last executing test programs: 24.531640326s ago: executing program 1 (id=1261): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000680)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000740), 0x75, r0}, 0x38) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000013c0)={0x6, 0x28, &(0x7f0000001080)=ANY=[@ANYBLOB="1800000003000000000000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018460000020000000000000000000000b7080000000000007b8af8ff00000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000c3440400f0ff07ff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000011c0)='syzkaller\x00', 0x2, 0xc5, &(0x7f0000001200)=""/197, 0x40f00, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001340)={0x5, 0xb, 0x4, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380), 0x10, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x9, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000003000000185b00000c000000000000000000000018120000", @ANYRES32, @ANYRES8], &(0x7f0000000dc0)='syzkaller\x00', 0x4, 0x4b, &(0x7f0000000e00)=""/75, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x8, &(0x7f0000001000)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000001040)={0x5, 0x10, 0xd, 0x8b7}, 0x10, 0x0, r3, 0x5, &(0x7f0000001480)=[0xffffffffffffffff], &(0x7f00000014c0)=[{0x4, 0x1, 0x4, 0x9}, {0x1, 0x1, 0xe, 0x3}, {0x5, 0x5, 0xb, 0xa}, {0x1, 0x2, 0x9, 0x8}, {0x4, 0x3, 0xd, 0x3}], 0x10, 0x1}, 0x94) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000e80)=ANY=[@ANYBLOB="9feb01001800000000000000c0000000c000000004000000040000000a000005060000000100000004000000050000000a00000004000000040000000d00000005000000050000000b00000002000000018000001000000001000000000000000200000005000000050000000500000001000000000000000e0000000500000000000000090000000500000037f3ffff0900000001000000010000000e0000000000000904000000080000000000000902000000000000000100000d0000000010000000020000000000000000000001000000005600500600303000fa2af5d6de93c5b7efc41fa6fb7a3ebf97b474ca6fc60733645676fb"], &(0x7f0000000cc0)=""/229, 0xdc, 0xe5, 0x1, 0x6}, 0x28) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000100500000000009954000000190000e8ff00000000000000"], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="09402cbbccef3722435808000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x13, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000010010000000000007e5600001811000039fbcd58030a9202a9213ba43a9aeb10c88c272f1f678248dfb6ddaa763ec35f757cc6db0ede15bb90e55709caa60644af31e358d2988306dd85d82a9698328c0d900507d9446b629fd306b84068c5fbaae326f292b3b2b3caeb96d4ca179dedeaa9912b135584b543ee3ab0952eed07", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001834000002000000000000000000000018160000", @ANYRES32=r1, @ANYBLOB="0000000000000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x400, 0xc6, &(0x7f0000000340)=""/198, 0x41100, 0x70, '\x00', 0x0, 0x17, r4, 0x8, &(0x7f0000000200)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x4, 0x9, 0x5}, 0x10, 0x24c30, 0xffffffffffffffff, 0x7, &(0x7f0000000980)=[r0, r5, r1, r6, 0x1, r7, r0, r0, r1], &(0x7f00000009c0)=[{0x1, 0x1, 0xe, 0x8}, {0x5, 0x3, 0x9, 0x4}, {0x4, 0x5, 0x2, 0x5}, {0x5, 0x3, 0x4, 0xc}, {0x5, 0x2, 0xc, 0x2}, {0x3, 0x3, 0xb, 0x3}, {0x3, 0x5, 0x5, 0xc}], 0x10, 0xfff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r8}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r10 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10120, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0a000000ee76cfc34011535fe9dec56a00000000a130847440f53b1025d731661f0e384ab9aa472fe1f7654b7d96", @ANYRES32, @ANYBLOB="010100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 20.148810421s ago: executing program 1 (id=1261): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000680)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000740), 0x75, r0}, 0x38) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000013c0)={0x6, 0x28, &(0x7f0000001080)=ANY=[@ANYBLOB="1800000003000000000000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018460000020000000000000000000000b7080000000000007b8af8ff00000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000c3440400f0ff07ff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000011c0)='syzkaller\x00', 0x2, 0xc5, &(0x7f0000001200)=""/197, 0x40f00, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001340)={0x5, 0xb, 0x4, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380), 0x10, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x9, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000003000000185b00000c000000000000000000000018120000", @ANYRES32, @ANYRES8], &(0x7f0000000dc0)='syzkaller\x00', 0x4, 0x4b, &(0x7f0000000e00)=""/75, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x8, &(0x7f0000001000)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000001040)={0x5, 0x10, 0xd, 0x8b7}, 0x10, 0x0, r3, 0x5, &(0x7f0000001480)=[0xffffffffffffffff], &(0x7f00000014c0)=[{0x4, 0x1, 0x4, 0x9}, {0x1, 0x1, 0xe, 0x3}, {0x5, 0x5, 0xb, 0xa}, {0x1, 0x2, 0x9, 0x8}, {0x4, 0x3, 0xd, 0x3}], 0x10, 0x1}, 0x94) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000e80)=ANY=[@ANYBLOB="9feb01001800000000000000c0000000c000000004000000040000000a000005060000000100000004000000050000000a00000004000000040000000d00000005000000050000000b00000002000000018000001000000001000000000000000200000005000000050000000500000001000000000000000e0000000500000000000000090000000500000037f3ffff0900000001000000010000000e0000000000000904000000080000000000000902000000000000000100000d0000000010000000020000000000000000000001000000005600500600303000fa2af5d6de93c5b7efc41fa6fb7a3ebf97b474ca6fc60733645676fb"], &(0x7f0000000cc0)=""/229, 0xdc, 0xe5, 0x1, 0x6}, 0x28) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000100500000000009954000000190000e8ff00000000000000"], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="09402cbbccef3722435808000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x13, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000010010000000000007e5600001811000039fbcd58030a9202a9213ba43a9aeb10c88c272f1f678248dfb6ddaa763ec35f757cc6db0ede15bb90e55709caa60644af31e358d2988306dd85d82a9698328c0d900507d9446b629fd306b84068c5fbaae326f292b3b2b3caeb96d4ca179dedeaa9912b135584b543ee3ab0952eed07", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001834000002000000000000000000000018160000", @ANYRES32=r1, @ANYBLOB="0000000000000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x400, 0xc6, &(0x7f0000000340)=""/198, 0x41100, 0x70, '\x00', 0x0, 0x17, r4, 0x8, &(0x7f0000000200)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x4, 0x9, 0x5}, 0x10, 0x24c30, 0xffffffffffffffff, 0x7, &(0x7f0000000980)=[r0, r5, r1, r6, 0x1, r7, r0, r0, r1], &(0x7f00000009c0)=[{0x1, 0x1, 0xe, 0x8}, {0x5, 0x3, 0x9, 0x4}, {0x4, 0x5, 0x2, 0x5}, {0x5, 0x3, 0x4, 0xc}, {0x5, 0x2, 0xc, 0x2}, {0x3, 0x3, 0xb, 0x3}, {0x3, 0x5, 0x5, 0xc}], 0x10, 0xfff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r8}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r10 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10120, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0a000000ee76cfc34011535fe9dec56a00000000a130847440f53b1025d731661f0e384ab9aa472fe1f7654b7d96", @ANYRES32, @ANYBLOB="010100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 14.890254652s ago: executing program 1 (id=1261): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000680)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000740), 0x75, r0}, 0x38) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000013c0)={0x6, 0x28, &(0x7f0000001080)=ANY=[@ANYBLOB="1800000003000000000000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018460000020000000000000000000000b7080000000000007b8af8ff00000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000c3440400f0ff07ff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000011c0)='syzkaller\x00', 0x2, 0xc5, &(0x7f0000001200)=""/197, 0x40f00, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001340)={0x5, 0xb, 0x4, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380), 0x10, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x9, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000003000000185b00000c000000000000000000000018120000", @ANYRES32, @ANYRES8], &(0x7f0000000dc0)='syzkaller\x00', 0x4, 0x4b, &(0x7f0000000e00)=""/75, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x8, &(0x7f0000001000)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000001040)={0x5, 0x10, 0xd, 0x8b7}, 0x10, 0x0, r3, 0x5, &(0x7f0000001480)=[0xffffffffffffffff], &(0x7f00000014c0)=[{0x4, 0x1, 0x4, 0x9}, {0x1, 0x1, 0xe, 0x3}, {0x5, 0x5, 0xb, 0xa}, {0x1, 0x2, 0x9, 0x8}, {0x4, 0x3, 0xd, 0x3}], 0x10, 0x1}, 0x94) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000e80)=ANY=[@ANYBLOB="9feb01001800000000000000c0000000c000000004000000040000000a000005060000000100000004000000050000000a00000004000000040000000d00000005000000050000000b00000002000000018000001000000001000000000000000200000005000000050000000500000001000000000000000e0000000500000000000000090000000500000037f3ffff0900000001000000010000000e0000000000000904000000080000000000000902000000000000000100000d0000000010000000020000000000000000000001000000005600500600303000fa2af5d6de93c5b7efc41fa6fb7a3ebf97b474ca6fc60733645676fb"], &(0x7f0000000cc0)=""/229, 0xdc, 0xe5, 0x1, 0x6}, 0x28) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000100500000000009954000000190000e8ff00000000000000"], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="09402cbbccef3722435808000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x13, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000010010000000000007e5600001811000039fbcd58030a9202a9213ba43a9aeb10c88c272f1f678248dfb6ddaa763ec35f757cc6db0ede15bb90e55709caa60644af31e358d2988306dd85d82a9698328c0d900507d9446b629fd306b84068c5fbaae326f292b3b2b3caeb96d4ca179dedeaa9912b135584b543ee3ab0952eed07", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001834000002000000000000000000000018160000", @ANYRES32=r1, @ANYBLOB="0000000000000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x400, 0xc6, &(0x7f0000000340)=""/198, 0x41100, 0x70, '\x00', 0x0, 0x17, r4, 0x8, &(0x7f0000000200)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x4, 0x9, 0x5}, 0x10, 0x24c30, 0xffffffffffffffff, 0x7, &(0x7f0000000980)=[r0, r5, r1, r6, 0x1, r7, r0, r0, r1], &(0x7f00000009c0)=[{0x1, 0x1, 0xe, 0x8}, {0x5, 0x3, 0x9, 0x4}, {0x4, 0x5, 0x2, 0x5}, {0x5, 0x3, 0x4, 0xc}, {0x5, 0x2, 0xc, 0x2}, {0x3, 0x3, 0xb, 0x3}, {0x3, 0x5, 0x5, 0xc}], 0x10, 0xfff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r8}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r10 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10120, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0a000000ee76cfc34011535fe9dec56a00000000a130847440f53b1025d731661f0e384ab9aa472fe1f7654b7d96", @ANYRES32, @ANYBLOB="010100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 10.576412396s ago: executing program 1 (id=1261): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000680)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000740), 0x75, r0}, 0x38) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000013c0)={0x6, 0x28, &(0x7f0000001080)=ANY=[@ANYBLOB="1800000003000000000000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018460000020000000000000000000000b7080000000000007b8af8ff00000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000c3440400f0ff07ff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000011c0)='syzkaller\x00', 0x2, 0xc5, &(0x7f0000001200)=""/197, 0x40f00, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001340)={0x5, 0xb, 0x4, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380), 0x10, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x9, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000003000000185b00000c000000000000000000000018120000", @ANYRES32, @ANYRES8], &(0x7f0000000dc0)='syzkaller\x00', 0x4, 0x4b, &(0x7f0000000e00)=""/75, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x8, &(0x7f0000001000)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000001040)={0x5, 0x10, 0xd, 0x8b7}, 0x10, 0x0, r3, 0x5, &(0x7f0000001480)=[0xffffffffffffffff], &(0x7f00000014c0)=[{0x4, 0x1, 0x4, 0x9}, {0x1, 0x1, 0xe, 0x3}, {0x5, 0x5, 0xb, 0xa}, {0x1, 0x2, 0x9, 0x8}, {0x4, 0x3, 0xd, 0x3}], 0x10, 0x1}, 0x94) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000e80)=ANY=[@ANYBLOB="9feb01001800000000000000c0000000c000000004000000040000000a000005060000000100000004000000050000000a00000004000000040000000d00000005000000050000000b00000002000000018000001000000001000000000000000200000005000000050000000500000001000000000000000e0000000500000000000000090000000500000037f3ffff0900000001000000010000000e0000000000000904000000080000000000000902000000000000000100000d0000000010000000020000000000000000000001000000005600500600303000fa2af5d6de93c5b7efc41fa6fb7a3ebf97b474ca6fc60733645676fb"], &(0x7f0000000cc0)=""/229, 0xdc, 0xe5, 0x1, 0x6}, 0x28) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000100500000000009954000000190000e8ff00000000000000"], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="09402cbbccef3722435808000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x13, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000010010000000000007e5600001811000039fbcd58030a9202a9213ba43a9aeb10c88c272f1f678248dfb6ddaa763ec35f757cc6db0ede15bb90e55709caa60644af31e358d2988306dd85d82a9698328c0d900507d9446b629fd306b84068c5fbaae326f292b3b2b3caeb96d4ca179dedeaa9912b135584b543ee3ab0952eed07", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001834000002000000000000000000000018160000", @ANYRES32=r1, @ANYBLOB="0000000000000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x400, 0xc6, &(0x7f0000000340)=""/198, 0x41100, 0x70, '\x00', 0x0, 0x17, r4, 0x8, &(0x7f0000000200)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x4, 0x9, 0x5}, 0x10, 0x24c30, 0xffffffffffffffff, 0x7, &(0x7f0000000980)=[r0, r5, r1, r6, 0x1, r7, r0, r0, r1], &(0x7f00000009c0)=[{0x1, 0x1, 0xe, 0x8}, {0x5, 0x3, 0x9, 0x4}, {0x4, 0x5, 0x2, 0x5}, {0x5, 0x3, 0x4, 0xc}, {0x5, 0x2, 0xc, 0x2}, {0x3, 0x3, 0xb, 0x3}, {0x3, 0x5, 0x5, 0xc}], 0x10, 0xfff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r8}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r10 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10120, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0a000000ee76cfc34011535fe9dec56a00000000a130847440f53b1025d731661f0e384ab9aa472fe1f7654b7d96", @ANYRES32, @ANYBLOB="010100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 5.575338472s ago: executing program 2 (id=1829): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x8, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r0, &(0x7f0000000280), &(0x7f0000000000)=""/10, 0x2}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 5.444998984s ago: executing program 2 (id=1831): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000001700)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001cc0)=ANY=[@ANYBLOB='-', @ANYRESDEC], 0x27) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080001000000007b8af8ff00006706bfa20000000017000007020000f8ffffffb706000008000000b704000008000000850000000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8, 0x4}, [@func, @map_fd, @generic, @initr0, @exit, @alu]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r8}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unlink(&(0x7f0000000140)='./cgroup\x00') r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r11, 0x10, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r10, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0xff, '\x00', r2, r9, 0x2, 0x3, 0x4}, 0x50) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair(0x27, 0x2, 0xfffffffc, &(0x7f0000000680)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) syz_clone(0x48808100, 0x0, 0x0, 0x0, 0x0, 0x0) 5.032372153s ago: executing program 2 (id=1834): bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) close(r1) (rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'ip6_vti0\x00', 0x100}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102032900fe08000e7f0061cd915a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 4.909523235s ago: executing program 2 (id=1835): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000780)={'pim6reg0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000880)=r2}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x9, 0x1, 0x7fe2, 0x1, 0x300, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x9e, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xec, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x8, 0x1, 0x7, 0x5, 0x0, 0x6, 0x802, 0xa, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7fff, 0x2, @perf_config_ext={0x4, 0x7}, 0x104104, 0xfc, 0x2, 0x6, 0xff, 0xf, 0x5, 0x0, 0x7, 0x0, 0xff}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r8 = getpid() syz_open_procfs$namespace(r8, &(0x7f00000001c0)='ns/cgroup\x00') perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x9, 0x6, 0x2, 0x53, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000006c0), 0x8}, 0x1000a, 0xc, 0x7, 0x4, 0x5, 0x8, 0x8, 0x0, 0x6, 0x0, 0xb}, r8, 0xa, r6, 0x0) write$cgroup_int(r0, &(0x7f0000000240)=0x2, 0x12) close(r0) 4.671748729s ago: executing program 1 (id=1261): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000680)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000740), 0x75, r0}, 0x38) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000013c0)={0x6, 0x28, &(0x7f0000001080)=ANY=[@ANYBLOB="1800000003000000000000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018460000020000000000000000000000b7080000000000007b8af8ff00000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000c3440400f0ff07ff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000011c0)='syzkaller\x00', 0x2, 0xc5, &(0x7f0000001200)=""/197, 0x40f00, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001340)={0x5, 0xb, 0x4, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380), 0x10, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x9, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000003000000185b00000c000000000000000000000018120000", @ANYRES32, @ANYRES8], &(0x7f0000000dc0)='syzkaller\x00', 0x4, 0x4b, &(0x7f0000000e00)=""/75, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x8, &(0x7f0000001000)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000001040)={0x5, 0x10, 0xd, 0x8b7}, 0x10, 0x0, r3, 0x5, &(0x7f0000001480)=[0xffffffffffffffff], &(0x7f00000014c0)=[{0x4, 0x1, 0x4, 0x9}, {0x1, 0x1, 0xe, 0x3}, {0x5, 0x5, 0xb, 0xa}, {0x1, 0x2, 0x9, 0x8}, {0x4, 0x3, 0xd, 0x3}], 0x10, 0x1}, 0x94) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000e80)=ANY=[@ANYBLOB="9feb01001800000000000000c0000000c000000004000000040000000a000005060000000100000004000000050000000a00000004000000040000000d00000005000000050000000b00000002000000018000001000000001000000000000000200000005000000050000000500000001000000000000000e0000000500000000000000090000000500000037f3ffff0900000001000000010000000e0000000000000904000000080000000000000902000000000000000100000d0000000010000000020000000000000000000001000000005600500600303000fa2af5d6de93c5b7efc41fa6fb7a3ebf97b474ca6fc60733645676fb"], &(0x7f0000000cc0)=""/229, 0xdc, 0xe5, 0x1, 0x6}, 0x28) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000100500000000009954000000190000e8ff00000000000000"], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="09402cbbccef3722435808000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x13, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000010010000000000007e5600001811000039fbcd58030a9202a9213ba43a9aeb10c88c272f1f678248dfb6ddaa763ec35f757cc6db0ede15bb90e55709caa60644af31e358d2988306dd85d82a9698328c0d900507d9446b629fd306b84068c5fbaae326f292b3b2b3caeb96d4ca179dedeaa9912b135584b543ee3ab0952eed07", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001834000002000000000000000000000018160000", @ANYRES32=r1, @ANYBLOB="0000000000000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x400, 0xc6, &(0x7f0000000340)=""/198, 0x41100, 0x70, '\x00', 0x0, 0x17, r4, 0x8, &(0x7f0000000200)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x4, 0x9, 0x5}, 0x10, 0x24c30, 0xffffffffffffffff, 0x7, &(0x7f0000000980)=[r0, r5, r1, r6, 0x1, r7, r0, r0, r1], &(0x7f00000009c0)=[{0x1, 0x1, 0xe, 0x8}, {0x5, 0x3, 0x9, 0x4}, {0x4, 0x5, 0x2, 0x5}, {0x5, 0x3, 0x4, 0xc}, {0x5, 0x2, 0xc, 0x2}, {0x3, 0x3, 0xb, 0x3}, {0x3, 0x5, 0x5, 0xc}], 0x10, 0xfff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r8}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r10 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10120, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0a000000ee76cfc34011535fe9dec56a00000000a130847440f53b1025d731661f0e384ab9aa472fe1f7654b7d96", @ANYRES32, @ANYBLOB="010100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 2.616142849s ago: executing program 2 (id=1840): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000445e00000000a177fafb6d55f239ad592b18ddaf7a7b37b18d31ed3b7f87119272c73ad30d7d1fdaafd5"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8264, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10320, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000004c0)=ANY=[]) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x0, 0x0, 0x0, 0x7, 0x39b8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0xd0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff22}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) unlink(0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r6, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) 1.787776845s ago: executing program 0 (id=1847): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffff"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 1.724097986s ago: executing program 0 (id=1850): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9}, 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700368df3757f0086dd6317ce8000377ac9b0e0865a6596aff57b000000000000000000000000007f"], 0xffffffffffffffc7) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a00000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x18) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000480)="b9ff03076844268cb89e14f065581be0ffff00fe4000632f77fbac141416e000000162079f4b", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.650028338s ago: executing program 0 (id=1851): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r2, 0x40047440, &(0x7f00000017c0)) bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000fcfffff5850000009e000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d40)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="b9ff03316844268cb89614f088a8", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0xffff, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x40042408, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = gettid() sendmsg$unix(r8, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000240)="a6bbe78ecaab", 0x6}], 0x1, &(0x7f0000000180)=[@cred={{0x1c, 0x1, 0x2, {r9, 0xee00}}}], 0x20}, 0x40000) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000dc0)=r9, 0x12) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000280)="fb", 0x1}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d00)={&(0x7f0000000c80)=ANY=[@ANYBLOB="9feb010018000000000000005c0000005c000000040000000400000000000001000000003300389c9e5eea000000000e0300000002000000090000000000000a02000000000000000000000300000000030000000200000003000000090000000000000c020000000c000000000000080100000000302e00"], &(0x7f0000001800)=""/4096, 0x78, 0x1000, 0x0, 0x10000}, 0x28) recvmsg(r10, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) 1.138428138s ago: executing program 0 (id=1855): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x7, &(0x7f0000000340)=ANY=[@ANYBLOB="d7738217bcdd4b455de84868d9a820180000006218f0a8980ab7cf0000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x78) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x3d124, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, r5, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000000bf0000000000000000008500000020000000850000007d0000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000002380)=""/192}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0xe, 0x0, &(0x7f0000000680)="e0b9547ed387dbe9abc89b6f5bff", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) sendmsg(r9, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x4044) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) getpid() 1.078534029s ago: executing program 3 (id=1867): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007000000000000000000000001050000018000000000000000010000851000000000000000020000000000000000000100da"], 0x0, 0x52}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e01, 0x0, @perf_bp={0x0, 0x5}, 0x6c8d, 0x5, 0x0, 0x4, 0x0, 0x6e, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfffffffffffffff8}, 0x0, 0x20, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair(0x0, 0x0, 0x200000, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 795.389284ms ago: executing program 0 (id=1858): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000780)={'pim6reg0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000880)=r2}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x9, 0x1, 0x7fe2, 0x1, 0x300, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x9e, &(0x7f0000000400)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xec, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x8, 0x1, 0x7, 0x5, 0x0, 0x6, 0x802, 0xa, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7fff, 0x2, @perf_config_ext={0x4, 0x7}, 0x104104, 0xfc, 0x2, 0x6, 0xff, 0xf, 0x5, 0x0, 0x7, 0x0, 0xff}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r8 = getpid() syz_open_procfs$namespace(r8, &(0x7f00000001c0)='ns/cgroup\x00') perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x9, 0x6, 0x2, 0x53, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000006c0), 0x8}, 0x1000a, 0xc, 0x7, 0x4, 0x5, 0x8, 0x8, 0x0, 0x6, 0x0, 0xb}, r8, 0xa, r6, 0x0) write$cgroup_int(r0, &(0x7f0000000240)=0x2, 0x12) close(r0) 744.860205ms ago: executing program 3 (id=1859): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000980)='kfree_skb\x00', r0}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 714.017226ms ago: executing program 3 (id=1860): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffff"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 650.731227ms ago: executing program 3 (id=1862): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000080)) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r7, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r8], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) close(r0) 567.418269ms ago: executing program 4 (id=1863): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) write$cgroup_int(r1, &(0x7f0000000000)=0x9, 0x12) syz_clone(0x33ac0000, &(0x7f0000000140)="caab95df1f6732e46419668bdf803d45ee2eae3e9f550edc7f469fc6c15358d45084611e2cb3d63cf927a73949e096800738ac298713e41463ddccb6bd0726055f8a2e7719d888fb9cfcbd9baccf99762090c1c91b6484eac8e0e022a1f0a14d30b952afb1c203d21ddf61fd6cd307a00c44602414e26a58b2bf38c702222ce0029f8c61a327c114636b60b43f37e805a411129e7206968fc08c9669fd9c87757f584339c0e03c0e28bf9df97e6a75cca099747d8f14d51478cd5387d2", 0xbd, &(0x7f0000000080), &(0x7f0000000240), &(0x7f0000000280)="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") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) write$cgroup_int(r1, &(0x7f0000000200)=0x1, 0x12) (async) write$cgroup_int(r1, &(0x7f00000000c0), 0x12) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) (async) write$cgroup_int(r1, &(0x7f0000000000)=0x9, 0x12) (async) syz_clone(0x33ac0000, &(0x7f0000000140)="caab95df1f6732e46419668bdf803d45ee2eae3e9f550edc7f469fc6c15358d45084611e2cb3d63cf927a73949e096800738ac298713e41463ddccb6bd0726055f8a2e7719d888fb9cfcbd9baccf99762090c1c91b6484eac8e0e022a1f0a14d30b952afb1c203d21ddf61fd6cd307a00c44602414e26a58b2bf38c702222ce0029f8c61a327c114636b60b43f37e805a411129e7206968fc08c9669fd9c87757f584339c0e03c0e28bf9df97e6a75cca099747d8f14d51478cd5387d2", 0xbd, &(0x7f0000000080), &(0x7f0000000240), &(0x7f0000000280)="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") (async) 509.98718ms ago: executing program 4 (id=1864): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00'}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x15, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB='\x00'/19, @ANYRES32, @ANYBLOB='\x00'/11], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0400000004000000040000000100000000080000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffff"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 252.391414ms ago: executing program 4 (id=1865): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x65, 0x1, 0x0, 0x0, 0x0, 0x3, 0x400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x104800}, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) (async) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000340), 0x8}, 0x0, 0x0, 0x400, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x2c, 0x3, 0x6, &(0x7f0000000000)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 239.575885ms ago: executing program 4 (id=1866): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000fffffff3000001000020696c2500000000002020097b1af8ff00000000bfa100400000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000380)=""/117, 0x75}, {&(0x7f00000004c0)=""/76, 0x4c}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000000580)=""/227, 0xe3}], 0x4, &(0x7f0000001740)=""/185, 0xb9}, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001840)='ext4_discard_blocks\x00', r1, 0x0, 0x4}, 0x18) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x35160, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x1, 0xd, 0x5, 0x0, 0x200000, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110c230000) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001540)=ANY=[@ANYBLOB="060000000400000007000000080000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000003faa05008c5e36771bd3b4c057db110c8bf50604c00634aa7d20d8c98f76780508e09ad93df4ce3baa3371cbdcdd03048f2e170ff603afa0bd9b676313fadac4738cd409b45e88e7c1d5e14ea356cd8328309aac351a8b448c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000500"/28], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000001b80)=ANY=[@ANYBLOB="18000000000400000000805907000000e9ff0000110000594fb5716e90d45560f4c3e30f90a3d99dc454cd2e064f1bbe6381cc54ad2fb2cb170586426fbcb3a69e175e86575f3b209c26e68a5edd83d90837841852a1850d19b2a16241e6a7f0ce790758a3b93fb1078f7f3bf80ca93f9109fe50f9659b8180be7e4b1bb3acc15f7f231f4ee0f02fe43822ded3c38cd3950447f331f69df890800e73a49614ed331da15a3b04f40a0bc65f412e5f55410f7af0e17969c7b2e0092186e6ac37bbe3d6ea9e3d0f16f623c4882f1dfe5b927c0a0d6baadffbac47b6ae0dd8e63cbb213b068c0403d92f0e04f1fc479fe52de642a73159283ef49f813da8de6a50d84f0a9075229f8e5f", @ANYRES64=r1, @ANYBLOB="2a9ae88a872ccd2265969ac0681bdd7209f6242139f414cd717990716d8b14c6b08b3baadbbc1161a1fd08099fe7be4a011c9f9404b73002396b1a95a7a3d83da09d2edc6cc7e426dd233487ee70655f53aceedf903638eef368100706cf553fa07d0ac5704a078c8cc6b77344fa8345ee7d55aa551032cf41cef08c004174073ef97b284df1a8bdc30127cbc5b936431e9e91561ecedc45f253e1bea2f0c4b357fb00a31c3156787c03aa3d982b0b2d2d7263353852e4807fbd15b6b7040fb76f25cd0697ddd9fd090af556d468b008f7dd1017651570323389b3d0d981a7b3afe7b2346177f56b87607582a9c64eb5573080e454b2a11a863e8557b9ba69c494e2340eece0718feb8158c7ab65124f80538f16b141a7fb05f985f4efd518e3a4c1786b3770397b88026f7c259cd93c6e11eb79219d673128533bb1d68e6cf8cf43eedf90764b235b964d09e048825e35d2e9a3f060fc966bea46dfba8c316b8e14de56d75859f4d1395688eb34197b61c5aae7e4cf1ddba5035c874c5ffae08308dc0e0cbd9dcb977cc6feb0a9804d11011fb6b716c8fe1bf803fd14c09943e66c855d767551aeb641af44455dde20c6a990eb09e2b0f3c5acf18346df155b50471ef36b0ab3d42948f0bbf5aea90e6a2d50c1511232acb85537d9d498"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffd0f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='(pu&\"&\t&&') (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @remote}) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a00)={0x11, 0x4, &(0x7f0000001880)=ANY=[@ANYRES64], &(0x7f00000001c0)='GPL\x00', 0x1001, 0x88, &(0x7f00000002c0)=""/136}, 0x94) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r5, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000010c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=ANY=[@ANYBLOB="3595dee2d9acc9f6bac50cfb0a1ac647552a29508d84f969140f12f113aaebc8d61d6cff3bf8be8e8a9805e03653b94e459032871b3b1fe83f98bbfa71197f2caef429d69b3f15b57dba82dea5da68b5eab1e8278c3cf98b9fa1bef22e385e1516fb9776eb261a7c93707546d4ff2f07e74f4eb862e9f55ae405deff6d4defacf8670ed2f53d6d7ea1c4a4086add06b8394b6cfbe0369ff3bc15167dd0a8eb655f73a331c434b85ca283e4b55ce735ce4ad4ce58c59d87", @ANYRESHEX=r2, @ANYRES16=r4, @ANYRES8=r11], 0x48) (async) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0x15) 170.148046ms ago: executing program 4 (id=1868): r0 = gettid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}, 0x10080, 0xc8, 0xd81}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xff, 0x3, 0x0, 0x0, 0x0, 0x40000000000, 0x8264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_bp={0x0, 0x1f}, 0x2010, 0x0, 0xfffffffc, 0x2, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) 152.630947ms ago: executing program 4 (id=1869): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x54}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() syz_open_procfs$namespace(r2, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r1, 0x0, 0x0, 0x0}, 0x30) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8e}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0x97, 0x9, 0x14, 0xc, 0x0, 0x9, 0x28020, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x5}, 0x2411, 0xffffffffffffffff, 0x80000000, 0x0, 0x5eba, 0x13, 0x3, 0x0, 0xffffffff, 0x0, 0xffffffffffffffff}, 0x0, 0x3, 0xffffffffffffffff, 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x8, &(0x7f0000000200)=@framed={{}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0x10}, @alu={0x0, 0x1, 0xc, 0x6, 0x7, 0x0, 0x10}, @map_fd={0x18, 0xe, 0x1, 0x0, r5}], {0x95, 0x0, 0x0, 0x85ff}}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x267e}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 151.757227ms ago: executing program 0 (id=1870): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007000000000000000000000001050000018000000000000000010000851000000000000000020000000000000000000100da"], 0x0, 0x52}, 0x28) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e01, 0x0, @perf_bp={0x0, 0x5}, 0x6c8d, 0x5, 0x0, 0x4, 0x0, 0x6e, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xfffffffffffffff8}, 0x0, 0x20, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair(0x0, 0x0, 0x200000, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 112.698328ms ago: executing program 3 (id=1871): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000980)='kfree_skb\x00', r0}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 96.813388ms ago: executing program 3 (id=1872): perf_event_open(&(0x7f0000000100)={0x1, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x18400, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'veth0_to_bond\x00', 0x4000}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d00390000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000080)) 59.912189ms ago: executing program 1 (id=1261): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000680)}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000740), 0x75, r0}, 0x38) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000013c0)={0x6, 0x28, &(0x7f0000001080)=ANY=[@ANYBLOB="1800000003000000000000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018460000020000000000000000000000b7080000000000007b8af8ff00000000b7080000090000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000c3440400f0ff07ff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f00000011c0)='syzkaller\x00', 0x2, 0xc5, &(0x7f0000001200)=""/197, 0x40f00, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001300)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001340)={0x5, 0xb, 0x4, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380), 0x10, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x9, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000003000000185b00000c000000000000000000000018120000", @ANYRES32, @ANYRES8], &(0x7f0000000dc0)='syzkaller\x00', 0x4, 0x4b, &(0x7f0000000e00)=""/75, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x8, &(0x7f0000001000)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000001040)={0x5, 0x10, 0xd, 0x8b7}, 0x10, 0x0, r3, 0x5, &(0x7f0000001480)=[0xffffffffffffffff], &(0x7f00000014c0)=[{0x4, 0x1, 0x4, 0x9}, {0x1, 0x1, 0xe, 0x3}, {0x5, 0x5, 0xb, 0xa}, {0x1, 0x2, 0x9, 0x8}, {0x4, 0x3, 0xd, 0x3}], 0x10, 0x1}, 0x94) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000e80)=ANY=[@ANYBLOB="9feb01001800000000000000c0000000c000000004000000040000000a000005060000000100000004000000050000000a00000004000000040000000d00000005000000050000000b00000002000000018000001000000001000000000000000200000005000000050000000500000001000000000000000e0000000500000000000000090000000500000037f3ffff0900000001000000010000000e0000000000000904000000080000000000000902000000000000000100000d0000000010000000020000000000000000000001000000005600500600303000fa2af5d6de93c5b7efc41fa6fb7a3ebf97b474ca6fc60733645676fb"], &(0x7f0000000cc0)=""/229, 0xdc, 0xe5, 0x1, 0x6}, 0x28) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000100500000000009954000000190000e8ff00000000000000"], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="09402cbbccef3722435808000000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x13, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000010010000000000007e5600001811000039fbcd58030a9202a9213ba43a9aeb10c88c272f1f678248dfb6ddaa763ec35f757cc6db0ede15bb90e55709caa60644af31e358d2988306dd85d82a9698328c0d900507d9446b629fd306b84068c5fbaae326f292b3b2b3caeb96d4ca179dedeaa9912b135584b543ee3ab0952eed07", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001834000002000000000000000000000018160000", @ANYRES32=r1, @ANYBLOB="0000000000000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x400, 0xc6, &(0x7f0000000340)=""/198, 0x41100, 0x70, '\x00', 0x0, 0x17, r4, 0x8, &(0x7f0000000200)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x4, 0x9, 0x5}, 0x10, 0x24c30, 0xffffffffffffffff, 0x7, &(0x7f0000000980)=[r0, r5, r1, r6, 0x1, r7, r0, r0, r1], &(0x7f00000009c0)=[{0x1, 0x1, 0xe, 0x8}, {0x5, 0x3, 0x9, 0x4}, {0x4, 0x5, 0x2, 0x5}, {0x5, 0x3, 0x4, 0xc}, {0x5, 0x2, 0xc, 0x2}, {0x3, 0x3, 0xb, 0x3}, {0x3, 0x5, 0x5, 0xc}], 0x10, 0xfff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r8}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r10 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10120, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0a000000ee76cfc34011535fe9dec56a00000000a130847440f53b1025d731661f0e384ab9aa472fe1f7654b7d96", @ANYRES32, @ANYBLOB="010100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) 0s ago: executing program 2 (id=1873): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffff"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) kernel console output (not intermixed with test programs): 3516] CPU: 1 PID: 3516 Comm: syz.4.995 Not tainted syzkaller #0 [ 99.455049][ T3516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 99.465121][ T3516] Call Trace: [ 99.468408][ T3516] [ 99.471342][ T3516] __dump_stack+0x21/0x30 [ 99.475701][ T3516] dump_stack_lvl+0xee/0x150 [ 99.480317][ T3516] ? show_regs_print_info+0x20/0x20 [ 99.485534][ T3516] dump_stack+0x15/0x20 [ 99.489691][ T3516] should_fail+0x3c1/0x510 [ 99.494225][ T3516] should_fail_usercopy+0x1a/0x20 [ 99.499273][ T3516] strncpy_from_user+0x24/0x2e0 [ 99.504154][ T3516] bpf_prog_load+0x1b8/0x1550 [ 99.508872][ T3516] ? __kasan_check_write+0x14/0x20 [ 99.513998][ T3516] ? proc_fail_nth_write+0x17a/0x1f0 [ 99.519310][ T3516] ? map_freeze+0x360/0x360 [ 99.523822][ T3516] ? selinux_bpf+0xc7/0xf0 [ 99.528262][ T3516] ? security_bpf+0x82/0xa0 [ 99.532785][ T3516] __sys_bpf+0x4c3/0x730 [ 99.537037][ T3516] ? bpf_link_show_fdinfo+0x310/0x310 [ 99.542422][ T3516] ? debug_smp_processor_id+0x17/0x20 [ 99.547815][ T3516] __x64_sys_bpf+0x7c/0x90 [ 99.552248][ T3516] x64_sys_call+0x4b9/0x9a0 [ 99.556760][ T3516] do_syscall_64+0x4c/0xa0 [ 99.561186][ T3516] ? clear_bhb_loop+0x50/0xa0 [ 99.565887][ T3516] ? clear_bhb_loop+0x50/0xa0 [ 99.570582][ T3516] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 99.576496][ T3516] RIP: 0033:0x7f839a9fbbe9 [ 99.580930][ T3516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.600551][ T3516] RSP: 002b:00007f8399464038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 99.608970][ T3516] RAX: ffffffffffffffda RBX: 00007f839ac32fa0 RCX: 00007f839a9fbbe9 [ 99.616944][ T3516] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005 [ 99.624919][ T3516] RBP: 00007f8399464090 R08: 0000000000000000 R09: 0000000000000000 [ 99.632884][ T3516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.640873][ T3516] R13: 00007f839ac33038 R14: 00007f839ac32fa0 R15: 00007fff3270a658 [ 99.648854][ T3516] [ 99.980516][ T3544] device syzkaller0 entered promiscuous mode [ 100.571228][ T3562] FAULT_INJECTION: forcing a failure. [ 100.571228][ T3562] name failslab, interval 1, probability 0, space 0, times 1 [ 100.589640][ T3562] CPU: 0 PID: 3562 Comm: syz.4.1011 Not tainted syzkaller #0 [ 100.597064][ T3562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 100.607159][ T3562] Call Trace: [ 100.610460][ T3562] [ 100.613410][ T3562] __dump_stack+0x21/0x30 [ 100.617770][ T3562] dump_stack_lvl+0xee/0x150 [ 100.622380][ T3562] ? show_regs_print_info+0x20/0x20 [ 100.627600][ T3562] ? 0xffffffffa000c000 [ 100.631767][ T3562] ? is_bpf_text_address+0x177/0x190 [ 100.637073][ T3562] dump_stack+0x15/0x20 [ 100.641258][ T3562] should_fail+0x3c1/0x510 [ 100.645699][ T3562] __should_failslab+0xa4/0xe0 [ 100.650534][ T3562] should_failslab+0x9/0x20 [ 100.655058][ T3562] slab_pre_alloc_hook+0x3b/0xe0 [ 100.659997][ T3562] kmem_cache_alloc_trace+0x48/0x270 [ 100.665303][ T3562] ? __get_vm_area_node+0x11d/0x350 [ 100.670506][ T3562] __get_vm_area_node+0x11d/0x350 [ 100.675535][ T3562] __vmalloc_node_range+0xdf/0xaf0 [ 100.680655][ T3562] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 100.686203][ T3562] ? selinux_capset+0xf0/0xf0 [ 100.690883][ T3562] ? _kstrtoull+0x3c0/0x4d0 [ 100.695394][ T3562] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 100.700934][ T3562] __vmalloc+0x79/0x90 [ 100.705003][ T3562] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 100.710556][ T3562] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 100.715930][ T3562] bpf_prog_alloc+0x1f/0x1e0 [ 100.720515][ T3562] bpf_prog_load+0x7c3/0x1550 [ 100.725192][ T3562] ? __kasan_check_write+0x14/0x20 [ 100.730300][ T3562] ? map_freeze+0x360/0x360 [ 100.734823][ T3562] ? selinux_bpf+0xc7/0xf0 [ 100.739239][ T3562] ? security_bpf+0x82/0xa0 [ 100.743744][ T3562] __sys_bpf+0x4c3/0x730 [ 100.747981][ T3562] ? bpf_link_show_fdinfo+0x310/0x310 [ 100.753347][ T3562] ? bpf_trace_run2+0xb5/0x1b0 [ 100.758115][ T3562] ? __bpf_trace_sys_enter+0x62/0x70 [ 100.763398][ T3562] __x64_sys_bpf+0x7c/0x90 [ 100.767820][ T3562] x64_sys_call+0x4b9/0x9a0 [ 100.772337][ T3562] do_syscall_64+0x4c/0xa0 [ 100.776755][ T3562] ? clear_bhb_loop+0x50/0xa0 [ 100.781424][ T3562] ? clear_bhb_loop+0x50/0xa0 [ 100.786099][ T3562] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 100.791980][ T3562] RIP: 0033:0x7f839a9fbbe9 [ 100.796394][ T3562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.815992][ T3562] RSP: 002b:00007f8399464038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 100.824402][ T3562] RAX: ffffffffffffffda RBX: 00007f839ac32fa0 RCX: 00007f839a9fbbe9 [ 100.832377][ T3562] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005 [ 100.840349][ T3562] RBP: 00007f8399464090 R08: 0000000000000000 R09: 0000000000000000 [ 100.848323][ T3562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.856301][ T3562] R13: 00007f839ac33038 R14: 00007f839ac32fa0 R15: 00007fff3270a658 [ 100.864275][ T3562] [ 100.959532][ T3562] syz.4.1011: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 100.976019][ T3562] CPU: 1 PID: 3562 Comm: syz.4.1011 Not tainted syzkaller #0 [ 100.983408][ T3562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 100.993571][ T3562] Call Trace: [ 100.996869][ T3562] [ 100.999866][ T3562] __dump_stack+0x21/0x30 [ 101.004216][ T3562] dump_stack_lvl+0xee/0x150 [ 101.008820][ T3562] ? show_regs_print_info+0x20/0x20 [ 101.014031][ T3562] ? pr_cont_kernfs_name+0xe3/0xf0 [ 101.019179][ T3562] dump_stack+0x15/0x20 [ 101.023381][ T3562] warn_alloc+0x1b0/0x1d0 [ 101.027768][ T3562] ? __should_failslab+0xa4/0xe0 [ 101.032740][ T3562] ? zone_watermark_ok_safe+0x270/0x270 [ 101.038304][ T3562] ? __get_vm_area_node+0x11d/0x350 [ 101.043510][ T3562] ? __get_vm_area_node+0x33e/0x350 [ 101.048720][ T3562] __vmalloc_node_range+0x152/0xaf0 [ 101.053925][ T3562] ? selinux_capset+0xf0/0xf0 [ 101.058616][ T3562] ? _kstrtoull+0x3c0/0x4d0 [ 101.063130][ T3562] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 101.068683][ T3562] __vmalloc+0x79/0x90 [ 101.072763][ T3562] ? bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 101.078326][ T3562] bpf_prog_alloc_no_stats+0x3e/0x2d0 [ 101.083714][ T3562] bpf_prog_alloc+0x1f/0x1e0 [ 101.088316][ T3562] bpf_prog_load+0x7c3/0x1550 [ 101.093009][ T3562] ? __kasan_check_write+0x14/0x20 [ 101.098141][ T3562] ? map_freeze+0x360/0x360 [ 101.102676][ T3562] ? selinux_bpf+0xc7/0xf0 [ 101.107106][ T3562] ? security_bpf+0x82/0xa0 [ 101.111627][ T3562] __sys_bpf+0x4c3/0x730 [ 101.115908][ T3562] ? bpf_link_show_fdinfo+0x310/0x310 [ 101.121313][ T3562] ? bpf_trace_run2+0xb5/0x1b0 [ 101.126108][ T3562] ? __bpf_trace_sys_enter+0x62/0x70 [ 101.131407][ T3562] __x64_sys_bpf+0x7c/0x90 [ 101.135839][ T3562] x64_sys_call+0x4b9/0x9a0 [ 101.140354][ T3562] do_syscall_64+0x4c/0xa0 [ 101.144790][ T3562] ? clear_bhb_loop+0x50/0xa0 [ 101.149492][ T3562] ? clear_bhb_loop+0x50/0xa0 [ 101.154193][ T3562] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 101.160112][ T3562] RIP: 0033:0x7f839a9fbbe9 [ 101.164545][ T3562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.184166][ T3562] RSP: 002b:00007f8399464038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 101.192600][ T3562] RAX: ffffffffffffffda RBX: 00007f839ac32fa0 RCX: 00007f839a9fbbe9 [ 101.200598][ T3562] RDX: 0000000000000020 RSI: 00002000000000c0 RDI: 0000000000000005 [ 101.208590][ T3562] RBP: 00007f8399464090 R08: 0000000000000000 R09: 0000000000000000 [ 101.216570][ T3562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.224554][ T3562] R13: 00007f839ac33038 R14: 00007f839ac32fa0 R15: 00007fff3270a658 [ 101.232550][ T3562] [ 101.242116][ T3562] Mem-Info: [ 101.245323][ T3562] active_anon:36 inactive_anon:13223 isolated_anon:0 [ 101.245323][ T3562] active_file:15078 inactive_file:10983 isolated_file:0 [ 101.245323][ T3562] unevictable:0 dirty:248 writeback:0 [ 101.245323][ T3562] slab_reclaimable:7862 slab_unreclaimable:73713 [ 101.245323][ T3562] mapped:28930 shmem:162 pagetables:651 bounce:0 [ 101.245323][ T3562] kernel_misc_reclaimable:0 [ 101.245323][ T3562] free:1383327 free_pcp:25346 free_cma:0 [ 101.288362][ T3562] Node 0 active_anon:144kB inactive_anon:52892kB active_file:60312kB inactive_file:43932kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:115720kB dirty:992kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5100kB pagetables:2604kB all_unreclaimable? no [ 101.378553][ T3562] DMA32 free:2978772kB min:62612kB low:78264kB high:93916kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982960kB mlocked:0kB bounce:0kB free_pcp:4188kB local_pcp:0kB free_cma:0kB [ 101.435104][ T3562] lowmem_reserve[]: 0 3941 3941 [ 101.440575][ T3562] Normal free:2552956kB min:84840kB low:106048kB high:127256kB reserved_highatomic:0KB active_anon:144kB inactive_anon:52892kB active_file:60312kB inactive_file:43932kB unevictable:0kB writepending:992kB present:5242880kB managed:4036096kB mlocked:0kB bounce:0kB free_pcp:100816kB local_pcp:48284kB free_cma:0kB [ 101.528178][ T3562] lowmem_reserve[]: 0 0 0 [ 101.532871][ T3562] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2978772kB [ 101.548717][ T3562] Normal: 1050*4kB (UME) 369*8kB (UME) 143*16kB (UME) 118*32kB (UME) 62*64kB (UME) 24*128kB (UME) 12*256kB (UM) 9*512kB (UM) 4*1024kB (UM) 2*2048kB (U) 618*4096kB (M) = 2567456kB [ 101.566857][ T3562] 26223 total pagecache pages [ 101.612139][ T3562] 0 pages in swap cache [ 101.616501][ T3562] Swap cache stats: add 0, delete 0, find 0/0 [ 101.635965][ T3562] Free swap = 124996kB [ 101.645922][ T3562] Total swap = 124996kB [ 101.655988][ T3562] 2097051 pages RAM [ 101.662506][ T3562] 0 pages HighMem/MovableOnly [ 101.673713][ T3562] 342287 pages reserved [ 101.677886][ T3562] 0 pages cma reserved [ 102.003268][ T3583] syz.0.1018[3583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.003348][ T3583] syz.0.1018[3583] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.181800][ T3585] device syzkaller0 entered promiscuous mode [ 102.426855][ T3590] device syzkaller0 entered promiscuous mode [ 102.709911][ T3593] device syzkaller0 entered promiscuous mode [ 103.350897][ T3603] device syzkaller0 entered promiscuous mode [ 104.273030][ T3625] device syzkaller0 entered promiscuous mode [ 104.605974][ T3631] device veth1_macvtap left promiscuous mode [ 104.614974][ T3631] device macsec0 left promiscuous mode [ 104.632372][ T3632] device veth1_macvtap entered promiscuous mode [ 104.647477][ T3632] device macsec0 entered promiscuous mode [ 104.668530][ T3634] ÿ: renamed from bond_slave_0 [ 104.771681][ T3646] device syzkaller0 entered promiscuous mode [ 105.211584][ T3661] device syzkaller0 entered promiscuous mode [ 105.361219][ T3675] device veth1_macvtap left promiscuous mode [ 105.380182][ T3675] device macsec0 left promiscuous mode [ 105.388972][ T3675] device veth1_macvtap entered promiscuous mode [ 105.409570][ T3675] device macsec0 entered promiscuous mode [ 105.575166][ T3683] device syzkaller0 entered promiscuous mode [ 106.367133][ T3702] device syzkaller0 entered promiscuous mode [ 106.894124][ T3718] device syzkaller0 entered promiscuous mode [ 107.021336][ T3723] device veth1_macvtap left promiscuous mode [ 107.037556][ T3723] device macsec0 left promiscuous mode [ 107.058693][ T3723] device veth1_macvtap entered promiscuous mode [ 107.159509][ T3723] device macsec0 entered promiscuous mode [ 108.139132][ T3741] ref_ctr_offset mismatch. inode: 0x41f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 108.535304][ T3744] GPL: port 1(erspan0) entered blocking state [ 108.541538][ T3744] GPL: port 1(erspan0) entered disabled state [ 108.548132][ T3744] device erspan0 entered promiscuous mode [ 108.554372][ T3744] GPL: port 1(erspan0) entered blocking state [ 108.560501][ T3744] GPL: port 1(erspan0) entered forwarding state [ 108.774446][ T3757] device syzkaller0 entered promiscuous mode [ 108.889592][ T3759] device syzkaller0 entered promiscuous mode [ 109.652439][ T30] audit: type=1400 audit(1757009834.133:148): avc: denied { create } for pid=3766 comm="syz.2.1076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 110.101765][ T3773] device syzkaller0 entered promiscuous mode [ 110.350038][ T3778] device syzkaller0 entered promiscuous mode [ 111.330987][ T3792] device syzkaller0 entered promiscuous mode [ 111.392381][ T3797] device sit0 left promiscuous mode [ 111.416778][ T3797] device sit0 entered promiscuous mode [ 111.922977][ T3817] device syzkaller0 entered promiscuous mode [ 112.219397][ T3823] device pim6reg1 entered promiscuous mode [ 112.412555][ T3837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 112.448650][ T3838] device syzkaller0 entered promiscuous mode [ 114.009554][ T3781] syz.2.1080 (3781) used greatest stack depth: 22064 bytes left [ 114.956569][ T3910] device syzkaller0 entered promiscuous mode [ 116.013509][ T3924] device syzkaller0 entered promiscuous mode [ 116.341371][ T3942] device syzkaller0 entered promiscuous mode [ 116.460665][ T3944] device syzkaller0 entered promiscuous mode [ 117.084269][ T3955] bond_slave_1: mtu less than device minimum [ 117.199210][ T3961] device veth1_macvtap left promiscuous mode [ 117.231044][ T3961] device macsec0 left promiscuous mode [ 117.321353][ T3962] device veth1_macvtap entered promiscuous mode [ 117.351949][ T3962] device macsec0 entered promiscuous mode [ 117.502365][ T3965] bond_slave_1: mtu less than device minimum [ 117.896777][ T3979] device syzkaller0 entered promiscuous mode [ 118.186493][ T3983] device syzkaller0 entered promiscuous mode [ 118.218824][ T3986] device syzkaller0 entered promiscuous mode [ 118.274692][ T3989] device syzkaller0 entered promiscuous mode [ 118.462369][ T3994] device syzkaller0 entered promiscuous mode [ 118.716997][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.727795][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.737496][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 118.850672][ T4005] device wg2 left promiscuous mode [ 118.871566][ T4008] device syzkaller0 entered promiscuous mode [ 118.888281][ T4005] device wg2 entered promiscuous mode [ 119.521798][ T4018] device veth0_vlan left promiscuous mode [ 119.529365][ T4018] device veth0_vlan entered promiscuous mode [ 119.686067][ T4031] device syzkaller0 entered promiscuous mode [ 119.953582][ T4036] device syzkaller0 entered promiscuous mode [ 120.236011][ T4044] device syzkaller0 entered promiscuous mode [ 120.573222][ T4046] device syzkaller0 entered promiscuous mode [ 120.931114][ T4077] device syzkaller0 entered promiscuous mode [ 121.405353][ T4092] device syzkaller0 entered promiscuous mode [ 121.708886][ T4111] device syzkaller0 entered promiscuous mode [ 122.180604][ T4123] device syzkaller0 entered promiscuous mode [ 123.561645][ T4143] device syzkaller0 entered promiscuous mode [ 123.679345][ T4155] device syzkaller0 entered promiscuous mode [ 123.807433][ T4161] device syzkaller0 entered promiscuous mode [ 123.833004][ T4164] device syzkaller0 entered promiscuous mode [ 124.281147][ T4177] ip6_vti0: mtu greater than device maximum [ 124.326100][ T4183] bond_slave_1: mtu greater than device maximum [ 124.624742][ T4192] device syzkaller0 entered promiscuous mode [ 124.685890][ T4194] device syzkaller0 entered promiscuous mode [ 124.739851][ T4199] device syzkaller0 entered promiscuous mode [ 125.002211][ T4201] device syzkaller0 entered promiscuous mode [ 125.372093][ T4218] device veth1_macvtap left promiscuous mode [ 125.378120][ T4218] device macsec0 left promiscuous mode [ 125.399217][ T4218] device veth1_macvtap entered promiscuous mode [ 125.405780][ T4218] device macsec0 entered promiscuous mode [ 125.528429][ T4225] ÿÿÿÿÿÿ: renamed from vlan1 [ 125.718615][ T4237] device syzkaller0 entered promiscuous mode [ 126.093608][ T4250] device syzkaller0 entered promiscuous mode [ 126.574611][ T4298] device veth1_macvtap left promiscuous mode [ 126.609474][ T4298] device macsec0 left promiscuous mode [ 126.676913][ T4298] device veth1_macvtap entered promiscuous mode [ 126.696786][ T4298] device macsec0 entered promiscuous mode [ 127.120196][ T4316] device syzkaller0 entered promiscuous mode [ 127.319512][ T4332] device syzkaller0 entered promiscuous mode [ 127.647854][ T4339] device syzkaller0 entered promiscuous mode [ 128.067968][ T4347] device veth1_macvtap left promiscuous mode [ 128.074076][ T4347] device macsec0 left promiscuous mode [ 128.080545][ T4350] device veth1_macvtap entered promiscuous mode [ 128.086811][ T4350] device macsec0 entered promiscuous mode [ 128.249923][ T4356] device syzkaller0 entered promiscuous mode [ 128.343612][ T4359] device syzkaller0 entered promiscuous mode [ 129.120658][ T4371] device syzkaller0 entered promiscuous mode [ 129.760438][ T4382] device veth1_macvtap left promiscuous mode [ 129.766476][ T4382] device macsec0 left promiscuous mode [ 129.912549][ T4383] device veth1_macvtap entered promiscuous mode [ 129.927137][ T4383] device macsec0 entered promiscuous mode [ 130.111566][ T4399] device veth1_macvtap left promiscuous mode [ 130.117826][ T4399] device macsec0 left promiscuous mode [ 130.143382][ T4389] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.150476][ T4389] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.151787][ T4403] syz.0.1269[4403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.158001][ T4389] device bridge_slave_0 entered promiscuous mode [ 130.159133][ T4403] syz.0.1269[4403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.170182][ T4399] device veth1_macvtap entered promiscuous mode [ 130.170210][ T4399] device macsec0 entered promiscuous mode [ 130.178782][ T4389] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.219603][ T4389] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.228566][ T4389] device bridge_slave_1 entered promiscuous mode [ 130.322931][ T4408] device sit0 entered promiscuous mode [ 130.576378][ T30] audit: type=1400 audit(1757009855.053:149): avc: denied { create } for pid=4389 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 130.648601][ T30] audit: type=1400 audit(1757009855.123:150): avc: denied { write } for pid=4389 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 130.670001][ T30] audit: type=1400 audit(1757009855.123:151): avc: denied { read } for pid=4389 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 130.750039][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.767360][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.774949][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.783380][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.791626][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.798693][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.806458][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.815059][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.823270][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.830297][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.837653][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.886933][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 130.902073][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.911799][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.920246][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.976210][ T4432] device syzkaller0 entered promiscuous mode [ 131.027644][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 131.036351][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.045337][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 131.053704][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.070124][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.130282][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.164342][ T4389] device veth0_vlan entered promiscuous mode [ 131.370096][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 131.379714][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.392729][ T4389] device veth1_macvtap entered promiscuous mode [ 131.415361][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.430526][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.441282][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.469002][ T4444] device veth1_macvtap left promiscuous mode [ 131.475208][ T4444] device macsec0 left promiscuous mode [ 131.499355][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.507675][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.516195][ T4444] device veth1_macvtap entered promiscuous mode [ 131.522514][ T4444] device macsec0 entered promiscuous mode [ 131.608767][ T4448] device syzkaller0 entered promiscuous mode [ 131.714575][ T4389] syz-executor (4389) used greatest stack depth: 21792 bytes left [ 132.060508][ T4462] device veth1_macvtap left promiscuous mode [ 132.066576][ T4462] device macsec0 left promiscuous mode [ 132.170375][ T4465] device veth1_macvtap entered promiscuous mode [ 132.200146][ T4465] device macsec0 entered promiscuous mode [ 132.377824][ T4458] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.403277][ T4458] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.416167][ T4458] device bridge_slave_0 entered promiscuous mode [ 132.425481][ T4458] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.432822][ T4458] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.441095][ T4458] device bridge_slave_1 entered promiscuous mode [ 132.486396][ T4483] device syzkaller0 entered promiscuous mode [ 132.664177][ T4486] device syzkaller0 entered promiscuous mode [ 133.053081][ T4507] device syzkaller0 entered promiscuous mode [ 133.301925][ T379] device bridge_slave_1 left promiscuous mode [ 133.308144][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.397651][ T379] device bridge_slave_0 left promiscuous mode [ 133.489195][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.580248][ T379] device veth1_macvtap left promiscuous mode [ 133.641036][ T379] device veth0_vlan left promiscuous mode [ 133.999978][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.014598][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.048841][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.057820][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.067371][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.074455][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.082957][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.092907][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.101306][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.108376][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.116335][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 134.124880][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.133109][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 134.141342][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.149553][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 134.157909][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.177886][ T4543] device syzkaller0 entered promiscuous mode [ 134.334997][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.342780][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 134.351001][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.359093][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.367408][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.389900][ T4545] device syzkaller0 entered promiscuous mode [ 134.398109][ T4560] bond_slave_1: mtu less than device minimum [ 134.404830][ T4458] device veth0_vlan entered promiscuous mode [ 134.426976][ T4561] device syzkaller0 entered promiscuous mode [ 134.461990][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 134.474684][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.489069][ T4458] device veth1_macvtap entered promiscuous mode [ 134.544892][ T4565] device pim6reg1 entered promiscuous mode [ 134.557313][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 134.571816][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 134.585113][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.596730][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 134.605900][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.367171][ T4599] device syzkaller0 entered promiscuous mode [ 135.379937][ T4595] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.387854][ T4595] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.399929][ T4595] device bridge_slave_0 entered promiscuous mode [ 135.532970][ T4605] device syzkaller0 entered promiscuous mode [ 135.770875][ T4595] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.789465][ T4595] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.796838][ T4595] device bridge_slave_1 entered promiscuous mode [ 135.880584][ T4611] device syzkaller0 entered promiscuous mode [ 136.230385][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.238567][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.247354][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 136.341709][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.420108][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.427194][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.493626][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 136.502287][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.510597][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.517664][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.527204][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 136.536213][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 136.544468][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 136.555962][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 136.617309][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 136.627678][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 136.642463][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 136.656265][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 136.664593][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.752617][ T4651] device syzkaller0 entered promiscuous mode [ 136.773342][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.780999][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.788620][ T4595] device veth0_vlan entered promiscuous mode [ 137.030804][ T4595] device veth1_macvtap entered promiscuous mode [ 137.090276][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 137.101607][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 137.119746][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 137.165159][ T4657] device syzkaller0 entered promiscuous mode [ 137.214081][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 137.225120][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 137.268572][ T4662] device syzkaller0 entered promiscuous mode [ 137.458388][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 137.467077][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 137.548566][ T379] device bridge_slave_1 left promiscuous mode [ 137.556251][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.566572][ T379] device bridge_slave_0 left promiscuous mode [ 137.573273][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.581852][ T379] device veth1_macvtap left promiscuous mode [ 137.587912][ T379] device veth0_vlan left promiscuous mode [ 137.654617][ T4681] device veth1_macvtap left promiscuous mode [ 137.660695][ T4681] device macsec0 left promiscuous mode [ 137.668975][ T4684] device veth1_macvtap entered promiscuous mode [ 137.676672][ T4684] device macsec0 entered promiscuous mode [ 137.722327][ T4679] device syzkaller0 entered promiscuous mode [ 137.739789][ T4677] device syzkaller0 entered promiscuous mode [ 138.263884][ T4703] device syzkaller0 entered promiscuous mode [ 138.472107][ T4708] device syzkaller0 entered promiscuous mode [ 138.682299][ T4727] device veth1_macvtap left promiscuous mode [ 138.688400][ T4727] device macsec0 left promiscuous mode [ 138.755115][ T4727] device veth1_macvtap entered promiscuous mode [ 138.761972][ T4727] device macsec0 entered promiscuous mode [ 138.940598][ T4706] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.947673][ T4706] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.006167][ T4706] device bridge_slave_0 entered promiscuous mode [ 139.055005][ T4740] device pim6reg1 entered promiscuous mode [ 139.129947][ T4706] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.149843][ T4706] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.166175][ T4706] device bridge_slave_1 entered promiscuous mode [ 139.517936][ T379] device bridge_slave_1 left promiscuous mode [ 139.525281][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.533210][ T379] device bridge_slave_0 left promiscuous mode [ 139.559239][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.567182][ T379] device veth1_macvtap left promiscuous mode [ 139.576584][ T379] device veth0_vlan left promiscuous mode [ 139.649716][ T4769] device veth1_macvtap left promiscuous mode [ 139.655779][ T4769] device macsec0 left promiscuous mode [ 139.667360][ T4769] device veth1_macvtap entered promiscuous mode [ 139.673783][ T4769] device macsec0 entered promiscuous mode [ 139.828123][ T4778] device syzkaller0 entered promiscuous mode [ 139.887637][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.895628][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.004867][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 140.013323][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.021824][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.028890][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.054770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 140.074780][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 140.089979][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.106856][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.113942][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.169028][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.189934][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.236402][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.272012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.295773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.309796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.336413][ T4793] device syzkaller0 entered promiscuous mode [ 140.350571][ T4706] device veth0_vlan entered promiscuous mode [ 140.603067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 140.620824][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.650679][ T4810] device veth1_macvtap left promiscuous mode [ 140.656690][ T4810] device macsec0 left promiscuous mode [ 140.681399][ T4706] device veth1_macvtap entered promiscuous mode [ 140.688001][ T4810] device veth1_macvtap entered promiscuous mode [ 140.709558][ T4810] device macsec0 entered promiscuous mode [ 140.731259][ T4814] device syzkaller0 entered promiscuous mode [ 140.739885][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 140.762667][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 140.796527][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.873344][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 140.900559][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.960720][ T4827] device wg2 entered promiscuous mode [ 141.910714][ T4852] device sit0 left promiscuous mode [ 142.018318][ T4871] device veth1_macvtap left promiscuous mode [ 142.025506][ T4871] device macsec0 left promiscuous mode [ 142.054056][ T4873] device syzkaller0 entered promiscuous mode [ 142.061300][ T4871] device veth1_macvtap entered promiscuous mode [ 142.067713][ T4871] device macsec0 entered promiscuous mode [ 142.074711][ T4861] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.087963][ T4861] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.105940][ T4861] device bridge_slave_0 entered promiscuous mode [ 142.174263][ T4861] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.181490][ T4861] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.188967][ T4861] device bridge_slave_1 entered promiscuous mode [ 142.336947][ T4881] device syzkaller0 entered promiscuous mode [ 142.478589][ T4896] device pim6reg1 entered promiscuous mode [ 142.562692][ T379] device bridge_slave_1 left promiscuous mode [ 142.601181][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.629982][ T379] device bridge_slave_0 left promiscuous mode [ 142.636229][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.656943][ T379] device veth1_macvtap left promiscuous mode [ 142.667566][ T379] device veth0_vlan left promiscuous mode [ 142.932528][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 142.959888][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.032040][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 143.068284][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.076813][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.083912][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.091564][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 143.100012][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.108303][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.115357][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.265669][ T4947] device syzkaller0 entered promiscuous mode [ 143.272984][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 143.281401][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.289337][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.398811][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.409055][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.417160][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.426498][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.447762][ T4861] device veth0_vlan entered promiscuous mode [ 143.469585][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.480578][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.493977][ T4861] device veth1_macvtap entered promiscuous mode [ 143.506063][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 143.515451][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.529806][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.585277][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 143.622368][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 144.589715][ T30] audit: type=1400 audit(1757009869.073:152): avc: denied { create } for pid=4979 comm="syz.3.1432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 144.866241][ T4993] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.881127][ T4993] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.930718][ T4993] device bridge_slave_0 entered promiscuous mode [ 144.978580][ T4993] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.002715][ T4993] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.010515][ T4993] device bridge_slave_1 entered promiscuous mode [ 145.119041][ T5010] device syzkaller0 entered promiscuous mode [ 145.162172][ T379] device bridge_slave_1 left promiscuous mode [ 145.186428][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.282191][ T379] device bridge_slave_0 left promiscuous mode [ 145.333688][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.375040][ T379] device veth1_macvtap left promiscuous mode [ 145.403395][ T379] device veth0_vlan left promiscuous mode [ 145.871786][ T5043] device veth1_macvtap left promiscuous mode [ 145.879584][ T5043] device macsec0 left promiscuous mode [ 145.903299][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 145.914078][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.933484][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 145.955122][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.964850][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.971908][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.979590][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 145.987918][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.996417][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.003480][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.011575][ T5045] device veth1_macvtap left promiscuous mode [ 146.019554][ T5045] device macsec0 left promiscuous mode [ 146.030218][ T5043] device veth1_macvtap entered promiscuous mode [ 146.036476][ T5043] device macsec0 entered promiscuous mode [ 146.047491][ T5050] device veth1_macvtap entered promiscuous mode [ 146.054166][ T5050] device macsec0 entered promiscuous mode [ 146.074449][ T5049] device syzkaller0 entered promiscuous mode [ 146.088788][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 146.108157][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.118166][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.126448][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.135771][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.161792][ T5055] device syzkaller0 entered promiscuous mode [ 146.169823][ T4993] device veth0_vlan entered promiscuous mode [ 146.273561][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 146.282115][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 146.294681][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 146.304246][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 146.316541][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 146.330368][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 146.388881][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 146.404737][ T4993] device veth1_macvtap entered promiscuous mode [ 146.426175][ T5063] device syzkaller0 entered promiscuous mode [ 146.445108][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 146.463611][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 146.474803][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 146.483293][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 146.521973][ T5066] device syzkaller0 entered promiscuous mode [ 147.906083][ T5088] device veth1_macvtap left promiscuous mode [ 147.919337][ T5088] device macsec0 left promiscuous mode [ 147.943216][ T5088] device veth1_macvtap entered promiscuous mode [ 147.959657][ T5088] device macsec0 entered promiscuous mode [ 147.995474][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 148.390379][ T332] device bridge_slave_1 left promiscuous mode [ 148.400442][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.414731][ T332] device bridge_slave_0 left promiscuous mode [ 148.435182][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.443478][ T332] device veth1_macvtap left promiscuous mode [ 148.449568][ T332] device veth0_vlan left promiscuous mode [ 148.665383][ T5093] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.679441][ T5093] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.686822][ T5093] device bridge_slave_0 entered promiscuous mode [ 148.703431][ T5121] device syzkaller0 entered promiscuous mode [ 148.714215][ T5093] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.721928][ T5093] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.729276][ T5093] device bridge_slave_1 entered promiscuous mode [ 148.890948][ T5093] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.898009][ T5093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.905321][ T5093] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.912372][ T5093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.932994][ T5134] device syzkaller0 entered promiscuous mode [ 148.965306][ T5141] device syzkaller0 entered promiscuous mode [ 148.979727][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.987170][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.042993][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.051789][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.059274][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.068090][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.076489][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.083566][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.091713][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.101007][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.109283][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.116348][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.123702][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.131964][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.140037][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.148048][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.156089][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 149.164544][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 149.175057][ T5093] device veth0_vlan entered promiscuous mode [ 149.404213][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 149.412707][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.442777][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.463264][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.472624][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 149.481373][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 149.491359][ T5093] device veth1_macvtap entered promiscuous mode [ 149.552444][ T5147] device veth1_macvtap left promiscuous mode [ 149.568996][ T5147] device macsec0 left promiscuous mode [ 149.577456][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 149.588868][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 149.609816][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 149.631323][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 149.666193][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 149.675103][ T5147] device veth1_macvtap entered promiscuous mode [ 149.699555][ T5147] device macsec0 entered promiscuous mode [ 149.912046][ T5151] device sit0 entered promiscuous mode [ 150.757559][ T5167] device syzkaller0 entered promiscuous mode [ 151.032993][ T332] device bridge_slave_1 left promiscuous mode [ 151.039149][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.060054][ T332] device bridge_slave_0 left promiscuous mode [ 151.069526][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.081271][ T332] device veth1_macvtap left promiscuous mode [ 151.089715][ T332] device veth0_vlan left promiscuous mode [ 151.261037][ T5181] device syzkaller0 entered promiscuous mode [ 151.288891][ T5187] device veth1_macvtap left promiscuous mode [ 151.305761][ T5187] device macsec0 left promiscuous mode [ 151.321952][ T5188] device veth1_macvtap entered promiscuous mode [ 151.329911][ T5188] device macsec0 entered promiscuous mode [ 151.585139][ T5207] device veth1_macvtap left promiscuous mode [ 151.615505][ T5207] device macsec0 left promiscuous mode [ 151.648062][ T5210] device veth1_macvtap entered promiscuous mode [ 151.654549][ T5210] device macsec0 entered promiscuous mode [ 151.705139][ T5178] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.712598][ T5178] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.723328][ T5178] device bridge_slave_0 entered promiscuous mode [ 151.823219][ T5178] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.835887][ T5178] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.843382][ T5178] device bridge_slave_1 entered promiscuous mode [ 151.887571][ T5226] device syzkaller0 entered promiscuous mode [ 152.156510][ T5231] device veth1_macvtap left promiscuous mode [ 152.167449][ T5231] device macsec0 left promiscuous mode [ 152.189531][ T5231] device veth1_macvtap entered promiscuous mode [ 152.203355][ T5233] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 152.204398][ T5231] device macsec0 entered promiscuous mode [ 152.255799][ T5235] device veth1_macvtap left promiscuous mode [ 152.272857][ T5235] device macsec0 left promiscuous mode [ 152.282355][ T5238] device veth1_macvtap entered promiscuous mode [ 152.288651][ T5238] device macsec0 entered promiscuous mode [ 152.313285][ T5237] device syzkaller0 entered promiscuous mode [ 152.615466][ T5251] device veth1_macvtap left promiscuous mode [ 152.621723][ T5251] device macsec0 left promiscuous mode [ 152.666213][ T5255] device veth1_macvtap entered promiscuous mode [ 152.672910][ T5255] device macsec0 entered promiscuous mode [ 152.692058][ T5256] €Â0: renamed from pim6reg1 [ 152.934276][ T5270] device sit0 left promiscuous mode [ 153.138991][ T5272] device sit0 entered promiscuous mode [ 153.369342][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.380221][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.491711][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.514829][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.559742][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.566849][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.634920][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 153.679886][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.719972][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.727028][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.748755][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 153.758964][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.767182][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 153.775643][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.928122][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 153.938259][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 153.947044][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 153.958764][ T5178] device veth0_vlan entered promiscuous mode [ 153.982193][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 153.993127][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.064856][ T5277] device syzkaller0 entered promiscuous mode [ 154.126898][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.140184][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.287505][ T5178] device veth1_macvtap entered promiscuous mode [ 154.325926][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 154.334126][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 154.342365][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 154.378503][ T5286] GPL: port 1(erspan0) entered blocking state [ 154.394887][ T5286] GPL: port 1(erspan0) entered disabled state [ 154.403687][ T5286] device erspan0 entered promiscuous mode [ 154.754690][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 154.763094][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 154.771501][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 154.779750][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.790103][ T332] device bridge_slave_1 left promiscuous mode [ 155.796221][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.803743][ T332] device bridge_slave_0 left promiscuous mode [ 155.809902][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.817734][ T332] device veth1_macvtap left promiscuous mode [ 155.823783][ T332] device veth0_vlan left promiscuous mode [ 155.938930][ T5301] device syzkaller0 entered promiscuous mode [ 156.425352][ T5320] device veth1_macvtap left promiscuous mode [ 156.435967][ T5320] device macsec0 left promiscuous mode [ 156.497120][ T5324] device syzkaller0 entered promiscuous mode [ 156.505063][ T5318] €Â0: renamed from pim6reg1 [ 156.560056][ T5320] device veth1_macvtap entered promiscuous mode [ 156.576623][ T5320] device macsec0 entered promiscuous mode [ 157.108973][ T5313] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.121718][ T5313] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.162595][ T5313] device bridge_slave_0 entered promiscuous mode [ 157.342130][ T5313] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.355940][ T5313] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.400377][ T5313] device bridge_slave_1 entered promiscuous mode [ 157.981422][ T5356] device syzkaller0 entered promiscuous mode [ 158.381295][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.393419][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.415888][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.447434][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.466313][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.473390][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.481364][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.491312][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.500186][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.507258][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.521672][ T5371] device veth1_macvtap left promiscuous mode [ 158.529497][ T5371] device macsec0 left promiscuous mode [ 158.542973][ T5377] device veth1_macvtap entered promiscuous mode [ 158.549486][ T5377] device macsec0 entered promiscuous mode [ 158.596981][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.604926][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.613240][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.621406][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.629803][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.638786][ T5388] syz.0.1552[5388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.638897][ T5388] syz.0.1552[5388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.651029][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 158.671116][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.688499][ T5389] device syzkaller0 entered promiscuous mode [ 158.712012][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 158.720079][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.729049][ T5313] device veth0_vlan entered promiscuous mode [ 158.742510][ T5313] device veth1_macvtap entered promiscuous mode [ 158.801344][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.831460][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.889686][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.906085][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.914620][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 159.028409][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 159.037261][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.045847][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 159.054506][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.173534][ T5405] device syzkaller0 entered promiscuous mode [ 160.460064][ T5415] device veth1_macvtap left promiscuous mode [ 160.520612][ T5415] device macsec0 left promiscuous mode [ 160.646127][ T5422] device veth1_macvtap entered promiscuous mode [ 160.669459][ T5422] device macsec0 entered promiscuous mode [ 160.782728][ T5420] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.790114][ T5420] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.802276][ T5420] device bridge_slave_0 entered promiscuous mode [ 160.811091][ T332] device bridge_slave_1 left promiscuous mode [ 160.817525][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.826829][ T332] device bridge_slave_0 left promiscuous mode [ 160.833161][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.841721][ T332] device veth1_macvtap left promiscuous mode [ 160.847792][ T332] device veth0_vlan left promiscuous mode [ 160.925556][ T5420] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.932706][ T5420] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.940431][ T5420] device bridge_slave_1 entered promiscuous mode [ 161.024556][ T5420] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.031639][ T5420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.038920][ T5420] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.045971][ T5420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.071700][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.090749][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.109513][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.134372][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.149316][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.156402][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.168152][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.176838][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.183902][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.208260][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.216341][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.233902][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 161.242481][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.265871][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.314372][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.329577][ T5420] device veth0_vlan entered promiscuous mode [ 161.343925][ T5436] device sit0 left promiscuous mode [ 161.529347][ T5443] device sit0 entered promiscuous mode [ 161.568078][ T5445] device syzkaller0 entered promiscuous mode [ 161.604862][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 161.613626][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 161.639220][ T5420] device veth1_macvtap entered promiscuous mode [ 161.659788][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 161.683654][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 161.699769][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 161.738539][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 161.748135][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.949269][ T30] audit: type=1400 audit(1757009886.423:153): avc: denied { create } for pid=5458 comm="syz.4.1570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 162.044403][ T5461] device syzkaller0 entered promiscuous mode [ 162.345247][ T5471] device syzkaller0 entered promiscuous mode [ 163.381111][ T332] device bridge_slave_1 left promiscuous mode [ 163.387244][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.394885][ T332] device bridge_slave_0 left promiscuous mode [ 163.401096][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.409465][ T332] device veth1_macvtap left promiscuous mode [ 163.415610][ T332] device veth0_vlan left promiscuous mode [ 163.558394][ T5494] device veth1_macvtap left promiscuous mode [ 163.564790][ T5494] device macsec0 left promiscuous mode [ 163.581021][ T5499] device veth1_macvtap entered promiscuous mode [ 163.587408][ T5499] device macsec0 entered promiscuous mode [ 163.620486][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 163.641355][ T5497] device syzkaller0 entered promiscuous mode [ 163.821051][ T5503] device sit0 entered promiscuous mode [ 164.270808][ T5510] device syzkaller0 entered promiscuous mode [ 164.449251][ T5498] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.459834][ T5498] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.490292][ T5498] device bridge_slave_0 entered promiscuous mode [ 164.524440][ T5498] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.533217][ T5498] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.541154][ T5498] device bridge_slave_1 entered promiscuous mode [ 164.720801][ T5525] device syzkaller0 entered promiscuous mode [ 164.984957][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.992854][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.020573][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.071208][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.119721][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.126820][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.134375][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.144136][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.152516][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.159580][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.167440][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.176232][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.202713][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.226262][ T5498] device veth0_vlan entered promiscuous mode [ 165.235665][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.246540][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.254418][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.262593][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 165.297189][ T5498] device veth1_macvtap entered promiscuous mode [ 165.306633][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.323136][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.333072][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.345477][ T30] audit: type=1400 audit(1757009889.823:154): avc: denied { ioctl } for pid=5548 comm="syz.2.1595" path="pid:[4026532471]" dev="nsfs" ino=4026532471 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 165.372648][ T5552] device pim6reg1 entered promiscuous mode [ 165.405261][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.413863][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.655294][ T5556] device syzkaller0 entered promiscuous mode [ 167.144791][ T5593] device syzkaller0 entered promiscuous mode [ 167.601216][ T5600] device syzkaller0 entered promiscuous mode [ 167.612760][ T5581] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.619842][ T5581] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.627320][ T5581] device bridge_slave_0 entered promiscuous mode [ 167.788046][ T5581] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.795291][ T5581] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.805774][ T5581] device bridge_slave_1 entered promiscuous mode [ 167.944110][ T332] device bridge_slave_1 left promiscuous mode [ 167.950554][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.958029][ T332] device bridge_slave_0 left promiscuous mode [ 167.964725][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.976438][ T332] device veth1_macvtap left promiscuous mode [ 167.982518][ T332] device veth0_vlan left promiscuous mode [ 168.038540][ T30] audit: type=1400 audit(1757009892.513:155): avc: denied { create } for pid=5625 comm="syz.3.1618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 168.142499][ T5635] device veth1_macvtap left promiscuous mode [ 168.148653][ T5635] device macsec0 left promiscuous mode [ 168.157898][ T5635] device veth1_macvtap entered promiscuous mode [ 168.168967][ T5635] device macsec0 entered promiscuous mode [ 168.234687][ T5638] device syzkaller0 entered promiscuous mode [ 169.239406][ C1] sched: RT throttling activated [ 170.214589][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.239955][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.249122][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.257765][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.309727][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.316907][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.436290][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.444957][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.453491][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.461749][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.468785][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.477925][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.489737][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.506555][ T5659] device syzkaller0 entered promiscuous mode [ 170.526739][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.542121][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.567904][ T5581] device veth0_vlan entered promiscuous mode [ 170.576824][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 170.629764][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.638726][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 170.646995][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.816696][ T5581] device veth1_macvtap entered promiscuous mode [ 170.826662][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.834601][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.842305][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 170.851648][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.859871][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 170.882840][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.891237][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.908884][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.924135][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 171.430507][ T332] device bridge_slave_1 left promiscuous mode [ 171.436689][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.444156][ T332] device bridge_slave_0 left promiscuous mode [ 171.450385][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.458122][ T332] device veth1_macvtap left promiscuous mode [ 171.464173][ T332] device veth0_vlan left promiscuous mode [ 172.431112][ T5693] device syzkaller0 entered promiscuous mode [ 172.695380][ T5703] device veth1_macvtap left promiscuous mode [ 172.701618][ T5703] device macsec0 left promiscuous mode [ 172.710187][ T5703] device veth1_macvtap entered promiscuous mode [ 172.716580][ T5703] device macsec0 entered promiscuous mode [ 172.799010][ T5697] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.806202][ T5697] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.813588][ T5697] device bridge_slave_0 entered promiscuous mode [ 172.839564][ T5697] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.846634][ T5697] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.854254][ T5697] device bridge_slave_1 entered promiscuous mode [ 172.868420][ T5711] device syzkaller0 entered promiscuous mode [ 172.905474][ T5713] device syzkaller0 entered promiscuous mode [ 173.362782][ T5725] device pim6reg1 entered promiscuous mode [ 173.551937][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.569652][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.620347][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.640077][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.700294][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.707385][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.759491][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.772952][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.783543][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.792985][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.800045][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.818328][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.826448][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.834990][ T5749] device veth1_macvtap left promiscuous mode [ 173.841062][ T5749] device macsec0 left promiscuous mode [ 173.849196][ T5751] device veth1_macvtap entered promiscuous mode [ 173.859523][ T5751] device macsec0 entered promiscuous mode [ 173.869887][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.878169][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.898939][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 173.917810][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 173.939327][ T5697] device veth0_vlan entered promiscuous mode [ 173.954171][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 173.972594][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.998722][ T5697] device veth1_macvtap entered promiscuous mode [ 174.016396][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 174.025475][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.033253][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.062867][ T5760] device syzkaller0 entered promiscuous mode [ 174.078554][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 174.090968][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.145133][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 174.195316][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 174.631990][ T5787] device veth1_macvtap left promiscuous mode [ 174.638007][ T5787] device macsec0 left promiscuous mode [ 174.656746][ T5787] device veth1_macvtap entered promiscuous mode [ 174.666135][ T5787] device macsec0 entered promiscuous mode [ 175.780780][ T332] device bridge_slave_1 left promiscuous mode [ 175.786901][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.794416][ T332] device bridge_slave_0 left promiscuous mode [ 175.800728][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.808558][ T332] device veth1_macvtap left promiscuous mode [ 175.814614][ T332] device veth0_vlan left promiscuous mode [ 176.099014][ T5802] device syzkaller0 entered promiscuous mode [ 176.408344][ T5812] device syzkaller0 entered promiscuous mode [ 176.646337][ T5820] device syzkaller0 entered promiscuous mode [ 176.951151][ T5825] device syzkaller0 entered promiscuous mode [ 176.966219][ T5810] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.089512][ T5810] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.177958][ T5810] device bridge_slave_0 entered promiscuous mode [ 177.237732][ T5842] device pim6reg1 entered promiscuous mode [ 177.608224][ T5810] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.673857][ T5810] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.735118][ T5810] device bridge_slave_1 entered promiscuous mode [ 177.784155][ T5844] device veth1_macvtap left promiscuous mode [ 177.799637][ T5844] device macsec0 left promiscuous mode [ 177.821710][ T5847] device veth1_macvtap entered promiscuous mode [ 177.828191][ T5847] device macsec0 entered promiscuous mode [ 178.100862][ T5857] device pim6reg1 entered promiscuous mode [ 178.146419][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.154127][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.172441][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.182366][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.270542][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.277642][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.286082][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.295350][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.311206][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.318294][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.331034][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.452641][ T5873] device pim6reg1 entered promiscuous mode [ 178.466641][ T5875] device syzkaller0 entered promiscuous mode [ 178.485365][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 178.494193][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.503263][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.510889][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.518441][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.526465][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.590717][ T5810] device veth0_vlan entered promiscuous mode [ 178.654961][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 178.665695][ T5810] device veth1_macvtap entered promiscuous mode [ 178.756418][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 178.788120][ T5893] device syzkaller0 entered promiscuous mode [ 178.799184][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 178.914044][ T5896] device veth1_macvtap left promiscuous mode [ 178.920404][ T5896] device macsec0 left promiscuous mode [ 178.959013][ T5896] device veth1_macvtap entered promiscuous mode [ 178.970919][ T5896] device macsec0 entered promiscuous mode [ 179.003004][ T5900] device syzkaller0 entered promiscuous mode [ 180.060307][ T379] device bridge_slave_1 left promiscuous mode [ 180.066516][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.074817][ T379] device bridge_slave_0 left promiscuous mode [ 180.081170][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.089846][ T379] device veth1_macvtap left promiscuous mode [ 180.095946][ T379] device veth0_vlan left promiscuous mode [ 180.811725][ T5928] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.827247][ T5928] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.835073][ T5928] device bridge_slave_0 entered promiscuous mode [ 180.852245][ T5928] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.880999][ T5928] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.893280][ T5928] device bridge_slave_1 entered promiscuous mode [ 180.959357][ T5936] device syzkaller0 entered promiscuous mode [ 181.125961][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.133639][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.142897][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.151449][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.159928][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.166973][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.174765][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.183445][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.191938][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.198985][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.225822][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.261364][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.290073][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.310826][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 181.362215][ T5947] device syzkaller0 entered promiscuous mode [ 181.382981][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.391240][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.411831][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.435966][ T5928] device veth0_vlan entered promiscuous mode [ 181.797947][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 181.863701][ T5928] device veth1_macvtap entered promiscuous mode [ 182.125563][ T5962] device syzkaller0 entered promiscuous mode [ 182.174915][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 182.196921][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 182.252543][ T5963] device pim6reg1 entered promiscuous mode [ 182.307340][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 182.316591][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 182.444616][ T5967] device syzkaller0 entered promiscuous mode [ 183.740175][ T379] device bridge_slave_1 left promiscuous mode [ 183.746525][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.754153][ T379] device bridge_slave_0 left promiscuous mode [ 183.760369][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.768388][ T379] device veth1_macvtap left promiscuous mode [ 183.774423][ T379] device veth0_vlan left promiscuous mode [ 184.461786][ T5988] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.489477][ T5988] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.497978][ T5988] device bridge_slave_0 entered promiscuous mode [ 184.519562][ T5988] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.526786][ T5988] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.537569][ T5988] device bridge_slave_1 entered promiscuous mode [ 184.622543][ T6009] device syzkaller0 entered promiscuous mode [ 184.946799][ T5988] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.953984][ T5988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.961330][ T5988] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.968359][ T5988] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.995483][ T6018] device syzkaller0 entered promiscuous mode [ 185.026758][ T6020] device veth1_macvtap left promiscuous mode [ 185.035409][ T6020] device macsec0 left promiscuous mode [ 185.086652][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.102661][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.136903][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.153679][ T6020] device veth1_macvtap entered promiscuous mode [ 185.164336][ T6020] device macsec0 entered promiscuous mode [ 185.181783][ T6025] device syzkaller0 entered promiscuous mode [ 185.307433][ T6027] device syzkaller0 entered promiscuous mode [ 185.506281][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.514756][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.527239][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.534327][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.565376][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.591975][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.650155][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.657239][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.739019][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.779964][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.799613][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.807754][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.845631][ T6058] device syzkaller0 entered promiscuous mode [ 185.855560][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 185.867746][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.886784][ T6064] device syzkaller0 entered promiscuous mode [ 185.894149][ T6068] device veth1_macvtap left promiscuous mode [ 185.903109][ T6068] device macsec0 left promiscuous mode [ 186.045772][ T6068] device veth1_macvtap entered promiscuous mode [ 186.052249][ T6068] device macsec0 entered promiscuous mode [ 186.067256][ T6074] device syzkaller0 entered promiscuous mode [ 186.104221][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.113377][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.123722][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.138546][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.155580][ T5988] device veth0_vlan entered promiscuous mode [ 186.216545][ T6078] device syzkaller0 entered promiscuous mode [ 186.540275][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 186.555911][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 186.577217][ T5988] device veth1_macvtap entered promiscuous mode [ 186.627160][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 186.670519][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 186.678872][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 186.700041][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 186.708431][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 186.719709][ T6099] device pim6reg1 entered promiscuous mode [ 186.761883][ T6106] device syzkaller0 entered promiscuous mode [ 186.900601][ T6114] device veth1_macvtap left promiscuous mode [ 186.906601][ T6114] device macsec0 left promiscuous mode [ 186.917360][ T6115] device veth1_macvtap entered promiscuous mode [ 186.923822][ T6115] device macsec0 entered promiscuous mode [ 187.820166][ T379] device bridge_slave_1 left promiscuous mode [ 187.826296][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.833803][ T379] device bridge_slave_0 left promiscuous mode [ 187.839985][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.847749][ T379] device veth1_macvtap left promiscuous mode [ 187.853778][ T379] device veth0_vlan left promiscuous mode [ 188.678530][ T6122] device syzkaller0 entered promiscuous mode [ 188.740932][ T6130] device syzkaller0 entered promiscuous mode [ 189.196745][ T6131] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.219455][ T6131] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.227008][ T6131] device bridge_slave_0 entered promiscuous mode [ 189.286026][ T6139] device syzkaller0 entered promiscuous mode [ 189.503693][ T6131] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.516123][ T6131] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.525116][ T6131] device bridge_slave_1 entered promiscuous mode [ 190.281586][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.289313][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.331571][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.340941][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.349190][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.356278][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.366743][ T6183] FAULT_INJECTION: forcing a failure. [ 190.366743][ T6183] name failslab, interval 1, probability 0, space 0, times 0 [ 190.384807][ T6183] CPU: 0 PID: 6183 Comm: syz.4.1770 Not tainted syzkaller #0 [ 190.392204][ T6183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 190.402262][ T6183] Call Trace: [ 190.405533][ T6183] [ 190.408458][ T6183] __dump_stack+0x21/0x30 [ 190.412810][ T6183] dump_stack_lvl+0xee/0x150 [ 190.417396][ T6183] ? show_regs_print_info+0x20/0x20 [ 190.422613][ T6183] dump_stack+0x15/0x20 [ 190.426791][ T6183] should_fail+0x3c1/0x510 [ 190.431210][ T6183] ? tipc_msg_build+0xd1/0xfb0 [ 190.435979][ T6183] __should_failslab+0xa4/0xe0 [ 190.440746][ T6183] should_failslab+0x9/0x20 [ 190.445258][ T6183] slab_pre_alloc_hook+0x3b/0xe0 [ 190.450221][ T6183] ? tipc_msg_build+0xd1/0xfb0 [ 190.454994][ T6183] ? tipc_msg_build+0xd1/0xfb0 [ 190.459759][ T6183] __kmalloc_track_caller+0x6c/0x2c0 [ 190.465061][ T6183] ? tipc_msg_build+0xd1/0xfb0 [ 190.469819][ T6183] ? tipc_msg_build+0xd1/0xfb0 [ 190.474572][ T6183] __alloc_skb+0x21a/0x740 [ 190.478991][ T6183] tipc_msg_build+0xd1/0xfb0 [ 190.483577][ T6183] ? tipc_nametbl_lookup_mcast_nodes+0x3fa/0x960 [ 190.489912][ T6183] __tipc_sendmsg+0x19dd/0x2680 [ 190.494755][ T6183] ? _raw_spin_lock+0xe0/0xe0 [ 190.499431][ T6183] ? local_bh_enable+0x30/0x30 [ 190.504191][ T6183] ? wait_woken+0x170/0x170 [ 190.508683][ T6183] ? avc_has_perm+0x158/0x240 [ 190.513352][ T6183] ? __kasan_check_write+0x14/0x20 [ 190.518454][ T6183] ? _raw_spin_lock_bh+0x8e/0xe0 [ 190.523381][ T6183] ? _raw_spin_lock_irq+0xe0/0xe0 [ 190.528394][ T6183] ? unwind_get_return_address+0x4d/0x90 [ 190.534018][ T6183] ? stack_trace_save+0xe0/0xe0 [ 190.538857][ T6183] ? __local_bh_enable_ip+0x58/0x80 [ 190.544043][ T6183] ? lock_sock_nested+0x1f1/0x290 [ 190.549162][ T6183] ? sock_init_data+0xc0/0xc0 [ 190.553840][ T6183] ? stack_trace_save+0x98/0xe0 [ 190.558710][ T6183] tipc_sendmsg+0x55/0x70 [ 190.563031][ T6183] ? tipc_recvmsg+0x13a0/0x13a0 [ 190.567899][ T6183] ____sys_sendmsg+0x5a2/0x8c0 [ 190.572657][ T6183] ? __sys_sendmsg_sock+0x40/0x40 [ 190.577677][ T6183] ? kstrtouint_from_user+0x1a0/0x200 [ 190.583057][ T6183] ? import_iovec+0x7c/0xb0 [ 190.587567][ T6183] ___sys_sendmsg+0x1f0/0x260 [ 190.592245][ T6183] ? __sys_sendmsg+0x250/0x250 [ 190.597012][ T6183] ? __fdget+0x1a1/0x230 [ 190.601270][ T6183] __x64_sys_sendmsg+0x1e2/0x2a0 [ 190.606207][ T6183] ? ___sys_sendmsg+0x260/0x260 [ 190.611056][ T6183] ? ksys_write+0x1eb/0x240 [ 190.615563][ T6183] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 190.621657][ T6183] x64_sys_call+0x4b/0x9a0 [ 190.626077][ T6183] do_syscall_64+0x4c/0xa0 [ 190.630491][ T6183] ? clear_bhb_loop+0x50/0xa0 [ 190.635170][ T6183] ? clear_bhb_loop+0x50/0xa0 [ 190.639839][ T6183] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 190.645727][ T6183] RIP: 0033:0x7f839a9fbbe9 [ 190.650152][ T6183] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.669778][ T6183] RSP: 002b:00007f8399464038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 190.678182][ T6183] RAX: ffffffffffffffda RBX: 00007f839ac32fa0 RCX: 00007f839a9fbbe9 [ 190.686145][ T6183] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000006 [ 190.694109][ T6183] RBP: 00007f8399464090 R08: 0000000000000000 R09: 0000000000000000 [ 190.702067][ T6183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 190.710027][ T6183] R13: 00007f839ac33038 R14: 00007f839ac32fa0 R15: 00007fff3270a658 [ 190.718016][ T6183] [ 190.762570][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.773530][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.783454][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.791802][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.798860][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.855007][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.863216][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.877714][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.893429][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.032523][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 191.041031][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 191.073475][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 191.129091][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.148768][ T6131] device veth0_vlan entered promiscuous mode [ 191.189098][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.206989][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.228771][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 191.240589][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.257021][ T6131] device veth1_macvtap entered promiscuous mode [ 191.266587][ T6232] FAULT_INJECTION: forcing a failure. [ 191.266587][ T6232] name failslab, interval 1, probability 0, space 0, times 0 [ 191.281421][ T6232] CPU: 0 PID: 6232 Comm: syz.2.1785 Not tainted syzkaller #0 [ 191.288813][ T6232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 191.298986][ T6232] Call Trace: [ 191.302267][ T6232] [ 191.305201][ T6232] __dump_stack+0x21/0x30 [ 191.309539][ T6232] dump_stack_lvl+0xee/0x150 [ 191.314136][ T6232] ? show_regs_print_info+0x20/0x20 [ 191.319346][ T6232] ? unwind_get_return_address+0x4d/0x90 [ 191.324988][ T6232] ? stack_trace_save+0xe0/0xe0 [ 191.329850][ T6232] dump_stack+0x15/0x20 [ 191.334042][ T6232] should_fail+0x3c1/0x510 [ 191.338465][ T6232] __should_failslab+0xa4/0xe0 [ 191.343256][ T6232] should_failslab+0x9/0x20 [ 191.347768][ T6232] slab_pre_alloc_hook+0x3b/0xe0 [ 191.352711][ T6232] ? __alloc_skb+0xe0/0x740 [ 191.357215][ T6232] kmem_cache_alloc+0x44/0x260 [ 191.361981][ T6232] ? __kasan_kmalloc+0xda/0x110 [ 191.366834][ T6232] __alloc_skb+0xe0/0x740 [ 191.371181][ T6232] __pskb_copy_fclone+0xa7/0xf00 [ 191.376135][ T6232] tipc_msg_reassemble+0x12e/0x440 [ 191.381284][ T6232] tipc_mcast_xmit+0x1c6/0x1710 [ 191.386164][ T6232] ? tipc_bcbase_xmit+0x9d0/0x9d0 [ 191.391208][ T6232] ? kasan_unpoison+0x67/0x90 [ 191.395910][ T6232] ? __check_object_size+0x8e/0x3c0 [ 191.401115][ T6232] ? tipc_msg_build+0x452/0xfb0 [ 191.406063][ T6232] ? tipc_nametbl_lookup_mcast_nodes+0x3fa/0x960 [ 191.412401][ T6232] __tipc_sendmsg+0x1d81/0x2680 [ 191.417253][ T6232] ? _raw_spin_lock+0xe0/0xe0 [ 191.421936][ T6232] ? local_bh_enable+0x30/0x30 [ 191.426702][ T6232] ? wait_woken+0x170/0x170 [ 191.431213][ T6232] ? avc_has_perm+0x158/0x240 [ 191.435909][ T6232] ? __kasan_check_write+0x14/0x20 [ 191.441025][ T6232] ? _raw_spin_lock_bh+0x8e/0xe0 [ 191.445975][ T6232] ? _raw_spin_lock_irq+0xe0/0xe0 [ 191.451011][ T6232] ? unwind_get_return_address+0x4d/0x90 [ 191.456666][ T6232] ? stack_trace_save+0xe0/0xe0 [ 191.461526][ T6232] ? __local_bh_enable_ip+0x58/0x80 [ 191.466731][ T6232] ? lock_sock_nested+0x1f1/0x290 [ 191.471764][ T6232] ? sock_init_data+0xc0/0xc0 [ 191.476446][ T6232] ? stack_trace_save+0x98/0xe0 [ 191.481322][ T6232] tipc_sendmsg+0x55/0x70 [ 191.485661][ T6232] ? tipc_recvmsg+0x13a0/0x13a0 [ 191.490530][ T6232] ____sys_sendmsg+0x5a2/0x8c0 [ 191.495312][ T6232] ? __sys_sendmsg_sock+0x40/0x40 [ 191.500346][ T6232] ? kstrtouint_from_user+0x1a0/0x200 [ 191.505736][ T6232] ? import_iovec+0x7c/0xb0 [ 191.510256][ T6232] ___sys_sendmsg+0x1f0/0x260 [ 191.514973][ T6232] ? __sys_sendmsg+0x250/0x250 [ 191.519767][ T6232] ? __fdget+0x1a1/0x230 [ 191.524034][ T6232] __x64_sys_sendmsg+0x1e2/0x2a0 [ 191.529013][ T6232] ? ___sys_sendmsg+0x260/0x260 [ 191.533865][ T6232] ? ksys_write+0x1eb/0x240 [ 191.538374][ T6232] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 191.544713][ T6232] x64_sys_call+0x4b/0x9a0 [ 191.549141][ T6232] do_syscall_64+0x4c/0xa0 [ 191.553563][ T6232] ? clear_bhb_loop+0x50/0xa0 [ 191.558252][ T6232] ? clear_bhb_loop+0x50/0xa0 [ 191.562934][ T6232] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 191.568862][ T6232] RIP: 0033:0x7f50474e4be9 [ 191.573294][ T6232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.592935][ T6232] RSP: 002b:00007f5045f4d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 191.601371][ T6232] RAX: ffffffffffffffda RBX: 00007f504771bfa0 RCX: 00007f50474e4be9 [ 191.609347][ T6232] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000006 [ 191.617321][ T6232] RBP: 00007f5045f4d090 R08: 0000000000000000 R09: 0000000000000000 [ 191.625290][ T6232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.633262][ T6232] R13: 00007f504771c038 R14: 00007f504771bfa0 R15: 00007ffc148812e8 [ 191.641300][ T6232] [ 191.726484][ T6236] device veth1_macvtap left promiscuous mode [ 191.733471][ T6236] device macsec0 left promiscuous mode [ 191.826658][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 191.848791][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 191.886904][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 191.906230][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 191.924823][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.071371][ T6255] device syzkaller0 entered promiscuous mode [ 193.500115][ T379] device bridge_slave_1 left promiscuous mode [ 193.506230][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.513789][ T379] device bridge_slave_0 left promiscuous mode [ 193.519972][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.527816][ T379] device veth1_macvtap left promiscuous mode [ 193.533870][ T379] device veth0_vlan left promiscuous mode [ 194.199693][ T6279] FAULT_INJECTION: forcing a failure. [ 194.199693][ T6279] name failslab, interval 1, probability 0, space 0, times 0 [ 194.311136][ T6279] CPU: 1 PID: 6279 Comm: syz.4.1799 Not tainted syzkaller #0 [ 194.318551][ T6279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 194.328632][ T6279] Call Trace: [ 194.331924][ T6279] [ 194.334871][ T6279] __dump_stack+0x21/0x30 [ 194.339226][ T6279] dump_stack_lvl+0xee/0x150 [ 194.343842][ T6279] ? show_regs_print_info+0x20/0x20 [ 194.349058][ T6279] dump_stack+0x15/0x20 [ 194.353232][ T6279] should_fail+0x3c1/0x510 [ 194.357663][ T6279] ? __pskb_copy_fclone+0xa7/0xf00 [ 194.362796][ T6279] __should_failslab+0xa4/0xe0 [ 194.367587][ T6279] should_failslab+0x9/0x20 [ 194.372097][ T6279] slab_pre_alloc_hook+0x3b/0xe0 [ 194.377038][ T6279] ? __pskb_copy_fclone+0xa7/0xf00 [ 194.382148][ T6279] ? __pskb_copy_fclone+0xa7/0xf00 [ 194.387270][ T6279] __kmalloc_track_caller+0x6c/0x2c0 [ 194.392558][ T6279] ? __pskb_copy_fclone+0xa7/0xf00 [ 194.397669][ T6279] ? __pskb_copy_fclone+0xa7/0xf00 [ 194.402772][ T6279] __alloc_skb+0x21a/0x740 [ 194.407186][ T6279] __pskb_copy_fclone+0xa7/0xf00 [ 194.412127][ T6279] tipc_msg_reassemble+0x12e/0x440 [ 194.417234][ T6279] tipc_mcast_xmit+0x1c6/0x1710 [ 194.422093][ T6279] ? tipc_bcbase_xmit+0x9d0/0x9d0 [ 194.427111][ T6279] ? kasan_unpoison+0x67/0x90 [ 194.431797][ T6279] ? __check_object_size+0x8e/0x3c0 [ 194.437003][ T6279] ? tipc_msg_build+0x452/0xfb0 [ 194.441847][ T6279] ? tipc_nametbl_lookup_mcast_nodes+0x3fa/0x960 [ 194.448182][ T6279] __tipc_sendmsg+0x1d81/0x2680 [ 194.453039][ T6279] ? _raw_spin_lock+0xe0/0xe0 [ 194.457719][ T6279] ? local_bh_enable+0x30/0x30 [ 194.462481][ T6279] ? wait_woken+0x170/0x170 [ 194.466978][ T6279] ? avc_has_perm+0x158/0x240 [ 194.471661][ T6279] ? __kasan_check_write+0x14/0x20 [ 194.476771][ T6279] ? _raw_spin_lock_bh+0x8e/0xe0 [ 194.481702][ T6279] ? _raw_spin_lock_irq+0xe0/0xe0 [ 194.486722][ T6279] ? unwind_get_return_address+0x4d/0x90 [ 194.492349][ T6279] ? stack_trace_save+0xe0/0xe0 [ 194.497192][ T6279] ? __local_bh_enable_ip+0x58/0x80 [ 194.502384][ T6279] ? lock_sock_nested+0x1f1/0x290 [ 194.507407][ T6279] ? sock_init_data+0xc0/0xc0 [ 194.512074][ T6279] ? stack_trace_save+0x98/0xe0 [ 194.517037][ T6279] tipc_sendmsg+0x55/0x70 [ 194.521370][ T6279] ? tipc_recvmsg+0x13a0/0x13a0 [ 194.526219][ T6279] ____sys_sendmsg+0x5a2/0x8c0 [ 194.530985][ T6279] ? __sys_sendmsg_sock+0x40/0x40 [ 194.536015][ T6279] ? kstrtouint_from_user+0x1a0/0x200 [ 194.541389][ T6279] ? import_iovec+0x7c/0xb0 [ 194.545885][ T6279] ___sys_sendmsg+0x1f0/0x260 [ 194.550566][ T6279] ? __sys_sendmsg+0x250/0x250 [ 194.555338][ T6279] ? __fdget+0x1a1/0x230 [ 194.559576][ T6279] __x64_sys_sendmsg+0x1e2/0x2a0 [ 194.564521][ T6279] ? ___sys_sendmsg+0x260/0x260 [ 194.569380][ T6279] ? ksys_write+0x1eb/0x240 [ 194.573881][ T6279] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 194.579944][ T6279] x64_sys_call+0x4b/0x9a0 [ 194.584366][ T6279] do_syscall_64+0x4c/0xa0 [ 194.588795][ T6279] ? clear_bhb_loop+0x50/0xa0 [ 194.593484][ T6279] ? clear_bhb_loop+0x50/0xa0 [ 194.598164][ T6279] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 194.604059][ T6279] RIP: 0033:0x7f839a9fbbe9 [ 194.608472][ T6279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.628097][ T6279] RSP: 002b:00007f8399464038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 194.636509][ T6279] RAX: ffffffffffffffda RBX: 00007f839ac32fa0 RCX: 00007f839a9fbbe9 [ 194.644595][ T6279] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000006 [ 194.652565][ T6279] RBP: 00007f8399464090 R08: 0000000000000000 R09: 0000000000000000 [ 194.660533][ T6279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.668504][ T6279] R13: 00007f839ac33038 R14: 00007f839ac32fa0 R15: 00007fff3270a658 [ 194.676490][ T6279] [ 194.840258][ T6280] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.852875][ T6280] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.861842][ T6280] device bridge_slave_0 entered promiscuous mode [ 194.936414][ T6280] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.943872][ T6280] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.951572][ T6280] device bridge_slave_1 entered promiscuous mode [ 195.589187][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.596838][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.615189][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.623796][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.633737][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.640818][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.654512][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.665329][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.682459][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.689531][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.697340][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.708540][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.716559][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.751349][ T6309] device syzkaller0 entered promiscuous mode [ 195.771685][ T6312] device syzkaller0 entered promiscuous mode [ 195.785431][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 195.825951][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.834364][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 195.842224][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 196.084099][ T6280] device veth0_vlan entered promiscuous mode [ 196.103712][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 196.115987][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 196.135479][ T6280] device veth1_macvtap entered promiscuous mode [ 196.199092][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 196.222938][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 196.255492][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 196.296902][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 196.305386][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 197.660177][ T332] device bridge_slave_1 left promiscuous mode [ 197.666299][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.673809][ T332] device bridge_slave_0 left promiscuous mode [ 197.680161][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.688010][ T332] device veth1_macvtap left promiscuous mode [ 197.694054][ T332] device veth0_vlan left promiscuous mode [ 198.588685][ T6327] device syzkaller0 entered promiscuous mode [ 198.608410][ T6331] FAULT_INJECTION: forcing a failure. [ 198.608410][ T6331] name failslab, interval 1, probability 0, space 0, times 0 [ 198.621052][ T6331] CPU: 1 PID: 6331 Comm: syz.3.1812 Not tainted syzkaller #0 [ 198.628463][ T6331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 198.638526][ T6331] Call Trace: [ 198.641820][ T6331] [ 198.644741][ T6331] __dump_stack+0x21/0x30 [ 198.649062][ T6331] dump_stack_lvl+0xee/0x150 [ 198.653665][ T6331] ? show_regs_print_info+0x20/0x20 [ 198.658882][ T6331] ? __kasan_kmalloc+0xec/0x110 [ 198.663755][ T6331] ? __kasan_kmalloc+0xda/0x110 [ 198.668611][ T6331] ? __kmalloc_track_caller+0x13c/0x2c0 [ 198.674162][ T6331] ? __pskb_copy_fclone+0xa7/0xf00 [ 198.679278][ T6331] ? tipc_msg_reassemble+0x12e/0x440 [ 198.684566][ T6331] ? tipc_mcast_xmit+0x1c6/0x1710 [ 198.689587][ T6331] dump_stack+0x15/0x20 [ 198.693746][ T6331] should_fail+0x3c1/0x510 [ 198.698167][ T6331] __should_failslab+0xa4/0xe0 [ 198.702920][ T6331] should_failslab+0x9/0x20 [ 198.707422][ T6331] slab_pre_alloc_hook+0x3b/0xe0 [ 198.712345][ T6331] kmem_cache_alloc_trace+0x48/0x270 [ 198.717625][ T6331] ? tipc_nametbl_lookup_mcast_sockets+0x641/0xd30 [ 198.724116][ T6331] tipc_nametbl_lookup_mcast_sockets+0x641/0xd30 [ 198.730440][ T6331] tipc_sk_mcast_rcv+0x590/0xec0 [ 198.735385][ T6331] ? __kmalloc_track_caller+0x13c/0x2c0 [ 198.740951][ T6331] ? tipc_sk_bind+0x310/0x310 [ 198.745630][ T6331] tipc_mcast_xmit+0x10fd/0x1710 [ 198.750559][ T6331] ? tipc_bcbase_xmit+0x9d0/0x9d0 [ 198.755575][ T6331] ? kasan_unpoison+0x67/0x90 [ 198.760239][ T6331] ? __check_object_size+0x8e/0x3c0 [ 198.765427][ T6331] ? tipc_msg_build+0x452/0xfb0 [ 198.770265][ T6331] ? tipc_nametbl_lookup_mcast_nodes+0x3fa/0x960 [ 198.776589][ T6331] __tipc_sendmsg+0x1d81/0x2680 [ 198.781423][ T6331] ? _raw_spin_lock+0xe0/0xe0 [ 198.786089][ T6331] ? local_bh_enable+0x30/0x30 [ 198.790846][ T6331] ? wait_woken+0x170/0x170 [ 198.795342][ T6331] ? avc_has_perm+0x158/0x240 [ 198.800032][ T6331] ? __kasan_check_write+0x14/0x20 [ 198.805131][ T6331] ? _raw_spin_lock_bh+0x8e/0xe0 [ 198.810112][ T6331] ? _raw_spin_lock_irq+0xe0/0xe0 [ 198.815135][ T6331] ? unwind_get_return_address+0x4d/0x90 [ 198.820764][ T6331] ? stack_trace_save+0xe0/0xe0 [ 198.825608][ T6331] ? __local_bh_enable_ip+0x58/0x80 [ 198.830806][ T6331] ? lock_sock_nested+0x1f1/0x290 [ 198.835829][ T6331] ? sock_init_data+0xc0/0xc0 [ 198.840494][ T6331] ? stack_trace_save+0x98/0xe0 [ 198.845339][ T6331] tipc_sendmsg+0x55/0x70 [ 198.849671][ T6331] ? tipc_recvmsg+0x13a0/0x13a0 [ 198.854529][ T6331] ____sys_sendmsg+0x5a2/0x8c0 [ 198.859288][ T6331] ? __sys_sendmsg_sock+0x40/0x40 [ 198.864300][ T6331] ? kstrtouint_from_user+0x1a0/0x200 [ 198.869667][ T6331] ? import_iovec+0x7c/0xb0 [ 198.874171][ T6331] ___sys_sendmsg+0x1f0/0x260 [ 198.878872][ T6331] ? __sys_sendmsg+0x250/0x250 [ 198.883654][ T6331] ? __fdget+0x1a1/0x230 [ 198.887902][ T6331] __x64_sys_sendmsg+0x1e2/0x2a0 [ 198.892856][ T6331] ? ___sys_sendmsg+0x260/0x260 [ 198.897699][ T6331] ? ksys_write+0x1eb/0x240 [ 198.902194][ T6331] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 198.908258][ T6331] x64_sys_call+0x4b/0x9a0 [ 198.912661][ T6331] do_syscall_64+0x4c/0xa0 [ 198.917061][ T6331] ? clear_bhb_loop+0x50/0xa0 [ 198.921740][ T6331] ? clear_bhb_loop+0x50/0xa0 [ 198.926407][ T6331] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 198.932284][ T6331] RIP: 0033:0x7fe8879bebe9 [ 198.936686][ T6331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.956298][ T6331] RSP: 002b:00007fe886427038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.964718][ T6331] RAX: ffffffffffffffda RBX: 00007fe887bf5fa0 RCX: 00007fe8879bebe9 [ 198.972677][ T6331] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000006 [ 198.980635][ T6331] RBP: 00007fe886427090 R08: 0000000000000000 R09: 0000000000000000 [ 198.988603][ T6331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 198.996560][ T6331] R13: 00007fe887bf6038 R14: 00007fe887bf5fa0 R15: 00007ffef105ec68 [ 199.004527][ T6331] [ 199.065196][ T30] audit: type=1400 audit(1757009923.543:156): avc: denied { create } for pid=6329 comm="syz.2.1811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 199.252092][ T6338] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.259229][ T6338] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.266904][ T6338] device bridge_slave_0 entered promiscuous mode [ 199.281680][ T6347] device syzkaller0 entered promiscuous mode [ 199.298425][ T6345] device veth1_macvtap left promiscuous mode [ 199.305411][ T6345] device macsec0 left promiscuous mode [ 199.330967][ T6338] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.339471][ T6338] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.347180][ T6338] device bridge_slave_1 entered promiscuous mode [ 200.532680][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.540472][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.556734][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.585692][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.597726][ T379] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.604967][ T379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.612449][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.620951][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.629182][ T379] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.636233][ T379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.643770][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 200.779132][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.787323][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.859706][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.890411][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.935504][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 200.946589][ T6382] FAULT_INJECTION: forcing a failure. [ 200.946589][ T6382] name failslab, interval 1, probability 0, space 0, times 0 [ 200.959238][ T6382] CPU: 0 PID: 6382 Comm: syz.0.1828 Not tainted syzkaller #0 [ 200.966628][ T6382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 200.976690][ T6382] Call Trace: [ 200.979979][ T6382] [ 200.982925][ T6382] __dump_stack+0x21/0x30 [ 200.987275][ T6382] dump_stack_lvl+0xee/0x150 [ 200.991880][ T6382] ? show_regs_print_info+0x20/0x20 [ 200.997090][ T6382] ? __kasan_kmalloc+0xec/0x110 [ 201.001963][ T6382] ? __kasan_kmalloc+0xda/0x110 [ 201.006833][ T6382] ? __kmalloc_track_caller+0x13c/0x2c0 [ 201.012395][ T6382] ? __pskb_copy_fclone+0xa7/0xf00 [ 201.017523][ T6382] ? tipc_msg_reassemble+0x12e/0x440 [ 201.022828][ T6382] ? tipc_mcast_xmit+0x1c6/0x1710 [ 201.027876][ T6382] dump_stack+0x15/0x20 [ 201.032042][ T6382] should_fail+0x3c1/0x510 [ 201.036469][ T6382] __should_failslab+0xa4/0xe0 [ 201.041265][ T6382] should_failslab+0x9/0x20 [ 201.045794][ T6382] slab_pre_alloc_hook+0x3b/0xe0 [ 201.050744][ T6382] kmem_cache_alloc_trace+0x48/0x270 [ 201.056052][ T6382] ? tipc_nametbl_lookup_mcast_sockets+0x641/0xd30 [ 201.062560][ T6382] tipc_nametbl_lookup_mcast_sockets+0x641/0xd30 [ 201.068910][ T6382] tipc_sk_mcast_rcv+0x590/0xec0 [ 201.073857][ T6382] ? __kmalloc_track_caller+0x13c/0x2c0 [ 201.079414][ T6382] ? tipc_sk_bind+0x310/0x310 [ 201.084107][ T6382] tipc_mcast_xmit+0x10fd/0x1710 [ 201.089056][ T6382] ? tipc_bcbase_xmit+0x9d0/0x9d0 [ 201.094086][ T6382] ? kasan_unpoison+0x67/0x90 [ 201.098771][ T6382] ? __check_object_size+0x8e/0x3c0 [ 201.103981][ T6382] ? tipc_msg_build+0x452/0xfb0 [ 201.108863][ T6382] ? tipc_nametbl_lookup_mcast_nodes+0x3fa/0x960 [ 201.115212][ T6382] __tipc_sendmsg+0x1d81/0x2680 [ 201.120087][ T6382] ? _raw_spin_lock+0xe0/0xe0 [ 201.124788][ T6382] ? local_bh_enable+0x30/0x30 [ 201.129568][ T6382] ? wait_woken+0x170/0x170 [ 201.134091][ T6382] ? avc_has_perm+0x158/0x240 [ 201.138780][ T6382] ? __kasan_check_write+0x14/0x20 [ 201.143902][ T6382] ? _raw_spin_lock_bh+0x8e/0xe0 [ 201.148859][ T6382] ? _raw_spin_lock_irq+0xe0/0xe0 [ 201.153891][ T6382] ? unwind_get_return_address+0x4d/0x90 [ 201.159524][ T6382] ? stack_trace_save+0xe0/0xe0 [ 201.164377][ T6382] ? __local_bh_enable_ip+0x58/0x80 [ 201.169594][ T6382] ? lock_sock_nested+0x1f1/0x290 [ 201.174614][ T6382] ? sock_init_data+0xc0/0xc0 [ 201.179281][ T6382] ? stack_trace_save+0x98/0xe0 [ 201.184131][ T6382] tipc_sendmsg+0x55/0x70 [ 201.188457][ T6382] ? tipc_recvmsg+0x13a0/0x13a0 [ 201.193298][ T6382] ____sys_sendmsg+0x5a2/0x8c0 [ 201.198062][ T6382] ? __sys_sendmsg_sock+0x40/0x40 [ 201.203073][ T6382] ? kstrtouint_from_user+0x1a0/0x200 [ 201.208435][ T6382] ? import_iovec+0x7c/0xb0 [ 201.212934][ T6382] ___sys_sendmsg+0x1f0/0x260 [ 201.217620][ T6382] ? __sys_sendmsg+0x250/0x250 [ 201.222389][ T6382] ? __fdget+0x1a1/0x230 [ 201.226631][ T6382] __x64_sys_sendmsg+0x1e2/0x2a0 [ 201.231571][ T6382] ? ___sys_sendmsg+0x260/0x260 [ 201.236416][ T6382] ? ksys_write+0x1eb/0x240 [ 201.240919][ T6382] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 201.246993][ T6382] x64_sys_call+0x4b/0x9a0 [ 201.251405][ T6382] do_syscall_64+0x4c/0xa0 [ 201.255811][ T6382] ? clear_bhb_loop+0x50/0xa0 [ 201.260483][ T6382] ? clear_bhb_loop+0x50/0xa0 [ 201.265157][ T6382] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 201.271042][ T6382] RIP: 0033:0x7f7f4876dbe9 [ 201.275457][ T6382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.295056][ T6382] RSP: 002b:00007f7f471d6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.303459][ T6382] RAX: ffffffffffffffda RBX: 00007f7f489a4fa0 RCX: 00007f7f4876dbe9 [ 201.311434][ T6382] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000006 [ 201.319412][ T6382] RBP: 00007f7f471d6090 R08: 0000000000000000 R09: 0000000000000000 [ 201.327406][ T6382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.335373][ T6382] R13: 00007f7f489a5038 R14: 00007f7f489a4fa0 R15: 00007ffd62d4d9a8 [ 201.343356][ T6382] [ 201.359801][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 201.447326][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 201.457199][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.474317][ T6338] device veth0_vlan entered promiscuous mode [ 201.520910][ T6387] device veth1_macvtap left promiscuous mode [ 201.588181][ T6387] device macsec0 left promiscuous mode [ 201.687127][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.696374][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.774747][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 201.787413][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.799111][ T6338] device veth1_macvtap entered promiscuous mode [ 201.807005][ T6389] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.821123][ T6389] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.912589][ T6394] device syzkaller0 entered promiscuous mode [ 201.990052][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 201.999714][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 202.009294][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 202.019215][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 202.028433][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 202.108700][ T6404] device syzkaller0 entered promiscuous mode [ 203.300247][ T332] device bridge_slave_1 left promiscuous mode [ 203.306361][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.313877][ T332] device bridge_slave_0 left promiscuous mode [ 203.320324][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.328139][ T332] device veth1_macvtap left promiscuous mode [ 203.334186][ T332] device veth0_vlan left promiscuous mode [ 204.421706][ T6418] FAULT_INJECTION: forcing a failure. [ 204.421706][ T6418] name failslab, interval 1, probability 0, space 0, times 0 [ 204.449417][ T6418] CPU: 0 PID: 6418 Comm: syz.3.1841 Not tainted syzkaller #0 [ 204.456918][ T6418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 204.466974][ T6418] Call Trace: [ 204.470252][ T6418] [ 204.473187][ T6418] __dump_stack+0x21/0x30 [ 204.477530][ T6418] dump_stack_lvl+0xee/0x150 [ 204.482130][ T6418] ? show_regs_print_info+0x20/0x20 [ 204.487338][ T6418] dump_stack+0x15/0x20 [ 204.491493][ T6418] should_fail+0x3c1/0x510 [ 204.495916][ T6418] ? __pskb_copy_fclone+0xa7/0xf00 [ 204.501062][ T6418] __should_failslab+0xa4/0xe0 [ 204.505864][ T6418] should_failslab+0x9/0x20 [ 204.510383][ T6418] slab_pre_alloc_hook+0x3b/0xe0 [ 204.515344][ T6418] ? __pskb_copy_fclone+0xa7/0xf00 [ 204.520468][ T6418] ? __pskb_copy_fclone+0xa7/0xf00 [ 204.525590][ T6418] __kmalloc_track_caller+0x6c/0x2c0 [ 204.530889][ T6418] ? __pskb_copy_fclone+0xa7/0xf00 [ 204.536020][ T6418] ? __pskb_copy_fclone+0xa7/0xf00 [ 204.541139][ T6418] __alloc_skb+0x21a/0x740 [ 204.545582][ T6418] __pskb_copy_fclone+0xa7/0xf00 [ 204.550531][ T6418] ? kfree+0xc4/0x270 [ 204.554529][ T6418] ? tipc_dest_pop+0x1e4/0x280 [ 204.559304][ T6418] ? tipc_dest_pop+0x1e4/0x280 [ 204.564078][ T6418] tipc_sk_mcast_rcv+0x5ce/0xec0 [ 204.569028][ T6418] ? __kmalloc_track_caller+0x13c/0x2c0 [ 204.574580][ T6418] ? tipc_sk_bind+0x310/0x310 [ 204.579269][ T6418] tipc_mcast_xmit+0x10fd/0x1710 [ 204.584338][ T6418] ? tipc_bcbase_xmit+0x9d0/0x9d0 [ 204.589375][ T6418] ? kasan_unpoison+0x67/0x90 [ 204.594283][ T6418] ? __check_object_size+0x8e/0x3c0 [ 204.599495][ T6418] ? tipc_msg_build+0x452/0xfb0 [ 204.604352][ T6418] ? tipc_nametbl_lookup_mcast_nodes+0x3fa/0x960 [ 204.610691][ T6418] __tipc_sendmsg+0x1d81/0x2680 [ 204.615549][ T6418] ? _raw_spin_lock+0xe0/0xe0 [ 204.620241][ T6418] ? local_bh_enable+0x30/0x30 [ 204.625021][ T6418] ? wait_woken+0x170/0x170 [ 204.629544][ T6418] ? avc_has_perm+0x158/0x240 [ 204.634230][ T6418] ? __kasan_check_write+0x14/0x20 [ 204.639354][ T6418] ? _raw_spin_lock_bh+0x8e/0xe0 [ 204.644297][ T6418] ? _raw_spin_lock_irq+0xe0/0xe0 [ 204.649327][ T6418] ? unwind_get_return_address+0x4d/0x90 [ 204.654967][ T6418] ? stack_trace_save+0xe0/0xe0 [ 204.659821][ T6418] ? __local_bh_enable_ip+0x58/0x80 [ 204.665025][ T6418] ? lock_sock_nested+0x1f1/0x290 [ 204.670053][ T6418] ? sock_init_data+0xc0/0xc0 [ 204.674754][ T6418] ? stack_trace_save+0x98/0xe0 [ 204.679610][ T6418] tipc_sendmsg+0x55/0x70 [ 204.683961][ T6418] ? tipc_recvmsg+0x13a0/0x13a0 [ 204.688817][ T6418] ____sys_sendmsg+0x5a2/0x8c0 [ 204.693587][ T6418] ? __sys_sendmsg_sock+0x40/0x40 [ 204.698611][ T6418] ? kstrtouint_from_user+0x1a0/0x200 [ 204.703991][ T6418] ? import_iovec+0x7c/0xb0 [ 204.708518][ T6418] ___sys_sendmsg+0x1f0/0x260 [ 204.713215][ T6418] ? __sys_sendmsg+0x250/0x250 [ 204.718025][ T6418] ? __fdget+0x1a1/0x230 [ 204.722273][ T6418] __x64_sys_sendmsg+0x1e2/0x2a0 [ 204.727221][ T6418] ? ___sys_sendmsg+0x260/0x260 [ 204.732082][ T6418] ? ksys_write+0x1eb/0x240 [ 204.736588][ T6418] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 204.742666][ T6418] x64_sys_call+0x4b/0x9a0 [ 204.747083][ T6418] do_syscall_64+0x4c/0xa0 [ 204.751508][ T6418] ? clear_bhb_loop+0x50/0xa0 [ 204.756199][ T6418] ? clear_bhb_loop+0x50/0xa0 [ 204.760882][ T6418] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 204.766797][ T6418] RIP: 0033:0x7fe8879bebe9 [ 204.771219][ T6418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.790852][ T6418] RSP: 002b:00007fe886427038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 204.799278][ T6418] RAX: ffffffffffffffda RBX: 00007fe887bf5fa0 RCX: 00007fe8879bebe9 [ 204.807258][ T6418] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000006 [ 204.815227][ T6418] RBP: 00007fe886427090 R08: 0000000000000000 R09: 0000000000000000 [ 204.823196][ T6418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 204.831170][ T6418] R13: 00007fe887bf6038 R14: 00007fe887bf5fa0 R15: 00007ffef105ec68 [ 204.839206][ T6418] [ 204.849610][ T6418] tipc: Failed to clone mcast rcv buffer [ 204.887863][ T6425] device veth1_macvtap left promiscuous mode [ 204.894056][ T6425] device macsec0 left promiscuous mode [ 204.912010][ T6425] device veth1_macvtap entered promiscuous mode [ 204.923236][ T6425] device macsec0 entered promiscuous mode [ 204.956659][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 204.977288][ T6429] device syzkaller0 entered promiscuous mode [ 205.123297][ T6431] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.136157][ T6431] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.162142][ T6426] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.169280][ T6426] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.176801][ T6426] device bridge_slave_0 entered promiscuous mode [ 205.247409][ T6426] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.272119][ T6426] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.289918][ T6426] device bridge_slave_1 entered promiscuous mode [ 205.296785][ T6437] device pim6reg1 entered promiscuous mode [ 205.452679][ T6457] FAULT_INJECTION: forcing a failure. [ 205.452679][ T6457] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 205.550804][ T6457] CPU: 0 PID: 6457 Comm: syz.3.1853 Not tainted syzkaller #0 [ 205.558225][ T6457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 205.568288][ T6457] Call Trace: [ 205.571572][ T6457] [ 205.574508][ T6457] __dump_stack+0x21/0x30 [ 205.578859][ T6457] dump_stack_lvl+0xee/0x150 [ 205.583464][ T6457] ? show_regs_print_info+0x20/0x20 [ 205.588674][ T6457] dump_stack+0x15/0x20 [ 205.592878][ T6457] should_fail+0x3c1/0x510 [ 205.597307][ T6457] should_fail_usercopy+0x1a/0x20 [ 205.602341][ T6457] _copy_to_user+0x20/0x90 [ 205.606767][ T6457] simple_read_from_buffer+0xe9/0x160 [ 205.612166][ T6457] proc_fail_nth_read+0x19a/0x210 [ 205.617200][ T6457] ? proc_fault_inject_write+0x2f0/0x2f0 [ 205.622843][ T6457] ? security_file_permission+0x83/0xa0 [ 205.628399][ T6457] ? proc_fault_inject_write+0x2f0/0x2f0 [ 205.634039][ T6457] vfs_read+0x282/0xbe0 [ 205.638208][ T6457] ? kernel_read+0x1f0/0x1f0 [ 205.642801][ T6457] ? __kasan_check_write+0x14/0x20 [ 205.647921][ T6457] ? mutex_lock+0x95/0x1a0 [ 205.652342][ T6457] ? wait_for_completion_killable_timeout+0x10/0x10 [ 205.658941][ T6457] ? __fget_files+0x2c4/0x320 [ 205.663631][ T6457] ? __fdget_pos+0x2d2/0x380 [ 205.668228][ T6457] ? ksys_read+0x71/0x240 [ 205.672565][ T6457] ksys_read+0x140/0x240 [ 205.676833][ T6457] ? vfs_write+0xf70/0xf70 [ 205.681275][ T6457] ? debug_smp_processor_id+0x17/0x20 [ 205.686673][ T6457] __x64_sys_read+0x7b/0x90 [ 205.691198][ T6457] x64_sys_call+0x96d/0x9a0 [ 205.695740][ T6457] do_syscall_64+0x4c/0xa0 [ 205.700166][ T6457] ? clear_bhb_loop+0x50/0xa0 [ 205.704880][ T6457] ? clear_bhb_loop+0x50/0xa0 [ 205.709574][ T6457] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 205.715477][ T6457] RIP: 0033:0x7fe8879bd5fc [ 205.719902][ T6457] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 205.739507][ T6457] RSP: 002b:00007fe886427030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 205.747912][ T6457] RAX: ffffffffffffffda RBX: 00007fe887bf5fa0 RCX: 00007fe8879bd5fc [ 205.755874][ T6457] RDX: 000000000000000f RSI: 00007fe8864270a0 RDI: 0000000000000007 [ 205.763832][ T6457] RBP: 00007fe886427090 R08: 0000000000000000 R09: 0000000000000000 [ 205.771796][ T6457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 205.779758][ T6457] R13: 00007fe887bf6038 R14: 00007fe887bf5fa0 R15: 00007ffef105ec68 [ 205.787724][ T6457] [ 205.833385][ T6426] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.840585][ T6426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.847917][ T6426] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.854989][ T6426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.881550][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.898807][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.934172][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.098182][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.130041][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.138355][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.145412][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.153595][ T6476] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.162186][ T6476] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.219715][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.239579][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.247834][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.254897][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.278095][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.286282][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.301557][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.314898][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.359035][ T6484] device syzkaller0 entered promiscuous mode [ 206.390494][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 206.399103][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.412694][ T6426] device veth0_vlan entered promiscuous mode [ 206.419276][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.427416][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.457683][ T6426] device veth1_macvtap entered promiscuous mode [ 206.487676][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.495373][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.502901][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.511596][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.530343][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.801135][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.809894][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.868439][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.885012][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=1261 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 207.179406][ T30] audit: type=1400 audit(1757009931.653:157): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14031]" dev="pipefs" ino=14031 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 207.430394][ T285] syz-executor (285) used greatest stack depth: 21760 bytes left [ 207.597420][ T281] syz-executor (281) used greatest stack depth: 21440 bytes left [ 208.020773][ T332] device bridge_slave_1 left promiscuous mode [ 208.026921][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.034421][ T332] device bridge_slave_0 left promiscuous mode [ 208.040591][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.048406][ T332] device veth1_macvtap left promiscuous mode [ 208.054473][ T332] device veth0_vlan left promiscuous mode