae, 0x0, 0x0, 0x10, &(0x7f0000000340), 0x0, 0x0, 0x95, 0x8, 0x0, 0x0}}, 0x10) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) close(r2) 9.071404136s ago: executing program 0 (id=2741): bpf$MAP_CREATE(0x300000000000000, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="024000000500"/28], 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400006d3b3caf0af44fb6d9093500064e75929300", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0xffffffffffffffff], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYRES8=r0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000000000000400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0xa8, 0x0, 0x0, 0x1, 0x480283, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x8}, 0x7606, 0x3ff, 0x80000000, 0x3, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x3, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="18500000ae5203ba000000000000000095"], &(0x7f0000000b40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0x10, 0x0, &(0x7f0000000080)="5aee41dea43e63a3f7fb7f1100000000", 0x0, 0xf004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="120000000800000004000000b47c000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200000000f7ff00"/28], 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0}, 0x94) 8.167014343s ago: executing program 3 (id=2736): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000003d00000095000000000000002db3d6333a029190a259c7f1b74b101701a8e25f27ac52709a9d6f432c458f56791e80ce4b0933e6c440cdd15733945207e93b098c2f1618832e6dec2a84b6e99e82facf6290c1b122a988"], &(0x7f00000000c0)='GPL\x00', 0x1, 0x98, &(0x7f00000001c0)=""/152}, 0x94) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x9}, 0x8080, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00K\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) sendmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x18}, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000080000085000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='..\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000000)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r5, 0x2000012, 0x0, 0x0, 0x0, 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x50) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000400003d0000000000000006800a0000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r6, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r7, 0x0, 0x0}, 0x20) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) 8.116531743s ago: executing program 1 (id=2737): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x6, 0x40, 0x40, 0x41}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f00000008c0), 0x1003, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x2, [@volatile={0x3}, @func={0xb, 0x0, 0x0, 0xc, 0x2}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x23, 0x7}, @enum64={0x7, 0x2, 0x0, 0x13, 0x1, 0xc, [{0x6, 0x0, 0x8000000}, {0x5, 0x7ff, 0x3}]}]}}, &(0x7f0000000380)=""/81, 0x66, 0x51, 0x0, 0x1, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r3], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, r4}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r5}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100"], 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 7.689128286s ago: executing program 1 (id=2739): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)=ANY=[], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r2, 0x0, 0x8b, 0x1000, &(0x7f0000000680)="6d883f36816c43f8e7aacecc2c62aae650838abe6f5bbf517f108ecdd7e88c1102b556a8acf6006fcdb9f791147d42ab2f5f8c65633ddc80fe67512b561e9cb139b613b0ddf41dc234e8b6a190425bff21b5047e99b9ad6d03c6c9cafa4be727762f3f793eb179bb7c422100ad52ab1fa227413d647e8091c8a86f5522f67efd41c7a6e692fb39819c66ac", &(0x7f0000000a00)=""/4096, 0x9, 0x0, 0x5e, 0x48, &(0x7f0000000180)="fdba3fbc69d2dafbc4d0a7d8cecde02d18a5b05e2202c393249dbdbee3f068dd09cce7320ab5959773651337748dc066108f8e3edd8c476bfe631a101248f0f8ed1a135345b29968c82fb6b237008864b35abadbf4bd68efacca89f684cb", &(0x7f0000000380)="dbfa051923758eac940c5c81bb6f5f4a634942a5e80367822045ae813355bb389f031a73b121d247287b1c5c4c543856f3b0665c0e8b106291dc7885454755fe52643f4aba0644d9", 0x7, 0x0, 0x1}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x18, 0x4, 0x6, 0x55, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x18) r6 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r6, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101400, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r7}, 0x18) 7.234849959s ago: executing program 0 (id=2742): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1e00000005000000030000000400000080", @ANYRES32, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="190000000400000004000000020000", @ANYRES32=0x1, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="c100008c51cf0600000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x2000000000000016, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r7, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 7.226121069s ago: executing program 3 (id=2743): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x709}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x6, 0x40, 0x40, 0x41}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000a40), &(0x7f00000008c0), 0x1003, r2}, 0x38) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x2, [@volatile={0x3}, @func={0xb, 0x0, 0x0, 0xc, 0x2}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x23, 0x7}, @enum64={0x7, 0x2, 0x0, 0x13, 0x1, 0xc, [{0x6, 0x0, 0x8000000}, {0x5, 0x7ff, 0x3}]}]}}, &(0x7f0000000380)=""/81, 0x66, 0x51, 0x0, 0x1, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r3], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, r4}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r5}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100"], 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000280)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 7.10356005s ago: executing program 4 (id=2744): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00K\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000ffff000000007200ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r2}, 0x10) r3 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, r3, 0x4, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 6.631053623s ago: executing program 3 (id=2745): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0400000004000000040000000000010008080000", @ANYRES32, @ANYBLOB="000000000008c2789e54da000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffff"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r2, &(0x7f0000000000), 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x1d, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x2, [@type_tag={0x7, 0x0, 0x0, 0x12, 0x4}, @struct={0x6, 0x6, 0x0, 0x4, 0x1, 0x1, [{0x3, 0x2, 0x7f}, {0xe, 0x5, 0x6}, {0x7, 0x4, 0x2}, {0x0, 0x3, 0x4}, {0x8, 0x1}, {0x2, 0x0, 0xd9}]}, @fwd={0xd}]}}, &(0x7f0000001d40)=""/4096, 0x86, 0x1000, 0x0, 0x48}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) 5.557795061s ago: executing program 3 (id=2746): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea048500000050000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x40f00}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x9e, &(0x7f0000000980)=""/158, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x3, 0x1, 0x7}], 0x10, 0x10001}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x20a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r3, 0x58, &(0x7f0000000480)}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xc, [@enum64={0x1, 0x1, 0x0, 0x13, 0x1, 0xc, [{0xd, 0xb288, 0x80000000}]}, @func={0x3, 0x0, 0x0, 0xc, 0x4}, @struct={0x8, 0x1, 0x0, 0x4, 0x1, 0x4, [{0x7, 0x4, 0xa230}]}]}, {0x0, [0x5f, 0x6f, 0x30, 0x30, 0x0, 0x0, 0x30, 0x30, 0x5f, 0x0]}}, &(0x7f00000007c0)=""/71, 0x60, 0x47, 0x1, 0xf9d8}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xf89, '\x00', 0x0, r6, 0x0, 0x3, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x300, 0xed}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @tracing, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0xed}, 0x92f5e}, 0x6d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) 4.745298637s ago: executing program 3 (id=2748): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) write$cgroup_devices(r0, 0x0, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x5, 0x3, &(0x7f0000000b40)=ANY=[@ANYRES16=r0], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x1, '\x00', 0x0, @fallback=0x37, r0, 0x8, &(0x7f0000000000)={0xfffffffe}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffd}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x3a, 0x0, &(0x7f0000000440)="e460cdfbef2408002900119386dd6a00000000072feb3014cd3ec8a755c1e1380081ffad000400e8d50000000100000bb500000500242c108906", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r2, 0x0, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000090000000000000040000000850000002c000000850000000800000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1, 0xfffffffc}, 0x50) close(0x3) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000100000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bca2000000000000a6020000f8ffffffb703000018000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000ac0)={{r5}, &(0x7f0000000a40), &(0x7f0000000a80)=r6}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x27, 0xe, 0x0, &(0x7f0000000480)="0300f977ea0e00c00c00004256fd", 0x0, 0x25, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700100000000000ff000020850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r0, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000480)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0], 0x0, 0x51, &(0x7f0000000580)=[{}], 0x8, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000b80)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000c1a84a59da2b0262fa90af44664c3e2015a8efad679364082a86bfd26b946f34cde93cebb93edbe39fe2aa366504d653cc10324506d0f0df9b06c0298f7324847becf58ab4dc1fe37c8d3fe4fed5ca286cd742ed0e5d3c28d73bd9da6e7f64f87846696a07f3998f04c5950659e74bca6b228ccaaff63e7df687a9a0d3b306b411033d421c71e3ac9a9bdd660cdb6e47abeca2b4a01ad93be92487ee76b2dfde652c22851aee7fb61c"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r8, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r9}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@cgroup=r2, 0xf, 0x1, 0x8, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300)={0x1b, 0x0}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000c80)=ANY=[@ANYRES32=r2, @ANYRES32=r7, @ANYBLOB='0\x00\x00\x005\x00\x00\x00', @ANYRES32=r9, @ANYBLOB="a8be5a32498206a3ec5437708cdd0ffc8f043b497eaf19bc3d0739073bb034d0402fb1accc0bf88069664e8c361d77c8b2741d3bd99915e7f93489514e07d77df0ba7842751c57d97d7e9c0a437b85c59f0282a3f42e5f468b47012dfa592ec17f1de20020e39956fda9f6da647b8798f4cb8ad0d93a9d82b80e66c640db25515667", @ANYRES32=r11, @ANYRES64=r10], 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfa, 0x3, 0x0, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0xffff}, 0x0, 0xc8, 0x1, 0x0, 0x0, 0x400}, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r7, 0x0, 0x5c0c}, 0x18) r12 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4}, 0x40db, 0x0, 0x4, 0x8, 0xa, 0x100, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x40082406, &(0x7f0000000040)='cpu==0~|!?q\xf7\n[\xb6\x10\xe4\xd5\x1aP.\x13\x8fE`\x19\xe5v\xd6\x9f\x14_\x00\x00\xca\xd3>\x82\x818\x8c\x89\xae>\x03\xbbM{+\x89\x84=\xd2zaSDU\xfbBR:\n$\x8fR\xbd\x12\xdcFJ\xb0\xbc[\x03/\x1c\x9a\x005\x8f\xd2\xbf\xfe\x1a\r\x1c\x8bL\xd3$\xca\xa4\xb6\xddjT\xf1\x97\xf8\x16\xf0\xd6M\xd2\xe1\xfeC\xca\x9b\xf2\xdd6\xae\x17h\x12P\v\xaa\xa7\x01\xf0w\xcf\xf2c \x98\x99\x88i\x05m\xe4\r\xbd\x0ex\xc4l\x84\xcd~\xdf\xe3\x925\xec\xf0\xa5\xaeR2y\bY\xdf\xa1Z\x1cg\x9b\xc1\x8c\xee.\x8d\t/\xb5\x8e=J\n\xa1\xe1q\xd3\x1dY\xe2\x13\xc6\xdc\xbbH\xb59=!.\xa6\n\xe5\xcf\xeb\xdc)}\xd8\xcd\x98\x04\xe0c\x02\b\xa5\v\xcfk\xee;\xb7U\x89\x1b\x00\b\tZ\x98\xc8\xec\xec$kml\x83N\xf2\xfa\x9aM\xec\x00G}\xdaw+?\xe2\xd8\xe5r\xb7Y\xa7\xf7\x8e\r\xee\xc2\xc4\'\x11\xce\xd0l)\x95\xbc\xc7\xf2i\xfa\xa1\xb4\xa5nw&\xfc\'\xc4\xf1\xc1G\xbd\xdb1<\xf6\xac\xdf\x8eZC>\x00'/302) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r13, 0x89a1, &(0x7f0000000900)={'ip6erspan0\x00'}) 4.625541988s ago: executing program 3 (id=2750): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x15, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x4000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x800000}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 64) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, 0x0, &(0x7f0000000580)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x5, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x8001, 0x0, r3}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000, r4}, 0x38) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) (async, rerun: 64) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r5) (async, rerun: 64) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xdd, 0xa}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x48, &(0x7f0000000480)=ANY=[@ANYBLOB="180200009b1aecb600000000000000008d0000007500000095"], 0x0}, 0x94) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4.35900021s ago: executing program 2 (id=2752): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xf, 0x0, 0x0, 0x0, 0x0, 0xb08e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) close(0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000069000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2], 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000700)='blkio.throttle.io_service_bytes_recursive\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000050000000200"/23, @ANYRES32=r6, @ANYBLOB="150f9ad85d8a17f8106687eef662615b643a8f701cf9428cfaf16b1644dbb9e026d514d256e01af217848614c89962"], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) recvmsg(r7, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000580)={0x5, 0x80, 0x97, 0xe, 0x3, 0x2c, 0x0, 0x19, 0x0, 0x5, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x19, 0x7f7fffffffffffff}, 0x40, 0x6, 0x2, 0x4, 0x1, 0x4, 0x108, 0x0, 0x3ff, 0x0, 0x7}) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r9, &(0x7f0000000000), 0xfffffd26) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r9) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r8, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 3.998914332s ago: executing program 4 (id=2753): bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0x18, &(0x7f0000000600)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7e2b0f401f2e1279, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x46830, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0xfffffffffffffffd}, 0x100002, 0x0, 0x0, 0x0, 0x4, 0x8000004, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, r2, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000840)=ANY=[@ANYBLOB="85000000080000006600000000000000270000000000007b00000000000000006b5f8e672d2a6ddf323d2be56a29c3c1561e83daad4c1dd029dac7b094a7ead4c5a1633a363184c4cdf623449e70e4f989714eb11db17008272b6cee5dcd55c166bafb3a138fc99f9be87741"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7700000004ccf4910589020075b20300000000000000001d00", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x37) close(r3) r4 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x80000001, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)}], 0x1}, 0x0) 3.023594979s ago: executing program 2 (id=2756): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0400000004000000040000000000010008080000", @ANYRES32, @ANYBLOB="000000000008c2789e54da000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffff"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r2, &(0x7f0000000000), 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x1d, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x2, [@type_tag={0x7, 0x0, 0x0, 0x12, 0x4}, @struct={0x6, 0x6, 0x0, 0x4, 0x1, 0x1, [{0x3, 0x2, 0x7f}, {0xe, 0x5, 0x6}, {0x7, 0x4, 0x2}, {0x0, 0x3, 0x4}, {0x8, 0x1}, {0x2, 0x0, 0xd9}]}, @fwd={0xd}]}}, &(0x7f0000001d40)=""/4096, 0x86, 0x1000, 0x0, 0x48}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) 2.379977964s ago: executing program 2 (id=2757): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000060000000800000001"], 0x48) (async) close(0x3) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001640)={r2, 0xe0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001340)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000001380)=[0x0, 0x0], &(0x7f00000013c0)=[0x0, 0x0], 0x0, 0x4a, &(0x7f0000001400)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000001480), &(0x7f00000014c0), 0x8, 0x17, 0x8, 0x8, &(0x7f0000001500)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001700)={0x18, 0x6, &(0x7f0000001280)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @generic={0x5, 0x1, 0x6, 0x6}, @generic={0x10, 0x3, 0x3, 0x3, 0x3}], &(0x7f00000012c0)='syzkaller\x00', 0x3, 0xd, &(0x7f0000001300)=""/13, 0x40f00, 0x20, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001680)={0x0, 0xf, 0x695, 0x5e8c}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[r3, r3]}, 0x94) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0x63, 0x9, [@datasec={0xf, 0x2, 0x0, 0xf, 0x3, [{0x3, 0x1}, {0x4, 0x1000, 0x1}], "c248fb"}, @const={0x4}, @enum64={0xb, 0x3, 0x0, 0x13, 0x0, 0xe, [{0xa, 0x0, 0x6}, {0x5, 0x8, 0x1ff}, {0x2, 0xa, 0xed2}]}]}, {0x0, [0x61, 0x5f, 0x61, 0x61, 0x61, 0x2e, 0x30]}}, &(0x7f0000001080)=""/140, 0x85, 0x8c, 0x1, 0x9, 0x10000}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000011c0)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000040)=@raw=[@map_idx_val={0x18, 0x9, 0x6, 0x0, 0x10}], &(0x7f00000002c0)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x18, r6, 0x8, &(0x7f00000004c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0x1, 0x4, 0x1ddc}, 0x10, 0x2009a, r1, 0x8, &(0x7f0000000600)=[r4, r3], &(0x7f0000001140)=[{0x0, 0x1, 0x3, 0x8}, {0x1, 0x1, 0xe, 0x9}, {0x5, 0x1, 0x7, 0xb}, {0x4, 0x4, 0xb, 0xc}, {0x3, 0x1, 0x10, 0x1}, {0x5, 0x3, 0x1, 0xa}, {0x1, 0x2, 0x3, 0x2}, {0x5, 0x4, 0x5, 0x9}], 0x10, 0x565}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) 2.036719786s ago: executing program 0 (id=2758): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c00000000000080010000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000100)="b9ff030f6044238cb89e14f089061bff88caffff4000632f77fbac14142ce934a0a662079f4b4d2f87e56dca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x18000000000002a0, 0x204, 0x0, &(0x7f0000000040)="5aee41dea43e63a3f7fb7f11c72b", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 2.035025346s ago: executing program 2 (id=2759): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea048500000050000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x40f00}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x0, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x9e, &(0x7f0000000980)=""/158, 0x40f00, 0x5a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x4, 0x6, 0x8, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000f00)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x3, 0x1, 0x7}], 0x10, 0x10001}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x20a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r3, 0x58, &(0x7f0000000480)}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xc, [@enum64={0x1, 0x1, 0x0, 0x13, 0x1, 0xc, [{0xd, 0xb288, 0x80000000}]}, @func={0x3, 0x0, 0x0, 0xc, 0x4}, @struct={0x8, 0x1, 0x0, 0x4, 0x1, 0x4, [{0x7, 0x4, 0xa230}]}]}, {0x0, [0x5f, 0x6f, 0x30, 0x30, 0x0, 0x0, 0x30, 0x30, 0x5f, 0x0]}}, &(0x7f00000007c0)=""/71, 0x60, 0x47, 0x1, 0xf9d8}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xf89, '\x00', 0x0, r6, 0x0, 0x3, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x300, 0xed}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @tracing, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0xed}, 0x92f5e}, 0x6d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) 2.030346146s ago: executing program 1 (id=2768): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) (async) r1 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={&(0x7f0000000580)=""/149, 0x95, 0x0, &(0x7f0000000640)=""/223, 0xdf}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080), 0x0, 0xcf, &(0x7f0000000180)=[{}, {}, {}], 0xc4, 0x10, &(0x7f00000001c0), &(0x7f0000000280), 0x8, 0x62, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x11, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffa}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000007c0)='GPL\x00', 0x9a, 0xc9, &(0x7f0000000980)=""/201, 0x40f00, 0x8, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x9, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x26cc3, 0xffffffffffffffff, 0x1, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000c00)=[{0x4, 0x1, 0x5, 0x7}], 0x10, 0x78dded39}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x52) (async) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) (async) syz_clone(0x4eb82100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$TUNSETOFFLOAD(r7, 0x8004745a, 0x2000000c) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r8, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000a80)=ANY=[@ANYRESOCT=r2, @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000000180), 0x4) (async) sendmsg$inet(r11, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x20000000) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfe33) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 2.004002806s ago: executing program 1 (id=2760): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0xe, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000004851000000100000095000000000000001800000020646c2500000000002020207b1af8ff00000000bda100000000000007010000f8ffffffb702000008000000b703000000000000850000003400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9b, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xea, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x300, 0xed}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @tracing, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x0, 0x3000000}, 0x92f5e}, 0x6d) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0xfff, '\x00', r3, r4, 0x2}, 0x50) socketpair(0x0, 0x1, 0x0, 0x0) close(0xffffffffffffffff) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r5, 0x8008743f, 0xf0ff1f00000000) 1.41092s ago: executing program 2 (id=2761): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001000000", @ANYRES32], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000001700000040b7080000000000ac268af8ff00000000bfa200000000000007020000f8ffffffb703000008080000b70400000000000085000000030083009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x5802000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb01001800000000000000b2000000b20000000c0000000e0000000000000b05000000000000000200000d000000000d000000020000000100000005000000070000000200000f020000000200000011e5000048ed00000100000005000000490000002a6a0d0000000000000b000000001000000005fa7b93000093040000000b000000001000000300000010000000090000004f4d0000090000000300000009000000100000008000000007000000080000000a000000020000000e003f0000000e030000000000000000000000305f0000"], &(0x7f0000000080)=""/60, 0xd8, 0x3c, 0x0, 0x400, 0x10000}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000489d0000000000000400181100002a68f4c1aa3ab9806b", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={@cgroup, 0x26, 0x1, 0x6, &(0x7f0000000040)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x5452, &(0x7f0000000a00)={'vlan0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0xfc}}) recvmsg$unix(r5, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) close(r4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x1000, 0x0, 0x0, &(0x7f0000001180), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 921.076384ms ago: executing program 1 (id=2762): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x10005, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x157, 0x0, 0xfff, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x1f, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x7}, [@call={0x85, 0x0, 0x0, 0x75}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[], 0x48) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r7) 787.426395ms ago: executing program 1 (id=2763): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r0, 0x0, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x17, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700100000000000ff000020850000006d00000018110000", @ANYRES32=r1, @ANYRES32=r0], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r3}, 0x18) socketpair$unix(0x1, 0x1, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000000, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x7, 0x5, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xd, 0x17, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x80000000}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@call={0x85, 0x0, 0x0, 0x1d}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='syzkaller\x00', 0x8, 0xb6, &(0x7f0000000740)=""/182, 0x41000, 0x20, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x5, 0x10, 0x1, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) sendmsg$tipc(r7, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, 0x0}, 0x0) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) 680.512966ms ago: executing program 2 (id=2764): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r0}, 0x18) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x100, 0x100, 0x6, [@fwd={0x10}, @enum={0x2, 0x3, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0x1, 0xffffffff}, {0x9, 0x5}]}, @union={0x2, 0x1, 0x0, 0x5, 0x1, 0x4, [{0xa, 0x2, 0x100}]}, @enum64={0x4, 0x9, 0x0, 0x13, 0x1, 0xb, [{0xd, 0xfffffffb, 0x10}, {0xa, 0x7, 0x9}, {0xd, 0x81, 0x2}, {0x6, 0x7, 0x4}, {0xc, 0x100, 0x2}, {0xb, 0x0, 0xffffffff}, {0xf, 0x9, 0x6}, {0x1, 0xbb87, 0x1}, {0xd, 0x5, 0x9}]}, @struct={0x5, 0x1, 0x0, 0x4, 0x1, 0x6, [{0x3, 0x1, 0x2}]}, @type_tag={0x4, 0x0, 0x0, 0x12, 0x3}, @enum={0xd, 0x2, 0x0, 0x6, 0x4, [{0x10}, {0x5, 0x6b7a}]}]}, {0x0, [0x30, 0x30, 0x61, 0x61]}}, &(0x7f0000000340)=""/93, 0x11e, 0x5d, 0x0, 0x6, 0x10000}, 0x28) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1b, r2}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r4, 0x58, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="10000000040000000800000007"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xaa) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r9}, &(0x7f00000008c0), &(0x7f0000000900)=r8}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_tracing={0x1a, 0x14, &(0x7f0000000b00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7ff}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xd}, @exit, @map_idx={0x18, 0x6, 0x5, 0x0, 0x9}, @jmp={0x5, 0x0, 0x2, 0x2, 0x4, 0xfffffffffffffffc}, @map_idx={0x18, 0xe, 0x5, 0x0, 0x9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', r7, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x261e1, r3, 0x6, &(0x7f0000000c00)=[r4, r9, r4], &(0x7f0000000c40)=[{0x3, 0x4, 0x0, 0x2}, {0x5, 0x1, 0xe, 0x3}, {0x2, 0x2, 0x4}, {0x5, 0x5, 0x1, 0x2}, {0x2, 0x1, 0xf, 0x5}, {0x0, 0x5, 0x4, 0x6}], 0x10, 0xb68}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x50) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r10) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0x1, 0x0, r4, 0x4, '\x00', 0x0, r0, 0x5}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r11, &(0x7f0000000840)="38c947d919c30f164bd457a5b13737a84f71b4cc7e75d98f775b474cce48565ff2c5d39f0e9bf6531451d1b1d94f3865f0c5790afe2819c77f33bd7b73d9dd21eb14503d45054bb4d1192284d3ef", &(0x7f00000008c0)=""/251}, 0x20) bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r3}, 0x8) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r3, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 578.601µs ago: executing program 4 (id=2765): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0f0000000400000070a7009e5658998c1b677e9d8709fe65c9ea9067152f1796ca7b9b9b9b1ae238e6307df13ca0e8fb6666c0ada481b879e36dc4d1d945cc788f9bfe1f51fcb01e14e5bf7281034d07d2fe258ad8c475482d84eab116a1cc57259414157577e283bff4558ffc8399e00201d95f04de62c5295b2c22a4827572c8881376c7395ef64255963e81c5c30145a4d0a3e646044313c827", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000000)="d3d255edbc2b32d5e1a3d5fc0d18853344a47e01a4cd78106285c45a5a02477ccfb8e59f1c495d3a8c0d67d1c29fa95e18819702dd3221023b4b78fd5059fb690248364e9da24bd8b13f4c"}, 0x20) 0s ago: executing program 4 (id=2766): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="180000000000000000000000150000d9d4d7ed90220a54c6fab47683c9cf032efb27f1e5dbab17b32e2216c3de80cb19e586500ebe3746bb2674ea902e494a3f0c4dc90a25ffe96dcdd45cceddd3b3c88834b57c8c1feb10d1f89235b713be6bdaa91c96899624eb260eeba7e01c3ce4212819c8bfc7d2162c55244bf2481c3f5533d3d679c384a420c6c498e1", @ANYRES32=0xffffffffffffffff, @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r3, @ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=r3, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="01000000000000000300000000000000000000000080000000000000"], 0x50) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) socketpair(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000080000000850000002b000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES8=r2, @ANYBLOB="0000000000000000b703000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r6, 0x0, 0xe, 0x0, &(0x7f0000000100)="c1dfb061cd21d3084d94d35486dd", 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r8 = gettid() syz_open_procfs$namespace(r8, &(0x7f0000000680)='ns/cgroup\x00') (async) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x0, 0x2, 0x4, 0x8, 0x0, 0x10001, 0x10000, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000200)}, 0x2802, 0x2, 0x400, 0x9, 0x50a, 0x10000, 0x1, 0x0, 0x646, 0x0, 0x8a9e}, r8, 0x5, r5, 0x2) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000340)='%d\x00\x00\x00\x00j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x0f\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 E\xaaC\xc388\x13\xc6H\x0f \x03\x86\xb5\xbfq\'\xab!\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdf\xde\x91\xfd\xf1B*j\n\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r11}, 0x10) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') (async) r12 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r12, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.62' (ED25519) to the list of known hosts. [ 18.108747][ T28] audit: type=1400 audit(1762270689.609:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 18.109806][ T275] cgroup: Unknown subsys name 'net' [ 18.111843][ T28] audit: type=1400 audit(1762270689.619:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.115395][ T28] audit: type=1400 audit(1762270689.619:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 18.115514][ T275] cgroup: Unknown subsys name 'devices' [ 18.240984][ T275] cgroup: Unknown subsys name 'hugetlb' [ 18.246573][ T275] cgroup: Unknown subsys name 'rlimit' [ 18.348310][ T28] audit: type=1400 audit(1762270689.849:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 18.371456][ T28] audit: type=1400 audit(1762270689.849:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 18.388493][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 18.396897][ T28] audit: type=1400 audit(1762270689.849:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 18.427792][ T28] audit: type=1400 audit(1762270689.919:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.436154][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 18.453342][ T28] audit: type=1400 audit(1762270689.919:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.487647][ T28] audit: type=1400 audit(1762270689.939:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.513151][ T28] audit: type=1400 audit(1762270689.939:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.352237][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.359337][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.366610][ T284] device bridge_slave_0 entered promiscuous mode [ 19.374878][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.381968][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.389298][ T284] device bridge_slave_1 entered promiscuous mode [ 19.422151][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.429247][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.436609][ T286] device bridge_slave_0 entered promiscuous mode [ 19.459446][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.466485][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.473969][ T286] device bridge_slave_1 entered promiscuous mode [ 19.505640][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.512754][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.520129][ T283] device bridge_slave_0 entered promiscuous mode [ 19.541144][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.548151][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.555680][ T283] device bridge_slave_1 entered promiscuous mode [ 19.577994][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.585563][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.592892][ T285] device bridge_slave_0 entered promiscuous mode [ 19.609933][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.616941][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.624319][ T285] device bridge_slave_1 entered promiscuous mode [ 19.655574][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.662647][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.669962][ T287] device bridge_slave_0 entered promiscuous mode [ 19.676681][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.683736][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.691188][ T287] device bridge_slave_1 entered promiscuous mode [ 19.800231][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.807256][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.814543][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.821566][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.857131][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.864172][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.871430][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.878439][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.896713][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.903954][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.911735][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.919013][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.926789][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 19.934265][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.960862][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.969262][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.976272][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.983673][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 19.991939][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.998965][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.018977][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.027236][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.035146][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.043093][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.051482][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.058478][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.065812][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.073898][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.080910][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.103702][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.112383][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.120299][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.132065][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.151925][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.160204][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.167621][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.177353][ T284] device veth0_vlan entered promiscuous mode [ 20.187967][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.195898][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.203353][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.220304][ T283] device veth0_vlan entered promiscuous mode [ 20.230264][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.237769][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.246102][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.253138][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.260919][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.274355][ T284] device veth1_macvtap entered promiscuous mode [ 20.289399][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.296917][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.304495][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.313017][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.321257][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.329618][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.336648][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.344042][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.352293][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.359324][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.366912][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.378441][ T283] device veth1_macvtap entered promiscuous mode [ 20.385251][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 20.393718][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.402237][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.409302][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.436087][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 20.444712][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.453016][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.460049][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.467625][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.476680][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.484717][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.492771][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.500773][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.508759][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.516739][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.524888][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.532928][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.541169][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.549519][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 20.557905][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.566139][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.573158][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.580600][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.588768][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.597154][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.616433][ T286] device veth0_vlan entered promiscuous mode [ 20.625983][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.634431][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.642787][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.651026][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.659105][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.667239][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.675721][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.683820][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.691867][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.700221][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.708465][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.716553][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.724466][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.732876][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.741269][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.748662][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.764885][ T285] device veth0_vlan entered promiscuous mode [ 20.774519][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 20.775406][ T286] device veth1_macvtap entered promiscuous mode [ 20.788562][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.796595][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.804766][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.813226][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.821420][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.829158][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.836548][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.853687][ T285] device veth1_macvtap entered promiscuous mode [ 20.871438][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.880382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.888559][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.896341][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.904807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.913202][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.921501][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.938580][ T287] device veth0_vlan entered promiscuous mode [ 20.976999][ T336] device syzkaller0 entered promiscuous mode [ 20.984181][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.004215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.012689][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.029880][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.037956][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.049142][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.058245][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.066902][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.094703][ C1] hrtimer: interrupt took 13372 ns [ 21.109668][ T287] device veth1_macvtap entered promiscuous mode [ 21.155430][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.171806][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.182015][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.190518][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.199652][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.272166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.280472][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.288853][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.297170][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.001499][ T358] device veth0_vlan left promiscuous mode [ 22.032924][ T358] device veth0_vlan entered promiscuous mode [ 22.449350][ T367] device veth1_macvtap left promiscuous mode [ 23.458460][ T377] device veth0_vlan left promiscuous mode [ 23.722331][ T377] device veth0_vlan entered promiscuous mode [ 24.081507][ T28] kauditd_printk_skb: 42 callbacks suppressed [ 24.081542][ T28] audit: type=1400 audit(1762270695.569:116): avc: denied { create } for pid=382 comm="syz.2.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 24.301659][ T28] audit: type=1400 audit(1762270695.779:117): avc: denied { write } for pid=385 comm="syz.0.14" name="cgroup.subtree_control" dev="cgroup2" ino=180 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 24.650143][ T28] audit: type=1400 audit(1762270695.779:118): avc: denied { open } for pid=385 comm="syz.0.14" path="" dev="cgroup2" ino=180 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 24.999372][ T28] audit: type=1400 audit(1762270695.789:119): avc: denied { ioctl } for pid=385 comm="syz.0.14" path="" dev="cgroup2" ino=180 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 25.076439][ T395] device syzkaller0 entered promiscuous mode [ 25.481892][ T404] device wg2 entered promiscuous mode [ 26.105972][ T28] audit: type=1400 audit(1762270697.609:120): avc: denied { relabelfrom } for pid=411 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.323008][ T28] audit: type=1400 audit(1762270697.609:121): avc: denied { relabelto } for pid=411 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.916559][ T28] audit: type=1400 audit(1762270699.419:122): avc: denied { create } for pid=439 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 29.799158][ T481] device syzkaller0 entered promiscuous mode [ 29.914570][ T491] device syzkaller0 entered promiscuous mode [ 30.000129][ T28] audit: type=1400 audit(1762270701.489:123): avc: denied { read } for pid=492 comm="syz.4.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.056725][ T28] audit: type=1400 audit(1762270701.549:124): avc: denied { write } for pid=492 comm="syz.4.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.381724][ T508] Driver unsupported XDP return value 0 on prog (id 38) dev N/A, expect packet loss! [ 30.496989][ T510] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 30.581205][ T510] dvmrp1: linktype set to 778 [ 31.018087][ T518] device syzkaller0 entered promiscuous mode [ 31.475895][ T530] device syzkaller0 entered promiscuous mode [ 32.301258][ T547] device syzkaller0 entered promiscuous mode [ 34.578980][ T581] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 34.584507][ T581] dvmrp1: linktype set to 778 [ 35.155581][ T594] device syzkaller0 entered promiscuous mode [ 36.139411][ T616] device wg2 entered promiscuous mode [ 37.170280][ T638] device veth0_vlan left promiscuous mode [ 37.251405][ T638] device veth0_vlan entered promiscuous mode [ 38.732995][ T661] device syzkaller0 entered promiscuous mode [ 39.137170][ T667] device veth0_vlan left promiscuous mode [ 39.162094][ T667] device veth0_vlan entered promiscuous mode [ 40.290118][ T683] syz.2.87 (683) used greatest stack depth: 22048 bytes left [ 45.376771][ T28] audit: type=1400 audit(1762270716.879:125): avc: denied { create } for pid=763 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 45.416043][ T765] device wg2 entered promiscuous mode [ 46.476519][ T792] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.483768][ T792] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.873230][ T801] device bridge_slave_1 left promiscuous mode [ 46.991429][ T801] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.297833][ T801] device bridge_slave_0 left promiscuous mode [ 47.463836][ T801] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.645225][ T835] bond_slave_1: mtu less than device minimum [ 49.428994][ T849] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.436198][ T849] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.719238][ T859] device bridge_slave_1 left promiscuous mode [ 49.725396][ T859] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.859266][ T859] device bridge_slave_0 left promiscuous mode [ 50.130227][ T859] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.560088][ T28] audit: type=1400 audit(1762270723.069:126): avc: denied { create } for pid=883 comm="syz.4.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 51.678068][ T904] device sit0 entered promiscuous mode [ 52.711518][ T925] bridge0: port 3(veth1_macvtap) entered blocking state [ 52.718489][ T925] bridge0: port 3(veth1_macvtap) entered disabled state [ 52.915820][ T924] device sit0 entered promiscuous mode [ 53.372876][ T941] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.380100][ T941] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.642326][ T945] device syzkaller0 entered promiscuous mode [ 53.697995][ T942] device bridge_slave_1 left promiscuous mode [ 53.776811][ T942] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.853380][ T942] device bridge_slave_0 left promiscuous mode [ 53.925562][ T942] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.387889][ T28] audit: type=1400 audit(1762270725.889:127): avc: denied { setopt } for pid=958 comm="syz.4.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 55.137561][ T28] audit: type=1400 audit(1762270726.639:128): avc: denied { create } for pid=983 comm="syz.2.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 55.737550][ T996] device syzkaller0 entered promiscuous mode [ 56.951466][ T1039] device sit0 entered promiscuous mode [ 57.058897][ T28] audit: type=1400 audit(1762270728.569:129): avc: denied { create } for pid=1040 comm="syz.0.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 57.298905][ T28] audit: type=1400 audit(1762270728.639:130): avc: denied { create } for pid=1040 comm="syz.0.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 57.429615][ T1049] device syzkaller0 entered promiscuous mode [ 61.076032][ T1102] device syzkaller0 entered promiscuous mode [ 61.579201][ T1106] device sit0 entered promiscuous mode [ 62.077638][ T1118] syz.0.206[1118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.077707][ T1118] syz.0.206[1118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.433484][ T1183] device syzkaller0 entered promiscuous mode [ 67.601218][ T1216] syz.4.231[1216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.601287][ T1216] syz.4.231[1216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.999116][ T1232] device syzkaller0 entered promiscuous mode [ 70.749002][ T1258] GPL: port 1(erspan0) entered blocking state [ 70.755192][ T1258] GPL: port 1(erspan0) entered disabled state [ 71.107674][ T1258] device erspan0 entered promiscuous mode [ 71.262379][ T1261] GPL: port 1(erspan0) entered blocking state [ 71.268477][ T1261] GPL: port 1(erspan0) entered forwarding state [ 72.584951][ T1282] device syzkaller0 entered promiscuous mode [ 74.159261][ T1321] GPL: port 1(erspan0) entered blocking state [ 74.165374][ T1321] GPL: port 1(erspan0) entered disabled state [ 74.229608][ T1321] device erspan0 entered promiscuous mode [ 74.274802][ T1317] GPL: port 1(erspan0) entered blocking state [ 74.280994][ T1317] GPL: port 1(erspan0) entered forwarding state [ 74.899898][ T1341] device syzkaller0 entered promiscuous mode [ 76.267731][ T1381] device pim6reg1 entered promiscuous mode [ 78.177570][ T1405] device wg2 left promiscuous mode [ 78.299185][ T1405] device wg2 entered promiscuous mode [ 78.595099][ T28] audit: type=1400 audit(1762270750.099:131): avc: denied { create } for pid=1428 comm="syz.4.287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 78.732740][ T1427] device syzkaller0 entered promiscuous mode [ 81.050586][ T1511] device syzkaller0 entered promiscuous mode [ 81.877570][ T28] audit: type=1400 audit(1762270753.379:132): avc: denied { ioctl } for pid=1529 comm="syz.4.312" path="uts:[4026532480]" dev="nsfs" ino=4026532480 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.140223][ T28] audit: type=1400 audit(1762270753.419:133): avc: denied { create } for pid=1529 comm="syz.4.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 82.171090][ T28] audit: type=1400 audit(1762270753.419:134): avc: denied { create } for pid=1529 comm="syz.4.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 82.409842][ T1538] device veth0_vlan left promiscuous mode [ 82.468362][ T1538] device veth0_vlan entered promiscuous mode [ 82.724777][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 82.735093][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 82.748064][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.521619][ T1590] device syzkaller0 entered promiscuous mode [ 87.619936][ T1617] device sit0 left promiscuous mode [ 87.736323][ T1617] device sit0 entered promiscuous mode [ 88.268338][ T1640] device wg2 left promiscuous mode [ 88.903368][ T1661] bond_slave_1: mtu less than device minimum [ 89.192472][ T1683] syz.2.348[1683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.192533][ T1683] syz.2.348[1683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.548794][ T1696] device sit0 left promiscuous mode [ 89.877153][ T1696] device sit0 entered promiscuous mode [ 90.589824][ T1705] device syzkaller0 entered promiscuous mode [ 91.541520][ T1720] device sit0 left promiscuous mode [ 91.613527][ T1722] device sit0 entered promiscuous mode [ 92.527030][ T1734] device veth1_macvtap left promiscuous mode [ 92.634326][ T1736] device sit0 left promiscuous mode [ 93.221458][ T1738] device sit0 entered promiscuous mode [ 93.382131][ T1749] device veth0_vlan left promiscuous mode [ 93.388401][ T1749] device veth0_vlan entered promiscuous mode [ 93.463052][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.486982][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 93.564312][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 93.659329][ T1756] device sit0 entered promiscuous mode [ 94.512155][ T1781] syz.2.372 (1781) used obsolete PPPIOCDETACH ioctl [ 94.610081][ T1784] bond_slave_1: mtu less than device minimum [ 95.819141][ T1791] device wg2 entered promiscuous mode [ 98.112293][ T1821] bond_slave_1: mtu less than device minimum [ 100.177225][ T1849] device syzkaller0 entered promiscuous mode [ 100.489908][ T1873] device wg2 left promiscuous mode [ 101.428022][ T1886] device wg2 entered promiscuous mode [ 102.622070][ T28] audit: type=1400 audit(1762270774.129:135): avc: denied { create } for pid=1896 comm="syz.2.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 103.327202][ T1921] device syzkaller0 entered promiscuous mode [ 103.884166][ T1913] syz.4.406 (1913) used greatest stack depth: 20896 bytes left [ 104.110356][ T1937] device macsec0 entered promiscuous mode [ 105.342074][ T1945] bond_slave_1: mtu less than device minimum [ 107.151620][ T1969] device syzkaller0 entered promiscuous mode [ 107.292468][ T1974] device pim6reg1 entered promiscuous mode [ 107.578455][ T1983] bond_slave_1: mtu less than device minimum [ 109.760720][ T2006] device veth0_vlan left promiscuous mode [ 109.782272][ T2006] device veth0_vlan entered promiscuous mode [ 109.900630][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.914208][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.949321][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.213449][ T2025] device syzkaller0 entered promiscuous mode [ 111.504254][ T2044] device pim6reg1 entered promiscuous mode [ 112.677431][ T2081] device syzkaller0 entered promiscuous mode [ 112.747854][ T2083] device pim6reg1 entered promiscuous mode [ 114.375736][ T2129] device syzkaller0 entered promiscuous mode [ 114.498627][ T2130] device pim6reg1 entered promiscuous mode [ 116.778237][ T2171] device syzkaller0 entered promiscuous mode [ 118.790763][ T2212] device syzkaller0 entered promiscuous mode [ 122.265889][ T2263] device syzkaller0 entered promiscuous mode [ 126.763669][ T2352] device syzkaller0 entered promiscuous mode [ 127.418844][ T2358] device sit0 left promiscuous mode [ 127.454949][ T2357] device sit0 entered promiscuous mode [ 128.767564][ T2378] device veth0_vlan left promiscuous mode [ 128.788251][ T2378] device veth0_vlan entered promiscuous mode [ 128.881965][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.898282][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 128.906305][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.171839][ T2403] bond_slave_1: mtu less than device minimum [ 130.531977][ T2415] device syzkaller0 entered promiscuous mode [ 130.779529][ T2420] FAULT_INJECTION: forcing a failure. [ 130.779529][ T2420] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 130.850856][ T2420] CPU: 1 PID: 2420 Comm: syz.0.554 Not tainted syzkaller #0 [ 130.858168][ T2420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 130.868224][ T2420] Call Trace: [ 130.871495][ T2420] [ 130.874415][ T2420] __dump_stack+0x21/0x24 [ 130.878744][ T2420] dump_stack_lvl+0xee/0x150 [ 130.883324][ T2420] ? __cfi_dump_stack_lvl+0x8/0x8 [ 130.888341][ T2420] dump_stack+0x15/0x24 [ 130.892489][ T2420] should_fail_ex+0x3d4/0x520 [ 130.897162][ T2420] should_fail+0xb/0x10 [ 130.901311][ T2420] should_fail_usercopy+0x1a/0x20 [ 130.906345][ T2420] _copy_from_user+0x1e/0xc0 [ 130.910931][ T2420] __sys_bpf+0x277/0x780 [ 130.915177][ T2420] ? bpf_link_show_fdinfo+0x320/0x320 [ 130.920541][ T2420] ? __cfi_ksys_write+0x10/0x10 [ 130.925380][ T2420] ? debug_smp_processor_id+0x17/0x20 [ 130.930740][ T2420] __x64_sys_bpf+0x7c/0x90 [ 130.935151][ T2420] x64_sys_call+0x488/0x9a0 [ 130.939643][ T2420] do_syscall_64+0x4c/0xa0 [ 130.944059][ T2420] ? clear_bhb_loop+0x30/0x80 [ 130.948739][ T2420] ? clear_bhb_loop+0x30/0x80 [ 130.953410][ T2420] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 130.959305][ T2420] RIP: 0033:0x7fd9a4d8f6c9 [ 130.963713][ T2420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.983310][ T2420] RSP: 002b:00007fd9a5b58038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 130.991720][ T2420] RAX: ffffffffffffffda RBX: 00007fd9a4fe5fa0 RCX: 00007fd9a4d8f6c9 [ 130.999684][ T2420] RDX: 0000000000000050 RSI: 0000200000000640 RDI: 0000000000000000 [ 131.007643][ T2420] RBP: 00007fd9a5b58090 R08: 0000000000000000 R09: 0000000000000000 [ 131.015606][ T2420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.023565][ T2420] R13: 00007fd9a4fe6038 R14: 00007fd9a4fe5fa0 R15: 00007fffd99d1728 [ 131.031529][ T2420] [ 131.425311][ T2440] bond_slave_1: mtu less than device minimum [ 131.709907][ T2443] device syzkaller0 entered promiscuous mode [ 132.830263][ T28] audit: type=1400 audit(1762270804.339:136): avc: denied { create } for pid=2464 comm="syz.0.568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 133.019722][ T2466] device veth1_macvtap left promiscuous mode [ 133.595839][ T2477] bond_slave_1: mtu less than device minimum [ 133.885494][ T2482] device syzkaller0 entered promiscuous mode [ 135.262212][ T2502] device pim6reg1 entered promiscuous mode [ 135.368676][ T2506] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.375883][ T2506] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.619673][ T2518] bond_slave_1: mtu less than device minimum [ 135.865520][ T2530] device syzkaller0 entered promiscuous mode [ 136.487938][ T28] audit: type=1400 audit(1762270807.989:137): avc: denied { create } for pid=2540 comm="syz.3.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 137.254058][ T2564] bond_slave_1: mtu less than device minimum [ 138.106555][ T2566] device syzkaller0 entered promiscuous mode [ 138.222561][ T2567] device veth0_vlan left promiscuous mode [ 138.229519][ T2567] device veth0_vlan entered promiscuous mode [ 138.268513][ T2585] device syzkaller0 entered promiscuous mode [ 138.399661][ T2590] GPL: port 1(erspan0) entered blocking state [ 138.405790][ T2590] GPL: port 1(erspan0) entered disabled state [ 138.421637][ T2590] device erspan0 entered promiscuous mode [ 138.501949][ T2592] GPL: port 1(erspan0) entered blocking state [ 138.508059][ T2592] GPL: port 1(erspan0) entered forwarding state [ 139.556141][ T2611] bond_slave_1: mtu less than device minimum [ 141.136756][ T2632] device syzkaller0 entered promiscuous mode [ 141.947336][ T2646] device syzkaller0 entered promiscuous mode [ 142.064395][ T2654] bond_slave_1: mtu less than device minimum [ 142.218353][ T2660] device bridge_slave_1 left promiscuous mode [ 142.224745][ T2660] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.233954][ T2660] device bridge_slave_0 left promiscuous mode [ 142.240325][ T2660] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.528662][ T28] audit: type=1400 audit(1762270814.019:138): avc: denied { create } for pid=2665 comm="syz.3.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 143.277805][ T2686] device sit0 left promiscuous mode [ 145.891616][ T2686] device sit0 entered promiscuous mode [ 146.775064][ T2708] bond_slave_1: mtu less than device minimum [ 146.870018][ T2711] device syzkaller0 entered promiscuous mode [ 147.413223][ T28] audit: type=1400 audit(1762270818.919:139): avc: denied { ioctl } for pid=2737 comm="syz.0.641" path="socket:[23335]" dev="sockfs" ino=23335 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 148.033069][ T2744] cgroup: fork rejected by pids controller in /syz3 [ 150.133649][ T2774] bond_slave_1: mtu less than device minimum [ 150.139880][ T2773] bond_slave_1: mtu less than device minimum [ 150.271336][ T2764] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.297496][ T2764] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.305476][ T2764] device bridge_slave_0 entered promiscuous mode [ 150.317901][ T2764] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.329579][ T2764] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.337006][ T2764] device bridge_slave_1 entered promiscuous mode [ 150.396596][ T2780] device syzkaller0 entered promiscuous mode [ 150.836847][ T28] audit: type=1400 audit(1762270822.339:140): avc: denied { create } for pid=2764 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 150.858200][ T28] audit: type=1400 audit(1762270822.339:141): avc: denied { write } for pid=2764 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 150.879005][ T28] audit: type=1400 audit(1762270822.339:142): avc: denied { read } for pid=2764 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 151.010392][ T2764] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.017455][ T2764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.024729][ T2764] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.031753][ T2764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.188277][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.207256][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.281078][ T1003] device veth1_macvtap left promiscuous mode [ 151.528839][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.536469][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.695158][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.736307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.913602][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.920686][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 152.104651][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 152.119577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 152.176210][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.183288][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 152.256397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 152.333847][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 152.599564][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 152.624185][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.637544][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 152.729248][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 152.865416][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 152.897889][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.921334][ T2764] device veth0_vlan entered promiscuous mode [ 153.002721][ T2806] cgroup: fork rejected by pids controller in /syz2 [ 153.039184][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.119680][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 153.161781][ T2764] device veth1_macvtap entered promiscuous mode [ 153.224614][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 153.233154][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 153.241651][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 153.257052][ T2807] tap0: tun_chr_ioctl cmd 2147767520 [ 153.310311][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 153.327414][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 153.336221][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 153.344753][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 154.135700][ T2820] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.287107][ T2820] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.294689][ T2820] device bridge_slave_0 entered promiscuous mode [ 154.301861][ T2820] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.308910][ T2820] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.316462][ T2820] device bridge_slave_1 entered promiscuous mode [ 154.474279][ T1003] GPL: port 1(erspan0) entered disabled state [ 154.493570][ T1003] device erspan0 left promiscuous mode [ 154.577073][ T1003] GPL: port 1(erspan0) entered disabled state [ 155.037141][ T1003] device veth1_macvtap left promiscuous mode [ 155.413301][ T2844] device syzkaller0 entered promiscuous mode [ 155.737162][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.750409][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.781828][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.819078][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.834214][ T2861] cgroup: fork rejected by pids controller in /syz1 [ 155.846374][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.853440][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.941716][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.966240][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.976099][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.983150][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.992367][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.023044][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.040593][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.059334][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.073717][ T2820] device veth0_vlan entered promiscuous mode [ 156.087226][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 156.097294][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.113287][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 156.122311][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.134247][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.147481][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.452538][ T2820] device veth1_macvtap entered promiscuous mode [ 156.461312][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 156.469772][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.477989][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 156.532818][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.543694][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.555538][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 156.566005][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.599488][ T2879] device pim6reg1 entered promiscuous mode [ 156.791780][ T2877] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.820324][ T2877] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.834287][ T2877] device bridge_slave_0 entered promiscuous mode [ 156.875279][ T2877] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.886632][ T2877] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.926785][ T2877] device bridge_slave_1 entered promiscuous mode [ 157.553011][ T2904] device syzkaller0 entered promiscuous mode [ 157.951559][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 157.959175][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 157.977924][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 157.990790][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.004730][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.011811][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.024509][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.033320][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.041953][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.049041][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.219023][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.241430][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.279755][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.296289][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.309090][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.369707][ T1003] GPL: port 1(erspan0) entered disabled state [ 158.378655][ T1003] device erspan0 left promiscuous mode [ 158.384629][ T1003] GPL: port 1(erspan0) entered disabled state [ 158.452521][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 158.462957][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.481486][ T2917] device sit0 entered promiscuous mode [ 158.927242][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 158.935346][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.946258][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.956556][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.986552][ T2877] device veth0_vlan entered promiscuous mode [ 158.999596][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 159.012681][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 159.297264][ T2877] device veth1_macvtap entered promiscuous mode [ 159.433571][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 159.449337][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 159.487096][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.569287][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 159.577963][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 160.646754][ T2958] device syzkaller0 entered promiscuous mode [ 160.796803][ T2959] device syzkaller0 entered promiscuous mode [ 161.202705][ T2987] device pim6reg1 entered promiscuous mode [ 162.314357][ T3007] syz.1.704[3007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.321046][ T3007] syz.1.704[3007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.355721][ T3009] syz.2.705[3009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.415038][ T3009] syz.2.705[3009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.504873][ T3022] device syzkaller0 entered promiscuous mode [ 162.882452][ T3027] device wg2 entered promiscuous mode [ 163.141432][ T3039] device pim6reg1 entered promiscuous mode [ 164.878021][ T3086] device syzkaller0 entered promiscuous mode [ 166.457621][ T28] audit: type=1400 audit(1762270837.959:143): avc: denied { write } for pid=3104 comm="syz.1.733" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 168.965461][ T3129] device syzkaller0 entered promiscuous mode [ 168.997017][ T3130] device sit0 left promiscuous mode [ 169.155916][ T3133] device sit0 entered promiscuous mode [ 170.383944][ T3166] device sit0 left promiscuous mode [ 170.578944][ T3167] device sit0 entered promiscuous mode [ 172.690438][ T3214] device syzkaller0 entered promiscuous mode [ 173.104380][ T3226] device sit0 entered promiscuous mode [ 174.030817][ T3253] device syzkaller0 entered promiscuous mode [ 174.276241][ T3269] FAULT_INJECTION: forcing a failure. [ 174.276241][ T3269] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 174.404315][ T3269] CPU: 0 PID: 3269 Comm: syz.2.772 Not tainted syzkaller #0 [ 174.411639][ T3269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 174.421688][ T3269] Call Trace: [ 174.424958][ T3269] [ 174.427879][ T3269] __dump_stack+0x21/0x24 [ 174.432207][ T3269] dump_stack_lvl+0xee/0x150 [ 174.436789][ T3269] ? __cfi_dump_stack_lvl+0x8/0x8 [ 174.441807][ T3269] dump_stack+0x15/0x24 [ 174.445956][ T3269] should_fail_ex+0x3d4/0x520 [ 174.450626][ T3269] should_fail+0xb/0x10 [ 174.454781][ T3269] should_fail_usercopy+0x1a/0x20 [ 174.460147][ T3269] _copy_to_user+0x1e/0x90 [ 174.464565][ T3269] simple_read_from_buffer+0xe9/0x160 [ 174.469932][ T3269] proc_fail_nth_read+0x19a/0x210 [ 174.474947][ T3269] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 174.480486][ T3269] ? security_file_permission+0x94/0xb0 [ 174.486030][ T3269] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 174.491575][ T3269] vfs_read+0x26e/0x8c0 [ 174.495744][ T3269] ? __cfi_vfs_read+0x10/0x10 [ 174.500426][ T3269] ? __kasan_check_write+0x14/0x20 [ 174.505531][ T3269] ? mutex_lock+0x8d/0x1a0 [ 174.509948][ T3269] ? __cfi_mutex_lock+0x10/0x10 [ 174.514799][ T3269] ? __fdget_pos+0x2cd/0x380 [ 174.519381][ T3269] ? ksys_read+0x71/0x240 [ 174.523711][ T3269] ksys_read+0x140/0x240 [ 174.527955][ T3269] ? __cfi_ksys_read+0x10/0x10 [ 174.532714][ T3269] ? fput+0x154/0x1a0 [ 174.536691][ T3269] ? debug_smp_processor_id+0x17/0x20 [ 174.542059][ T3269] __x64_sys_read+0x7b/0x90 [ 174.546557][ T3269] x64_sys_call+0x2f/0x9a0 [ 174.550966][ T3269] do_syscall_64+0x4c/0xa0 [ 174.555376][ T3269] ? clear_bhb_loop+0x30/0x80 [ 174.560050][ T3269] ? clear_bhb_loop+0x30/0x80 [ 174.564726][ T3269] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 174.570613][ T3269] RIP: 0033:0x7fab5a38e0dc [ 174.575020][ T3269] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 174.594623][ T3269] RSP: 002b:00007fab58df7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 174.603038][ T3269] RAX: ffffffffffffffda RBX: 00007fab5a5e6090 RCX: 00007fab5a38e0dc [ 174.611012][ T3269] RDX: 000000000000000f RSI: 00007fab58df70a0 RDI: 0000000000000004 [ 174.618986][ T3269] RBP: 00007fab58df7090 R08: 0000000000000000 R09: 0000000000000000 [ 174.626961][ T3269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.634932][ T3269] R13: 00007fab5a5e6128 R14: 00007fab5a5e6090 R15: 00007ffe91d0dbb8 [ 174.642906][ T3269] [ 176.917237][ T3303] device syzkaller0 entered promiscuous mode [ 180.140117][ T3375] syz.1.802[3375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.140294][ T3375] syz.1.802[3375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.152583][ T3375] syz.1.802[3375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.164007][ T3375] syz.1.802[3375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.980445][ T3392] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 182.032504][ T3419] device syzkaller0 entered promiscuous mode [ 182.318238][ T3438] device pim6reg1 entered promiscuous mode [ 184.162351][ T3478] device veth0_vlan left promiscuous mode [ 184.209236][ T3478] device veth0_vlan entered promiscuous mode [ 184.234493][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.247699][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.318969][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.414225][ T3496] device syzkaller0 entered promiscuous mode [ 185.847000][ T3499] device pim6reg1 entered promiscuous mode [ 187.338066][ T3530] device syzkaller0 entered promiscuous mode [ 187.882293][ T3540] device syzkaller0 entered promiscuous mode [ 188.154711][ T3558] device sit0 left promiscuous mode [ 188.312503][ T3558] device sit0 entered promiscuous mode [ 189.167681][ T3596] device syzkaller0 entered promiscuous mode [ 189.244473][ T3609] device syzkaller0 entered promiscuous mode [ 190.844027][ T28] audit: type=1400 audit(1762270862.349:144): avc: denied { create } for pid=3659 comm="syz.0.877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 192.122017][ T3672] device syzkaller0 entered promiscuous mode [ 192.212770][ T3675] device pim6reg1 entered promiscuous mode [ 194.188717][ C1] sched: RT throttling activated [ 194.188721][ C0] sched: RT throttling activated [ 198.486309][ T3716] device syzkaller0 entered promiscuous mode [ 198.709132][ T3721] device sit0 left promiscuous mode [ 198.892257][ T3731] device sit0 entered promiscuous mode [ 199.661435][ T3751] device pim6reg1 entered promiscuous mode [ 199.971861][ T3757] device syzkaller0 entered promiscuous mode [ 200.377323][ T3762] device syzkaller0 entered promiscuous mode [ 202.431558][ T3814] device syzkaller0 entered promiscuous mode [ 203.092078][ T3828] device pim6reg1 entered promiscuous mode [ 206.104421][ T3864] syz.2.934[3864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.104500][ T3864] syz.2.934[3864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.145033][ T3862] device syzkaller0 entered promiscuous mode [ 207.582021][ T3916] device syzkaller0 entered promiscuous mode [ 207.685418][ T3928] device sit0 left promiscuous mode [ 207.773396][ T3928] device sit0 entered promiscuous mode [ 208.246895][ T3946] device syzkaller0 entered promiscuous mode [ 208.666899][ T3959] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 208.732285][ T3959] device syzkaller0 entered promiscuous mode [ 209.061075][ T3970] device sit0 left promiscuous mode [ 209.213653][ T3971] device sit0 entered promiscuous mode [ 209.869196][ T3976] device veth1_macvtap entered promiscuous mode [ 209.884628][ T3976] device macsec0 entered promiscuous mode [ 210.008473][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 210.065695][ T3987] device syzkaller0 entered promiscuous mode [ 210.356886][ T3988] device veth0_vlan left promiscuous mode [ 210.398731][ T3988] device veth0_vlan entered promiscuous mode [ 210.601759][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 210.620162][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 210.635471][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 210.914326][ T4013] device pim6reg1 entered promiscuous mode [ 211.164934][ T4018] bond_slave_1: mtu less than device minimum [ 211.915204][ T4020] device syzkaller0 entered promiscuous mode [ 212.820488][ T4040] device syzkaller0 entered promiscuous mode [ 214.957277][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 214.961946][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 215.724959][ T4104] device syzkaller0 entered promiscuous mode [ 216.358294][ T4110] device sit0 left promiscuous mode [ 216.517348][ T4109] device sit0 entered promiscuous mode [ 218.117317][ T4124] bond_slave_1: mtu less than device minimum [ 218.752413][ T4124] device syzkaller0 entered promiscuous mode [ 220.107000][ T28] audit: type=1400 audit(1762270891.609:145): avc: denied { create } for pid=4178 comm="syz.0.1018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 220.546994][ T4190] device sit0 left promiscuous mode [ 220.645030][ T4193] device sit0 entered promiscuous mode [ 221.022409][ T4212] device syzkaller0 entered promiscuous mode [ 221.455869][ T4222] device sit0 entered promiscuous mode [ 222.538004][ T4259] device syzkaller0 entered promiscuous mode [ 223.252740][ T4269] device macsec0 entered promiscuous mode [ 224.342338][ T4283] device sit0 left promiscuous mode [ 224.418620][ T4283] device sit0 entered promiscuous mode [ 225.499816][ T4317] device sit0 left promiscuous mode [ 225.645285][ T4317] device sit0 entered promiscuous mode [ 226.836982][ T4333] device pim6reg1 entered promiscuous mode [ 227.130626][ T4341] device veth1_macvtap left promiscuous mode [ 227.205813][ T4345] device veth1_macvtap entered promiscuous mode [ 227.230016][ T4345] device macsec0 entered promiscuous mode [ 228.626110][ T4378] device sit0 left promiscuous mode [ 228.828018][ T4378] device sit0 entered promiscuous mode [ 229.625346][ T4387] device pim6reg1 entered promiscuous mode [ 238.377955][ T4465] device sit0 left promiscuous mode [ 238.589713][ T4468] device sit0 entered promiscuous mode [ 240.210569][ T4492] device macsec0 entered promiscuous mode [ 240.943069][ T4511] device syzkaller0 entered promiscuous mode [ 241.211249][ T4513] syz.2.1111[4513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.211339][ T4513] syz.2.1111[4513] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.372479][ T4513] IPv6: pim6reg1: Disabled Multicast RS [ 241.539786][ T4521] device sit0 left promiscuous mode [ 241.682860][ T4523] device sit0 entered promiscuous mode [ 244.400031][ T4589] device sit0 left promiscuous mode [ 244.625313][ T4590] device sit0 entered promiscuous mode [ 250.789855][ T4697] device pim6reg1 entered promiscuous mode [ 252.158235][ T4716] device wg2 left promiscuous mode [ 252.312093][ T4716] device wg2 entered promiscuous mode [ 252.951912][ T4734] device syzkaller0 entered promiscuous mode [ 253.161926][ T4742] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 253.167854][ T4742] syzkaller1: linktype set to 780 [ 253.671357][ T4757] device sit0 left promiscuous mode [ 253.713429][ T4757] device sit0 entered promiscuous mode [ 254.392289][ T4764] device syzkaller0 entered promiscuous mode [ 255.917028][ T4788] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 255.950131][ T4788] syzkaller0: linktype set to 270 [ 256.364324][ T4801] device syzkaller0 entered promiscuous mode [ 256.391865][ T4796] device sit0 left promiscuous mode [ 257.504352][ T4845] device syzkaller0 entered promiscuous mode [ 258.340938][ T4873] device sit0 left promiscuous mode [ 258.420855][ T4876] device sit0 entered promiscuous mode [ 258.945807][ T4890] device sit0 left promiscuous mode [ 259.150009][ T4894] !6±ÿ: renamed from team_slave_1 [ 259.196498][ T4892] device sit0 entered promiscuous mode [ 261.559567][ T4925] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 261.598798][ T4925] syzkaller0: linktype set to 270 [ 261.782937][ T4920] device syzkaller0 entered promiscuous mode [ 263.552868][ T4952] device syzkaller0 entered promiscuous mode [ 263.735264][ T4955] device syzkaller0 entered promiscuous mode [ 264.003753][ T4960] device syzkaller0 entered promiscuous mode [ 266.860669][ T4990] device wg2 left promiscuous mode [ 266.874014][ T4990] device wg2 entered promiscuous mode [ 267.171689][ T4997] device syzkaller0 entered promiscuous mode [ 267.478943][ T4998] device veth0_vlan left promiscuous mode [ 267.485724][ T4998] device veth0_vlan entered promiscuous mode [ 267.541449][ T5004] device wg2 entered promiscuous mode [ 267.561018][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.569298][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.576815][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.624276][ T5006] device syzkaller0 entered promiscuous mode [ 267.839128][ T5014] bond_slave_1: mtu less than device minimum [ 267.976972][ T5024] !6±ÿ: renamed from team_slave_1 [ 268.804532][ T5043] IPv6: pim6reg1: Disabled Multicast RS [ 269.138751][ T5049] device sit0 left promiscuous mode [ 269.347468][ T5049] device sit0 entered promiscuous mode [ 269.769328][ T5063] device wg2 left promiscuous mode [ 270.039905][ T5066] device syzkaller0 entered promiscuous mode [ 270.180179][ T5061] device wg2 entered promiscuous mode [ 271.797927][ T5095] device sit0 left promiscuous mode [ 272.029676][ T5104] device sit0 entered promiscuous mode [ 273.356886][ T5123] device syzkaller0 entered promiscuous mode [ 274.891683][ T5144] !6±ÿ: renamed from team_slave_1 [ 275.204559][ T28] audit: type=1400 audit(1762270946.709:146): avc: denied { create } for pid=5147 comm="syz.3.1284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 277.765968][ T5198] device sit0 left promiscuous mode [ 277.804379][ T5199] device sit0 entered promiscuous mode [ 278.803426][ T5220] device sit0 left promiscuous mode [ 279.037470][ T5220] device sit0 entered promiscuous mode [ 279.204397][ T5237] device sit0 left promiscuous mode [ 282.558625][ T5287] device syzkaller0 entered promiscuous mode [ 283.857422][ T5322] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 284.515387][ T5328] device sit0 left promiscuous mode [ 284.763897][ T5330] device sit0 entered promiscuous mode [ 285.422541][ T5343] device wg2 entered promiscuous mode [ 286.278851][ T5355] device syzkaller0 entered promiscuous mode [ 286.698663][ T5375] device sit0 left promiscuous mode [ 287.045717][ T5383] device sit0 entered promiscuous mode [ 288.390325][ T5391] device sit0 left promiscuous mode [ 288.397874][ T28] audit: type=1400 audit(1762270959.899:147): avc: denied { create } for pid=5392 comm="syz.1.1345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 288.457236][ T5389] device sit0 entered promiscuous mode [ 291.893494][ T5461] device wg2 left promiscuous mode [ 296.417968][ T5484] device syzkaller0 entered promiscuous mode [ 296.767008][ T5504] device sit0 left promiscuous mode [ 296.811955][ T5509] device sit0 entered promiscuous mode [ 298.422099][ T5566] device syzkaller0 entered promiscuous mode [ 299.327115][ T28] audit: type=1400 audit(1762270970.799:148): avc: denied { create } for pid=5564 comm="syz.4.1389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 300.493759][ T28] audit: type=1400 audit(1762270971.999:149): avc: denied { read } for pid=5609 comm="syz.3.1399" dev="nsfs" ino=4026532964 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 300.513434][ T5606] device syzkaller0 entered promiscuous mode [ 300.619290][ T28] audit: type=1400 audit(1762270972.039:150): avc: denied { open } for pid=5609 comm="syz.3.1399" path="cgroup:[4026532964]" dev="nsfs" ino=4026532964 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 300.641755][ T5619] device syzkaller0 entered promiscuous mode [ 301.857302][ T5665] device sit0 entered promiscuous mode [ 302.182749][ T5675] device syzkaller0 entered promiscuous mode [ 302.871130][ T5705] bridge0: port 3(veth1_macvtap) entered blocking state [ 302.878100][ T5705] bridge0: port 3(veth1_macvtap) entered disabled state [ 303.378481][ T5717] device syzkaller0 entered promiscuous mode [ 304.349338][ T5729] device veth0_vlan left promiscuous mode [ 304.364884][ T5729] device veth0_vlan entered promiscuous mode [ 304.410977][ T5731] device veth1_macvtap left promiscuous mode [ 304.418191][ T5731] device macsec0 left promiscuous mode [ 304.541884][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.550224][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.557734][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.913594][ T5769] device syzkaller0 entered promiscuous mode [ 308.181958][ T28] audit: type=1400 audit(1762270979.689:151): avc: denied { create } for pid=5790 comm="syz.2.1448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 308.330789][ T28] audit: type=1400 audit(1762270979.839:152): avc: denied { create } for pid=5781 comm="syz.1.1446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 308.386706][ T5807] device wg2 entered promiscuous mode [ 309.214498][ T5816] device syzkaller0 entered promiscuous mode [ 310.042689][ T5832] cgroup: fork rejected by pids controller in /syz0 [ 312.634901][ T5951] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.642002][ T5951] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.649569][ T5951] device bridge_slave_0 entered promiscuous mode [ 312.656593][ T5951] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.663814][ T5951] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.671326][ T5951] device bridge_slave_1 entered promiscuous mode [ 313.591958][ T999] device bridge_slave_1 left promiscuous mode [ 313.598097][ T999] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.774380][ T999] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.819066][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.827926][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.836353][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 314.846934][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 314.854773][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 314.863754][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.872327][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.879375][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.887125][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.897329][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.905931][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.912988][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.001985][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 315.044640][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 315.061851][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.083824][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.091797][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.102106][ T5951] device veth0_vlan entered promiscuous mode [ 315.173004][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 315.194994][ T5951] device veth1_macvtap entered promiscuous mode [ 315.218398][ T5441] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 315.226865][ T5441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 315.251802][ T5441] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 315.262104][ T5441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 315.567498][ T5993] device syzkaller0 entered promiscuous mode [ 319.109789][ T6067] syz.2.1495[6067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.109897][ T6067] syz.2.1495[6067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.504530][ T6072] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.529941][ T6072] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.801834][ T6085] device sit0 left promiscuous mode [ 320.286306][ T6102] device syzkaller0 entered promiscuous mode [ 320.860960][ T6100] bond_slave_1: mtu less than device minimum [ 324.012841][ T6133] device syzkaller0 entered promiscuous mode [ 324.020774][ T6147] device sit0 left promiscuous mode [ 324.603170][ T6165] bond_slave_1: mtu less than device minimum [ 324.788892][ T6168] device wg2 left promiscuous mode [ 325.098122][ T6170] device syzkaller0 entered promiscuous mode [ 325.138764][ T6173] device wg2 left promiscuous mode [ 325.514247][ T6178] device syzkaller0 entered promiscuous mode [ 326.322229][ T6184] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.332315][ T6184] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.605504][ T6187] bond_slave_1: mtu less than device minimum [ 328.315171][ T6205] device sit0 left promiscuous mode [ 328.867334][ T6214] bond_slave_1: mtu less than device minimum [ 328.976612][ T6218] device syzkaller0 entered promiscuous mode [ 329.023133][ T6227] device bridge_slave_1 left promiscuous mode [ 329.029381][ T6227] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.044707][ T6227] device bridge_slave_0 left promiscuous mode [ 329.057190][ T6227] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.162019][ T6273] device syzkaller0 entered promiscuous mode [ 332.807934][ T6312] syz.1.1573[6312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.808057][ T6312] syz.1.1573[6312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.535556][ T6329] device veth1_macvtap left promiscuous mode [ 333.826452][ T6337] syzkaller1: tun_chr_ioctl cmd 1074025677 [ 333.837479][ T6337] syzkaller1: linktype set to 780 [ 334.947537][ T6372] device sit0 entered promiscuous mode [ 335.074697][ T6369] device pim6reg1 entered promiscuous mode [ 335.457181][ T6386] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.487858][ T6386] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.551383][ T6386] device bridge_slave_0 entered promiscuous mode [ 335.597187][ T6386] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.608520][ T6386] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.626385][ T6386] device bridge_slave_1 entered promiscuous mode [ 335.826974][ T6386] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.834030][ T6386] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.841305][ T6386] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.848321][ T6386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.882330][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 335.890385][ T1003] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.900213][ T1003] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.929265][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.951227][ T1003] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.958266][ T1003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.965674][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.974063][ T1003] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.981118][ T1003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.084976][ T10] device bridge_slave_1 left promiscuous mode [ 336.091499][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.098997][ T10] device bridge_slave_0 left promiscuous mode [ 336.106417][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.115079][ T10] device veth1_macvtap left promiscuous mode [ 337.263095][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.322758][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.331149][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.363779][ T6386] device veth0_vlan entered promiscuous mode [ 337.371847][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 337.396690][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 337.410453][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 337.418360][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.470532][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.477979][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.553895][ T6386] device veth1_macvtap entered promiscuous mode [ 337.572108][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 337.581237][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 337.643057][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 337.759995][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 337.821010][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 337.890394][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 337.961529][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 339.683832][ T6505] bridge0: port 3(team_slave_1) entered blocking state [ 339.828982][ T6505] bridge0: port 3(team_slave_1) entered disabled state [ 339.996023][ T6505] device team_slave_1 entered promiscuous mode [ 340.118872][ T6515] device pim6reg1 left promiscuous mode [ 340.364113][ T6519] device veth0_vlan left promiscuous mode [ 340.550817][ T6519] device veth0_vlan entered promiscuous mode [ 340.649809][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.688722][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.754056][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.997940][ T6564] syz.1.1635 uses obsolete (PF_INET,SOCK_PACKET) [ 341.299390][ T6577] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 341.359189][ T6577] device pim6reg1 entered promiscuous mode [ 342.490359][ T6651] device veth0_vlan left promiscuous mode [ 342.529197][ T6651] device veth0_vlan entered promiscuous mode [ 342.536103][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.549229][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.571943][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.700569][ T6659] syz.4.1660[6659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.700636][ T6659] syz.4.1660[6659] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.939945][ T6770] device sit0 left promiscuous mode [ 345.980099][ T6770] device sit0 entered promiscuous mode [ 346.332926][ T6782] device sit0 entered promiscuous mode [ 346.397719][ T6793] device syzkaller0 entered promiscuous mode [ 346.567294][ T6798] device syzkaller0 entered promiscuous mode [ 346.845465][ T28] audit: type=1400 audit(1762271018.349:153): avc: denied { create } for pid=6813 comm="syz.3.1710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 346.997348][ T6843] device pim6reg1 entered promiscuous mode [ 347.797092][ T6864] device pim6reg1 entered promiscuous mode [ 348.197931][ T6878] device syzkaller0 entered promiscuous mode [ 350.818563][ T6930] device syzkaller0 entered promiscuous mode [ 354.553353][ T6985] device pim6reg1 entered promiscuous mode [ 356.022744][ T7007] device veth1_macvtap left promiscuous mode [ 356.100714][ T7007] device macsec0 entered promiscuous mode [ 357.607719][ T7041] device sit0 entered promiscuous mode [ 358.578563][ T7062] device sit0 left promiscuous mode [ 358.587155][ T7065] device sit0 entered promiscuous mode [ 358.874337][ T7093] device syzkaller0 entered promiscuous mode [ 359.495118][ T7117] device syzkaller0 entered promiscuous mode [ 359.503127][ T7120] device sit0 left promiscuous mode [ 359.562216][ T7120] device sit0 entered promiscuous mode [ 360.853574][ T7163] device syzkaller0 entered promiscuous mode [ 361.240920][ T7167] device macsec0 left promiscuous mode [ 361.342435][ T7169] device pim6reg1 entered promiscuous mode [ 361.683389][ T7183] device syzkaller0 entered promiscuous mode [ 362.097629][ T7200] device veth0_vlan left promiscuous mode [ 362.116823][ T7200] device veth0_vlan entered promiscuous mode [ 362.449490][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 362.479423][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 362.571237][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 362.802853][ T7201] device sit0 left promiscuous mode [ 362.910465][ T7202] device sit0 entered promiscuous mode [ 363.181920][ T7211] device sit0 left promiscuous mode [ 364.413991][ T7256] device wg2 entered promiscuous mode [ 366.885816][ T7300] device wg2 left promiscuous mode [ 366.907981][ T7300] device wg2 entered promiscuous mode [ 367.383954][ T7310] device syzkaller0 entered promiscuous mode [ 370.726271][ T7357] device sit0 left promiscuous mode [ 370.892723][ T7358] device sit0 entered promiscuous mode [ 371.532017][ T7363] device syzkaller0 entered promiscuous mode [ 371.637409][ T7378] device sit0 left promiscuous mode [ 371.696096][ T7378] device sit0 entered promiscuous mode [ 373.228789][ T7424] device syzkaller0 entered promiscuous mode [ 376.472319][ T7492] device syzkaller0 entered promiscuous mode [ 376.901894][ T7507] device syzkaller0 entered promiscuous mode [ 379.411757][ T7532] device syzkaller0 entered promiscuous mode [ 381.087967][ T7561] ªªªªªª: renamed from vlan0 [ 381.336518][ T7574] dvmrp0: tun_chr_ioctl cmd 35108 [ 382.924659][ T7621] device veth0_vlan left promiscuous mode [ 382.936540][ T7621] device veth0_vlan entered promiscuous mode [ 382.949059][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.972997][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.980743][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.988500][ T7619] device veth0_vlan left promiscuous mode [ 383.029689][ T7619] device veth0_vlan entered promiscuous mode [ 383.140272][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 383.148593][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 383.161758][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 384.642226][ T7643] device pim6reg1 entered promiscuous mode [ 385.647627][ T7659] device syzkaller0 entered promiscuous mode [ 386.026421][ T7671] device syzkaller0 entered promiscuous mode [ 387.603594][ T7715] device syzkaller0 entered promiscuous mode [ 388.353326][ T7726] device syzkaller0 entered promiscuous mode [ 388.812876][ T7727] device syzkaller0 entered promiscuous mode [ 389.361264][ T7764] device syzkaller0 entered promiscuous mode [ 394.226868][ T7783] FAULT_INJECTION: forcing a failure. [ 394.226868][ T7783] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 394.288690][ T7783] CPU: 1 PID: 7783 Comm: syz.2.1973 Not tainted syzkaller #0 [ 394.296097][ T7783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 394.306152][ T7783] Call Trace: [ 394.309436][ T7783] [ 394.312348][ T7783] __dump_stack+0x21/0x24 [ 394.316667][ T7783] dump_stack_lvl+0xee/0x150 [ 394.321236][ T7783] ? __cfi_dump_stack_lvl+0x8/0x8 [ 394.326241][ T7783] dump_stack+0x15/0x24 [ 394.330378][ T7783] should_fail_ex+0x3d4/0x520 [ 394.335040][ T7783] should_fail_alloc_page+0x61/0x90 [ 394.340222][ T7783] prepare_alloc_pages+0x148/0x5f0 [ 394.345315][ T7783] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 394.350492][ T7783] ? slab_post_alloc_hook+0x4f/0x2d0 [ 394.355763][ T7783] ? kmem_cache_alloc_node+0x181/0x340 [ 394.361199][ T7783] ? alloc_vmap_area+0x17b/0x1870 [ 394.366199][ T7783] ? __get_vm_area_node+0x160/0x360 [ 394.371371][ T7783] ? __vmalloc_node_range+0x326/0x13d0 [ 394.376806][ T7783] ? sock_hash_alloc+0x297/0x510 [ 394.381727][ T7783] __alloc_pages+0x124/0x450 [ 394.386626][ T7783] ? __cfi___alloc_pages+0x10/0x10 [ 394.392244][ T7783] __get_free_pages+0xe/0x30 [ 394.396822][ T7783] kasan_populate_vmalloc_pte+0x29/0x120 [ 394.402437][ T7783] __apply_to_page_range+0x8de/0xc80 [ 394.407705][ T7783] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 394.413927][ T7783] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 394.420146][ T7783] apply_to_page_range+0x3b/0x50 [ 394.425064][ T7783] kasan_populate_vmalloc+0x60/0x70 [ 394.430244][ T7783] alloc_vmap_area+0x173e/0x1870 [ 394.435163][ T7783] ? vm_map_ram+0x930/0x930 [ 394.440169][ T7783] ? __kasan_kmalloc+0x95/0xb0 [ 394.444915][ T7783] ? kmalloc_node_trace+0x3d/0xb0 [ 394.449914][ T7783] __get_vm_area_node+0x160/0x360 [ 394.454915][ T7783] ? x64_sys_call+0x488/0x9a0 [ 394.459570][ T7783] __vmalloc_node_range+0x326/0x13d0 [ 394.464831][ T7783] ? sock_hash_alloc+0x297/0x510 [ 394.469751][ T7783] ? __cfi___vmalloc_node_range+0x10/0x10 [ 394.475448][ T7783] ? kasan_save_alloc_info+0x25/0x30 [ 394.480714][ T7783] ? bpf_map_area_alloc+0x4b/0xe0 [ 394.485716][ T7783] ? __kmalloc_node+0xb2/0x1e0 [ 394.490462][ T7783] bpf_map_area_alloc+0xd7/0xe0 [ 394.495295][ T7783] ? sock_hash_alloc+0x297/0x510 [ 394.500216][ T7783] sock_hash_alloc+0x297/0x510 [ 394.504958][ T7783] map_create+0x49c/0xd80 [ 394.509266][ T7783] __sys_bpf+0x30b/0x780 [ 394.513492][ T7783] ? bpf_link_show_fdinfo+0x320/0x320 [ 394.518844][ T7783] ? __cfi_ksys_write+0x10/0x10 [ 394.523673][ T7783] ? debug_smp_processor_id+0x17/0x20 [ 394.529021][ T7783] __x64_sys_bpf+0x7c/0x90 [ 394.533418][ T7783] x64_sys_call+0x488/0x9a0 [ 394.537897][ T7783] do_syscall_64+0x4c/0xa0 [ 394.542294][ T7783] ? clear_bhb_loop+0x30/0x80 [ 394.546951][ T7783] ? clear_bhb_loop+0x30/0x80 [ 394.551605][ T7783] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 394.557480][ T7783] RIP: 0033:0x7fab5a38f6c9 [ 394.561884][ T7783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 394.581464][ T7783] RSP: 002b:00007fab5b149038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 394.589856][ T7783] RAX: ffffffffffffffda RBX: 00007fab5a5e5fa0 RCX: 00007fab5a38f6c9 [ 394.597807][ T7783] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 394.605753][ T7783] RBP: 00007fab5b149090 R08: 0000000000000000 R09: 0000000000000000 [ 394.613702][ T7783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 394.621648][ T7783] R13: 00007fab5a5e6038 R14: 00007fab5a5e5fa0 R15: 00007ffe91d0dbb8 [ 394.629604][ T7783] [ 395.009801][ T7789] device syzkaller0 entered promiscuous mode [ 395.240591][ T7808] device syzkaller0 entered promiscuous mode [ 395.843093][ T7818] FAULT_INJECTION: forcing a failure. [ 395.843093][ T7818] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 395.947408][ T7818] CPU: 1 PID: 7818 Comm: syz.4.1985 Not tainted syzkaller #0 [ 395.954805][ T7818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 395.964848][ T7818] Call Trace: [ 395.968118][ T7818] [ 395.971039][ T7818] __dump_stack+0x21/0x24 [ 395.975365][ T7818] dump_stack_lvl+0xee/0x150 [ 395.979950][ T7818] ? __cfi_dump_stack_lvl+0x8/0x8 [ 395.984973][ T7818] dump_stack+0x15/0x24 [ 395.989125][ T7818] should_fail_ex+0x3d4/0x520 [ 395.993800][ T7818] should_fail_alloc_page+0x61/0x90 [ 395.998994][ T7818] prepare_alloc_pages+0x148/0x5f0 [ 396.004103][ T7818] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 396.009300][ T7818] ? slab_post_alloc_hook+0x4f/0x2d0 [ 396.014580][ T7818] ? alloc_vmap_area+0x17b/0x1870 [ 396.019601][ T7818] ? __get_vm_area_node+0x160/0x360 [ 396.024790][ T7818] ? __vmalloc_node_range+0x326/0x13d0 [ 396.030246][ T7818] __alloc_pages+0x124/0x450 [ 396.034835][ T7818] ? __cfi___alloc_pages+0x10/0x10 [ 396.039944][ T7818] ? __kasan_check_write+0x14/0x20 [ 396.045049][ T7818] ? _raw_spin_lock+0x8e/0xe0 [ 396.049730][ T7818] ? __cfi__raw_spin_lock+0x10/0x10 [ 396.054935][ T7818] __get_free_pages+0xe/0x30 [ 396.059522][ T7818] kasan_populate_vmalloc_pte+0x29/0x120 [ 396.065150][ T7818] __apply_to_page_range+0x8de/0xc80 [ 396.070431][ T7818] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 396.076664][ T7818] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 396.082897][ T7818] apply_to_page_range+0x3b/0x50 [ 396.087833][ T7818] kasan_populate_vmalloc+0x60/0x70 [ 396.093020][ T7818] alloc_vmap_area+0x173e/0x1870 [ 396.097957][ T7818] ? vm_map_ram+0x930/0x930 [ 396.102458][ T7818] ? __kasan_kmalloc+0x95/0xb0 [ 396.107216][ T7818] ? kmalloc_node_trace+0x3d/0xb0 [ 396.112229][ T7818] __get_vm_area_node+0x160/0x360 [ 396.117246][ T7818] __vmalloc_node_range+0x326/0x13d0 [ 396.122520][ T7818] ? sock_hash_alloc+0x297/0x510 [ 396.127452][ T7818] ? __cfi___vmalloc_node_range+0x10/0x10 [ 396.133151][ T7818] ? kasan_save_alloc_info+0x25/0x30 [ 396.138435][ T7818] ? bpf_map_area_alloc+0x4b/0xe0 [ 396.143458][ T7818] ? __kmalloc_node+0xb2/0x1e0 [ 396.148223][ T7818] bpf_map_area_alloc+0xd7/0xe0 [ 396.153068][ T7818] ? sock_hash_alloc+0x297/0x510 [ 396.158003][ T7818] sock_hash_alloc+0x297/0x510 [ 396.162760][ T7818] map_create+0x49c/0xd80 [ 396.167082][ T7818] __sys_bpf+0x30b/0x780 [ 396.171316][ T7818] ? bpf_link_show_fdinfo+0x320/0x320 [ 396.176681][ T7818] ? __cfi_ksys_write+0x10/0x10 [ 396.181524][ T7818] ? debug_smp_processor_id+0x17/0x20 [ 396.186896][ T7818] __x64_sys_bpf+0x7c/0x90 [ 396.191313][ T7818] x64_sys_call+0x488/0x9a0 [ 396.195810][ T7818] do_syscall_64+0x4c/0xa0 [ 396.200218][ T7818] ? clear_bhb_loop+0x30/0x80 [ 396.204889][ T7818] ? clear_bhb_loop+0x30/0x80 [ 396.209560][ T7818] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 396.215453][ T7818] RIP: 0033:0x7f93c1f8f6c9 [ 396.219858][ T7818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 396.239453][ T7818] RSP: 002b:00007f93c2d7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 396.247861][ T7818] RAX: ffffffffffffffda RBX: 00007f93c21e5fa0 RCX: 00007f93c1f8f6c9 [ 396.255827][ T7818] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 396.263790][ T7818] RBP: 00007f93c2d7a090 R08: 0000000000000000 R09: 0000000000000000 [ 396.271749][ T7818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 396.279711][ T7818] R13: 00007f93c21e6038 R14: 00007f93c21e5fa0 R15: 00007ffd18092cb8 [ 396.287680][ T7818] [ 396.450561][ T7828] bond_slave_1: mtu less than device minimum [ 397.976487][ T7851] device syzkaller0 entered promiscuous mode [ 398.172991][ T7864] FAULT_INJECTION: forcing a failure. [ 398.172991][ T7864] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 398.233886][ T7864] CPU: 1 PID: 7864 Comm: syz.2.1997 Not tainted syzkaller #0 [ 398.241291][ T7864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 398.251338][ T7864] Call Trace: [ 398.254606][ T7864] [ 398.257530][ T7864] __dump_stack+0x21/0x24 [ 398.261859][ T7864] dump_stack_lvl+0xee/0x150 [ 398.266444][ T7864] ? __cfi_dump_stack_lvl+0x8/0x8 [ 398.271465][ T7864] dump_stack+0x15/0x24 [ 398.275612][ T7864] should_fail_ex+0x3d4/0x520 [ 398.280284][ T7864] should_fail_alloc_page+0x61/0x90 [ 398.285484][ T7864] prepare_alloc_pages+0x148/0x5f0 [ 398.290598][ T7864] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 398.295794][ T7864] ? slab_post_alloc_hook+0x4f/0x2d0 [ 398.301076][ T7864] ? alloc_vmap_area+0x17b/0x1870 [ 398.306092][ T7864] ? __get_vm_area_node+0x160/0x360 [ 398.311277][ T7864] ? __vmalloc_node_range+0x326/0x13d0 [ 398.316730][ T7864] __alloc_pages+0x124/0x450 [ 398.321314][ T7864] ? __cfi___alloc_pages+0x10/0x10 [ 398.326423][ T7864] ? __kasan_check_write+0x14/0x20 [ 398.331527][ T7864] ? _raw_spin_lock+0x8e/0xe0 [ 398.336203][ T7864] ? __cfi__raw_spin_lock+0x10/0x10 [ 398.341397][ T7864] __get_free_pages+0xe/0x30 [ 398.345986][ T7864] kasan_populate_vmalloc_pte+0x29/0x120 [ 398.351608][ T7864] __apply_to_page_range+0x8de/0xc80 [ 398.356894][ T7864] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 398.363127][ T7864] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 398.369364][ T7864] apply_to_page_range+0x3b/0x50 [ 398.374299][ T7864] kasan_populate_vmalloc+0x60/0x70 [ 398.379488][ T7864] alloc_vmap_area+0x173e/0x1870 [ 398.384420][ T7864] ? vm_map_ram+0x930/0x930 [ 398.388914][ T7864] ? __kasan_kmalloc+0x95/0xb0 [ 398.393668][ T7864] ? kmalloc_node_trace+0x3d/0xb0 [ 398.398685][ T7864] __get_vm_area_node+0x160/0x360 [ 398.403696][ T7864] ? x64_sys_call+0x488/0x9a0 [ 398.408367][ T7864] __vmalloc_node_range+0x326/0x13d0 [ 398.413652][ T7864] ? sock_hash_alloc+0x297/0x510 [ 398.418589][ T7864] ? __cfi___vmalloc_node_range+0x10/0x10 [ 398.424302][ T7864] ? kasan_save_alloc_info+0x25/0x30 [ 398.429584][ T7864] ? bpf_map_area_alloc+0x4b/0xe0 [ 398.434599][ T7864] ? __kmalloc_node+0xb2/0x1e0 [ 398.439360][ T7864] bpf_map_area_alloc+0xd7/0xe0 [ 398.444205][ T7864] ? sock_hash_alloc+0x297/0x510 [ 398.449133][ T7864] sock_hash_alloc+0x297/0x510 [ 398.453887][ T7864] map_create+0x49c/0xd80 [ 398.458210][ T7864] __sys_bpf+0x30b/0x780 [ 398.462438][ T7864] ? bpf_link_show_fdinfo+0x320/0x320 [ 398.467802][ T7864] ? __cfi_ksys_write+0x10/0x10 [ 398.472642][ T7864] ? debug_smp_processor_id+0x17/0x20 [ 398.478010][ T7864] __x64_sys_bpf+0x7c/0x90 [ 398.482432][ T7864] x64_sys_call+0x488/0x9a0 [ 398.486927][ T7864] do_syscall_64+0x4c/0xa0 [ 398.491349][ T7864] ? clear_bhb_loop+0x30/0x80 [ 398.496040][ T7864] ? clear_bhb_loop+0x30/0x80 [ 398.500726][ T7864] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 398.506617][ T7864] RIP: 0033:0x7fab5a38f6c9 [ 398.511021][ T7864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 398.530619][ T7864] RSP: 002b:00007fab5b149038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 398.539026][ T7864] RAX: ffffffffffffffda RBX: 00007fab5a5e5fa0 RCX: 00007fab5a38f6c9 [ 398.546994][ T7864] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 398.554959][ T7864] RBP: 00007fab5b149090 R08: 0000000000000000 R09: 0000000000000000 [ 398.562921][ T7864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 398.570882][ T7864] R13: 00007fab5a5e6038 R14: 00007fab5a5e5fa0 R15: 00007ffe91d0dbb8 [ 398.578847][ T7864] [ 398.937998][ T7898] device syzkaller0 entered promiscuous mode [ 399.141316][ T7920] FAULT_INJECTION: forcing a failure. [ 399.141316][ T7920] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 399.388123][ T7920] CPU: 1 PID: 7920 Comm: syz.1.2013 Not tainted syzkaller #0 [ 399.395521][ T7920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 399.405566][ T7920] Call Trace: [ 399.408834][ T7920] [ 399.411755][ T7920] __dump_stack+0x21/0x24 [ 399.416078][ T7920] dump_stack_lvl+0xee/0x150 [ 399.420659][ T7920] ? __cfi_dump_stack_lvl+0x8/0x8 [ 399.425675][ T7920] dump_stack+0x15/0x24 [ 399.429819][ T7920] should_fail_ex+0x3d4/0x520 [ 399.434489][ T7920] should_fail_alloc_page+0x61/0x90 [ 399.439685][ T7920] prepare_alloc_pages+0x148/0x5f0 [ 399.444789][ T7920] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 399.449978][ T7920] ? slab_post_alloc_hook+0x4f/0x2d0 [ 399.455255][ T7920] ? alloc_vmap_area+0x65a/0x1870 [ 399.460265][ T7920] ? __get_vm_area_node+0x160/0x360 [ 399.465449][ T7920] ? __vmalloc_node_range+0x326/0x13d0 [ 399.470898][ T7920] __alloc_pages+0x124/0x450 [ 399.475481][ T7920] ? __cfi___alloc_pages+0x10/0x10 [ 399.480588][ T7920] ? __kasan_check_write+0x14/0x20 [ 399.485699][ T7920] ? _raw_spin_lock+0x8e/0xe0 [ 399.490375][ T7920] ? __cfi__raw_spin_lock+0x10/0x10 [ 399.495576][ T7920] __get_free_pages+0xe/0x30 [ 399.500170][ T7920] kasan_populate_vmalloc_pte+0x29/0x120 [ 399.505798][ T7920] __apply_to_page_range+0x8de/0xc80 [ 399.511083][ T7920] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 399.517329][ T7920] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 399.523562][ T7920] apply_to_page_range+0x3b/0x50 [ 399.528504][ T7920] kasan_populate_vmalloc+0x60/0x70 [ 399.533694][ T7920] alloc_vmap_area+0x173e/0x1870 [ 399.538625][ T7920] ? vm_map_ram+0x930/0x930 [ 399.543115][ T7920] ? __kasan_kmalloc+0x95/0xb0 [ 399.547872][ T7920] ? kmalloc_node_trace+0x3d/0xb0 [ 399.552887][ T7920] __get_vm_area_node+0x160/0x360 [ 399.557910][ T7920] ? x64_sys_call+0x488/0x9a0 [ 399.562584][ T7920] __vmalloc_node_range+0x326/0x13d0 [ 399.567861][ T7920] ? sock_hash_alloc+0x297/0x510 [ 399.572801][ T7920] ? __cfi___vmalloc_node_range+0x10/0x10 [ 399.578511][ T7920] ? kasan_save_alloc_info+0x25/0x30 [ 399.583791][ T7920] ? bpf_map_area_alloc+0x4b/0xe0 [ 399.588806][ T7920] ? __kmalloc_node+0xb2/0x1e0 [ 399.593565][ T7920] bpf_map_area_alloc+0xd7/0xe0 [ 399.598406][ T7920] ? sock_hash_alloc+0x297/0x510 [ 399.603337][ T7920] sock_hash_alloc+0x297/0x510 [ 399.608096][ T7920] map_create+0x49c/0xd80 [ 399.612416][ T7920] __sys_bpf+0x30b/0x780 [ 399.616654][ T7920] ? bpf_link_show_fdinfo+0x320/0x320 [ 399.622020][ T7920] ? __cfi_ksys_write+0x10/0x10 [ 399.626860][ T7920] ? debug_smp_processor_id+0x17/0x20 [ 399.632222][ T7920] __x64_sys_bpf+0x7c/0x90 [ 399.636635][ T7920] x64_sys_call+0x488/0x9a0 [ 399.641132][ T7920] do_syscall_64+0x4c/0xa0 [ 399.645538][ T7920] ? clear_bhb_loop+0x30/0x80 [ 399.650208][ T7920] ? clear_bhb_loop+0x30/0x80 [ 399.654878][ T7920] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 399.660765][ T7920] RIP: 0033:0x7ff2ee98f6c9 [ 399.665169][ T7920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 399.684765][ T7920] RSP: 002b:00007ff2ed3f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 399.693180][ T7920] RAX: ffffffffffffffda RBX: 00007ff2eebe5fa0 RCX: 00007ff2ee98f6c9 [ 399.701147][ T7920] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 399.709114][ T7920] RBP: 00007ff2ed3f7090 R08: 0000000000000000 R09: 0000000000000000 [ 399.717077][ T7920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 399.725037][ T7920] R13: 00007ff2eebe6038 R14: 00007ff2eebe5fa0 R15: 00007ffd5fffa788 [ 399.733010][ T7920] [ 399.866391][ T7931] device sit0 entered promiscuous mode [ 400.215052][ T7942] device sit0 left promiscuous mode [ 400.308438][ T7943] device sit0 entered promiscuous mode [ 401.227392][ T7967] FAULT_INJECTION: forcing a failure. [ 401.227392][ T7967] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 401.242310][ T7967] CPU: 1 PID: 7967 Comm: syz.2.2026 Not tainted syzkaller #0 [ 401.249700][ T7967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 401.259747][ T7967] Call Trace: [ 401.263020][ T7967] [ 401.265949][ T7967] __dump_stack+0x21/0x24 [ 401.270277][ T7967] dump_stack_lvl+0xee/0x150 [ 401.274862][ T7967] ? __cfi_dump_stack_lvl+0x8/0x8 [ 401.279883][ T7967] dump_stack+0x15/0x24 [ 401.284035][ T7967] should_fail_ex+0x3d4/0x520 [ 401.288712][ T7967] should_fail_alloc_page+0x61/0x90 [ 401.293911][ T7967] prepare_alloc_pages+0x148/0x5f0 [ 401.299030][ T7967] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 401.304232][ T7967] ? slab_post_alloc_hook+0x4f/0x2d0 [ 401.309515][ T7967] ? alloc_vmap_area+0x17b/0x1870 [ 401.314532][ T7967] ? __get_vm_area_node+0x160/0x360 [ 401.319723][ T7967] ? __vmalloc_node_range+0x326/0x13d0 [ 401.325185][ T7967] __alloc_pages+0x124/0x450 [ 401.329774][ T7967] ? __cfi___alloc_pages+0x10/0x10 [ 401.334893][ T7967] ? __kasan_check_write+0x14/0x20 [ 401.340085][ T7967] ? _raw_spin_lock+0x8e/0xe0 [ 401.344837][ T7967] ? __cfi__raw_spin_lock+0x10/0x10 [ 401.350057][ T7967] __get_free_pages+0xe/0x30 [ 401.354658][ T7967] kasan_populate_vmalloc_pte+0x29/0x120 [ 401.360290][ T7967] __apply_to_page_range+0x8de/0xc80 [ 401.365588][ T7967] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 401.371825][ T7967] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 401.378069][ T7967] apply_to_page_range+0x3b/0x50 [ 401.383012][ T7967] kasan_populate_vmalloc+0x60/0x70 [ 401.388205][ T7967] alloc_vmap_area+0x173e/0x1870 [ 401.393142][ T7967] ? vm_map_ram+0x930/0x930 [ 401.397649][ T7967] ? __kasan_kmalloc+0x95/0xb0 [ 401.402410][ T7967] ? kmalloc_node_trace+0x3d/0xb0 [ 401.407434][ T7967] __get_vm_area_node+0x160/0x360 [ 401.412449][ T7967] ? x64_sys_call+0x488/0x9a0 [ 401.417127][ T7967] __vmalloc_node_range+0x326/0x13d0 [ 401.422422][ T7967] ? sock_hash_alloc+0x297/0x510 [ 401.427369][ T7967] ? __cfi___vmalloc_node_range+0x10/0x10 [ 401.433086][ T7967] ? kasan_save_alloc_info+0x25/0x30 [ 401.438376][ T7967] ? bpf_map_area_alloc+0x4b/0xe0 [ 401.443395][ T7967] ? __kmalloc_node+0xb2/0x1e0 [ 401.448160][ T7967] bpf_map_area_alloc+0xd7/0xe0 [ 401.453006][ T7967] ? sock_hash_alloc+0x297/0x510 [ 401.457937][ T7967] sock_hash_alloc+0x297/0x510 [ 401.462698][ T7967] map_create+0x49c/0xd80 [ 401.467029][ T7967] __sys_bpf+0x30b/0x780 [ 401.471263][ T7967] ? bpf_link_show_fdinfo+0x320/0x320 [ 401.476628][ T7967] ? __cfi_ksys_write+0x10/0x10 [ 401.481476][ T7967] ? debug_smp_processor_id+0x17/0x20 [ 401.486888][ T7967] __x64_sys_bpf+0x7c/0x90 [ 401.491311][ T7967] x64_sys_call+0x488/0x9a0 [ 401.495809][ T7967] do_syscall_64+0x4c/0xa0 [ 401.500223][ T7967] ? clear_bhb_loop+0x30/0x80 [ 401.504896][ T7967] ? clear_bhb_loop+0x30/0x80 [ 401.509572][ T7967] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 401.515463][ T7967] RIP: 0033:0x7fab5a38f6c9 [ 401.519874][ T7967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 401.539473][ T7967] RSP: 002b:00007fab5b149038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 401.547882][ T7967] RAX: ffffffffffffffda RBX: 00007fab5a5e5fa0 RCX: 00007fab5a38f6c9 [ 401.555845][ T7967] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 401.563807][ T7967] RBP: 00007fab5b149090 R08: 0000000000000000 R09: 0000000000000000 [ 401.571770][ T7967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 401.579735][ T7967] R13: 00007fab5a5e6038 R14: 00007fab5a5e5fa0 R15: 00007ffe91d0dbb8 [ 401.587705][ T7967] [ 403.587261][ T8003] FAULT_INJECTION: forcing a failure. [ 403.587261][ T8003] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 403.659355][ T8003] CPU: 1 PID: 8003 Comm: syz.3.2037 Not tainted syzkaller #0 [ 403.666753][ T8003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 403.676799][ T8003] Call Trace: [ 403.680070][ T8003] [ 403.682993][ T8003] __dump_stack+0x21/0x24 [ 403.687326][ T8003] dump_stack_lvl+0xee/0x150 [ 403.691916][ T8003] ? __cfi_dump_stack_lvl+0x8/0x8 [ 403.696935][ T8003] dump_stack+0x15/0x24 [ 403.701082][ T8003] should_fail_ex+0x3d4/0x520 [ 403.705760][ T8003] should_fail_alloc_page+0x61/0x90 [ 403.710967][ T8003] prepare_alloc_pages+0x148/0x5f0 [ 403.716078][ T8003] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 403.721270][ T8003] ? slab_post_alloc_hook+0x4f/0x2d0 [ 403.726555][ T8003] ? alloc_vmap_area+0x17b/0x1870 [ 403.731568][ T8003] ? __get_vm_area_node+0x160/0x360 [ 403.736756][ T8003] ? __vmalloc_node_range+0x326/0x13d0 [ 403.742212][ T8003] __alloc_pages+0x124/0x450 [ 403.746799][ T8003] ? __cfi___alloc_pages+0x10/0x10 [ 403.751907][ T8003] ? __kasan_check_write+0x14/0x20 [ 403.757010][ T8003] ? _raw_spin_lock+0x8e/0xe0 [ 403.761683][ T8003] ? __cfi__raw_spin_lock+0x10/0x10 [ 403.766875][ T8003] __get_free_pages+0xe/0x30 [ 403.771463][ T8003] kasan_populate_vmalloc_pte+0x29/0x120 [ 403.777089][ T8003] __apply_to_page_range+0x8de/0xc80 [ 403.782368][ T8003] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 403.788599][ T8003] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 403.794831][ T8003] apply_to_page_range+0x3b/0x50 [ 403.799765][ T8003] kasan_populate_vmalloc+0x60/0x70 [ 403.804952][ T8003] alloc_vmap_area+0x173e/0x1870 [ 403.809881][ T8003] ? vm_map_ram+0x930/0x930 [ 403.814373][ T8003] ? __kasan_kmalloc+0x95/0xb0 [ 403.819128][ T8003] ? kmalloc_node_trace+0x3d/0xb0 [ 403.824145][ T8003] __get_vm_area_node+0x160/0x360 [ 403.829161][ T8003] ? x64_sys_call+0x488/0x9a0 [ 403.833830][ T8003] __vmalloc_node_range+0x326/0x13d0 [ 403.839108][ T8003] ? sock_hash_alloc+0x297/0x510 [ 403.844044][ T8003] ? __cfi___vmalloc_node_range+0x10/0x10 [ 403.849761][ T8003] ? kasan_save_alloc_info+0x25/0x30 [ 403.855051][ T8003] ? bpf_map_area_alloc+0x4b/0xe0 [ 403.860069][ T8003] ? __kmalloc_node+0xb2/0x1e0 [ 403.865176][ T8003] bpf_map_area_alloc+0xd7/0xe0 [ 403.870024][ T8003] ? sock_hash_alloc+0x297/0x510 [ 403.874954][ T8003] sock_hash_alloc+0x297/0x510 [ 403.879712][ T8003] map_create+0x49c/0xd80 [ 403.884038][ T8003] __sys_bpf+0x30b/0x780 [ 403.888270][ T8003] ? bpf_link_show_fdinfo+0x320/0x320 [ 403.893644][ T8003] ? __cfi_ksys_write+0x10/0x10 [ 403.898491][ T8003] ? debug_smp_processor_id+0x17/0x20 [ 403.903856][ T8003] __x64_sys_bpf+0x7c/0x90 [ 403.908270][ T8003] x64_sys_call+0x488/0x9a0 [ 403.912779][ T8003] do_syscall_64+0x4c/0xa0 [ 403.917195][ T8003] ? clear_bhb_loop+0x30/0x80 [ 403.921864][ T8003] ? clear_bhb_loop+0x30/0x80 [ 403.926533][ T8003] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 403.932415][ T8003] RIP: 0033:0x7fa161d8f6c9 [ 403.936820][ T8003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 403.956419][ T8003] RSP: 002b:00007fa162cac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 403.964977][ T8003] RAX: ffffffffffffffda RBX: 00007fa161fe5fa0 RCX: 00007fa161d8f6c9 [ 403.972948][ T8003] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 403.980914][ T8003] RBP: 00007fa162cac090 R08: 0000000000000000 R09: 0000000000000000 [ 403.988876][ T8003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 403.996838][ T8003] R13: 00007fa161fe6038 R14: 00007fa161fe5fa0 R15: 00007ffc7dda5e68 [ 404.004804][ T8003] [ 404.446133][ T8028] device pim6reg1 entered promiscuous mode [ 405.894892][ T8045] FAULT_INJECTION: forcing a failure. [ 405.894892][ T8045] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 405.937378][ T8045] CPU: 1 PID: 8045 Comm: syz.1.2050 Not tainted syzkaller #0 [ 405.944789][ T8045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 405.954833][ T8045] Call Trace: [ 405.958103][ T8045] [ 405.961023][ T8045] __dump_stack+0x21/0x24 [ 405.965348][ T8045] dump_stack_lvl+0xee/0x150 [ 405.969929][ T8045] ? __cfi_dump_stack_lvl+0x8/0x8 [ 405.974950][ T8045] dump_stack+0x15/0x24 [ 405.979099][ T8045] should_fail_ex+0x3d4/0x520 [ 405.983777][ T8045] should_fail_alloc_page+0x61/0x90 [ 405.988973][ T8045] prepare_alloc_pages+0x148/0x5f0 [ 405.994083][ T8045] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 405.999274][ T8045] ? slab_post_alloc_hook+0x4f/0x2d0 [ 406.004555][ T8045] ? alloc_vmap_area+0x17b/0x1870 [ 406.009571][ T8045] ? __get_vm_area_node+0x160/0x360 [ 406.014762][ T8045] ? __vmalloc_node_range+0x326/0x13d0 [ 406.020213][ T8045] __alloc_pages+0x124/0x450 [ 406.024799][ T8045] ? __cfi___alloc_pages+0x10/0x10 [ 406.029904][ T8045] ? __kasan_check_write+0x14/0x20 [ 406.035012][ T8045] ? _raw_spin_lock+0x8e/0xe0 [ 406.039679][ T8045] ? __cfi__raw_spin_lock+0x10/0x10 [ 406.044870][ T8045] __get_free_pages+0xe/0x30 [ 406.049453][ T8045] kasan_populate_vmalloc_pte+0x29/0x120 [ 406.055090][ T8045] __apply_to_page_range+0x8de/0xc80 [ 406.060373][ T8045] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 406.066625][ T8045] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 406.072858][ T8045] apply_to_page_range+0x3b/0x50 [ 406.077794][ T8045] kasan_populate_vmalloc+0x60/0x70 [ 406.082980][ T8045] alloc_vmap_area+0x173e/0x1870 [ 406.087909][ T8045] ? vm_map_ram+0x930/0x930 [ 406.092402][ T8045] ? __kasan_kmalloc+0x95/0xb0 [ 406.097161][ T8045] ? kmalloc_node_trace+0x3d/0xb0 [ 406.102187][ T8045] __get_vm_area_node+0x160/0x360 [ 406.107209][ T8045] ? x64_sys_call+0x488/0x9a0 [ 406.111882][ T8045] __vmalloc_node_range+0x326/0x13d0 [ 406.117163][ T8045] ? sock_hash_alloc+0x297/0x510 [ 406.122102][ T8045] ? __cfi___vmalloc_node_range+0x10/0x10 [ 406.127814][ T8045] ? kasan_save_alloc_info+0x25/0x30 [ 406.133097][ T8045] ? bpf_map_area_alloc+0x4b/0xe0 [ 406.138118][ T8045] ? __kmalloc_node+0xb2/0x1e0 [ 406.142882][ T8045] bpf_map_area_alloc+0xd7/0xe0 [ 406.147727][ T8045] ? sock_hash_alloc+0x297/0x510 [ 406.152657][ T8045] sock_hash_alloc+0x297/0x510 [ 406.157413][ T8045] map_create+0x49c/0xd80 [ 406.161734][ T8045] __sys_bpf+0x30b/0x780 [ 406.165976][ T8045] ? bpf_link_show_fdinfo+0x320/0x320 [ 406.171344][ T8045] ? __cfi_ksys_write+0x10/0x10 [ 406.176182][ T8045] ? debug_smp_processor_id+0x17/0x20 [ 406.181540][ T8045] __x64_sys_bpf+0x7c/0x90 [ 406.185952][ T8045] x64_sys_call+0x488/0x9a0 [ 406.190451][ T8045] do_syscall_64+0x4c/0xa0 [ 406.194859][ T8045] ? clear_bhb_loop+0x30/0x80 [ 406.199545][ T8045] ? clear_bhb_loop+0x30/0x80 [ 406.204218][ T8045] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 406.210104][ T8045] RIP: 0033:0x7ff2ee98f6c9 [ 406.214512][ T8045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 406.234106][ T8045] RSP: 002b:00007ff2ed3f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 406.242510][ T8045] RAX: ffffffffffffffda RBX: 00007ff2eebe5fa0 RCX: 00007ff2ee98f6c9 [ 406.250477][ T8045] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 406.258439][ T8045] RBP: 00007ff2ed3f7090 R08: 0000000000000000 R09: 0000000000000000 [ 406.266407][ T8045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 406.274371][ T8045] R13: 00007ff2eebe6038 R14: 00007ff2eebe5fa0 R15: 00007ffd5fffa788 [ 406.282341][ T8045] [ 407.234318][ T8078] device sit0 left promiscuous mode [ 407.382621][ T8078] device sit0 entered promiscuous mode [ 407.692610][ T8087] bond_slave_1: mtu less than device minimum [ 411.409958][ T8160] device sit0 entered promiscuous mode [ 411.782268][ T8165] device syzkaller0 entered promiscuous mode [ 412.648552][ T8178] syz.0.2083[8178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.648767][ T8178] syz.0.2083[8178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.310461][ T8211] device veth0_vlan left promiscuous mode [ 415.457937][ T8211] device veth0_vlan entered promiscuous mode [ 415.501105][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 415.540624][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 415.568134][ T28] audit: type=1400 audit(1762271087.069:154): avc: denied { create } for pid=8207 comm="syz.0.2093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 415.655464][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 415.810340][ T8210] device sit0 left promiscuous mode [ 416.192271][ T8212] device sit0 entered promiscuous mode [ 416.494171][ T8231] device sit0 left promiscuous mode [ 416.548401][ T8237] device sit0 entered promiscuous mode [ 418.927012][ T8276] device sit0 left promiscuous mode [ 419.550203][ T8279] device sit0 left promiscuous mode [ 419.671413][ T8283] device sit0 entered promiscuous mode [ 419.706354][ T8285] device sit0 entered promiscuous mode [ 420.618205][ T8305] device syzkaller0 entered promiscuous mode [ 420.824068][ T8310] device syzkaller0 entered promiscuous mode [ 420.870073][ T8316] bond_slave_1: mtu less than device minimum [ 421.253343][ T8336] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 421.278104][ T8336] dvmrp1: linktype set to 6 [ 421.878547][ T8360] device syzkaller0 entered promiscuous mode [ 422.574591][ T8366] device syzkaller0 entered promiscuous mode [ 425.044211][ T8394] device sit0 left promiscuous mode [ 425.107906][ T8394] device sit0 entered promiscuous mode [ 425.756575][ T8404] device syzkaller0 entered promiscuous mode [ 426.298973][ T8422] device syzkaller0 entered promiscuous mode [ 426.938601][ T8460] device wg2 entered promiscuous mode [ 427.207072][ T8468] device syzkaller0 entered promiscuous mode [ 430.031523][ T8519] device syzkaller0 entered promiscuous mode [ 430.914465][ T8523] device syzkaller0 entered promiscuous mode [ 431.637000][ T8529] device wg2 left promiscuous mode [ 431.760436][ T8529] device wg2 entered promiscuous mode [ 432.407101][ T8558] device syzkaller0 entered promiscuous mode [ 433.158665][ T8581] ë: port 1(ip6gretap0) entered blocking state [ 433.259030][ T8581] ë: port 1(ip6gretap0) entered disabled state [ 433.407282][ T8581] device ip6gretap0 entered promiscuous mode [ 435.656301][ T8607] device sit0 left promiscuous mode [ 435.990925][ T8610] device syzkaller0 entered promiscuous mode [ 436.608001][ T8617] device veth0_vlan left promiscuous mode [ 436.684451][ T8617] device veth0_vlan entered promiscuous mode [ 436.747720][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 436.764211][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 436.773140][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 437.816828][ T8641] device syzkaller0 entered promiscuous mode [ 439.138907][ T8639] device syzkaller0 entered promiscuous mode [ 442.481706][ T8645] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 443.096213][ T8685] device sit0 left promiscuous mode [ 443.461808][ T8687] device sit0 entered promiscuous mode [ 445.255189][ T8718] bond_slave_1: mtu less than device minimum [ 446.714470][ T8742] device syzkaller0 entered promiscuous mode [ 448.621308][ T28] audit: type=1400 audit(1762271120.129:155): avc: denied { create } for pid=8758 comm="syz.4.2243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 449.162114][ T8769] device veth1_macvtap entered promiscuous mode [ 449.203496][ T8769] device macsec0 entered promiscuous mode [ 449.210049][ T393] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 450.293665][ T8794] device syzkaller0 entered promiscuous mode [ 450.729158][ T8798] syz.2.2255[8798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.729249][ T8798] syz.2.2255[8798] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.890240][ T28] audit: type=1400 audit(1762271123.399:156): avc: denied { append } for pid=8837 comm="syz.0.2265" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 453.390686][ T8889] device syzkaller0 entered promiscuous mode [ 457.363017][ T28] audit: type=1400 audit(1762271128.859:157): avc: denied { ioctl } for pid=8918 comm="syz.3.2288" path="uts:[4026532965]" dev="nsfs" ino=4026532965 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 458.252766][ T8951] device pim6reg1 entered promiscuous mode [ 459.257277][ T8968] device pim6reg1 entered promiscuous mode [ 461.438789][ T8997] device syzkaller0 entered promiscuous mode [ 463.054822][ T9040] device syzkaller0 entered promiscuous mode [ 465.560389][ T9135] device syzkaller0 entered promiscuous mode [ 465.947099][ T9145] device sit0 entered promiscuous mode [ 467.417506][ T9178] syz.1.2359[9178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.417596][ T9178] syz.1.2359[9178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.139616][ T9271] IPv6: …: Disabled Multicast RS [ 471.548172][ T9293] device pim6reg1 entered promiscuous mode [ 472.191748][ T9299] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 472.354598][ T9301] device pim6reg1 left promiscuous mode [ 473.796696][ T9359] device sit0 left promiscuous mode [ 473.955116][ T9360] device sit0 entered promiscuous mode [ 474.611013][ T9374] device veth0_vlan left promiscuous mode [ 474.616993][ T9374] device veth0_vlan entered promiscuous mode [ 474.624699][ T9377] device sit0 left promiscuous mode [ 475.096635][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 475.105540][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 475.113379][ T1003] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 476.163043][ T9405] device sit0 left promiscuous mode [ 476.572683][ T9406] device sit0 entered promiscuous mode [ 478.360079][ T9467] syz.2.2438[9467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.360142][ T9467] syz.2.2438[9467] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.874836][ T9479] device pim6reg1 entered promiscuous mode [ 479.061534][ T9510] device wg2 left promiscuous mode [ 479.082260][ T9510] device wg2 entered promiscuous mode [ 480.222464][ T9550] device sit0 left promiscuous mode [ 480.743563][ T9555] device syzkaller0 entered promiscuous mode [ 480.773576][ T339] syzkaller0: tun_net_xmit 48 [ 482.094620][ T9586] device sit0 left promiscuous mode [ 482.586858][ T9593] device sit0 entered promiscuous mode [ 483.389918][ T9641] device veth1_macvtap left promiscuous mode [ 483.430194][ T9641] device macsec0 left promiscuous mode [ 483.513093][ T9643] device wg2 left promiscuous mode [ 483.539644][ T9646] device wg2 entered promiscuous mode [ 483.811090][ T9655] device sit0 left promiscuous mode [ 484.101154][ T9657] device syzkaller0 entered promiscuous mode [ 484.180541][ T9658] device sit0 entered promiscuous mode [ 485.670422][ T9693] syz.0.2502[9693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.670480][ T9693] syz.0.2502[9693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.197553][ T9762] device syzkaller0 entered promiscuous mode [ 488.973959][ T9777] device sit0 entered promiscuous mode [ 494.383421][ T9854] device sit0 left promiscuous mode [ 494.512289][ T9855] device sit0 entered promiscuous mode [ 495.322180][ T9877] device wg2 left promiscuous mode [ 498.227566][ T9920] device syzkaller0 entered promiscuous mode [ 498.885745][ T9927] device syzkaller0 entered promiscuous mode [ 500.285683][ T9958] .€: renamed from bond_slave_1 [ 500.291419][ T9961] ip6_vti0: mtu greater than device maximum [ 500.534341][ T9970] device syzkaller0 entered promiscuous mode [ 501.242881][ T9987] device syzkaller0 entered promiscuous mode [ 502.007489][ T9999] device wg2 entered promiscuous mode [ 503.416380][T10022] device sit0 left promiscuous mode [ 503.651742][T10022] device sit0 entered promiscuous mode [ 503.851280][T10041] device syzkaller0 entered promiscuous mode [ 504.221101][T10053] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.228263][T10053] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.775333][T10068] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 504.872850][T10068] device syzkaller0 entered promiscuous mode [ 505.939316][T10087] device bridge0 entered promiscuous mode [ 508.023197][T10125] device wg2 left promiscuous mode [ 508.100622][T10125] device wg2 entered promiscuous mode [ 521.014313][T10262] device syzkaller0 entered promiscuous mode [ 527.141344][T10340] device syzkaller0 entered promiscuous mode [ 529.410561][T10401] device syzkaller0 entered promiscuous mode [ 529.475970][T10404] device team_slave_1 left promiscuous mode [ 529.483460][T10404] bridge0: port 3(team_slave_1) entered disabled state [ 529.498983][T10404] device bridge_slave_1 left promiscuous mode [ 529.512321][T10404] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.560541][T10404] device bridge_slave_0 left promiscuous mode [ 529.570095][T10404] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.478468][T10452] device syzkaller0 entered promiscuous mode [ 531.830080][T10456] device syzkaller0 entered promiscuous mode [ 532.837232][T10512] device syzkaller0 entered promiscuous mode [ 534.707632][ T28] audit: type=1400 audit(1762271206.209:158): avc: denied { read } for pid=10583 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 194) OK Stopping crond: stopped /usr/sbin/crond (pid 187) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 141) [ 536.327900][ T28] audit: type=1400 audit(1762271207.829:159): avc: denied { search } for pid=10627 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 537.723514][ T28] audit: type=1400 audit(1762271209.229:160): avc: denied { write } for pid=142 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 537.813480][ T28] audit: type=1400 audit(1762271209.229:161): avc: denied { remove_name } for pid=142 comm="dhcpcd" name="sock" dev="tmpfs" ino=491 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 537.945828][ T28] audit: type=1400 audit(1762271209.229:162): avc: denied { unlink } for pid=142 comm="dhcpcd" name="sock" dev="tmpfs" ino=491 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 538.077373][ T28] audit: type=1400 audit(1762271209.289:163): avc: denied { unlink } for pid=142 comm="dhcpcd" name="pid" dev="tmpfs" ino=490 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping iptables: [ 538.237481][ T28] audit: type=1400 audit(1762271209.739:164): avc: denied { search } for pid=10669 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK Stopping system message bus: [ 538.332840][ T28] audit: type=1400 audit(1762271209.799:165): avc: denied { write } for pid=10669 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 538.588614][ T28] audit: type=1400 audit(1762271209.799:166): avc: denied { add_name } for pid=10669 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 538.638098][ T28] audit: type=1400 audit(1762271209.799:167): avc: denied { create } for pid=10669 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 done killall: can't kill pid 10226: No such process Stopping klogd: OK Stopping acpid: [ 540.236758][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 540.236772][ T28] audit: type=1400 audit(1762271211.739:170): avc: denied { write } for pid=88 comm="acpid" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 540.267100][ T28] audit: type=1400 audit(1762271211.739:171): avc: denied { remove_name } for pid=88 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 540.302624][ T28] audit: type=1400 audit(1762271211.739:172): avc: denied { unlink } for pid=88 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping syslogd: stopped /sbin/syslogd (pid 85) OK umount: can't remount debugfs read-only umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Connection to 10.128.0.62 closed by remote host. [ 542.558321][ T28] audit: type=1400 audit(1762271214.049:173): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[14784]" dev="pipefs" ino=14784 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 Sent SIGTERM toSent SIGKILL to all processes Requesting system poweroff [ 543.733718][ T393] device ip6gretap0 left promiscuous mode [ 543.739464][ T393] ë: port 1(ip6gretap0) entered disabled state [ 544.020050][ T393] GPL: port 1(erspan0) entered disabled state [ 544.027899][ T393] device erspan0 left promiscuous mode [ 544.033376][ T393] GPL: port 1(erspan0) entered disabled state [ 544.179304][ T393] device bridge_slave_1 left promiscuous mode [ 544.185387][ T393] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.192715][ T393] device bridge_slave_0 left promiscuous mode [ 544.198834][ T393] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.206877][ T393] device bridge_slave_1 left promiscuous mode [ 544.213000][ T393] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.220717][ T393] device bridge_slave_0 left promiscuous mode [ 544.226852][ T393] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.235851][ T393] device veth1_macvtap left promiscuous mode [ 544.682561][T10746] kvm: exiting hardware virtualization [ 544.688834][T10746] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 544.695476][T10746] ACPI: PM: Preparing to enter system sleep state S5 [ 544.702365][T10746] reboot: Power down serialport: VM disconnected.