last executing test programs: 35.879690603s ago: executing program 3 (id=1715): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xd, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="180000000000000000000000000000006112340000000000950000000000000039ff66a8d35b9a8db8662385249d0e49954967c507d58613b9cc81cf32a20736c39c4ec489febab6f4eebbb6a520f2b2b1ddd2c2b104b77f795899e4aa4ef67ae7ac3e9f008b21b487f6cdeaacfc21d8e0621793d01d6df377589b0a70b271c1"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001000)={&(0x7f0000000040)='cq_alloc\x00', 0xffffffffffffffff, 0x0, 0xa}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffff356, 0xfffffffffffffffb}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='(pu&\"&\t&&') ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000007000000000000000000008500000023000000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xfa, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x4}, 0x10000, 0xc8, 0x1000, 0x0, 0x0, 0x2, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000600850000009e"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000180)='signal_generate\x00', r8}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 35.206311045s ago: executing program 3 (id=1719): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r0}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 34.863004252s ago: executing program 3 (id=1722): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x44}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, 0x0, &(0x7f0000000b00)=""/151}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000009d000000010001000900000001000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r5, &(0x7f0000000080), 0x0}, 0x20) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000200)={'netdevsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) close(r6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) ioctl$SIOCSIFHWADDR(r6, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x4}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8943, &(0x7f0000000080)) 34.728815535s ago: executing program 3 (id=1725): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r0, &(0x7f0000000980), 0x20000992) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) (async, rerun: 64) close(0xffffffffffffffff) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x48) 34.698320165s ago: executing program 3 (id=1726): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x6, 0x8, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0700000004000000800000000100000028000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000007bd552a6585d8e8e6b28f9b9c77b00000000000000aa76fc39c05312d73ce219acf08f"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000007000000181200006cf47551f7e3616a4636d10978bbc4c37a6762b82d6544568641cac08c2a8cdd3da5c6f217461d2ed6022ae8", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r0, @ANYRES32=r3, @ANYRES8=r1], 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xf}, 0x94) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000740), 0xc4200, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000840)={0x0, r4}, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000004000000410000000000000001000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0240000004000000562fd33ea1000000e700000000000000000000000002000000000000"], 0x50) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b708000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYRES32=r7], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x20}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r10, r9, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r10}, &(0x7f0000000000), &(0x7f0000000080)=r8}, 0x20) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r11, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xd, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a0000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="b9ff030f6044238cb89e14f088a820ff43052f002000636777fbac141443e000000d62079f4b4d2f87e56dca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) 33.353776611s ago: executing program 3 (id=1733): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000046be1c8cdfbf81e800", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x8, 0x7, 0x6, 0x3, 0x0, 0x7, 0x800, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1326, 0x3, @perf_bp={0x0, 0xa}, 0x10602, 0x9, 0xb1a9, 0x5, 0x5, 0x1, 0x8, 0x0, 0x6, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x3) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r1, r0, 0x4, r0}, 0x10) syz_clone(0x410a0000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) 33.346139942s ago: executing program 1 (id=1735): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 33.280095513s ago: executing program 1 (id=1738): socketpair(0x29, 0x5, 0x36a, &(0x7f0000000280)={0xffffffffffffffff}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000500)={0x0, r0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000faffffffffffffff00"/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="06000069000000000000ffffffffffffffff000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000030000000400"/28], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00000004000000090000000c"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r5}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) recvmsg(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff000000820c0200", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00a300"/21], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071107500000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000380), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='ext4_ext_rm_idx\x00', r10}, 0x18) 32.499927748s ago: executing program 2 (id=1743): perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x10028, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x58, 0x5}, 0x14095, 0x4000000000000000, 0x0, 0x7, 0x2, 0x6, 0xfffd, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r4}, 0x18) syz_clone(0x44044000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x7, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000002ffffff8100000081"], 0x50) r9 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r10}, &(0x7f0000000180), &(0x7f00000001c0)=r9}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r9) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x15) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r11}, 0x10) 32.40561718s ago: executing program 1 (id=1745): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="10000000040000000400000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r2}, &(0x7f0000000a00), &(0x7f0000000a40)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r2}, &(0x7f0000000880), &(0x7f00000008c0)=r1}, 0x20) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000000)=0x8) 32.348866361s ago: executing program 1 (id=1746): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000040)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x5, &(0x7f0000000200)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x9e}, @call={0x85, 0x0, 0x0, 0x9e}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r3}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000013c0)={0x13, 0x1a, &(0x7f0000001100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x19fcdd1}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@call={0x85, 0x0, 0x0, 0xa7}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x8a}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfec, 0x0, 0x0, 0x0, 0x7}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x10, 0x0, &(0x7f0000001240), 0x41000, 0x2a, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x8, &(0x7f0000001280)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000012c0)={0x3, 0x2, 0xf58f, 0x1}, 0x10, 0xffffffffffffffff, r6, 0x5, 0x0, &(0x7f0000001340)=[{0x3, 0x3, 0x7, 0x5}, {0x0, 0x5, 0x8, 0xb}, {0x4, 0x1, 0x7, 0x2}, {0x3, 0x4, 0x9, 0xc}, {0x5, 0x1, 0xe, 0x8}]}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001480)=r7, 0x4) r8 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40047452, 0xf0ff1f00000000) 32.088230736s ago: executing program 4 (id=1747): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001000)=ANY=[@ANYRES64=0x0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r2, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x2}, 0x40000300) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x20, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc}, [@exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x18694b9a3f845d23}}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff9}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @alu={0x7, 0x0, 0xc, 0x9, 0x5, 0x8}, @map_fd={0x18, 0x4, 0x1, 0x0, r3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffb}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}]}, &(0x7f00000017c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x40002002) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000090000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) sendmsg(r2, &(0x7f0000001380)={&(0x7f0000001080)=@nfc_llcp={0x27, 0x0, 0xffffffffffffffff, 0x4, 0xc1, 0x5, "8e38818d46c23b934a24fea972f9e763bca06021347150c7acbaf643224f80f6bfc3352bb9c00890c7e26b230ffa896da9fbd4b3e5969595c7573b8bc0f8bd", 0x3e}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001280)="26d8c3b3fcee7cbe56c21bc6af6a62f13286d01e01f4ed94acb96a5973be4da1b1b866844ff8c1ca3b3f5034d313ce7b51a7aa6654632e0f528534f7b41febbd6704363f7be702bc92cfe229e79f14b4a87b1ca258e01f02f0885ffb9d5dbd630aeda0d5dea0ddd43d9f66f0255c9d51a9153abc688cadef6b55b9691de440ca76081e00ae139abea680a2445784e4094541d4952398538754fb804abd1b4cd7ff5e4c22a8347681ab61d414af37e6ce0eb1bfa83a48296cea07a3296c5f21d549a53872ced5e8daf079b36d88cb4271c33e3a8aa0fe4385c153cd19195780db27c42edf09e6e95ae76dbf28a88b81", 0xef}], 0x1, &(0x7f00000025c0)=[{0x110, 0x0, 0xd3d9, "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"}, {0x88, 0x88, 0x1, "765c0de8c1dcd404444857b5ddff495cd750c415bb18e23f21787b3be08021e9beb20088e447b35ae2282e4454920cd1a94e02ceb66e65742ac47825aad7769a58fc1f80e591fad18233803265762d124d49d060fe5bda89f95125d22379ad15bf505f1ce19594c899cd8ab843232aed62ec"}, {0xe8, 0x115, 0x11907a5e, "c8530dd596b2de3cf778bcbc0a6c7ca829e557b68891347c4fc470de6ab469a69707eb9c17ad31fe75dc11b67a9b170dd531d1a496483dbab0b6bac4c11de05f9892865379ff20e53e7d7abdcb2f34748730bf0d2ff6b9da2ec356d1ae69b485ceea3c117791db4d6cb192719becd0d5134a80fb72d6f8f3957c6d1be861031db562c8bad1f11fef4324724b7a918b27ba9fc9f7ef64054064661da05a15721732bf2bb58e6e866b0b63e93e791b0ac1e80237c1dbb160ccb162035608837116b793a9e93b76960effabac643fb72bbf49"}], 0x280}, 0x40000) 31.929824299s ago: executing program 2 (id=1748): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x5, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4878, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f00000004c0)='GPL\x00', 0xffff, 0xf6, &(0x7f0000000500)=""/246, 0x40f00, 0x40, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000640)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0x10, 0x4}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f00000006c0)=[{0x0, 0x5, 0xb, 0x5}, {0x0, 0x3, 0xc, 0x3}, {0x3, 0x1, 0xa, 0x9}, {0x1, 0x2, 0xa, 0x4}], 0x10, 0x3}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cpuacct.stat\x00', 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000a8000000a8000000030000000900000000000009020000000f00000007000006040000000d0000000600000005000000fdffffff010000000500000007000000040000000f0000007f00000007000000010000001000000005000000000000000300000d000000000e00000000000200000001000000050000000f000000050000060400000008000000080000000300000001000000090000000600000004000000710100000b0000002157ffff005f00"], &(0x7f0000000040)=""/11, 0xc3, 0xfe5b, 0x1, 0x200, 0x10000, @value=r2}, 0x28) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYRESOCT=r3, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000544e00000000800000"], 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d80)=ANY=[@ANYRES32=r5, @ANYRES32, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="c9bbcd417765f3b116a2c4db1683fa67fc2debaa44ac12ffb3366aa5b7918ea08c27a51f9ba8944adf10289a21ebc3e9ceb4c22e13aac2882842a3bf894bc5917ffcf958e14ad33e05668f5b9ab12bb063b0e1238c857085964e46e0718c253ca1090119523f9f542a9e5e92ccc3894807a18937ec764a130a59c07442a033dc50120dc31cf0efa86414cbbe316a4b00060000000000000061417c100125fd3daba734fbc18ffa399acd1804a1e8fd95533db717742457908cda", @ANYRES64=0x0], 0x10) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x0, 0x0}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="000000fdff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000500000002000000000000080000000000005f25"], &(0x7f0000000080)=""/132, 0x29, 0x84, 0x1, 0x2}, 0x28) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x7, '\x00', 0x0, r8, 0x5, 0x2, 0x5}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r10}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x100, 0x0, 0x40, 0x4c00, r9, 0xff, '\x00', r10, 0xffffffffffffffff, 0x3, 0x2, 0x5}, 0x50) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000940)={0xb68a, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_lsm={0x1d, 0x14, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@jmp={0x5, 0x0, 0xc, 0x2, 0x7, 0xffffffffffffffed, 0xfffffffffffffffc}, @ldst={0x2, 0x0, 0x2, 0x0, 0x4, 0xffffffffffffffc0, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000880)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x71, '\x00', r10, 0x1b, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000900)={0x5, 0x3, 0x2, 0x9}, 0x10, r12, 0x0, 0xfffffffffffff86, &(0x7f0000000980)=[r2, r2, r6], &(0x7f00000009c0)=[{0x1, 0x1, 0x1, 0x5}, {0x0, 0x5, 0x1, 0x1}], 0x10, 0x1ff}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='percpu_free_percpu\x00', r0}, 0x18) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0xfffffffffffffd94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6843}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000600), 0x1000}, 0x38) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 31.844068841s ago: executing program 4 (id=1749): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 31.819930301s ago: executing program 4 (id=1750): bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="d2205d96c717ab96f0ded75d86dd", 0x0, 0xd5b5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x800, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x76cc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="06000069000000000000ffffffffffffffff00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000000030000000400"/28], 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff000000820c0200", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00a300"/20], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x8003, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000380), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8931, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 31.512774578s ago: executing program 2 (id=1751): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000010000000000000000000000711205000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x4b}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x39) 31.506112437s ago: executing program 4 (id=1752): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 31.484934738s ago: executing program 2 (id=1753): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r0}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r1}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 31.402705019s ago: executing program 4 (id=1754): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x30400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff56) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x141141, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x6}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000fc0)={0x6, 0x29, &(0x7f0000001080)=ANY=[@ANYBLOB="18000000386fc13f6b2e658e7744863aa2c81c7de3127b2fd2a4668029dc0000f4ffffffffffffff181100004d89383cdfff0996e503e05375ab8ee2e222a6ba09f25e4f892ad0574d9e0761e98b753c0187397870dd95868dab98f5df89b66dacc90a45395bc4b0aeeb9ca270e5b96c0bed9af4c9cf6180c30607b90622590abefba3e4186f6ff5a31a2005405b4c41639010faab310b46b0f1470cb1f8e6e9df11fe3804d6ebfe288cf3cb975601000000000000000db8ad47324825e1f265", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008c670600fcffffff652c8000100000009500", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB], &(0x7f00000004c0)='syzkaller\x00', 0x5, 0x0, &(0x7f0000000500), 0x41000, 0x1e, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000840)={0x0, 0xc, 0x8001, 0x3}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000f40)=[{0x4, 0x5, 0xf, 0x2}, {0x0, 0x1, 0xb, 0x3}, {0x1, 0x1, 0x8, 0xa}, {0x5, 0x1, 0x7, 0x9}, {0x2, 0x2, 0x5}, {0x1, 0x1, 0x3, 0xc}, {0x0, 0x5, 0x7, 0x2}, {0x3, 0x5}], 0x10, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4}, 0x10}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x4, 0x4, 0x4, 0x6, 0x900}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x10000, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4000000, 0x3, 0x0, 0x0, @void, @value=0xff070000}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b000000080000000c000000fbbfffff01000000", @ANYRES32=0x1, @ANYBLOB='>\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 31.256760462s ago: executing program 2 (id=1755): bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x5, 0x100, 0x8, 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="c60a0100000000006111b400000000008510000002000000850000001b00000095000e000000000095000000000000003764e7be95cd1b051a0f3cd983c673d1cc389e632d686ff6bfc1884d28861b616a4e21cc0c6b735256c1d8389642393b41331d67072eac14cc61e5392e2bfdb6c35de43684005670f403f1fc05a286a2029fb37849d0ec6f224dd3578c7a5f29bfec9c769e5eb33f3737ee2f36d9d6bd53f70c048c0985405510c8994db5"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='sched_switch\x00', r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 31.199020583s ago: executing program 1 (id=1756): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000940), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000440)={&(0x7f0000001a80)="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", &(0x7f0000000540)=""/172, &(0x7f0000000600)="8bd16b50868c58d9645e50ac833ac62d6ae7712716197d418ebde454d8313a3502ad53e97e9c6b50d40dcfcab88b4f4eba96e1d24f3bb04f72d23525c1f53bbe0e22177222eb9bacf3c220788288346f0f0f94c63f7b501921acbf1a660db59813d38d4a887347757a3e8f5b22a016285e266865ceafee30dcebb5f13a7f200fa6a612b22ba8368bdcd05af60ca5bc0d042488dc3dbaefb6b00b11650914de2fca2f11e35845e29732699d909ee993e44696617651c3b4c090e301f6", &(0x7f0000000400)="4bb134f8067ba9632af919e385fbed01c2343b0734ad810a1400d3f028541b8c", 0x5, r0, 0x4}, 0x38) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80044, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xe}, 0x0, 0xc8, 0xfffffffd, 0x0, 0xffff, 0x0, 0x6, 0x0, 0xfffffffb}, 0x0, 0x1, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f00000001c0)={0x0, 0xfffffffffffffd61, 0x0}, 0x0) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x120) write$cgroup_pid(r6, &(0x7f0000000200)=0xffffffffffffffff, 0x12) (async) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000010240)=r8, 0x5a) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x600e7180, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r11}, 0x18) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r12, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r12, 0x80047441, 0xf0ff1f00000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64=r8], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x2e, r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff35, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c5d}, 0x94) (async) r13 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@o_path={&(0x7f0000000800)='./file0\x00', 0x0, 0x8, r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1e, 0x4, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5ce5, 0x0, 0x0, 0x0, 0x36ce}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000700)='syzkaller\x00', 0xf, 0x9, &(0x7f0000000740)=""/9, 0x40f00, 0x34, '\x00', 0x0, @sk_lookup, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f00000007c0)={0x1, 0xa, 0xca, 0x3}, 0x10, r8, r13, 0x6, &(0x7f0000000880), &(0x7f00000008c0)=[{0x2, 0x5, 0x7}, {0x3, 0x1, 0xc, 0x7}, {0x2, 0x5, 0x0, 0xc}, {0x5, 0x1, 0x5, 0x7}, {0x0, 0x1, 0xd, 0x5}, {0x3, 0x4, 0xd, 0x6}]}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f00000002c0)="839839fd544a9c6118b082966ba2880a4dc1354d7278b79a76e0879a9de0a625c9728ab943711413ecb6f07769d839a9bd14fc69a32adce460d699b98801823376bba948a6743d29a298bfd749881f7d64d7d1e3a2ca", &(0x7f0000000380)=""/16}, 0x20) 31.173381164s ago: executing program 1 (id=1757): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x4, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000740)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYBLOB="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", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@type_tag={0xe, 0x0, 0x0, 0x12, 0x1}, @struct={0x5, 0x5, 0x0, 0x4, 0x1, 0x1, [{0x10, 0x2, 0x200}, {0x7, 0x3}, {0xc, 0x2, 0x7}, {0x7, 0x3, 0x2b}, {0xa, 0x2, 0x5}]}]}, {0x0, [0x2e]}}, &(0x7f00000003c0)=""/105, 0x6f, 0x69}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x9, 0x0, r5, 0xa, '\x00', 0x0, r6, 0x5, 0x2}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000004440)={0x0, 0x0, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0x6b5}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) 30.497826557s ago: executing program 2 (id=1758): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x72, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) r4 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x1, 0x8, 0x4, 0x1, 0x0, 0x1, 0xd800, 0x9, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000000), 0x9}, 0x4080, 0x7, 0x7, 0x3, 0x9, 0xfffffffb, 0x1, 0x0, 0xc, 0x0, 0x8}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000040)='\'\xfd\x00') bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x1c, 0x20000000000000bb, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) (async) r8 = openat$cgroup_ro(r7, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d900000000000000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r10}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r11}, 0x18) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x3, 0x4, 0x9, 0x10200, 0xffffffffffffffff, 0x9, '\x00', 0x0, r2, 0x5, 0x5, 0x0, 0xe, @void, @value, @value=r8}, 0x50) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r12, 0x0, 0x20000000}, 0x20) (async) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r13}, 0x10) 30.490673667s ago: executing program 4 (id=1768): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1d000000040000000800"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00'], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYRES8=r1, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001380)=ANY=[@ANYBLOB="00000018110400ee2ba495d8cd1f65291f729a2c467491ad98f91659ad5476279a0a1e027432432efd12935a698a27beca2514f112badade55b4d269ff1789451110c60a591d92f826b86b4d67fc32dcef8c980b31ef18f99b32e64c690863e16071a484752aba00e6de486822198dfd304e1886f8f7c671778981f97e26b2c450e9d9ed5eb3d9810af5e4f3ed9157b13b07adaa374dcb7daf2043921047a67b04cf055a85c0fb2022219181b5aeb83f7facd754452bffb5cf974adc5c768d145cf8bc2c150938a670f1d4dada0fd2f67be4ea191b683007c369", @ANYRES32=r2, @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f00000005c0)=ANY=[@ANYRESOCT=r1, @ANYRES8=0x0, @ANYRES16], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="fcffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000006002000"/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", 0x0, 0x5, r6}, 0x38) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@cgroup, 0x15, 0x1, 0x9390, &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000300)=[0x0], &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0]}, 0x40) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x20, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x18) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x11010, 0x5, 0x3, 0x6, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1, @perf_config_ext={0x6, 0x104800}, 0x4dc6, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0xfffffffe, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffc000000002, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000c00)=ANY=[@ANYBLOB], 0x0, 0xa8, 0x0, 0x1, 0x7}, 0x28) r9 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid\x00') ioctl$TUNSETNOCSUM(r9, 0xb703, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 11.239610331s ago: executing program 0 (id=1708): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000e000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 9.217476201s ago: executing program 0 (id=1708): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000e000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 7.119021891s ago: executing program 0 (id=1708): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000e000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 4.880263295s ago: executing program 0 (id=1708): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000e000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 2.410322203s ago: executing program 0 (id=1708): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000e000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 0s ago: executing program 0 (id=1708): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000e000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x5c, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) kernel console output (not intermixed with test programs): 818][ T2182] device syzkaller0 entered promiscuous mode [ 64.436408][ T2188] device syzkaller0 entered promiscuous mode [ 65.091139][ T2221] syz.4.545[2221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.091229][ T2221] syz.4.545[2221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.264729][ T2212] device syzkaller0 entered promiscuous mode [ 65.861277][ T2234] device pim6reg1 entered promiscuous mode [ 66.094148][ T2241] device pim6reg1 entered promiscuous mode [ 66.558401][ T2264] device syzkaller0 entered promiscuous mode [ 66.630798][ T2271] syz.2.558[2271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.630899][ T2271] syz.2.558[2271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.714183][ T2270] device syzkaller0 entered promiscuous mode [ 67.535265][ T2283] device syzkaller0 entered promiscuous mode [ 67.997355][ T2305] tap0: tun_chr_ioctl cmd 1074025676 [ 68.017997][ T2305] tap0: tun_chr_ioctl cmd 1074025675 [ 68.040228][ T2305] tap0: persist disabled [ 68.207946][ T2317] syz.1.576[2317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.208045][ T2317] syz.1.576[2317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.654419][ T2348] ÿÿÿÿÿÿ: renamed from vlan1 [ 69.268417][ T2365] device veth1_macvtap left promiscuous mode [ 69.341925][ T2365] device wg2 left promiscuous mode [ 69.938728][ T2384] syz.4.593[2384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.944742][ T2384] syz.4.593[2384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.147011][ T2393] syz.0.597[2393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.168803][ T2393] syz.0.597[2393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.885044][ T2474] device wg2 left promiscuous mode [ 71.916210][ T2479] device wg2 entered promiscuous mode [ 72.494833][ T2503] device sit0 entered promiscuous mode [ 72.511009][ T2508] syz.4.628[2508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.511078][ T2508] syz.4.628[2508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.754003][ T2509] device sit0 left promiscuous mode [ 73.711926][ T2540] device pim6reg1 entered promiscuous mode [ 74.048971][ T2542] device syzkaller0 entered promiscuous mode [ 74.166128][ T2554] device veth0_vlan left promiscuous mode [ 74.181066][ T2554] device veth0_vlan entered promiscuous mode [ 74.198237][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 74.219399][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 74.240330][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.282411][ T2564] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.299001][ T2564] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.339387][ T2575] device bridge_slave_1 left promiscuous mode [ 74.360169][ T2575] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.367818][ T2575] device bridge_slave_0 left promiscuous mode [ 74.384152][ T2575] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.440517][ T2572] device syzkaller0 entered promiscuous mode [ 74.452633][ T2579] syz.4.650[2579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.452726][ T2579] syz.4.650[2579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.584480][ T2583] device veth0_vlan left promiscuous mode [ 74.631281][ T2583] device veth0_vlan entered promiscuous mode [ 74.651199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 74.660239][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 74.673718][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 75.662749][ T2617] device veth0_vlan left promiscuous mode [ 75.690122][ T2617] device veth0_vlan entered promiscuous mode [ 75.813577][ T2628] syz.3.665[2628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.813638][ T2628] syz.3.665[2628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.969308][ T30] audit: type=1400 audit(1756892346.244:141): avc: denied { create } for pid=2634 comm="syz.3.668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 76.011341][ T2637] tap0: tun_chr_ioctl cmd 1074025688 [ 77.047902][ T2675] syz.0.679[2675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.047986][ T2675] syz.0.679[2675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.205968][ T2673] device veth0_vlan left promiscuous mode [ 77.225675][ T2673] device veth0_vlan entered promiscuous mode [ 77.274831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.284198][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.295400][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 77.605175][ T2697] device pim6reg1 entered promiscuous mode [ 77.787799][ T30] audit: type=1400 audit(1756892348.064:142): avc: denied { create } for pid=2703 comm="syz.2.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 78.081526][ T2708] syz.4.689[2708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.083012][ T2708] syz.4.689[2708] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.143082][ T2720] syz.1.693[2720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.171543][ T2720] syz.1.693[2720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.934155][ T2734] device veth0_vlan left promiscuous mode [ 79.020586][ T2734] device veth0_vlan entered promiscuous mode [ 79.981248][ T2745] device syzkaller0 entered promiscuous mode [ 80.260545][ T2767] bond_slave_1: mtu less than device minimum [ 80.344113][ T2774] bpf_get_probe_write_proto: 2 callbacks suppressed [ 80.344131][ T2774] syz.2.710[2774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.365465][ T2776] device sit0 left promiscuous mode [ 80.385333][ T2774] syz.2.710[2774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.507135][ T2780] device sit0 entered promiscuous mode [ 80.702314][ T2779] tap0: tun_chr_ioctl cmd 1074025692 [ 80.759673][ T2789] syz.3.723[2789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.759771][ T2789] syz.3.723[2789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.539878][ T2831] syz.3.725[2831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.670038][ T2831] syz.3.725[2831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.922856][ T2871] device veth0_vlan left promiscuous mode [ 82.967951][ T30] audit: type=1400 audit(1756892353.244:143): avc: denied { read } for pid=2876 comm="syz.1.738" dev="nsfs" ino=4026532557 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.020229][ T2871] device veth0_vlan entered promiscuous mode [ 83.058643][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.066549][ T30] audit: type=1400 audit(1756892353.244:144): avc: denied { open } for pid=2876 comm="syz.1.738" path="net:[4026532557]" dev="nsfs" ino=4026532557 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.100444][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.108289][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 83.228811][ T2880] device syzkaller0 entered promiscuous mode [ 83.252999][ T2881] ÿÿÿÿÿÿ_“–ÿ’¯: renamed from vlan1 [ 83.339109][ T2887] syz.0.739[2887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.339211][ T2887] syz.0.739[2887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.360968][ T2884] device syzkaller0 entered promiscuous mode [ 83.695154][ T2908] syz.2.745[2908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.695308][ T2908] syz.2.745[2908] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.970803][ T2914] device sit0 left promiscuous mode [ 84.194272][ T2916] device sit0 entered promiscuous mode [ 84.675898][ T2938] device syzkaller0 entered promiscuous mode [ 85.387164][ T2971] bpf_get_probe_write_proto: 2 callbacks suppressed [ 85.387179][ T2971] syz.4.766[2971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.419718][ T2971] syz.4.766[2971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.501906][ T2974] device veth0_vlan left promiscuous mode [ 85.572925][ T2974] device veth0_vlan entered promiscuous mode [ 85.579232][ T30] audit: type=1400 audit(1756892355.854:145): avc: denied { create } for pid=2978 comm="syz.4.768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 85.628098][ T1358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.657561][ T1358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.665635][ T1358] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 85.676211][ T30] audit: type=1400 audit(1756892355.864:146): avc: denied { create } for pid=2976 comm="syz.0.769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 85.766575][ T2986] device syzkaller0 entered promiscuous mode [ 86.499651][ T30] audit: type=1400 audit(1756892356.774:147): avc: denied { create } for pid=2995 comm="syz.2.774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 86.724082][ T3000] device syzkaller0 entered promiscuous mode [ 87.388171][ T3013] syz.0.779[3013] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.388262][ T3013] syz.0.779[3013] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.635771][ T3030] device pim6reg1 entered promiscuous mode [ 87.941835][ T3039] device pim6reg1 entered promiscuous mode [ 88.364374][ T3058] device syzkaller0 entered promiscuous mode [ 89.745116][ T3083] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 89.800810][ T3083] device syzkaller0 entered promiscuous mode [ 90.246288][ T3114] device syzkaller0 entered promiscuous mode [ 90.499062][ T3118] device syzkaller0 entered promiscuous mode [ 90.855868][ T3148] syz.2.820[3148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.855966][ T3148] syz.2.820[3148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.857367][ T3147] syz.2.820[3147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.071675][ T3170] device pim6reg1 entered promiscuous mode [ 91.354425][ T3174] device syzkaller0 entered promiscuous mode [ 91.579058][ T3196] device pim6reg1 entered promiscuous mode [ 92.103305][ T3238] device syzkaller0 entered promiscuous mode [ 92.491412][ T3259] device sit0 left promiscuous mode [ 92.683928][ T3259] device pim6reg1 entered promiscuous mode [ 93.878967][ T3308] device syzkaller0 entered promiscuous mode [ 93.912134][ T3316] syz.0.873[3316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.912218][ T3316] syz.0.873[3316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.783235][ T3350] syz.3.884[3350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.842892][ T3350] syz.3.884[3350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.161565][ T3390] device veth1_macvtap left promiscuous mode [ 96.258525][ T3390] device veth1_macvtap entered promiscuous mode [ 96.284451][ T3390] device macsec0 entered promiscuous mode [ 96.294589][ T3400] syz.0.902[3400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.294691][ T3400] syz.0.902[3400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.477010][ T3404] GPL: port 1(erspan0) entered blocking state [ 96.540403][ T3404] GPL: port 1(erspan0) entered disabled state [ 96.566678][ T3404] device erspan0 entered promiscuous mode [ 98.011829][ T3442] syz.3.914[3442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.011923][ T3442] syz.3.914[3442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.420575][ T30] audit: type=1400 audit(1756892368.704:148): avc: denied { create } for pid=3446 comm="syz.0.915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 100.260771][ T3483] syz.1.928[3483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.260879][ T3483] syz.1.928[3483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.352898][ T3496] syz.0.942[3496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.483421][ T3496] syz.0.942[3496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.861546][ T3517] syz.2.949[3517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.920331][ T3517] syz.2.949[3517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.119964][ T30] audit: type=1400 audit(1756892371.394:149): avc: denied { create } for pid=3526 comm="syz.2.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 102.021167][ T3556] syz.3.952[3556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.021270][ T3556] syz.3.952[3556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.158605][ T3560] syz.0.963[3560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.210514][ T3560] syz.0.963[3560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.240540][ T3574] device sit0 left promiscuous mode [ 102.369651][ T3568] device sit0 entered promiscuous mode [ 104.069895][ C1] sched: RT throttling activated [ 105.026932][ T3618] syz.0.969[3618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.026986][ T3618] syz.0.969[3618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.101297][ T3653] syz.2.975[3653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.153104][ T3653] syz.2.975[3653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.299318][ T3666] syz.2.980[3666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.389021][ T3666] syz.2.980[3666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.223359][ T3713] syz.2.998[3713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.270613][ T3713] syz.2.998[3713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.512937][ T3737] tun0: tun_chr_ioctl cmd 1074025677 [ 107.550932][ T3737] tun0: linktype set to 776 [ 108.223281][ T3776] syz.0.1015[3776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.223374][ T3776] syz.0.1015[3776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.569363][ T3798] device pim6reg1 entered promiscuous mode [ 109.501251][ T3826] syz.1.1031[3826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.501356][ T3826] syz.1.1031[3826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.657598][ T3834] device macsec0 entered promiscuous mode [ 110.218106][ T3851] device pim6reg1 entered promiscuous mode [ 110.812529][ T3871] syz.2.1047[3871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.812620][ T3871] syz.2.1047[3871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.821812][ T3923] syz.2.1061[3923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.854554][ T3923] syz.2.1061[3923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.120815][ T3976] ref_ctr_offset mismatch. inode: 0x45e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 113.228142][ T3980] syz.0.1075[3980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.228238][ T3980] syz.0.1075[3980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.217148][ T4024] syz.0.1091[4024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.320060][ T4024] syz.0.1091[4024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.383544][ T4032] device macsec0 entered promiscuous mode [ 114.740983][ T4069] syz.3.1105[4069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.741087][ T4069] syz.3.1105[4069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.989105][ T30] audit: type=1400 audit(1756892385.264:150): avc: denied { create } for pid=4080 comm="syz.0.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 115.125495][ T30] audit: type=1400 audit(1756892385.404:151): avc: denied { create } for pid=4080 comm="syz.0.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 115.444411][ T4092] device syzkaller0 entered promiscuous mode [ 115.882487][ T4110] syz.0.1117[4110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.882598][ T4110] syz.0.1117[4110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.325997][ T30] audit: type=1400 audit(1756892386.584:152): avc: denied { create } for pid=4125 comm="syz.2.1122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 117.362518][ T4140] device veth1_macvtap left promiscuous mode [ 117.370200][ T4140] device macsec0 left promiscuous mode [ 117.443291][ T4140] device veth1_macvtap entered promiscuous mode [ 117.466313][ T4140] device macsec0 entered promiscuous mode [ 117.502683][ T4143] syz.4.1128[4143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.502797][ T4143] syz.4.1128[4143] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.657329][ T4152] device veth0_vlan left promiscuous mode [ 117.712594][ T4152] device veth0_vlan entered promiscuous mode [ 118.050702][ T4176] device erspan0 left promiscuous mode [ 118.063004][ T4176] GPL: port 1(erspan0) entered disabled state [ 118.217748][ T4186] device veth0_vlan left promiscuous mode [ 118.254916][ T4186] device veth0_vlan entered promiscuous mode [ 118.286254][ T1358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.331807][ T1358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.351357][ T1358] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 118.405801][ T4199] device veth0_vlan left promiscuous mode [ 118.448905][ T4199] device veth0_vlan entered promiscuous mode [ 118.540595][ T1358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.558811][ T1358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.591310][ T1358] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 118.840651][ T4216] bpf_get_probe_write_proto: 2 callbacks suppressed [ 118.840671][ T4216] syz.3.1152[4216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.847483][ T4216] syz.3.1152[4216] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.167745][ T4234] device syzkaller0 entered promiscuous mode [ 119.356613][ T30] audit: type=1400 audit(1756892389.634:153): avc: denied { create } for pid=4232 comm="syz.0.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 119.398076][ T4242] device veth0_vlan left promiscuous mode [ 119.452584][ T4242] device veth0_vlan entered promiscuous mode [ 119.590266][ T4264] syz.3.1168[4264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.590354][ T4264] syz.3.1168[4264] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.853983][ T4270] device sit0 left promiscuous mode [ 120.070550][ T4272] device sit0 entered promiscuous mode [ 120.342720][ T4282] syz.1.1175[4282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.343870][ T4282] syz.1.1175[4282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.600431][ T4297] syz.0.1180[4297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.704484][ T4297] syz.0.1180[4297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.950926][ T4314] device veth0_vlan left promiscuous mode [ 121.024667][ T4314] device veth0_vlan entered promiscuous mode [ 121.092132][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.100995][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.108701][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ_“–ÿ’¯: link becomes ready [ 121.307485][ T4322] device sit0 entered promiscuous mode [ 121.574634][ T4339] syz.1.1194[4339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.574738][ T4339] syz.1.1194[4339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.559100][ T4377] device sit0 entered promiscuous mode [ 122.758328][ T4388] device pim6reg1 entered promiscuous mode [ 124.253887][ T4454] bpf_get_probe_write_proto: 6 callbacks suppressed [ 124.253904][ T4454] syz.4.1232[4454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.261437][ T4454] syz.4.1232[4454] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.278270][ T4451] device pim6reg1 entered promiscuous mode [ 124.403735][ T4458] syz.2.1234[4458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.403847][ T4458] syz.2.1234[4458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.426007][ T4460] syz.0.1235[4460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.444471][ T4460] syz.0.1235[4460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 124.964081][ T4484] syz.4.1243[4484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.032346][ T4484] syz.4.1243[4484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.171830][ T4494] syz.1.1247[4494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.272233][ T4494] syz.1.1247[4494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.880233][ T4543] device syzkaller0 entered promiscuous mode [ 125.899135][ T30] audit: type=1400 audit(1756892396.174:154): avc: denied { ioctl } for pid=4546 comm="syz.0.1263" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 126.994330][ T4612] device syzkaller0 entered promiscuous mode [ 127.099374][ T4578] syz.2.1270 (4578) used greatest stack depth: 21360 bytes left [ 129.384566][ T4739] bpf_get_probe_write_proto: 12 callbacks suppressed [ 129.384585][ T4739] syz.1.1327[4739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.391903][ T4739] syz.1.1327[4739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.944865][ T4769] FAULT_INJECTION: forcing a failure. [ 129.944865][ T4769] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 129.980086][ T4769] CPU: 0 PID: 4769 Comm: syz.2.1339 Not tainted syzkaller #0 [ 129.987794][ T4769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 129.998497][ T4769] Call Trace: [ 130.001779][ T4769] [ 130.004722][ T4769] __dump_stack+0x21/0x30 [ 130.009052][ T4769] dump_stack_lvl+0xee/0x150 [ 130.013650][ T4769] ? show_regs_print_info+0x20/0x20 [ 130.018855][ T4769] dump_stack+0x15/0x20 [ 130.023102][ T4769] should_fail+0x3c1/0x510 [ 130.027516][ T4769] should_fail_usercopy+0x1a/0x20 [ 130.032728][ T4769] _copy_from_user+0x20/0xd0 [ 130.037326][ T4769] sock_do_ioctl+0x175/0x300 [ 130.042010][ T4769] ? sock_show_fdinfo+0xa0/0xa0 [ 130.047043][ T4769] ? selinux_file_ioctl+0x377/0x480 [ 130.052241][ T4769] sock_ioctl+0x4bc/0x6b0 [ 130.056656][ T4769] ? sock_poll+0x3d0/0x3d0 [ 130.061198][ T4769] ? __fget_files+0x2c4/0x320 [ 130.065986][ T4769] ? security_file_ioctl+0x84/0xa0 [ 130.071111][ T4769] ? sock_poll+0x3d0/0x3d0 [ 130.075538][ T4769] __se_sys_ioctl+0x121/0x1a0 [ 130.080221][ T4769] __x64_sys_ioctl+0x7b/0x90 [ 130.084817][ T4769] x64_sys_call+0x2f/0x9a0 [ 130.089231][ T4769] do_syscall_64+0x4c/0xa0 [ 130.093754][ T4769] ? clear_bhb_loop+0x50/0xa0 [ 130.098527][ T4769] ? clear_bhb_loop+0x50/0xa0 [ 130.103306][ T4769] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 130.109195][ T4769] RIP: 0033:0x7f5c52311be9 [ 130.113608][ T4769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.133383][ T4769] RSP: 002b:00007f5c50d7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 130.141805][ T4769] RAX: ffffffffffffffda RBX: 00007f5c52548fa0 RCX: 00007f5c52311be9 [ 130.149782][ T4769] RDX: 0000200000000080 RSI: 0000000000008943 RDI: 000000000000000d [ 130.157749][ T4769] RBP: 00007f5c50d7a090 R08: 0000000000000000 R09: 0000000000000000 [ 130.165745][ T4769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 130.173798][ T4769] R13: 00007f5c52549038 R14: 00007f5c52548fa0 R15: 00007fffbf70a298 [ 130.181788][ T4769] [ 130.200374][ T4772] syz.3.1340[4772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.200495][ T4772] syz.3.1340[4772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.988763][ T4812] syz.2.1355[4812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.050246][ T4812] syz.2.1355[4812] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.102204][ T4816] FAULT_INJECTION: forcing a failure. [ 131.102204][ T4816] name failslab, interval 1, probability 0, space 0, times 1 [ 131.128062][ T4816] CPU: 0 PID: 4816 Comm: syz.1.1356 Not tainted syzkaller #0 [ 131.135639][ T4816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 131.146164][ T4816] Call Trace: [ 131.149563][ T4816] [ 131.152672][ T4816] __dump_stack+0x21/0x30 [ 131.157098][ T4816] dump_stack_lvl+0xee/0x150 [ 131.161690][ T4816] ? show_regs_print_info+0x20/0x20 [ 131.167192][ T4816] dump_stack+0x15/0x20 [ 131.171467][ T4816] should_fail+0x3c1/0x510 [ 131.175891][ T4816] __should_failslab+0xa4/0xe0 [ 131.180772][ T4816] should_failslab+0x9/0x20 [ 131.185279][ T4816] slab_pre_alloc_hook+0x3b/0xe0 [ 131.190252][ T4816] ? __alloc_skb+0xe0/0x740 [ 131.194843][ T4816] kmem_cache_alloc+0x44/0x260 [ 131.199713][ T4816] ? br_netlink_fini+0x30/0x30 [ 131.204476][ T4816] __alloc_skb+0xe0/0x740 [ 131.209011][ T4816] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 131.214298][ T4816] rtnetlink_event+0xd2/0x1a0 [ 131.219092][ T4816] raw_notifier_call_chain+0x90/0x100 [ 131.224469][ T4816] dev_change_tx_queue_len+0x1af/0x330 [ 131.229931][ T4816] ? dev_set_mtu+0xc0/0xc0 [ 131.234450][ T4816] dev_ifsioc+0x25c/0xe70 [ 131.238867][ T4816] ? dev_ioctl+0xd10/0xd10 [ 131.243367][ T4816] ? __kasan_check_write+0x14/0x20 [ 131.248574][ T4816] ? mutex_lock+0x95/0x1a0 [ 131.252992][ T4816] ? wait_for_completion_killable_timeout+0x10/0x10 [ 131.259577][ T4816] ? dev_get_by_name_rcu+0xc8/0xf0 [ 131.264787][ T4816] dev_ioctl+0x560/0xd10 [ 131.269041][ T4816] sock_do_ioctl+0x22e/0x300 [ 131.273869][ T4816] ? sock_show_fdinfo+0xa0/0xa0 [ 131.278743][ T4816] ? selinux_file_ioctl+0x377/0x480 [ 131.284241][ T4816] sock_ioctl+0x4bc/0x6b0 [ 131.288774][ T4816] ? sock_poll+0x3d0/0x3d0 [ 131.293276][ T4816] ? __fget_files+0x2c4/0x320 [ 131.298216][ T4816] ? security_file_ioctl+0x84/0xa0 [ 131.303340][ T4816] ? sock_poll+0x3d0/0x3d0 [ 131.307847][ T4816] __se_sys_ioctl+0x121/0x1a0 [ 131.312542][ T4816] __x64_sys_ioctl+0x7b/0x90 [ 131.317147][ T4816] x64_sys_call+0x2f/0x9a0 [ 131.321570][ T4816] do_syscall_64+0x4c/0xa0 [ 131.326081][ T4816] ? clear_bhb_loop+0x50/0xa0 [ 131.330762][ T4816] ? clear_bhb_loop+0x50/0xa0 [ 131.335465][ T4816] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 131.341454][ T4816] RIP: 0033:0x7f85660febe9 [ 131.345883][ T4816] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.365850][ T4816] RSP: 002b:00007f8564b67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 131.374272][ T4816] RAX: ffffffffffffffda RBX: 00007f8566335fa0 RCX: 00007f85660febe9 [ 131.382248][ T4816] RDX: 0000200000000080 RSI: 0000000000008943 RDI: 000000000000000d [ 131.390419][ T4816] RBP: 00007f8564b67090 R08: 0000000000000000 R09: 0000000000000000 [ 131.398669][ T4816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 131.406648][ T4816] R13: 00007f8566336038 R14: 00007f8566335fa0 R15: 00007ffdeb7db998 [ 131.414803][ T4816] [ 131.839694][ T4851] syz.1.1369[4851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.839802][ T4851] syz.1.1369[4851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.025963][ T4863] FAULT_INJECTION: forcing a failure. [ 132.025963][ T4863] name failslab, interval 1, probability 0, space 0, times 0 [ 132.130085][ T4863] CPU: 0 PID: 4863 Comm: syz.1.1373 Not tainted syzkaller #0 [ 132.137708][ T4863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 132.147874][ T4863] Call Trace: [ 132.151159][ T4863] [ 132.154267][ T4863] __dump_stack+0x21/0x30 [ 132.158607][ T4863] dump_stack_lvl+0xee/0x150 [ 132.163232][ T4863] ? show_regs_print_info+0x20/0x20 [ 132.168440][ T4863] dump_stack+0x15/0x20 [ 132.172603][ T4863] should_fail+0x3c1/0x510 [ 132.177036][ T4863] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 132.182507][ T4863] __should_failslab+0xa4/0xe0 [ 132.187291][ T4863] should_failslab+0x9/0x20 [ 132.191807][ T4863] slab_pre_alloc_hook+0x3b/0xe0 [ 132.196756][ T4863] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 132.202224][ T4863] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 132.207724][ T4863] __kmalloc_track_caller+0x6c/0x2c0 [ 132.213019][ T4863] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 132.218576][ T4863] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 132.224133][ T4863] __alloc_skb+0x21a/0x740 [ 132.228647][ T4863] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 132.233953][ T4863] rtnetlink_event+0xd2/0x1a0 [ 132.238642][ T4863] raw_notifier_call_chain+0x90/0x100 [ 132.244024][ T4863] dev_change_tx_queue_len+0x1af/0x330 [ 132.249600][ T4863] ? dev_set_mtu+0xc0/0xc0 [ 132.254030][ T4863] dev_ifsioc+0x25c/0xe70 [ 132.258369][ T4863] ? dev_ioctl+0xd10/0xd10 [ 132.262795][ T4863] ? __kasan_check_write+0x14/0x20 [ 132.267926][ T4863] ? mutex_lock+0x95/0x1a0 [ 132.272438][ T4863] ? wait_for_completion_killable_timeout+0x10/0x10 [ 132.279225][ T4863] ? dev_get_by_name_rcu+0xc8/0xf0 [ 132.284592][ T4863] dev_ioctl+0x560/0xd10 [ 132.289136][ T4863] sock_do_ioctl+0x22e/0x300 [ 132.293766][ T4863] ? sock_show_fdinfo+0xa0/0xa0 [ 132.298977][ T4863] ? selinux_file_ioctl+0x377/0x480 [ 132.304377][ T4863] sock_ioctl+0x4bc/0x6b0 [ 132.308818][ T4863] ? sock_poll+0x3d0/0x3d0 [ 132.313243][ T4863] ? __fget_files+0x2c4/0x320 [ 132.318020][ T4863] ? security_file_ioctl+0x84/0xa0 [ 132.323143][ T4863] ? sock_poll+0x3d0/0x3d0 [ 132.327575][ T4863] __se_sys_ioctl+0x121/0x1a0 [ 132.332267][ T4863] __x64_sys_ioctl+0x7b/0x90 [ 132.336872][ T4863] x64_sys_call+0x2f/0x9a0 [ 132.341303][ T4863] do_syscall_64+0x4c/0xa0 [ 132.346175][ T4863] ? clear_bhb_loop+0x50/0xa0 [ 132.350965][ T4863] ? clear_bhb_loop+0x50/0xa0 [ 132.355952][ T4863] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 132.362127][ T4863] RIP: 0033:0x7f85660febe9 [ 132.366557][ T4863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.386559][ T4863] RSP: 002b:00007f8564b67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 132.395014][ T4863] RAX: ffffffffffffffda RBX: 00007f8566335fa0 RCX: 00007f85660febe9 [ 132.403027][ T4863] RDX: 0000200000000080 RSI: 0000000000008943 RDI: 000000000000000d [ 132.411020][ T4863] RBP: 00007f8564b67090 R08: 0000000000000000 R09: 0000000000000000 [ 132.419012][ T4863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.426985][ T4863] R13: 00007f8566336038 R14: 00007f8566335fa0 R15: 00007ffdeb7db998 [ 132.434974][ T4863] [ 132.620694][ T4881] syz.4.1380[4881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.620837][ T4881] syz.4.1380[4881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.437779][ T4911] FAULT_INJECTION: forcing a failure. [ 133.437779][ T4911] name failslab, interval 1, probability 0, space 0, times 0 [ 133.525626][ T4911] CPU: 0 PID: 4911 Comm: syz.3.1390 Not tainted syzkaller #0 [ 133.533158][ T4911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 133.543350][ T4911] Call Trace: [ 133.546729][ T4911] [ 133.549661][ T4911] __dump_stack+0x21/0x30 [ 133.554005][ T4911] dump_stack_lvl+0xee/0x150 [ 133.558687][ T4911] ? show_regs_print_info+0x20/0x20 [ 133.563969][ T4911] ? skb_put+0x10e/0x1f0 [ 133.568208][ T4911] ? memcpy+0x56/0x70 [ 133.572189][ T4911] dump_stack+0x15/0x20 [ 133.576345][ T4911] should_fail+0x3c1/0x510 [ 133.580846][ T4911] ? netlink_trim+0x193/0x230 [ 133.585520][ T4911] __should_failslab+0xa4/0xe0 [ 133.590280][ T4911] should_failslab+0x9/0x20 [ 133.594782][ T4911] slab_pre_alloc_hook+0x3b/0xe0 [ 133.599743][ T4911] ? netlink_trim+0x193/0x230 [ 133.604414][ T4911] ? netlink_trim+0x193/0x230 [ 133.609085][ T4911] __kmalloc_track_caller+0x6c/0x2c0 [ 133.614365][ T4911] ? netlink_trim+0x193/0x230 [ 133.619035][ T4911] ? netlink_trim+0x193/0x230 [ 133.623706][ T4911] pskb_expand_head+0x11b/0x11d0 [ 133.628646][ T4911] netlink_trim+0x193/0x230 [ 133.633156][ T4911] netlink_broadcast_filtered+0x78/0x1230 [ 133.639054][ T4911] ? rtmsg_ifinfo_build_skb+0xd8/0x180 [ 133.644512][ T4911] nlmsg_notify+0xed/0x1b0 [ 133.648924][ T4911] rtnetlink_event+0x13a/0x1a0 [ 133.653694][ T4911] raw_notifier_call_chain+0x90/0x100 [ 133.659234][ T4911] dev_change_tx_queue_len+0x1af/0x330 [ 133.664693][ T4911] ? dev_set_mtu+0xc0/0xc0 [ 133.669453][ T4911] dev_ifsioc+0x25c/0xe70 [ 133.674745][ T4911] ? dev_ioctl+0xd10/0xd10 [ 133.679154][ T4911] ? __kasan_check_write+0x14/0x20 [ 133.684264][ T4911] ? mutex_lock+0x95/0x1a0 [ 133.688684][ T4911] ? wait_for_completion_killable_timeout+0x10/0x10 [ 133.695264][ T4911] ? dev_get_by_name_rcu+0xc8/0xf0 [ 133.700396][ T4911] dev_ioctl+0x560/0xd10 [ 133.704638][ T4911] sock_do_ioctl+0x22e/0x300 [ 133.709316][ T4911] ? sock_show_fdinfo+0xa0/0xa0 [ 133.714249][ T4911] ? selinux_file_ioctl+0x377/0x480 [ 133.719449][ T4911] sock_ioctl+0x4bc/0x6b0 [ 133.723776][ T4911] ? sock_poll+0x3d0/0x3d0 [ 133.728206][ T4911] ? __fget_files+0x2c4/0x320 [ 133.732978][ T4911] ? security_file_ioctl+0x84/0xa0 [ 133.738086][ T4911] ? sock_poll+0x3d0/0x3d0 [ 133.742509][ T4911] __se_sys_ioctl+0x121/0x1a0 [ 133.747184][ T4911] __x64_sys_ioctl+0x7b/0x90 [ 133.751772][ T4911] x64_sys_call+0x2f/0x9a0 [ 133.756192][ T4911] do_syscall_64+0x4c/0xa0 [ 133.760606][ T4911] ? clear_bhb_loop+0x50/0xa0 [ 133.765279][ T4911] ? clear_bhb_loop+0x50/0xa0 [ 133.769950][ T4911] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 133.775843][ T4911] RIP: 0033:0x7f4bc2865be9 [ 133.780249][ T4911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.799947][ T4911] RSP: 002b:00007f4bc12ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 133.808359][ T4911] RAX: ffffffffffffffda RBX: 00007f4bc2a9cfa0 RCX: 00007f4bc2865be9 [ 133.816341][ T4911] RDX: 0000200000000080 RSI: 0000000000008943 RDI: 000000000000000d [ 133.824397][ T4911] RBP: 00007f4bc12ce090 R08: 0000000000000000 R09: 0000000000000000 [ 133.832375][ T4911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.840342][ T4911] R13: 00007f4bc2a9d038 R14: 00007f4bc2a9cfa0 R15: 00007ffe659308a8 [ 133.848321][ T4911] [ 135.082824][ T4983] FAULT_INJECTION: forcing a failure. [ 135.082824][ T4983] name failslab, interval 1, probability 0, space 0, times 0 [ 135.096903][ T4983] CPU: 0 PID: 4983 Comm: syz.1.1415 Not tainted syzkaller #0 [ 135.104353][ T4983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 135.114641][ T4983] Call Trace: [ 135.117928][ T4983] [ 135.121126][ T4983] __dump_stack+0x21/0x30 [ 135.125475][ T4983] dump_stack_lvl+0xee/0x150 [ 135.130163][ T4983] ? show_regs_print_info+0x20/0x20 [ 135.135468][ T4983] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 135.141498][ T4983] dump_stack+0x15/0x20 [ 135.145663][ T4983] should_fail+0x3c1/0x510 [ 135.150099][ T4983] __should_failslab+0xa4/0xe0 [ 135.154881][ T4983] should_failslab+0x9/0x20 [ 135.159380][ T4983] slab_pre_alloc_hook+0x3b/0xe0 [ 135.164457][ T4983] __kmalloc+0x6d/0x2c0 [ 135.168618][ T4983] ? tun_device_event+0x15d/0xf20 [ 135.173656][ T4983] tun_device_event+0x15d/0xf20 [ 135.178503][ T4983] ? __kasan_check_read+0x11/0x20 [ 135.183541][ T4983] ? macsec_notify+0xff/0x490 [ 135.188207][ T4983] ? inetdev_event+0x493/0x10a0 [ 135.193067][ T4983] ? macsec_common_dellink+0x520/0x520 [ 135.198614][ T4983] ? sel_netif_netdev_notifier_handler+0x1a1/0x300 [ 135.205304][ T4983] raw_notifier_call_chain+0x90/0x100 [ 135.210725][ T4983] dev_change_tx_queue_len+0x1af/0x330 [ 135.216184][ T4983] ? dev_set_mtu+0xc0/0xc0 [ 135.220687][ T4983] dev_ifsioc+0x25c/0xe70 [ 135.225023][ T4983] ? dev_ioctl+0xd10/0xd10 [ 135.229573][ T4983] ? __kasan_check_write+0x14/0x20 [ 135.234926][ T4983] ? mutex_lock+0x95/0x1a0 [ 135.239464][ T4983] ? wait_for_completion_killable_timeout+0x10/0x10 [ 135.246147][ T4983] ? dev_get_by_name_rcu+0xc8/0xf0 [ 135.251351][ T4983] dev_ioctl+0x560/0xd10 [ 135.255610][ T4983] sock_do_ioctl+0x22e/0x300 [ 135.260221][ T4983] ? sock_show_fdinfo+0xa0/0xa0 [ 135.265081][ T4983] ? selinux_file_ioctl+0x377/0x480 [ 135.270371][ T4983] sock_ioctl+0x4bc/0x6b0 [ 135.274688][ T4983] ? sock_poll+0x3d0/0x3d0 [ 135.279098][ T4983] ? __fget_files+0x2c4/0x320 [ 135.283769][ T4983] ? security_file_ioctl+0x84/0xa0 [ 135.288869][ T4983] ? sock_poll+0x3d0/0x3d0 [ 135.293273][ T4983] __se_sys_ioctl+0x121/0x1a0 [ 135.297964][ T4983] __x64_sys_ioctl+0x7b/0x90 [ 135.302558][ T4983] x64_sys_call+0x2f/0x9a0 [ 135.306976][ T4983] do_syscall_64+0x4c/0xa0 [ 135.311376][ T4983] ? clear_bhb_loop+0x50/0xa0 [ 135.316051][ T4983] ? clear_bhb_loop+0x50/0xa0 [ 135.320718][ T4983] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 135.326624][ T4983] RIP: 0033:0x7f85660febe9 [ 135.331139][ T4983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 135.350820][ T4983] RSP: 002b:00007f8564b67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 135.359224][ T4983] RAX: ffffffffffffffda RBX: 00007f8566335fa0 RCX: 00007f85660febe9 [ 135.367200][ T4983] RDX: 0000200000000080 RSI: 0000000000008943 RDI: 000000000000000d [ 135.375247][ T4983] RBP: 00007f8564b67090 R08: 0000000000000000 R09: 0000000000000000 [ 135.383210][ T4983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.391168][ T4983] R13: 00007f8566336038 R14: 00007f8566335fa0 R15: 00007ffdeb7db998 [ 135.399131][ T4983] [ 135.403144][ T4983] syzkaller0: refused to change device tx_queue_len [ 135.450577][ T4988] bpf_get_probe_write_proto: 4 callbacks suppressed [ 135.450595][ T4988] syz.3.1417[4988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.470378][ T4988] syz.3.1417[4988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.850993][ T5015] device syzkaller0 entered promiscuous mode [ 136.024726][ T5034] FAULT_INJECTION: forcing a failure. [ 136.024726][ T5034] name failslab, interval 1, probability 0, space 0, times 0 [ 136.056473][ T5038] syz.4.1433[5038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.056572][ T5038] syz.4.1433[5038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.075446][ T5034] CPU: 1 PID: 5034 Comm: syz.1.1430 Not tainted syzkaller #0 [ 136.094111][ T5034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 136.104161][ T5034] Call Trace: [ 136.107597][ T5034] [ 136.110543][ T5034] __dump_stack+0x21/0x30 [ 136.114895][ T5034] dump_stack_lvl+0xee/0x150 [ 136.119484][ T5034] ? show_regs_print_info+0x20/0x20 [ 136.124680][ T5034] dump_stack+0x15/0x20 [ 136.128837][ T5034] should_fail+0x3c1/0x510 [ 136.133250][ T5034] __should_failslab+0xa4/0xe0 [ 136.138012][ T5034] should_failslab+0x9/0x20 [ 136.142509][ T5034] slab_pre_alloc_hook+0x3b/0xe0 [ 136.147453][ T5034] __kmalloc+0x6d/0x2c0 [ 136.151605][ T5034] ? tun_device_event+0x4e7/0xf20 [ 136.156629][ T5034] tun_device_event+0x4e7/0xf20 [ 136.161474][ T5034] ? __kasan_check_read+0x11/0x20 [ 136.166492][ T5034] ? macsec_notify+0xff/0x490 [ 136.171164][ T5034] ? macsec_common_dellink+0x520/0x520 [ 136.176619][ T5034] raw_notifier_call_chain+0x90/0x100 [ 136.181984][ T5034] dev_change_tx_queue_len+0x1af/0x330 [ 136.187441][ T5034] ? dev_set_mtu+0xc0/0xc0 [ 136.192036][ T5034] dev_ifsioc+0x25c/0xe70 [ 136.196364][ T5034] ? dev_ioctl+0xd10/0xd10 [ 136.200775][ T5034] ? __kasan_check_write+0x14/0x20 [ 136.206026][ T5034] ? mutex_lock+0x95/0x1a0 [ 136.210528][ T5034] ? wait_for_completion_killable_timeout+0x10/0x10 [ 136.217645][ T5034] ? dev_get_by_name_rcu+0xc8/0xf0 [ 136.222842][ T5034] dev_ioctl+0x560/0xd10 [ 136.227185][ T5034] sock_do_ioctl+0x22e/0x300 [ 136.231777][ T5034] ? sock_show_fdinfo+0xa0/0xa0 [ 136.236629][ T5034] ? selinux_file_ioctl+0x377/0x480 [ 136.241824][ T5034] sock_ioctl+0x4bc/0x6b0 [ 136.246158][ T5034] ? sock_poll+0x3d0/0x3d0 [ 136.250668][ T5034] ? __fget_files+0x2c4/0x320 [ 136.255344][ T5034] ? security_file_ioctl+0x84/0xa0 [ 136.260467][ T5034] ? sock_poll+0x3d0/0x3d0 [ 136.264983][ T5034] __se_sys_ioctl+0x121/0x1a0 [ 136.269756][ T5034] __x64_sys_ioctl+0x7b/0x90 [ 136.274641][ T5034] x64_sys_call+0x2f/0x9a0 [ 136.279255][ T5034] do_syscall_64+0x4c/0xa0 [ 136.283769][ T5034] ? clear_bhb_loop+0x50/0xa0 [ 136.288552][ T5034] ? clear_bhb_loop+0x50/0xa0 [ 136.293231][ T5034] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 136.299345][ T5034] RIP: 0033:0x7f85660febe9 [ 136.303870][ T5034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.323606][ T5034] RSP: 002b:00007f8564b67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 136.332483][ T5034] RAX: ffffffffffffffda RBX: 00007f8566335fa0 RCX: 00007f85660febe9 [ 136.340543][ T5034] RDX: 0000200000000080 RSI: 0000000000008943 RDI: 000000000000000d [ 136.348712][ T5034] RBP: 00007f8564b67090 R08: 0000000000000000 R09: 0000000000000000 [ 136.356682][ T5034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.364652][ T5034] R13: 00007f8566336038 R14: 00007f8566335fa0 R15: 00007ffdeb7db998 [ 136.372645][ T5034] [ 136.385715][ T5034] syzkaller0: refused to change device tx_queue_len [ 136.532965][ T5062] device syzkaller0 entered promiscuous mode [ 136.838196][ T5086] syz.3.1448[5086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.838331][ T5086] syz.3.1448[5086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.921600][ T5092] FAULT_INJECTION: forcing a failure. [ 136.921600][ T5092] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 136.962432][ T5092] CPU: 1 PID: 5092 Comm: syz.4.1451 Not tainted syzkaller #0 [ 136.969837][ T5092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 136.980231][ T5092] Call Trace: [ 136.983504][ T5092] [ 136.986424][ T5092] __dump_stack+0x21/0x30 [ 136.990759][ T5092] dump_stack_lvl+0xee/0x150 [ 136.995425][ T5092] ? show_regs_print_info+0x20/0x20 [ 137.000616][ T5092] ? 0xffffffffa0026d50 [ 137.004861][ T5092] ? is_bpf_text_address+0x177/0x190 [ 137.010134][ T5092] dump_stack+0x15/0x20 [ 137.014282][ T5092] should_fail+0x3c1/0x510 [ 137.018882][ T5092] should_fail_alloc_page+0x55/0x80 [ 137.024085][ T5092] prepare_alloc_pages+0x156/0x600 [ 137.029746][ T5092] ? __alloc_pages_bulk+0xab0/0xab0 [ 137.035065][ T5092] ? __stack_depot_save+0x34/0x480 [ 137.040193][ T5092] ? __kasan_slab_alloc+0x69/0xf0 [ 137.045232][ T5092] __alloc_pages+0x10a/0x440 [ 137.049939][ T5092] ? __kasan_kmalloc+0xda/0x110 [ 137.054814][ T5092] ? __kmalloc+0x13d/0x2c0 [ 137.059237][ T5092] ? prep_new_page+0x110/0x110 [ 137.063998][ T5092] ? sock_do_ioctl+0x22e/0x300 [ 137.068771][ T5092] ? __se_sys_ioctl+0x121/0x1a0 [ 137.073880][ T5092] kmalloc_order+0x4c/0x160 [ 137.078466][ T5092] kmalloc_order_trace+0x18/0xb0 [ 137.083484][ T5092] __kmalloc+0x199/0x2c0 [ 137.087722][ T5092] kvmalloc_node+0x206/0x300 [ 137.092319][ T5092] ? vm_mmap+0xb0/0xb0 [ 137.096404][ T5092] ? __kmalloc+0x60/0x2c0 [ 137.100751][ T5092] tun_device_event+0x59b/0xf20 [ 137.105619][ T5092] ? __kasan_check_read+0x11/0x20 [ 137.110831][ T5092] ? macsec_common_dellink+0x520/0x520 [ 137.116333][ T5092] raw_notifier_call_chain+0x90/0x100 [ 137.121702][ T5092] dev_change_tx_queue_len+0x1af/0x330 [ 137.127335][ T5092] ? dev_set_mtu+0xc0/0xc0 [ 137.131858][ T5092] dev_ifsioc+0x25c/0xe70 [ 137.136546][ T5092] ? dev_ioctl+0xd10/0xd10 [ 137.140968][ T5092] ? __kasan_check_write+0x14/0x20 [ 137.146077][ T5092] ? mutex_lock+0x95/0x1a0 [ 137.150578][ T5092] ? wait_for_completion_killable_timeout+0x10/0x10 [ 137.157163][ T5092] ? dev_get_by_name_rcu+0xc8/0xf0 [ 137.162299][ T5092] dev_ioctl+0x560/0xd10 [ 137.166557][ T5092] sock_do_ioctl+0x22e/0x300 [ 137.171519][ T5092] ? sock_show_fdinfo+0xa0/0xa0 [ 137.176430][ T5092] ? selinux_file_ioctl+0x377/0x480 [ 137.181644][ T5092] sock_ioctl+0x4bc/0x6b0 [ 137.185979][ T5092] ? sock_poll+0x3d0/0x3d0 [ 137.190571][ T5092] ? __fget_files+0x2c4/0x320 [ 137.195270][ T5092] ? security_file_ioctl+0x84/0xa0 [ 137.200399][ T5092] ? sock_poll+0x3d0/0x3d0 [ 137.204829][ T5092] __se_sys_ioctl+0x121/0x1a0 [ 137.209528][ T5092] __x64_sys_ioctl+0x7b/0x90 [ 137.214135][ T5092] x64_sys_call+0x2f/0x9a0 [ 137.218739][ T5092] do_syscall_64+0x4c/0xa0 [ 137.223678][ T5092] ? clear_bhb_loop+0x50/0xa0 [ 137.228443][ T5092] ? clear_bhb_loop+0x50/0xa0 [ 137.233116][ T5092] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 137.239020][ T5092] RIP: 0033:0x7fc2b8ee8be9 [ 137.243578][ T5092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.263287][ T5092] RSP: 002b:00007fc2b7951038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 137.271709][ T5092] RAX: ffffffffffffffda RBX: 00007fc2b911ffa0 RCX: 00007fc2b8ee8be9 [ 137.279819][ T5092] RDX: 0000200000000080 RSI: 0000000000008943 RDI: 000000000000000d [ 137.288267][ T5092] RBP: 00007fc2b7951090 R08: 0000000000000000 R09: 0000000000000000 [ 137.296425][ T5092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.304573][ T5092] R13: 00007fc2b9120038 R14: 00007fc2b911ffa0 R15: 00007ffc59472958 [ 137.312561][ T5092] [ 137.726305][ T5124] bridge0: port 4(veth0_macvtap) entered blocking state [ 137.740011][ T5124] bridge0: port 4(veth0_macvtap) entered disabled state [ 137.747727][ T5124] device veth0_macvtap entered promiscuous mode [ 137.754595][ T5124] bridge0: port 4(veth0_macvtap) entered blocking state [ 137.761672][ T5124] bridge0: port 4(veth0_macvtap) entered forwarding state [ 137.893388][ T5138] syz.4.1463[5138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.893485][ T5138] syz.4.1463[5138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.094369][ T5150] FAULT_INJECTION: forcing a failure. [ 138.094369][ T5150] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 138.119683][ T5150] CPU: 0 PID: 5150 Comm: syz.2.1467 Not tainted syzkaller #0 [ 138.127151][ T5150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 138.137223][ T5150] Call Trace: [ 138.140528][ T5150] [ 138.143530][ T5150] __dump_stack+0x21/0x30 [ 138.147880][ T5150] dump_stack_lvl+0xee/0x150 [ 138.152474][ T5150] ? show_regs_print_info+0x20/0x20 [ 138.157864][ T5150] ? is_bpf_text_address+0x177/0x190 [ 138.163266][ T5150] dump_stack+0x15/0x20 [ 138.167429][ T5150] should_fail+0x3c1/0x510 [ 138.172143][ T5150] should_fail_alloc_page+0x55/0x80 [ 138.177349][ T5150] prepare_alloc_pages+0x156/0x600 [ 138.182545][ T5150] ? __alloc_pages_bulk+0xab0/0xab0 [ 138.187919][ T5150] ? __bpf_trace_mm_page_alloc+0xc0/0xf0 [ 138.193540][ T5150] __alloc_pages+0x10a/0x440 [ 138.198119][ T5150] ? __kasan_kmalloc+0xda/0x110 [ 138.202968][ T5150] ? prep_new_page+0x110/0x110 [ 138.207724][ T5150] ? __mod_node_page_state+0x9e/0xd0 [ 138.213005][ T5150] kmalloc_order+0x4c/0x160 [ 138.217513][ T5150] kmalloc_order_trace+0x18/0xb0 [ 138.222453][ T5150] __kmalloc+0x199/0x2c0 [ 138.226691][ T5150] kvmalloc_node+0x206/0x300 [ 138.231505][ T5150] ? vm_mmap+0xb0/0xb0 [ 138.235931][ T5150] ? __kmalloc+0x60/0x2c0 [ 138.240350][ T5150] tun_device_event+0x59b/0xf20 [ 138.245448][ T5150] ? __kasan_check_read+0x11/0x20 [ 138.250471][ T5150] ? macsec_common_dellink+0x520/0x520 [ 138.255929][ T5150] raw_notifier_call_chain+0x90/0x100 [ 138.261294][ T5150] dev_change_tx_queue_len+0x1af/0x330 [ 138.266740][ T5150] ? dev_set_mtu+0xc0/0xc0 [ 138.271150][ T5150] dev_ifsioc+0x25c/0xe70 [ 138.275474][ T5150] ? dev_ioctl+0xd10/0xd10 [ 138.280080][ T5150] ? __kasan_check_write+0x14/0x20 [ 138.285513][ T5150] ? mutex_lock+0x95/0x1a0 [ 138.289940][ T5150] ? wait_for_completion_killable_timeout+0x10/0x10 [ 138.296682][ T5150] ? dev_get_by_name_rcu+0xc8/0xf0 [ 138.301830][ T5150] dev_ioctl+0x560/0xd10 [ 138.306152][ T5150] sock_do_ioctl+0x22e/0x300 [ 138.310734][ T5150] ? sock_show_fdinfo+0xa0/0xa0 [ 138.315680][ T5150] ? selinux_file_ioctl+0x377/0x480 [ 138.320958][ T5150] sock_ioctl+0x4bc/0x6b0 [ 138.325377][ T5150] ? sock_poll+0x3d0/0x3d0 [ 138.329798][ T5150] ? __fget_files+0x2c4/0x320 [ 138.334574][ T5150] ? security_file_ioctl+0x84/0xa0 [ 138.339769][ T5150] ? sock_poll+0x3d0/0x3d0 [ 138.344174][ T5150] __se_sys_ioctl+0x121/0x1a0 [ 138.348848][ T5150] __x64_sys_ioctl+0x7b/0x90 [ 138.353872][ T5150] x64_sys_call+0x2f/0x9a0 [ 138.358277][ T5150] do_syscall_64+0x4c/0xa0 [ 138.362698][ T5150] ? clear_bhb_loop+0x50/0xa0 [ 138.367366][ T5150] ? clear_bhb_loop+0x50/0xa0 [ 138.372035][ T5150] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 138.378101][ T5150] RIP: 0033:0x7f5c52311be9 [ 138.382519][ T5150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 138.402295][ T5150] RSP: 002b:00007f5c50d7a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 138.410709][ T5150] RAX: ffffffffffffffda RBX: 00007f5c52548fa0 RCX: 00007f5c52311be9 [ 138.418862][ T5150] RDX: 0000200000000080 RSI: 0000000000008943 RDI: 000000000000000d [ 138.426851][ T5150] RBP: 00007f5c50d7a090 R08: 0000000000000000 R09: 0000000000000000 [ 138.434825][ T5150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 138.442888][ T5150] R13: 00007f5c52549038 R14: 00007f5c52548fa0 R15: 00007fffbf70a298 [ 138.450957][ T5150] [ 138.546965][ T5154] device veth0_vlan left promiscuous mode [ 138.562805][ T5154] device veth0_vlan entered promiscuous mode [ 138.710526][ T5176] syz.0.1476[5176] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.710617][ T5176] syz.0.1476[5176] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.785582][ T5170] device sit0 entered promiscuous mode [ 139.308732][ T5195] FAULT_INJECTION: forcing a failure. [ 139.308732][ T5195] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.340576][ T5195] CPU: 1 PID: 5195 Comm: syz.1.1482 Not tainted syzkaller #0 [ 139.348098][ T5195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 139.358271][ T5195] Call Trace: [ 139.361668][ T5195] [ 139.364620][ T5195] __dump_stack+0x21/0x30 [ 139.368962][ T5195] dump_stack_lvl+0xee/0x150 [ 139.373559][ T5195] ? show_regs_print_info+0x20/0x20 [ 139.378777][ T5195] dump_stack+0x15/0x20 [ 139.383036][ T5195] should_fail+0x3c1/0x510 [ 139.387460][ T5195] should_fail_usercopy+0x1a/0x20 [ 139.392491][ T5195] _copy_to_user+0x20/0x90 [ 139.397014][ T5195] simple_read_from_buffer+0xe9/0x160 [ 139.402486][ T5195] proc_fail_nth_read+0x19a/0x210 [ 139.407533][ T5195] ? proc_fault_inject_write+0x2f0/0x2f0 [ 139.413188][ T5195] ? security_file_permission+0x83/0xa0 [ 139.418783][ T5195] ? proc_fault_inject_write+0x2f0/0x2f0 [ 139.424612][ T5195] vfs_read+0x282/0xbe0 [ 139.428798][ T5195] ? kernel_read+0x1f0/0x1f0 [ 139.433392][ T5195] ? __kasan_check_write+0x14/0x20 [ 139.438510][ T5195] ? mutex_lock+0x95/0x1a0 [ 139.443121][ T5195] ? wait_for_completion_killable_timeout+0x10/0x10 [ 139.449721][ T5195] ? __fget_files+0x2c4/0x320 [ 139.454499][ T5195] ? __fdget_pos+0x2d2/0x380 [ 139.459133][ T5195] ? ksys_read+0x71/0x240 [ 139.463475][ T5195] ksys_read+0x140/0x240 [ 139.467728][ T5195] ? vfs_write+0xf70/0xf70 [ 139.472298][ T5195] ? debug_smp_processor_id+0x17/0x20 [ 139.477681][ T5195] __x64_sys_read+0x7b/0x90 [ 139.482190][ T5195] x64_sys_call+0x96d/0x9a0 [ 139.486698][ T5195] do_syscall_64+0x4c/0xa0 [ 139.491120][ T5195] ? clear_bhb_loop+0x50/0xa0 [ 139.495811][ T5195] ? clear_bhb_loop+0x50/0xa0 [ 139.500495][ T5195] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 139.506395][ T5195] RIP: 0033:0x7f85660fd5fc [ 139.510822][ T5195] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 139.531130][ T5195] RSP: 002b:00007f8564b67030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 139.539667][ T5195] RAX: ffffffffffffffda RBX: 00007f8566335fa0 RCX: 00007f85660fd5fc [ 139.547656][ T5195] RDX: 000000000000000f RSI: 00007f8564b670a0 RDI: 000000000000000f [ 139.555727][ T5195] RBP: 00007f8564b67090 R08: 0000000000000000 R09: 0000000000000000 [ 139.563706][ T5195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.571697][ T5195] R13: 00007f8566336038 R14: 00007f8566335fa0 R15: 00007ffdeb7db998 [ 139.579698][ T5195] [ 140.033687][ T5232] device pim6reg1 entered promiscuous mode [ 140.105389][ T5232] device pim6reg1 left promiscuous mode [ 140.182759][ T5241] device sit0 left promiscuous mode [ 140.276627][ T5241] device sit0 entered promiscuous mode [ 140.873135][ T5284] bpf_get_probe_write_proto: 4 callbacks suppressed [ 140.873152][ T5284] syz.4.1513[5284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 140.950067][ T5284] syz.4.1513[5284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.022903][ T5295] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.050271][ T5295] O3ãc¤±: renamed from bridge_slave_0 [ 141.319185][ T5326] syz.4.1526[5326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.319279][ T5326] syz.4.1526[5326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.337441][ T5328] device veth0_vlan left promiscuous mode [ 141.389825][ T5328] device veth0_vlan entered promiscuous mode [ 141.410530][ T5328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.428638][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.447398][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 141.459985][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.781607][ T5377] syz.3.1541[5377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.781718][ T5377] syz.3.1541[5377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.091807][ T5391] device syzkaller0 entered promiscuous mode [ 142.570016][ T5464] syz.1.1568[5464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.570184][ T5464] syz.1.1568[5464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.761974][ T5446] device syzkaller0 entered promiscuous mode [ 142.964220][ T5484] device sit0 left promiscuous mode [ 143.268374][ T5505] syz.3.1583[5505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.268514][ T5505] syz.3.1583[5505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.842399][ T5536] device wg2 left promiscuous mode [ 143.903697][ T5538] device wg2 entered promiscuous mode [ 144.295818][ T5584] device sit0 left promiscuous mode [ 144.561724][ T5602] @ÿ: renamed from bond_slave_0 [ 145.476540][ T5664] device pim6reg1 entered promiscuous mode [ 146.162609][ T5695] bpf_get_probe_write_proto: 8 callbacks suppressed [ 146.162627][ T5695] syz.3.1649[5695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.183308][ T5695] syz.3.1649[5695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.736305][ T5729] device syzkaller0 entered promiscuous mode [ 146.834768][ T5730] device veth0_vlan left promiscuous mode [ 146.841389][ T5730] device veth0_vlan entered promiscuous mode [ 148.198581][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.207199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.220285][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.240897][ T5739] syz.0.1664[5739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.240993][ T5739] syz.0.1664[5739] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.931870][ T5768] syz.0.1672[5768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.943486][ T5768] syz.0.1672[5768] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.300231][ T5783] syz.2.1677[5783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.405695][ T5783] syz.2.1677[5783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.232108][ T5823] syz.4.1689[5823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.273979][ T5823] syz.4.1689[5823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.293914][ T5835] device sit0 entered promiscuous mode [ 150.730884][ T281] syz-executor (281) used greatest stack depth: 21120 bytes left [ 151.060074][ T5857] device sit0 left promiscuous mode [ 151.166132][ T5861] device sit0 entered promiscuous mode [ 151.813109][ T5870] syz.2.1704[5870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.815640][ T5870] syz.2.1704[5870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.112027][ T5860] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.130700][ T5860] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.140515][ T5860] device bridge_slave_0 entered promiscuous mode [ 152.217276][ T5881] syz.3.1707[5881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.217372][ T5881] syz.3.1707[5881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.245276][ T5860] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.264137][ T5860] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.272257][ T5860] device bridge_slave_1 entered promiscuous mode [ 152.284194][ T5883] syz.3.1709[5883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.284296][ T5883] syz.3.1709[5883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.881767][ T400] device veth0_vlan left promiscuous mode [ 153.256488][ T30] audit: type=1400 audit(1756892423.534:155): avc: denied { create } for pid=5860 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 153.303287][ T30] audit: type=1400 audit(1756892423.564:156): avc: denied { write } for pid=5860 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 153.326208][ T30] audit: type=1400 audit(1756892423.564:157): avc: denied { read } for pid=5860 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 153.511737][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.532711][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.569652][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.597490][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.619363][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.626439][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.634116][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 153.643085][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.651514][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.658558][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.741435][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 153.807645][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 153.850336][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.888804][ T5909] device sit0 left promiscuous mode [ 154.065731][ T5910] device sit0 entered promiscuous mode [ 154.369920][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 154.388374][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.417535][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 154.442628][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 154.457842][ T5860] device veth0_vlan entered promiscuous mode [ 154.484810][ T5922] syz.3.1719[5922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.484909][ T5922] syz.3.1719[5922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.519215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 154.550194][ T5924] syz.1.1720[5924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.550296][ T5924] syz.1.1720[5924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.590377][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.640707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.648225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.663304][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 154.671999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 154.684570][ T5860] device veth1_macvtap entered promiscuous mode [ 154.720975][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 154.729069][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 154.738683][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 154.747460][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 154.757394][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.118764][ T5954] device sit0 left promiscuous mode [ 155.282609][ T5956] device sit0 entered promiscuous mode [ 155.932218][ T5955] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.939513][ T5955] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.947306][ T5955] device bridge_slave_0 entered promiscuous mode [ 155.955540][ T5955] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.962682][ T5955] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.970179][ T5955] device bridge_slave_1 entered promiscuous mode [ 156.181315][ T5955] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.188384][ T5955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.195693][ T5955] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.202741][ T5955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.222226][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.230017][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.237610][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.245195][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.254651][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.263362][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.270415][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.306823][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.325607][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.332710][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.411205][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.426030][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.435842][ T5984] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.444164][ T5984] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.496921][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.614653][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.640488][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.678392][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.711440][ T5955] device veth0_vlan entered promiscuous mode [ 156.834289][ T5988] bpf_get_probe_write_proto: 6 callbacks suppressed [ 156.834323][ T5988] syz.3.1733[5988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.860321][ T5988] syz.3.1733[5988] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.878807][ T5955] device veth1_macvtap entered promiscuous mode [ 156.921856][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.977110][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.985769][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.994670][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 157.003323][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.217285][ T6005] device sit0 entered promiscuous mode [ 157.677804][ T400] device bridge_slave_1 left promiscuous mode [ 157.684861][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.698856][ T400] device bridge_slave_0 left promiscuous mode [ 157.715880][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.724312][ T400] device veth1_macvtap left promiscuous mode [ 157.740211][ T400] device veth0_vlan left promiscuous mode [ 157.804425][ T6030] syz.4.1749[6030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.804519][ T6030] syz.4.1749[6030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.219033][ T6023] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.249926][ T6023] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.257494][ T6023] device bridge_slave_0 entered promiscuous mode [ 158.297594][ T6023] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.310390][ T6023] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.320288][ T6023] device bridge_slave_1 entered promiscuous mode [ 158.677446][ T6051] device syzkaller0 entered promiscuous mode [ 159.358386][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 159.366659][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.398077][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 159.412449][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.430226][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.437558][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.480375][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.488185][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 159.498250][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.506536][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.513680][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.521919][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.530260][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.538318][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.546802][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.558286][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 159.568153][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 159.582501][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.591247][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.598689][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.611472][ T6023] device veth0_vlan entered promiscuous mode [ 159.621721][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 159.631538][ T6023] device veth1_macvtap entered promiscuous mode [ 159.641322][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 159.649644][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.659042][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 159.667482][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.882089][ T6077] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.889375][ T6077] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.897159][ T6077] device bridge_slave_0 entered promiscuous mode [ 159.904207][ T6077] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.911576][ T6077] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.918889][ T6077] device bridge_slave_1 entered promiscuous mode [ 159.933951][ T400] device bridge_slave_1 left promiscuous mode [ 159.940157][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.947718][ T400] device bridge_slave_0 left promiscuous mode [ 159.954174][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.962596][ T400] device veth1_macvtap left promiscuous mode [ 159.968639][ T400] device veth0_vlan left promiscuous mode [ 160.115701][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.123205][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.131849][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.140259][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.148353][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.155482][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.164375][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 160.173842][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.182403][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.190792][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.198134][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.210058][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 160.218339][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 160.228102][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 160.236578][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 160.255304][ T6077] device veth0_vlan entered promiscuous mode [ 160.261775][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 160.270694][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 160.278997][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 160.287375][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.295722][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.303314][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 160.317547][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 160.326496][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 160.336228][ T6077] device veth1_macvtap entered promiscuous mode [ 160.347161][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 160.355327][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 160.363707][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 160.375997][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 160.384442][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 160.983148][ T6088] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.990351][ T6088] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.997639][ T6088] device bridge_slave_0 entered promiscuous mode [ 161.005129][ T6088] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.012418][ T6088] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.019712][ T6088] device bridge_slave_1 entered promiscuous mode [ 161.064358][ T6088] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.071879][ T6088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.079365][ T6088] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.086423][ T6088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.095365][ T400] device bridge_slave_1 left promiscuous mode [ 161.101546][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.109157][ T400] device bridge_slave_0 left promiscuous mode [ 161.115821][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.124205][ T400] device veth1_macvtap left promiscuous mode [ 161.130231][ T400] device veth0_vlan left promiscuous mode [ 161.234480][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.241870][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.262048][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.269560][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.278281][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.286876][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.295201][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.302268][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.311874][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.320618][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.328845][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.335906][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.348147][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.356375][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.365497][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.373995][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.387632][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 161.396516][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.407455][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 161.415628][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.423722][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.431658][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.449470][ T6088] device veth0_vlan entered promiscuous mode [ 161.461517][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 161.470413][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.481625][ T6088] device veth1_macvtap entered promiscuous mode [ 161.490808][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 161.498508][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 161.507266][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.516854][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.525200][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 162.249581][ T400] device bridge_slave_1 left promiscuous mode [ 162.255774][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.263979][ T400] device bridge_slave_0 left promiscuous mode [ 162.270332][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.278431][ T400] device veth1_macvtap left promiscuous mode [ 162.284792][ T400] device veth0_vlan left promiscuous mode [ 162.400640][ T6099] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.407952][ T6099] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.415465][ T6099] device bridge_slave_0 entered promiscuous mode [ 162.422273][ T6099] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.429290][ T6099] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.436983][ T6099] device bridge_slave_1 entered promiscuous mode [ 162.484359][ T6099] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.491433][ T6099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.498688][ T6099] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.505753][ T6099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.524188][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.531649][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.539321][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.547133][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.556701][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.564996][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.572058][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.592443][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.600805][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.607846][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.622907][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.630977][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.640757][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.652362][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.660662][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.668015][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.676978][ T6099] device veth0_vlan entered promiscuous mode [ 162.687266][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 162.696548][ T6099] device veth1_macvtap entered promiscuous mode [ 162.706447][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 162.719557][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 163.350513][ T400] device bridge_slave_1 left promiscuous mode [ 163.356690][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.364212][ T400] device bridge_slave_0 left promiscuous mode [ 163.370406][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.378236][ T400] device veth1_macvtap left promiscuous mode [ 163.384415][ T400] device veth0_vlan left promiscuous mode [ 163.507393][ T6110] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.514481][ T6110] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.522126][ T6110] device bridge_slave_0 entered promiscuous mode [ 163.529420][ T6110] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.536503][ T6110] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.543842][ T6110] device bridge_slave_1 entered promiscuous mode [ 163.586676][ T6110] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.593756][ T6110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.601091][ T6110] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.608342][ T6110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.626257][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.634166][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.641668][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.652997][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.661214][ T338] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.668243][ T338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.677127][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.685439][ T338] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.692495][ T338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.714032][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.724780][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.738269][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.749470][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.758138][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.765858][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.775074][ T6110] device veth0_vlan entered promiscuous mode [ 163.784729][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.794304][ T6110] device veth1_macvtap entered promiscuous mode [ 163.803474][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.815754][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 164.590809][ T400] device bridge_slave_1 left promiscuous mode [ 164.596943][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.604560][ T400] device bridge_slave_0 left promiscuous mode [ 164.610747][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.618606][ T400] device veth1_macvtap left promiscuous mode [ 164.624666][ T400] device veth0_vlan left promiscuous mode [ 164.767910][ T6121] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.775012][ T6121] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.782765][ T6121] device bridge_slave_0 entered promiscuous mode [ 164.789726][ T6121] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.797014][ T6121] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.804474][ T6121] device bridge_slave_1 entered promiscuous mode [ 164.850343][ T6121] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.857384][ T6121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.864676][ T6121] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.872085][ T6121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.889539][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.897098][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.904540][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.913999][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.922190][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.929213][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.938178][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.946490][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.953636][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.970781][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.985139][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.996602][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 165.007900][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.015933][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.023658][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.033448][ T6121] device veth0_vlan entered promiscuous mode [ 165.043701][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.052865][ T6121] device veth1_macvtap entered promiscuous mode [ 165.062015][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.072213][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.750477][ T400] device bridge_slave_1 left promiscuous mode [ 165.756623][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.764166][ T400] device bridge_slave_0 left promiscuous mode [ 165.770394][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.778046][ T400] device veth1_macvtap left promiscuous mode [ 165.784153][ T400] device veth0_vlan left promiscuous mode [ 166.045478][ T6132] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.053076][ T6132] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.060756][ T6132] device bridge_slave_0 entered promiscuous mode [ 166.067961][ T6132] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.075099][ T6132] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.082740][ T6132] device bridge_slave_1 entered promiscuous mode [ 166.135502][ T6132] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.142668][ T6132] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.149977][ T6132] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.156999][ T6132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.174456][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.182000][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.189260][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.200639][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.208802][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.216015][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.225324][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.233904][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.240964][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.256134][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.265382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.281827][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.293017][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.301410][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.308761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.319103][ T6132] device veth0_vlan entered promiscuous mode [ 166.329345][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 166.340380][ T6132] device veth1_macvtap entered promiscuous mode [ 166.349380][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 166.360135][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.780659][ T400] device bridge_slave_1 left promiscuous mode [ 166.786886][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.794463][ T400] device bridge_slave_0 left promiscuous mode [ 166.800635][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.808410][ T400] device veth1_macvtap left promiscuous mode [ 166.814445][ T400] device veth0_vlan left promiscuous mode [ 167.474457][ T6143] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.482136][ T6143] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.489465][ T6143] device bridge_slave_0 entered promiscuous mode [ 167.496684][ T6143] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.504098][ T6143] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.511847][ T6143] device bridge_slave_1 entered promiscuous mode [ 167.569391][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.576852][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.587408][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.596603][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.604785][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.611838][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.619203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.629700][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.638164][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.646528][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.653679][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.666905][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.675124][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.684249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.692605][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.705918][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.714900][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.727817][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.736235][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.744289][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.752046][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.761723][ T6143] device veth0_vlan entered promiscuous mode [ 167.771251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 167.779495][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.788829][ T6143] device veth1_macvtap entered promiscuous mode [ 167.800686][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.808953][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.819050][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 167.827326][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 168.070494][ T400] device bridge_slave_1 left promiscuous mode [ 168.076621][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.084075][ T400] device bridge_slave_0 left promiscuous mode [ 168.090286][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.097882][ T400] device veth1_macvtap left promiscuous mode [ 168.104111][ T400] device veth0_vlan left promiscuous mode [ 169.058060][ T6154] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.065254][ T6154] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.072690][ T6154] device bridge_slave_0 entered promiscuous mode [ 169.079575][ T6154] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.086659][ T6154] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.094206][ T6154] device bridge_slave_1 entered promiscuous mode [ 169.139142][ T6154] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.146242][ T6154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.153804][ T6154] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.160948][ T6154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.181634][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.189365][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.196912][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.206377][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.214624][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.221673][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.233439][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.242011][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.249027][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.261484][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.271134][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.287438][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 169.298706][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.306994][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.314621][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.324756][ T6154] device veth0_vlan entered promiscuous mode [ 169.334548][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 169.343670][ T6154] device veth1_macvtap entered promiscuous mode [ 169.353257][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 169.362583][ T400] device bridge_slave_1 left promiscuous mode [ 169.368766][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.376499][ T400] device bridge_slave_0 left promiscuous mode [ 169.382753][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.391228][ T400] device veth1_macvtap left promiscuous mode [ 169.397244][ T400] device veth0_vlan left promiscuous mode [ 169.473350][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.767600][ T6165] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.774686][ T6165] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.782090][ T6165] device bridge_slave_0 entered promiscuous mode [ 170.788961][ T6165] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.796028][ T6165] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.803444][ T6165] device bridge_slave_1 entered promiscuous mode [ 170.814266][ T400] device bridge_slave_1 left promiscuous mode [ 170.820621][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.827980][ T400] device bridge_slave_0 left promiscuous mode [ 170.834296][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.842057][ T400] device veth1_macvtap left promiscuous mode [ 170.848057][ T400] device veth0_vlan left promiscuous mode [ 170.945819][ T6165] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.952886][ T6165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.960172][ T6165] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.967200][ T6165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.984736][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.992484][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.999719][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.009809][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.017998][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.025086][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.034434][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.043052][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.050193][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.062684][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.072497][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.085730][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.102399][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.110631][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.118368][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.129785][ T6165] device veth0_vlan entered promiscuous mode [ 171.140588][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.149725][ T6165] device veth1_macvtap entered promiscuous mode [ 171.159059][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 171.169083][ T400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.031409][ T400] device bridge_slave_1 left promiscuous mode [ 172.037527][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.045060][ T400] device bridge_slave_0 left promiscuous mode [ 172.051215][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.058997][ T400] device veth1_macvtap left promiscuous mode [ 172.065030][ T400] device veth0_vlan left promiscuous mode [ 172.512142][ T6176] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.519200][ T6176] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.526651][ T6176] device bridge_slave_0 entered promiscuous mode [ 172.533763][ T6176] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.541136][ T6176] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.548463][ T6176] device bridge_slave_1 entered promiscuous mode [ 172.596239][ T6176] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.603311][ T6176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.610600][ T6176] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.617632][ T6176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.635420][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.642998][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.650432][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.659302][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.667556][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.674669][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.683554][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.691934][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.700131][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.707352][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.718787][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.726972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.736115][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.744384][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.757347][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 172.765868][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 172.776516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 172.784647][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.792667][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.800256][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.808363][ T6176] device veth0_vlan entered promiscuous mode [ 172.817824][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 172.826013][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.835444][ T6176] device veth1_macvtap entered promiscuous mode [ 172.844404][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 172.852209][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 172.860816][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.870452][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 172.878815][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 173.711704][ T8] device bridge_slave_1 left promiscuous mode [ 173.717916][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.725438][ T8] device bridge_slave_0 left promiscuous mode [ 173.731638][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.739455][ T8] device veth1_macvtap left promiscuous mode [ 173.745517][ T8] device veth0_vlan left promiscuous mode [ 174.325024][ T6187] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.332305][ T6187] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.339738][ T6187] device bridge_slave_0 entered promiscuous mode [ 174.346663][ T6187] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.353695][ T6187] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.361131][ T6187] device bridge_slave_1 entered promiscuous mode [ 174.401152][ T6187] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.408209][ T6187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.415557][ T6187] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.422617][ T6187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.440083][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.447792][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.455122][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.464099][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.472485][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.479510][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.488293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.496612][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.503689][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.516048][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.525356][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.538542][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 174.550645][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.558805][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.566526][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.574882][ T6187] device veth0_vlan entered promiscuous mode [ 174.584877][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 174.594103][ T6187] device veth1_macvtap entered promiscuous mode [ 174.603999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.614184][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 175.470935][ T5926] device bridge_slave_1 left promiscuous mode [ 175.477151][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.485199][ T5926] device bridge_slave_0 left promiscuous mode [ 175.491547][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.499458][ T5926] device veth1_macvtap left promiscuous mode [ 175.505556][ T5926] device veth0_vlan left promiscuous mode [ 176.136348][ T6198] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.143722][ T6198] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.151660][ T6198] device bridge_slave_0 entered promiscuous mode [ 176.158498][ T6198] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.165584][ T6198] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.173009][ T6198] device bridge_slave_1 entered promiscuous mode [ 176.213746][ T6198] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.220906][ T6198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.228246][ T6198] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.235425][ T6198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.253324][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.261101][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.268370][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.277796][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.286004][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.293071][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.302101][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.310363][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.317387][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.329357][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.338459][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.352578][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.364200][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.372304][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.379646][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.388352][ T6198] device veth0_vlan entered promiscuous mode [ 176.398378][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.407500][ T6198] device veth1_macvtap entered promiscuous mode [ 176.416611][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.426545][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.311961][ T5926] device bridge_slave_1 left promiscuous mode [ 177.318083][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.325625][ T5926] device bridge_slave_0 left promiscuous mode [ 177.331793][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.339761][ T5926] device veth1_macvtap left promiscuous mode [ 177.346030][ T5926] device veth0_vlan left promiscuous mode [ 178.053169][ T6209] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.060651][ T6209] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.067969][ T6209] device bridge_slave_0 entered promiscuous mode [ 178.074992][ T6209] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.082054][ T6209] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.089425][ T6209] device bridge_slave_1 entered promiscuous mode [ 178.129009][ T6209] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.136208][ T6209] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.143507][ T6209] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.150548][ T6209] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.168087][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.175770][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.183090][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.192455][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.200693][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.207724][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.216290][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.224737][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.231781][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.244608][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.253794][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.266962][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 178.279014][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.287509][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.295115][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.303507][ T6209] device veth0_vlan entered promiscuous mode [ 178.314200][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 178.323357][ T6209] device veth1_macvtap entered promiscuous mode [ 178.332682][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 178.342683][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 179.070798][ T5926] device bridge_slave_1 left promiscuous mode [ 179.076962][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.084603][ T5926] device bridge_slave_0 left promiscuous mode [ 179.090784][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.098539][ T5926] device veth1_macvtap left promiscuous mode [ 179.104668][ T5926] device veth0_vlan left promiscuous mode [ 180.065844][ T6220] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.072936][ T6220] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.080541][ T6220] device bridge_slave_0 entered promiscuous mode [ 180.087361][ T6220] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.094626][ T6220] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.102022][ T6220] device bridge_slave_1 entered promiscuous mode [ 180.144036][ T6220] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.151120][ T6220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.158378][ T6220] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.165630][ T6220] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.183380][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.191028][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.198244][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.207347][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.215485][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.222534][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.231433][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.240148][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.247198][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.259166][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.268439][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.281814][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 180.293116][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.301225][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.308583][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.316938][ T6220] device veth0_vlan entered promiscuous mode [ 180.326631][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 180.336385][ T6220] device veth1_macvtap entered promiscuous mode [ 180.345507][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 180.355557][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 181.150573][ T5926] device bridge_slave_1 left promiscuous mode [ 181.156705][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.164341][ T5926] device bridge_slave_0 left promiscuous mode [ 181.170548][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.178273][ T5926] device veth1_macvtap left promiscuous mode [ 181.184444][ T5926] device veth0_vlan left promiscuous mode [ 182.187244][ T6231] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.194342][ T6231] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.201776][ T6231] device bridge_slave_0 entered promiscuous mode [ 182.208583][ T6231] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.215643][ T6231] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.223044][ T6231] device bridge_slave_1 entered promiscuous mode [ 182.264844][ T6231] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.271917][ T6231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.279170][ T6231] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.286210][ T6231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.304649][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.312226][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.319442][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.328716][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.337025][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.344062][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.352910][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.361104][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.368119][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.379813][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.389213][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.403031][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.414284][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.422492][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.429833][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.439080][ T6231] device veth0_vlan entered promiscuous mode [ 182.448782][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 182.458162][ T6231] device veth1_macvtap entered promiscuous mode [ 182.467632][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 182.477707][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.430457][ T5926] device bridge_slave_1 left promiscuous mode [ 183.436629][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.444425][ T5926] device bridge_slave_0 left promiscuous mode [ 183.450798][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.459731][ T5926] device veth1_macvtap left promiscuous mode [ 183.465952][ T5926] device veth0_vlan left promiscuous mode [ 184.386222][ T6242] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.393410][ T6242] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.401537][ T6242] device bridge_slave_0 entered promiscuous mode [ 184.408328][ T6242] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.415389][ T6242] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.422688][ T6242] device bridge_slave_1 entered promiscuous mode [ 184.465197][ T6242] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.472278][ T6242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.479518][ T6242] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.486640][ T6242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.505175][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.513634][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.521110][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.530902][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.539099][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.546171][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.555077][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.563294][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.570445][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.582664][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.591981][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.605368][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.616222][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.624604][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.632110][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.640411][ T6242] device veth0_vlan entered promiscuous mode [ 184.650750][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.659729][ T6242] device veth1_macvtap entered promiscuous mode [ 184.668799][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.678815][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.630772][ T5926] device bridge_slave_1 left promiscuous mode [ 185.636920][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.644477][ T5926] device bridge_slave_0 left promiscuous mode [ 185.650786][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.658520][ T5926] device veth1_macvtap left promiscuous mode [ 185.664551][ T5926] device veth0_vlan left promiscuous mode [ 186.731637][ T6253] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.738682][ T6253] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.746117][ T6253] device bridge_slave_0 entered promiscuous mode [ 186.753146][ T6253] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.760201][ T6253] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.767581][ T6253] device bridge_slave_1 entered promiscuous mode [ 186.808734][ T6253] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.815896][ T6253] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.823181][ T6253] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.830221][ T6253] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.847607][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.855241][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.863079][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.872277][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.881119][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.889277][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.896409][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.905031][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.913547][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.922065][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.929092][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.940678][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.948850][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.958093][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.966626][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.979632][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 186.988207][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.999110][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 187.007127][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.015457][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.023062][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.031505][ T6253] device veth0_vlan entered promiscuous mode [ 187.041120][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.049294][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.058466][ T6253] device veth1_macvtap entered promiscuous mode [ 187.067478][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.075142][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 187.083691][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.093116][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 187.101550][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 188.201952][ T400] device bridge_slave_1 left promiscuous mode [ 188.208074][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.215638][ T400] device bridge_slave_0 left promiscuous mode [ 188.221807][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.229578][ T400] device veth1_macvtap left promiscuous mode [ 188.235715][ T400] device veth0_vlan left promiscuous mode [ 189.296505][ T6264] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.304364][ T6264] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.311772][ T6264] device bridge_slave_0 entered promiscuous mode [ 189.318767][ T6264] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.326041][ T6264] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.333424][ T6264] device bridge_slave_1 entered promiscuous mode [ 189.374570][ T6264] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.381656][ T6264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.388981][ T6264] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.396016][ T6264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.413396][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.420945][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.428105][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.437298][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.445468][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.452522][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.461406][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.469684][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.476840][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.489734][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.499333][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.512795][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 189.524154][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.532441][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.539779][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.547931][ T6264] device veth0_vlan entered promiscuous mode [ 189.557817][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.566840][ T6264] device veth1_macvtap entered promiscuous mode [ 189.575957][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.586237][ T5926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=0 req=1708 state=3 status=67 (errno 9: Bad file descriptor) [ 189.655657][ T30] audit: type=1400 audit(1756892459.934:158): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14005]" dev="pipefs" ino=14005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 190.430775][ T5926] device bridge_slave_1 left promiscuous mode [ 190.437000][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.444622][ T5926] device bridge_slave_0 left promiscuous mode [ 190.450833][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.458906][ T5926] device veth1_macvtap left promiscuous mode [ 190.465060][ T5926] device veth0_vlan left promiscuous mode [ 191.961056][ T5926] device bridge_slave_1 left promiscuous mode [ 191.967401][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.974866][ T5926] device bridge_slave_0 left promiscuous mode [ 191.981010][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.988547][ T5926] device bridge_slave_1 left promiscuous mode [ 191.994676][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.002095][ T5926] device O3ãc¤± left promiscuous mode [ 192.007588][ T5926] bridge0: port 1(O3ãc¤±) entered disabled state [ 192.014809][ T5926] device veth0_macvtap left promiscuous mode [ 192.020900][ T5926] bridge0: port 4(veth0_macvtap) entered disabled state [ 192.028204][ T5926] device veth0 left promiscuous mode [ 192.033786][ T5926] bridge0: port 3(veth0) entered disabled state [ 192.040531][ T5926] device bridge_slave_1 left promiscuous mode [ 192.046779][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.054523][ T5926] device bridge_slave_0 left promiscuous mode [ 192.060755][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.068518][ T5926] device bridge_slave_1 left promiscuous mode [ 192.074797][ T5926] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.082196][ T5926] device bridge_slave_0 left promiscuous mode [ 192.088293][ T5926] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.096709][ T5926] device veth1_macvtap left promiscuous mode [ 192.102726][ T5926] device veth0_vlan left promiscuous mode [ 192.108674][ T5926] device veth0_vlan left promiscuous mode [ 192.114782][ T5926] device veth1_macvtap left promiscuous mode [ 192.120792][ T5926] device veth0_vlan left promiscuous mode [ 192.126776][ T5926] device veth1_macvtap left promiscuous mode [ 192.132871][ T5926] device veth0_vlan left promiscuous mode