last executing test programs: 3.955894934s ago: executing program 3 (id=1349): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/183}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x84}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0xa7f10723c5e5444d}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b705000000000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 3.814159387s ago: executing program 0 (id=1352): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fffffe, 0x0, @perf_config_ext={0x100000000}, 0x10017, 0xffffffff, 0x2, 0x9, 0x4, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="17000000000000001b0000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000090000000000000000c299cd7400"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x10, 0x1, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x2, 0x4, 0x0, 0x1, 0x40}], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="0f000000040000000800000001"], 0x37) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x6, 0x4, 0x0, 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x20000, 0x4, 0x3, 0x141, r1}, 0x50) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x9}, 0x5d01, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x702, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x14, 0x4, 0x4, 0x201}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r3, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000080)) 3.784237177s ago: executing program 3 (id=1353): sendmsg$inet(0xffffffffffffffff, 0x0, 0x3) syz_clone(0xa4080, &(0x7f0000001000), 0x0, &(0x7f0000001040), &(0x7f00000010c0), &(0x7f0000001140)="e1a3c2144d6a97f53dc54d541268fe681e04c8efef04b1a5b6cf80e03fadde64f99d48d80bf7b33268a0bd7bd7536e9c27e4232ad407f1b32b676583e8a5887faf9ac77910ae906b62a3d48b96a9feced7052fba669b606682adf3a470a1697a625993529e6e2284a5c42112619c8080c82724814d97b48d1142621b06eb5818062ffbb2ff3f7ab78a8b76d3bb57cc8083c7335af8a86e4c81159f764c0a7a6d166a1e85ec6785d083ae3401fdb20b46e2b5aec8d3bae3fdb6c21da3e32e21946c790007adaeb37b20e20f5d7829e5fbcb55cbedfb0bd3209055b361f3bd010cf9084c3b68f482e45c83d049") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r0}, &(0x7f0000001080), &(0x7f00000001c0)=r1}, 0x20) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 3.697884629s ago: executing program 0 (id=1354): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x19, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0xe}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='signal_generate\x00', r1}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x9}, 0x8080, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x400800, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000280)={'ip6tnl0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={@fallback, 0x26, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x20083500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f6000000006debff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000004c0)='signal_generate\x00', r5}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.396896994s ago: executing program 3 (id=1365): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x730, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x2, 0xfff, 0x9}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x72, 0x0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff09, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x9, 0x8, 0x40, 0x42, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000740), &(0x7f0000000ac0)="9c3dee5760c8de9e5884bd5821c37e2b2fe9de46f4c16b5d0e4c7f04811cd6ef841c2a2a65ad4701a166f84f6d925fa5b88e064ad03665a34e280d076688cfe9e8e5960ce4ded24384d85de34a751264daf45b29c18c360908000000000000003668991c70fbd0dfd8438e40463b68273305dcb7eb250bb55d58485c7f92d932efb8d96ee77c630d91987878a3705c517c05190aa72b978a7976139bf7f1359393e88e666b27a4cd2ab06ce598fe273ccaee306a2c6e766e9ac759da9af260dae104f7c2a636b949ed30a134de3ed52da8c3a0745e2635deac2881ac031102ced6c8916b559fba41f9ab06404d0c8214c3557c3f6894a77da587c4b4515915426bfd8a01aef95446a2bfa6127b7262dc8b2202eb9fda5f5e57541ed7e3c6f2ae2cdba0260f2abc7673773050c8cde7d9", 0x86, r6}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r6, &(0x7f0000000580), &(0x7f0000000540)=""/96}, 0x20) write$cgroup_int(r5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/15], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf}, 0x94) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) 2.320567866s ago: executing program 4 (id=1367): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1fffffffffff9}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="628a1bf1e9fe3f69080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x20000000000000a2, 0x0, &(0x7f00000003c0), 0x0, 0x0, 0xcb, 0x0, 0x0, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x8e2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001000)="ad4308a803a93ae832cfe6d5ef23337e0f698efa258fa9d3bc1c9df29b8749c5ffd0074397d4b10c19ca158b9169fc747e0ce81800f6ab54701b60db0d358f0341b17544b7edabe88d90fc5a63b52a5eee75baf1278b9c106f3c728d86482d41a1b38f52ef3ad9e716e77953d785625a2279cf4fd6266ccaba213de2e35c65a01968cf04d00a1ca520baf750b816fafde164d33bfafb0fee4aae07b55527d4d61deda8a79a1be0238b8309d25f34019a61f0363bd8bdf6bae02edd9d34b01b8157e510898a6e7d7217224d331981b5c2bb14d88bdc317c7a88eb04c5ef7be4021f8dbbf25c65b82d0f787de0c0b87c2d51c21e948c9c8f8077e0341b04c4ff0c0f3e7a48fae5ca15222bc350f59307d42d0670f91610d4dec94cfbbbe3b383decd29515965a3059d4b2cbed6a77948d374d320ef04b9fd74c87eef26125b3e3418aca9bd8e98db179d57611d0f85528116cae7b18393dd78c7528c45e7a8d64db9adb31bb95564d75ff0dc06fb71fc52ee5c02779cb166d93180cbd74ab3fb7e19b3509381c4e2b6e9cb7953347d0993c3d7445d201aa1e11c8eace70bc364fb0572af4c00f9c53d1a8fa4702a792ff9a83eef082e90a18dadd9dcbbc808b8887be9f1b74d8bd5de8adfbcd46b7ab3df6ea858bff5a1b4b5d5f85a6df2e90f370f67e9b7b9e9e02f7b5cb615a86297b112bd735d61d66e25624c465d5a87bfc7f7ec3daac70d4abc99c7a12cc79a14e9a7618a86a295c0fd5cbd9f716ad49a35b152828c3a16bdd4b649d0bf6a1c80a500cdde4627b13751d91cb67fd9003ba3a91891f240be702f978e4e55354de192406defe3d84917f02e27855d6611d8ffc41f73ea5abd7b0f48ad277b691a27e5b747a7d8aa632920f3fce2788d4437fc23f59f9a4b4dbe7fa3460c5c4047277a8b02cb508a2c1853d14aa78689c4814b44391bfc4acc022e7119e9109d35225271c063d6d89d09347a8c1d2ab958bad1ac3890de420877b875272db3402a63da014a38c8dd", 0x2d5}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="ff0300"/12, @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffa}, 0x0, 0xffefffffffffffff, r0, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r7], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, 0x0, &(0x7f0000000040)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) 2.216619907s ago: executing program 0 (id=1369): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x600000000000000, &(0x7f00000004c0)=ANY=[@ANYBLOB="0f00000004000000040000000200020000000000", @ANYRES32=0x1, @ANYBLOB="f9ffffff00000000ef6300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000850000000f00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000850000002a"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b405000000000000711e590000000000a6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) 2.09165185s ago: executing program 1 (id=1371): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000001980)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c767056898119827bf698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80af740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48bc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9f0390a6f01e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f00000000ff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c7167d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c2b460caaf1b5b12cf924f682a995076ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f949170ef8cb9c13c12138116bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8ec91e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2c74664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677eff7c5c568a89d6e36b165c39132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc405a18ca0264400abf38e90000000000000000008faf2cddffbfa69bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45101942cc7cec21b7f337df5431bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de086553469fad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c04f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c80f30505dd4cf2ae2a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525092710cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265425d513a1294b8439276394945d94a589708e32a1cb30f1fa4b2f08dd27c5e8c600"/4693], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0x0) (async) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000009400000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=@bloom_filter={0x1e, 0x3, 0xffffffff, 0x0, 0x41000, 0xffffffffffffffff, 0x80000000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x0, 0x1}, 0x50) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180500000000ffffffff00004b64ffec7dbf55857d000000850000000700006f39"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200, 0x90622, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000280), 0x5}, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) 1.903068733s ago: executing program 0 (id=1372): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1d, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r2, 0x8982, 0x20000500) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="180200000000e1ff0000000000000000850000005300000085000000070000009500000000000000a94be0c51261be6a99e5e06bb0a232d5e1f5bc0b6e76f82e9a7cde9e8f1b547edf612a03f1737d951d7a617558b674e1c4fdfd771ebe7c33af3e4917be59ac67f0bbabcb8f41c23ba8d91633"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9092dc1b6dbe9ab5becdcc777", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x18) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x100121, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x10}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) 1.756520626s ago: executing program 3 (id=1373): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup\x00', 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r3}, 0xc) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x43001000, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x5126880b685bb119) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x80000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0c00000004000000040000000180000000000000", @ANYRES32, @ANYBLOB="0048c810bc00000000001b00080000010420000032048e0e881ef469da27dca20527974b054f2596e2890d0edc100a36fc457c34eab2edff776bb8849b8070b719faa4766fd332a68146fc80ff85f5d3936c17892af6715c84d03f40735d787b0954d1f6ec", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) 1.755909596s ago: executing program 1 (id=1374): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'pim6reg\x00', 0x112}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x1d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000100)={'ipvlan1\x00', 0x600}) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000440)={'vcan0\x00', 0x1000}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x40, 0x5, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='0'], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x90) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 1.740372406s ago: executing program 2 (id=1375): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 1.587682239s ago: executing program 2 (id=1376): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r0, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000ff0100005c00000000000000", @ANYRES32, @ANYBLOB="ae00000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0, 0x2}, 0x218201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x9c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc5, &(0x7f00000007c0)=""/197, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000071123900000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) close(r6) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x599, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r7, 0x0, 0x1ba8847c99}, 0x38) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x18) syz_clone(0x20083500, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.452577502s ago: executing program 4 (id=1377): mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x1ff) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000100)=0x7) (async) sendmsg$tipc(r1, &(0x7f0000000580)={&(0x7f0000000140)=@name={0x1e, 0x2, 0x1, {{0x40, 0x4}, 0x2}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="5a2db59f87a0ac7567", 0x9}, {&(0x7f00000001c0)="f5cd3e66c4ac01476837d8ccbfcf959056e65f354971be3bfd12ef6c899011609d4beffbc48fcf569d896e3095eafc77ebf2faa2d4b83cbb22981f0dd14149e4d1d0671067c9bc07852c24eaca28fb4153b2e7654b256fa75d1f8b5d1ea8891de20d628b6740107269873f173a25f4f0dc5b8859e4bc8b3c7f8893082de167fd421c446084f596502a0dce5ba2c0366c6ce9c23a3da79b39c5a628ee5c6e86", 0x9f}, {&(0x7f0000000280)="74d5a7c78c2282fe3de8d417fea6997faca92ce522c8f79226511b8b1fe9d9c4b4fe8a2119c88fa11951613ee97e64c016418fff9af91600f05699255dcbe479d5f9d353f6243bcbf304b2c7a904b02e67b56b58006c403c2c27dde862edbcae61bd75f7493130bc4f459549beaddf3d3f6404140d292db1c5998146a92d38d6105ef5223b250490ec00a48f7498bd6890e0b09a5f6a715ed5bdcdcd6c229767242cc3e855ca05efe3ee71fc83c41e66bcc36030381fa88bd410a4f8d798f0b9cc374364715025a3c0b0a7", 0xcb}, {&(0x7f0000000380)="33868b073766bdbecd78a39cc3673326daf1ef582ee3ec77c7e92e79079304e0d13c9fd1d102e6ecc33665e2670cf42ce8d2dae0ae49c9e1d01edfc681a1b0924f7644383271dbcbd46a6e16ac829e2abf85bed49d319fb4ba2330f01dc253b39b6954b3c6e7e4d3efdaa3dec8a3d39be0be1dc6f27e2845d40452803ca66952d8adfb566dc3705d5757d727efd1200723624f79ac6678e6038f4322582506a731bbc55dddd416c5e88211b16b32814abc8db43eeba33c9a003d6b189ad666773a0597d82a4af85b3b3526f92e887d5af2bcfac9646b1c017123fb946ef4f0dcc29b707e597887dd6ab1654a083a9b79", 0xf0}], 0x4, &(0x7f00000004c0)="6f6277a156815893e03a882e7f50ef15a8019f6f6214104a41b9d5b03c22824f9707bc5b473ca93887bfde1f19d493c4116a9f0e0fe7f700bb5178d6b0384d079a8d096c18e820300b624d47ded03725061df126015c7bfe6e0bbe929fb202ac7843e344531381a83ca0737b8548dea291286d1f3d4e2c5ed285c095cfe0cad8a9", 0x81, 0x10}, 0x40008) (async) sendmsg$unix(r1, &(0x7f0000000740)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000640)="ac3eee77ba87d00c7c5fce2f70782ae05eae770ee06be5b94f7ff69da66601d473f055b1e60bd2cf433e869d539bf193043ef8a24af00ffe6a2c206f33262e3a", 0x40}], 0x1, &(0x7f00000006c0)=[@rights={{0x28, 0x1, 0x1, [r0, r0, r0, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee00}}}], 0x48, 0x4044804}, 0x80000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@fallback=r0, 0xe, 0x0, 0xb46, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0], &(0x7f0000000880)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000900)={@cgroup=r1, r1, 0x5, 0x4, 0x0, @void, @value=r1, @void, @void, r4}, 0x20) (async) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0x303) (async) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c80)={0x6, 0x36, &(0x7f0000000940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5fa}}, @call={0x85, 0x0, 0x0, 0x86}, @alu={0x4, 0x0, 0x0, 0x8, 0x3, 0x50, 0xfffffffffffffffd}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b00)='GPL\x00', 0x3, 0x34, &(0x7f0000000b40)=""/52, 0x41100, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000bc0)={0x2, 0x9, 0x9, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c00)=[r1, r0, r1, r1, r3, r1], &(0x7f0000000c40)=[{0x3, 0x5, 0xc, 0x7}, {0x0, 0x5, 0x2, 0x3}], 0x10, 0xe1}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000d40)={@fallback=r2, r5, 0x0, 0x14, r1, @void, @value=r1, @void, @void, r4}, 0x20) (async) openat$cgroup_pressure(r1, &(0x7f0000000d80)='io.pressure\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000e00)=@o_path={&(0x7f0000000dc0)='./file0\x00', 0x0, 0x4020, r5}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x11, 0x21, &(0x7f0000000e40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x10001}, [@alu={0x4, 0x0, 0x2, 0x6, 0x6, 0x6, 0xfffffffffffffffc}, @ldst={0x3, 0x2, 0x0, 0x9, 0xb, 0x0, 0xfffffffffffffffc}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x10}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @jmp={0x5, 0x1, 0xc, 0x4, 0x0, 0xe0, 0xfffffffffffffff0}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x2}]}, &(0x7f0000000f80)='syzkaller\x00', 0x81, 0xb9, &(0x7f0000000fc0)=""/185, 0x41000, 0x3, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000001080)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000010c0)={0x2, 0xd, 0x3, 0x7f}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001100)=[r3], &(0x7f0000001140)=[{0x2, 0x4, 0x3, 0x9}, {0x0, 0x3, 0x6, 0x8}], 0x10, 0xff}, 0x94) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000001240)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) (async) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000001280)='svcsock_marker\x00', 0xffffffffffffffff, 0x0, 0x5}, 0x18) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) r8 = openat$cgroup_type(r0, &(0x7f0000001340), 0x2, 0x0) write$cgroup_type(r8, &(0x7f0000001380), 0x9) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f00000013c0)={r3, r3}, 0xc) (async) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x6) r9 = openat$cgroup(r7, &(0x7f0000001400)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r9, &(0x7f0000001440), 0x2, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000001480)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000016c0)=@base={0x1c, 0x1, 0x9, 0x0, 0x8000, r1, 0x9, '\x00', 0x0, r1, 0x0, 0x0, 0x1, 0x0, @value=r1}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001740)={&(0x7f00000014c0)="6095fd6d9a9847c352c0b9107c56cb8563fab3c7a5ce415fda591c98b05d9915965a2c494acdf0f2389f36a921686de4d3a6f789d691627fb5a6ab48c6b12c2556bbffb80910a38c3c98ba0c709f97c4ad11ebd6564be3cf7716ee8e478b96ce5654e1e90d7fa0073da6704fb3", &(0x7f0000001540)=""/24, &(0x7f0000001580)="cefa1c78af5cf7196d291993c2b481a8a36e18e306d02216932540b5612bba2cb300b44eef0fab804073e112d6fc54381e34ee4f5fcdc76191044615655b8402538ba9adefc3d42a4c03234f1fcb85b7236c453b6cc461d3928914b9fc7a0034f1fc7e2644b75619f499479a6d8ee4fa2303108b6f79611f576ed239556fa97d6eafaaa3ae928f18bdcc060f7839f66081f352a9ea6a3624862a4fc531df2be22e1117c515b2", &(0x7f0000001640)="e9ed8825601020facad84027ff477ae89a20a34fc23aedce1fafc3d4a51213e2de4011df8419b692fa8b8ee7fc5696f2b6e1aaf9a734d231ed3b89087ba281f9b65b9c11da1f83cc1baa62361f2f58301bf93df7d9009e8281cde7ab2fc86c21dd9b2dc837c341051e531da1e4e14b1d47", 0x19, r10}, 0x38) 1.332277454s ago: executing program 0 (id=1378): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fffffe, 0x0, @perf_config_ext={0x100000000}, 0x10017, 0xffffffff, 0x2, 0x9, 0x4, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="17000000000000001b0000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000090000000000000000c299cd7400"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x10, 0x1, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x2, 0x4, 0x0, 0x1, 0x40}], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="0f000000040000000800000001"], 0x37) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x6, 0x4, 0x0, 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x20000, 0x4, 0x3, 0x141, r1}, 0x50) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x9}, 0x5d01, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x14, 0x4, 0x4, 0x201}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r3, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000080)) 1.332065824s ago: executing program 4 (id=1379): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000f9000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r2}, &(0x7f00000001c0), &(0x7f0000000200)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.283574845s ago: executing program 4 (id=1380): syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r2 = gettid() r3 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0xc, 0x40, 0x25, 0x0, 0x0, 0x401, 0x20200, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0xff0c, 0x6}, 0x2100, 0xfffffffffffffff7, 0x2, 0x7, 0x9, 0x5, 0x7f7, 0x0, 0x6, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x1, r1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r3, 0x0, 0x1, &(0x7f0000000180)='\x00'}, 0x30) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8a10ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f00000003c0)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0xb4, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x20}, {0x18, 0x6, 0x2, 0x0, r7}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x19, &(0x7f0000000400)=ANY=[@ANYBLOB="180000008f000000000000000b00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000086000000bf0900000000000055090100000000009500000000000000bd0a060000000000d500f4ff0100030018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000010000006500000006000000bf91000000000000b702000003000000850000002a000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x7, 0x1000, &(0x7f0000000cc0)=""/4096, 0x41100, 0x2f}, 0x21) 1.220260027s ago: executing program 2 (id=1381): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0, 0x18, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000080), &(0x7f00000001c0), 0x8, 0xcb, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x8, 0x800, 0x463a864f, 0x40, 0xffffffffffffffff, 0x3, '\x00', r0, r1, 0x5, 0x0, 0x0, 0x6}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r2, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000009000000000000000700000018270000", @ANYRES32=r3, @ANYBLOB="0000000000ffff0018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0xc, 0xe0, &(0x7f00000004c0)=""/224, 0x41100, 0x10, '\x00', r0, 0x0, r1, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0xa, 0x1ff, 0xffffffff}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000640)=[{0x1, 0x4, 0x7, 0x5}], 0x10, 0x8}, 0x94) 1.178484537s ago: executing program 2 (id=1382): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='svcrdma_wc_read\x00'}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async, rerun: 32) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000600), 0x4) (async, rerun: 32) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xfffffffffffffe01, 0xe3eb7016f3ab0a39, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x80010, 0x8, 0x0, 0x0}}, 0x10) (async, rerun: 32) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000800)=ANY=[@ANYBLOB="8510000004000338b47bc54db88f9e100000950000000000000018000000000000000000000000000000950000000000000885100000fcffffff9500000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2ca8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x10003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)) (async) r5 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000580)={0x5, 0x80, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x40243, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xd}, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x82}) (async, rerun: 32) write$cgroup_pid(r3, &(0x7f00000005c0), 0x12) (async, rerun: 32) r6 = syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) perf_event_open(&(0x7f00000006c0)={0x3, 0x80, 0xf8, 0x9, 0x7, 0x9, 0x0, 0x2, 0x1002, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1ff, 0x1, @perf_bp={&(0x7f00000001c0), 0x8}, 0x8840, 0x8001, 0x0, 0x7, 0x3, 0x1, 0x5, 0x0, 0x5, 0x0, 0x9}, r6, 0x9, 0xffffffffffffffff, 0x3) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000740)=0x100000000) 1.177179307s ago: executing program 0 (id=1383): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYRES8, @ANYRESDEC=r0], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x41, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/183}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x210}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1436, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x1882a, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) socketpair(0x10, 0x0, 0x14, &(0x7f0000000400)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1b00000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000ffffffff00000000000000ac015c0967651dcb2870d2cc1323366bba1f8a7f5adabc0ae48934dbf8ee4b1526aca3690fb1c9fdff0b4924eaabec1ea1236ad31fbf0d49104fb424dce4c9bf69b35274c92a60f68bbf54a52c53ac9ae3b93e5a3eabd0cfb0c4006fe141aa0c489d7f59f9c3dac5745f304294feb04f343327de74972abf4328ea05a9b5b3f0708c83640ca0b50af9e0eccae50be1198103d713d1ebc46c0b306c9e884f9e9f266b22448083e8f9fe411e85680be04444"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000852000002224"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x32}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffdbc) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000095112a"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.088739929s ago: executing program 2 (id=1384): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) close(r0) 1.06450501s ago: executing program 3 (id=1385): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x61}, @ringbuf_output]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b00)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000002000000000000000000ff110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdir(0x0, 0x0) syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000002c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x560b0007, &(0x7f0000000000)="259a53f271a76d2688f54c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1.0448407s ago: executing program 1 (id=1386): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000003c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd, 0x0, 0xffffffffffffffff, 0x28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000040)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000100000d000000000000000003000000000000000000000105000000200000000000"], 0x0, 0x56}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000003c0)='ext4_mark_inode_dirty\x00', r2, 0x0, 0xfffffffffffffffc}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000000000000000000008d8b9be608000000950000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x8, 0x0, 0x0, 0x2000}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x11, 0x100000}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1803aa0200000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000000500000095000000000000003756c1a6fd849e1d20d31d6f9ed2d3e0de82fbfb3ff6c19f7f9fd2e0e2f51b3a6f64e3e6c48c09a66f67660a716f2bb23870203fc4243d95f69ed992608deecb020cedf23408684486536298c3b3afe8b62b32621a26f78aaf8df9"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 960.055421ms ago: executing program 2 (id=1387): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1fffffffffff9}, 0x18) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="628a1bf1e9fe3f69080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x20000000000000a2, 0x0, &(0x7f00000003c0), 0x0, 0x0, 0xcb, 0x0, 0x0, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x8e2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000001000)="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", 0x2d5}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="ff0300"/12, @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffa}, 0x0, 0xffefffffffffffff, r0, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) sendmsg$inet(r3, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r7], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r7}, 0x0, &(0x7f0000000040)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03090000020000000000000000000000000000000000000000000000c6deba5a21a0d179a36aaae8ba02d301eebc5cab25b34842802f94db92d20cfd0be12cee718954a8b55775e1c4af78fbaa0d00000000000000972e8fc86808570e56f601fee668"], 0x50) 745.977535ms ago: executing program 1 (id=1388): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7, 0x0, 0x8000000000000}, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 401.711322ms ago: executing program 4 (id=1389): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x1, &(0x7f00000008c0)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0xffff, 0xec, &(0x7f00000005c0)=""/236, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x1, 0xd, 0x5, 0x4}, 0x10, 0x0, 0x0, 0x19, &(0x7f0000000740)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1]}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="03000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffe00000000000}, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x28, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e00000004"], 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80000, 0x2, &(0x7f0000000140)={0x0, 0x0}) close(r7) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r6) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0100000042000000060000000800000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000001400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8000}, 0x38) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) 308.586964ms ago: executing program 1 (id=1390): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000f9000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r2}, &(0x7f00000001c0), &(0x7f0000000200)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 236.736475ms ago: executing program 1 (id=1391): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = perf_event_open(&(0x7f0000000700)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffff7fff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f00000000c0)=ANY=[@ANYRES8=r2, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@fallback=r4, 0x1f, 0x1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, @perf_config_ext={0x9ae0067}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000004, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x20000}, 0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000005bf0439bca132cad221eeb5cde12772d799029817de995c09920e01184b9c34a05677980dc48cd5118f7c50c49f4b343238a424f6ad1854f31b674272657ffcee16ea301215c9c3e277dd04c68589f1c7ddc5ddb4a0f3fd32300682ccc6d9089cfb1d173fadee74899e8a1404783f3d280c05d943f2dcdbe6bb1", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000001bb5e98a0b7b19a300"/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xf, &(0x7f00000016c0)=ANY=[@ANYBLOB="180003289f00"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000280)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1ef7cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x401, 0x200, 0x5, 0x7, 0x0, 0x100}, 0xffffffffffffffff, 0xffefffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="00000000000000bb0c94514aafc0be00bc00009fbdfbfe0000c00536bc00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000ff0f00"/28], 0x48) 369.519µs ago: executing program 3 (id=1392): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f0000000200), 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x6, 0x8, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, @perf_config_ext, 0x12, 0x0, 0x3, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x7602, 0x0, 0x0, 0x0, 0x6}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00'}, 0x10) 0s ago: executing program 4 (id=1393): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fffffe, 0x0, @perf_config_ext={0x100000000}, 0x10017, 0xffffffff, 0x2, 0x9, 0x4, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="17000000000000001b0000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000090000000000000000c299cd7400"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x10, 0x1, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x2, 0x4, 0x0, 0x1, 0x40}], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="0f000000040000000800000001"], 0x37) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x6, 0x4, 0x0, 0x1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x20000, 0x4, 0x3, 0x141, r1}, 0x50) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x5a, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x9}, 0x5d01, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x14, 0x4, 0x4, 0x201}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r3, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000080)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.25' (ED25519) to the list of known hosts. [ 26.632184][ T28] audit: type=1400 audit(1757673069.349:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.639853][ T275] cgroup: Unknown subsys name 'net' [ 26.659558][ T28] audit: type=1400 audit(1757673069.359:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.687791][ T28] audit: type=1400 audit(1757673069.379:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.688004][ T275] cgroup: Unknown subsys name 'devices' [ 26.799961][ T275] cgroup: Unknown subsys name 'hugetlb' [ 26.807751][ T275] cgroup: Unknown subsys name 'rlimit' [ 26.943134][ T28] audit: type=1400 audit(1757673069.659:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.971526][ T28] audit: type=1400 audit(1757673069.659:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.002878][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 27.015979][ T28] audit: type=1400 audit(1757673069.659:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 27.042211][ T28] audit: type=1400 audit(1757673069.739:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 27.078567][ T28] audit: type=1400 audit(1757673069.739:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.124746][ T28] audit: type=1400 audit(1757673069.839:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.126076][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 27.168766][ T28] audit: type=1400 audit(1757673069.839:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.234038][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.246371][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.262516][ T283] device bridge_slave_0 entered promiscuous mode [ 28.288613][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.298094][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.306919][ T283] device bridge_slave_1 entered promiscuous mode [ 28.412480][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.419979][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.428982][ T284] device bridge_slave_0 entered promiscuous mode [ 28.439568][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.447943][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.456333][ T286] device bridge_slave_0 entered promiscuous mode [ 28.469846][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.479297][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.488273][ T284] device bridge_slave_1 entered promiscuous mode [ 28.498637][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.506070][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.513901][ T286] device bridge_slave_1 entered promiscuous mode [ 28.540202][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.548380][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.559696][ T287] device bridge_slave_0 entered promiscuous mode [ 28.580464][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.587869][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.595881][ T287] device bridge_slave_1 entered promiscuous mode [ 28.609162][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.618934][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.627474][ T285] device bridge_slave_0 entered promiscuous mode [ 28.653929][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.661831][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.669853][ T285] device bridge_slave_1 entered promiscuous mode [ 28.993436][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.002134][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.022153][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.030788][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.038935][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.048270][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.075728][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.084887][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.093890][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.101843][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.146886][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.155345][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.164368][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.172094][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.205005][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.217279][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.228611][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.240711][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.258513][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.266791][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.277504][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.286675][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.295576][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.305247][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.316587][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.330227][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.341871][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.350853][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.359464][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.379857][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.391281][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.421007][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.439078][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.450093][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.457883][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.466704][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.476047][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.488336][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.497312][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.506421][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.516677][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.525342][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.535244][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.558438][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.573367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.593847][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.611176][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.642211][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.653506][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.668306][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.676085][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.686876][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 29.699899][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 29.709629][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.717710][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.727407][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 29.735813][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 29.744298][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 29.755715][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 29.767956][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.780461][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.823119][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.839277][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.855097][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 29.872898][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.893036][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.922159][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 29.933033][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 29.948420][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 29.960897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.003928][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.019712][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.034175][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.050631][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.061091][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.071003][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.084045][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.096420][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.121166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.139942][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.152986][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.163809][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.174334][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.192152][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.203828][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.218405][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.230993][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.242279][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.267063][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.305786][ T284] device veth0_vlan entered promiscuous mode [ 30.330562][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.341972][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.365309][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 30.379556][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.394740][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.408415][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.425501][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.441060][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.459120][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.471305][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.483489][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.495950][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.515481][ T286] device veth0_vlan entered promiscuous mode [ 30.524081][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 30.532886][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.566382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.576000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.587735][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.597185][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.607440][ T283] device veth0_vlan entered promiscuous mode [ 30.620077][ T284] device veth1_macvtap entered promiscuous mode [ 30.630849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.640152][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.649328][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.658270][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.666739][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.681368][ T286] device veth1_macvtap entered promiscuous mode [ 30.691975][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.701126][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.711061][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.724195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 30.746019][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.764017][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 30.783743][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.802212][ T287] device veth0_vlan entered promiscuous mode [ 30.811346][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.826761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.843310][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.853802][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.873274][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 30.883496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.899203][ T283] device veth1_macvtap entered promiscuous mode [ 30.914705][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 30.930803][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.943991][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.960032][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 30.986547][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.001512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.014774][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.026432][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.040952][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.070228][ T285] device veth0_vlan entered promiscuous mode [ 31.089671][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.107324][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.122711][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.135094][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.177330][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.189159][ T286] request_module fs-gadgetfs succeeded, but still no fs? [ 31.189770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.210007][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.219801][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.233486][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.242969][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.268559][ T287] device veth1_macvtap entered promiscuous mode [ 31.289005][ T285] device veth1_macvtap entered promiscuous mode [ 31.312514][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.346334][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.351041][ C0] hrtimer: interrupt took 253952 ns [ 31.365630][ T339] Driver unsupported XDP return value 0 on prog (id 1) dev N/A, expect packet loss! [ 31.391005][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.401943][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.425770][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 31.474356][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 31.503216][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 31.514215][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.603314][ T348] device syzkaller0 entered promiscuous mode [ 31.621313][ T347] bond_slave_1: mtu less than device minimum [ 31.655511][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 31.655528][ T28] audit: type=1400 audit(1757673074.369:104): avc: denied { relabelfrom } for pid=336 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.793172][ T28] audit: type=1400 audit(1757673074.369:105): avc: denied { relabelto } for pid=336 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 31.865914][ T28] audit: type=1400 audit(1757673074.579:106): avc: denied { create } for pid=358 comm="syz.4.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.335019][ T28] audit: type=1400 audit(1757673075.049:107): avc: denied { read } for pid=370 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.363836][ T367] device pim6reg1 entered promiscuous mode [ 32.395819][ T28] audit: type=1400 audit(1757673075.109:108): avc: denied { write } for pid=370 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.516927][ T28] audit: type=1400 audit(1757673075.229:109): avc: denied { create } for pid=379 comm="syz.3.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 32.584541][ T382] device syzkaller0 entered promiscuous mode [ 32.591698][ T28] audit: type=1400 audit(1757673075.309:110): avc: denied { setopt } for pid=370 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.431117][ T28] audit: type=1400 audit(1757673076.149:111): avc: denied { cpu } for pid=400 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.539485][ T28] audit: type=1400 audit(1757673076.149:112): avc: denied { write } for pid=400 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 33.690292][ T407] bond_slave_1: mtu less than device minimum [ 33.735949][ T28] audit: type=1400 audit(1757673076.449:113): avc: denied { read } for pid=408 comm="syz.0.23" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.685318][ T423] device pim6reg1 entered promiscuous mode [ 34.907261][ T426] bridge0: port 3(dummy0) entered blocking state [ 34.997662][ T426] bridge0: port 3(dummy0) entered disabled state [ 35.033573][ T426] device dummy0 entered promiscuous mode [ 35.050197][ T426] bridge0: port 3(dummy0) entered blocking state [ 35.057370][ T426] bridge0: port 3(dummy0) entered forwarding state [ 35.337431][ T433] device dummy0 left promiscuous mode [ 35.353348][ T433] bridge0: port 3(dummy0) entered disabled state [ 35.629626][ T452] device syzkaller0 entered promiscuous mode [ 36.340029][ T452] device pim6reg1 entered promiscuous mode [ 37.189148][ T482] device pim6reg1 entered promiscuous mode [ 37.996930][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 37.996947][ T28] audit: type=1400 audit(1757673080.709:120): avc: denied { create } for pid=491 comm="syz.4.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 38.345975][ T499] device veth1_macvtap left promiscuous mode [ 38.740589][ T498] device veth1_macvtap entered promiscuous mode [ 38.770116][ T498] device macsec0 entered promiscuous mode [ 38.798819][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 39.256549][ T28] audit: type=1400 audit(1757673081.969:121): avc: denied { create } for pid=513 comm="syz.3.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 40.319214][ T28] audit: type=1400 audit(1757673083.039:122): avc: denied { create } for pid=541 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 41.988192][ T577] device wg2 entered promiscuous mode [ 42.360410][ T583] device pim6reg1 entered promiscuous mode [ 43.103033][ T620] device wg2 entered promiscuous mode [ 43.789595][ T28] audit: type=1400 audit(1757673086.509:123): avc: denied { write } for pid=635 comm="syz.2.93" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 44.576590][ T668] bond_slave_1: mtu less than device minimum [ 44.691976][ T28] audit: type=1400 audit(1757673087.409:124): avc: denied { create } for pid=666 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 48.059000][ T730] bond_slave_1: mtu less than device minimum [ 48.073947][ T731] bridge0: port 3(veth1_macvtap) entered blocking state [ 48.083961][ T731] bridge0: port 3(veth1_macvtap) entered disabled state [ 48.832986][ T743] device veth0_vlan left promiscuous mode [ 48.851772][ T743] device veth0_vlan entered promiscuous mode [ 48.916158][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 48.935007][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 48.989811][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 54.025191][ T837] device syzkaller0 entered promiscuous mode [ 54.199442][ T861] device veth0_vlan left promiscuous mode [ 54.232693][ T861] device veth0_vlan entered promiscuous mode [ 54.340072][ T870] bond_slave_1: mtu less than device minimum [ 56.089844][ T942] device veth1_macvtap left promiscuous mode [ 56.209133][ T28] audit: type=1400 audit(1757673098.929:125): avc: denied { create } for pid=940 comm="syz.3.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 56.439303][ T938] device wg2 left promiscuous mode [ 56.457360][ T938] device veth1_macvtap entered promiscuous mode [ 56.475889][ T938] device macsec0 entered promiscuous mode [ 57.177946][ T974] device veth1_macvtap left promiscuous mode [ 57.195187][ T974] device macsec0 left promiscuous mode [ 57.264584][ T978] device veth1_macvtap entered promiscuous mode [ 57.316573][ T978] device macsec0 entered promiscuous mode [ 57.334038][ T980] bond_slave_1: mtu less than device minimum [ 57.822831][ T992] device veth1_macvtap left promiscuous mode [ 57.909975][ T998] device wg2 left promiscuous mode [ 58.041525][ T989] device veth1_macvtap entered promiscuous mode [ 58.060703][ T989] device macsec0 entered promiscuous mode [ 58.076626][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 59.711487][ T28] audit: type=1400 audit(1757673102.429:126): avc: denied { create } for pid=1031 comm="syz.3.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 60.426382][ T1056] device pim6reg1 entered promiscuous mode [ 60.873320][ T1077] device syzkaller0 entered promiscuous mode [ 60.891771][ T1084] device veth0_vlan left promiscuous mode [ 60.900377][ T1084] device veth0_vlan entered promiscuous mode [ 60.916870][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 60.947217][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 60.982082][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.272453][ T1077] device pim6reg1 entered promiscuous mode [ 61.614678][ T28] audit: type=1400 audit(1757673104.329:127): avc: denied { create } for pid=1098 comm="syz.2.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 62.379958][ T1117] bridge0: port 3(dummy0) entered blocking state [ 62.394201][ T1117] bridge0: port 3(dummy0) entered disabled state [ 62.413139][ T1117] device dummy0 entered promiscuous mode [ 62.423998][ T1117] bridge0: port 3(dummy0) entered blocking state [ 62.435492][ T1117] bridge0: port 3(dummy0) entered forwarding state [ 62.548111][ T1112] device dummy0 left promiscuous mode [ 62.575737][ T1112] bridge0: port 3(dummy0) entered disabled state [ 62.715028][ T1127] device pim6reg1 entered promiscuous mode [ 62.881655][ T1133] bond_slave_1: mtu less than device minimum [ 62.946532][ T1131] device pim6reg1 entered promiscuous mode [ 65.732473][ T1227] device pim6reg1 entered promiscuous mode [ 66.017533][ T28] audit: type=1400 audit(1757673108.729:128): avc: denied { tracepoint } for pid=1231 comm="syz.2.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 66.241773][ T1244] bond_slave_1: mtu less than device minimum [ 66.398033][ T1247] device wg2 entered promiscuous mode [ 67.626453][ T1282] device syzkaller0 entered promiscuous mode [ 67.925828][ T1299] device veth1_to_bond entered promiscuous mode [ 68.170186][ T28] audit: type=1400 audit(1757673110.889:129): avc: denied { create } for pid=1304 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 68.176255][ T1311] device pim6reg1 entered promiscuous mode [ 68.753510][ T1333] device veth1_macvtap left promiscuous mode [ 68.828181][ T1333] device veth1_macvtap entered promiscuous mode [ 68.852303][ T1333] device macsec0 entered promiscuous mode [ 69.721856][ T1349] device pim6reg1 entered promiscuous mode [ 69.866545][ T1358] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.874935][ T1358] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.022099][ T1359] device bridge_slave_1 left promiscuous mode [ 70.029385][ T1359] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.045665][ T1359] device bridge_slave_0 left promiscuous mode [ 70.057847][ T1359] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.156480][ T1368] device sit0 entered promiscuous mode [ 70.354592][ T1374] device veth0_vlan left promiscuous mode [ 70.362536][ T1374] device veth0_vlan entered promiscuous mode [ 70.463853][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.474337][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.502272][ T334] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.714432][ T28] audit: type=1400 audit(1757673114.429:130): avc: denied { append } for pid=1448 comm="syz.0.338" name="ppp" dev="devtmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 71.739617][ T28] audit: type=1400 audit(1757673114.429:131): avc: denied { create } for pid=1448 comm="syz.0.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 71.932905][ T1456] device xfrm0 entered promiscuous mode [ 73.024269][ T28] audit: type=1400 audit(1757673115.739:132): avc: denied { create } for pid=1516 comm="syz.3.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 73.126651][ T1522] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.481981][ T1539] O3ãc¤±: renamed from bridge_slave_0 [ 73.931353][ T1562] FAULT_INJECTION: forcing a failure. [ 73.931353][ T1562] name failslab, interval 1, probability 0, space 0, times 0 [ 73.964184][ T1562] CPU: 0 PID: 1562 Comm: syz.2.371 Not tainted syzkaller #0 [ 73.971908][ T1562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 73.982633][ T1562] Call Trace: [ 73.986032][ T1562] [ 73.989435][ T1562] __dump_stack+0x21/0x24 [ 73.993988][ T1562] dump_stack_lvl+0xee/0x150 [ 73.999617][ T1562] ? __cfi_dump_stack_lvl+0x8/0x8 [ 74.004896][ T1562] ? addrconf_ifdown+0x16ce/0x1910 [ 74.010179][ T1562] dump_stack+0x15/0x24 [ 74.014537][ T1562] should_fail_ex+0x3d4/0x520 [ 74.020333][ T1562] __should_failslab+0xac/0xf0 [ 74.025843][ T1562] should_failslab+0x9/0x20 [ 74.031024][ T1562] kmem_cache_alloc_node+0x42/0x340 [ 74.038610][ T1562] ? __alloc_skb+0xea/0x4b0 [ 74.043770][ T1562] ? br_get_link_af_size_filtered+0xe0/0x180 [ 74.050247][ T1562] __alloc_skb+0xea/0x4b0 [ 74.054787][ T1562] rtmsg_ifinfo_build_skb+0x7c/0x190 [ 74.063703][ T1562] unregister_netdevice_many+0x101d/0x1820 [ 74.069734][ T1562] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 74.076168][ T1562] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 74.082439][ T1562] ? __kasan_check_write+0x14/0x20 [ 74.090539][ T1562] ? queue_delayed_work_on+0x101/0x150 [ 74.096230][ T1562] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 74.102420][ T1562] ? __kasan_check_read+0x11/0x20 [ 74.107673][ T1562] unregister_netdevice_queue+0x31c/0x360 [ 74.113698][ T1562] ? linkwatch_schedule_work+0x161/0x190 [ 74.119902][ T1562] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 74.126442][ T1562] ? linkwatch_fire_event+0x1ed/0x240 [ 74.132463][ T1562] __tun_detach+0xca6/0x1460 [ 74.138958][ T1562] ? __cfi_mutex_lock+0x10/0x10 [ 74.149302][ T1562] tun_chr_close+0x92/0x140 [ 74.157049][ T1562] ? __cfi_tun_chr_close+0x10/0x10 [ 74.162992][ T1562] __fput+0x1fc/0x8f0 [ 74.170178][ T1562] ____fput+0x15/0x20 [ 74.174816][ T1562] task_work_run+0x1db/0x240 [ 74.179708][ T1562] ? __cfi_task_work_run+0x10/0x10 [ 74.185108][ T1562] ? filp_close+0x111/0x160 [ 74.190225][ T1562] exit_to_user_mode_loop+0x9b/0xb0 [ 74.195632][ T1562] exit_to_user_mode_prepare+0x5a/0xa0 [ 74.201559][ T1562] syscall_exit_to_user_mode+0x1a/0x30 [ 74.207692][ T1562] do_syscall_64+0x58/0xa0 [ 74.212314][ T1562] ? clear_bhb_loop+0x30/0x80 [ 74.217275][ T1562] ? clear_bhb_loop+0x30/0x80 [ 74.224010][ T1562] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 74.235453][ T1562] RIP: 0033:0x7f29f438eba9 [ 74.240598][ T1562] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.262564][ T1562] RSP: 002b:00007f29f528d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 74.271894][ T1562] RAX: 0000000000000000 RBX: 00007f29f45d6090 RCX: 00007f29f438eba9 [ 74.281110][ T1562] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 74.290239][ T1562] RBP: 00007f29f528d090 R08: 0000000000000000 R09: 0000000000000000 [ 74.301397][ T1562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.310361][ T1562] R13: 00007f29f45d6128 R14: 00007f29f45d6090 R15: 00007ffe32b784e8 [ 74.322332][ T1562] [ 74.632329][ T1569] device pim6reg1 entered promiscuous mode [ 74.692682][ T1579] device veth1_macvtap left promiscuous mode [ 76.430318][ T1658] FAULT_INJECTION: forcing a failure. [ 76.430318][ T1658] name failslab, interval 1, probability 0, space 0, times 0 [ 76.479821][ T1658] CPU: 1 PID: 1658 Comm: syz.3.401 Not tainted syzkaller #0 [ 76.487385][ T1658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 76.498785][ T1658] Call Trace: [ 76.502212][ T1658] [ 76.505274][ T1658] __dump_stack+0x21/0x24 [ 76.509803][ T1658] dump_stack_lvl+0xee/0x150 [ 76.514758][ T1658] ? __cfi_dump_stack_lvl+0x8/0x8 [ 76.525558][ T1658] ? ____kasan_slab_free+0x13d/0x180 [ 76.532536][ T1658] dump_stack+0x15/0x24 [ 76.538108][ T1658] should_fail_ex+0x3d4/0x520 [ 76.543044][ T1658] __should_failslab+0xac/0xf0 [ 76.549662][ T1658] ? kobject_uevent_env+0x287/0x730 [ 76.555423][ T1658] should_failslab+0x9/0x20 [ 76.560488][ T1658] __kmem_cache_alloc_node+0x3d/0x2c0 [ 76.566527][ T1658] ? kernfs_put+0x469/0x480 [ 76.571309][ T1658] ? kobject_uevent_env+0x287/0x730 [ 76.576575][ T1658] kmalloc_trace+0x29/0xb0 [ 76.581202][ T1658] kobject_uevent_env+0x287/0x730 [ 76.586522][ T1658] kobject_uevent+0x1d/0x30 [ 76.591281][ T1658] __kobject_del+0xd7/0x2f0 [ 76.596445][ T1658] kobject_put+0x1ee/0x280 [ 76.603071][ T1658] net_rx_queue_update_kobjects+0x45c/0x4d0 [ 76.610541][ T1658] netdev_unregister_kobject+0x105/0x250 [ 76.616530][ T1658] unregister_netdevice_many+0x135b/0x1820 [ 76.624056][ T1658] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 76.630034][ T1658] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 76.636850][ T1658] ? ref_tracker_alloc+0x2a5/0x430 [ 76.646946][ T1658] ? __kasan_check_write+0x14/0x20 [ 76.652624][ T1658] ? queue_delayed_work_on+0x101/0x150 [ 76.660913][ T1658] ? linkwatch_fire_event+0x1d2/0x240 [ 76.669708][ T1658] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 76.676634][ T1658] ? exit_to_user_mode_loop+0x9b/0xb0 [ 76.682127][ T1658] ? __kasan_check_read+0x11/0x20 [ 76.687565][ T1658] unregister_netdevice_queue+0x31c/0x360 [ 76.693956][ T1658] ? linkwatch_schedule_work+0x161/0x190 [ 76.700183][ T1658] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 76.707078][ T1658] ? linkwatch_fire_event+0x1ed/0x240 [ 76.712840][ T1658] __tun_detach+0xca6/0x1460 [ 76.718069][ T1658] ? __cfi_mutex_lock+0x10/0x10 [ 76.723216][ T1658] tun_chr_close+0x92/0x140 [ 76.731195][ T1658] ? __cfi_tun_chr_close+0x10/0x10 [ 76.736430][ T1658] __fput+0x1fc/0x8f0 [ 76.741756][ T1658] ____fput+0x15/0x20 [ 76.748305][ T1658] task_work_run+0x1db/0x240 [ 76.753644][ T1658] ? __cfi_task_work_run+0x10/0x10 [ 76.762740][ T1658] ? filp_close+0x111/0x160 [ 76.776708][ T1658] exit_to_user_mode_loop+0x9b/0xb0 [ 76.785784][ T1658] exit_to_user_mode_prepare+0x5a/0xa0 [ 76.792585][ T1658] syscall_exit_to_user_mode+0x1a/0x30 [ 76.799530][ T1658] do_syscall_64+0x58/0xa0 [ 76.805006][ T1658] ? clear_bhb_loop+0x30/0x80 [ 76.810597][ T1658] ? clear_bhb_loop+0x30/0x80 [ 76.815887][ T1658] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 76.822992][ T1658] RIP: 0033:0x7fab0738eba9 [ 76.828044][ T1658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.854208][ T1658] RSP: 002b:00007fab082f2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 76.863284][ T1658] RAX: 0000000000000000 RBX: 00007fab075d5fa0 RCX: 00007fab0738eba9 [ 76.872294][ T1658] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 76.881073][ T1658] RBP: 00007fab082f2090 R08: 0000000000000000 R09: 0000000000000000 [ 76.890283][ T1658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.900459][ T1658] R13: 00007fab075d6038 R14: 00007fab075d5fa0 R15: 00007ffd2ab3c298 [ 76.909375][ T1658] [ 77.178349][ T1665] bond_slave_1: mtu less than device minimum [ 77.791377][ T1695] FAULT_INJECTION: forcing a failure. [ 77.791377][ T1695] name failslab, interval 1, probability 0, space 0, times 0 [ 77.804839][ T1695] CPU: 1 PID: 1695 Comm: syz.2.413 Not tainted syzkaller #0 [ 77.812407][ T1695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 77.822651][ T1695] Call Trace: [ 77.826027][ T1695] [ 77.829169][ T1695] __dump_stack+0x21/0x24 [ 77.833520][ T1695] dump_stack_lvl+0xee/0x150 [ 77.838567][ T1695] ? __cfi_dump_stack_lvl+0x8/0x8 [ 77.843817][ T1695] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 77.851314][ T1695] dump_stack+0x15/0x24 [ 77.855767][ T1695] should_fail_ex+0x3d4/0x520 [ 77.860567][ T1695] __should_failslab+0xac/0xf0 [ 77.865756][ T1695] ? kobject_get_path+0xbf/0x200 [ 77.871340][ T1695] should_failslab+0x9/0x20 [ 77.876037][ T1695] __kmem_cache_alloc_node+0x3d/0x2c0 [ 77.882553][ T1695] ? kobject_get_path+0xbf/0x200 [ 77.887685][ T1695] __kmalloc+0xa1/0x1e0 [ 77.892049][ T1695] kobject_get_path+0xbf/0x200 [ 77.897715][ T1695] kobject_uevent_env+0x2a0/0x730 [ 77.903692][ T1695] kobject_uevent+0x1d/0x30 [ 77.908485][ T1695] __kobject_del+0xd7/0x2f0 [ 77.913889][ T1695] kobject_put+0x1ee/0x280 [ 77.918718][ T1695] net_rx_queue_update_kobjects+0x45c/0x4d0 [ 77.926957][ T1695] netdev_unregister_kobject+0x105/0x250 [ 77.933792][ T1695] unregister_netdevice_many+0x135b/0x1820 [ 77.942369][ T1695] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 77.951427][ T1695] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 77.958700][ T1695] ? ref_tracker_alloc+0x2a5/0x430 [ 77.965775][ T1695] ? __kasan_check_write+0x14/0x20 [ 77.971361][ T1695] ? queue_delayed_work_on+0x101/0x150 [ 77.977598][ T1695] ? linkwatch_fire_event+0x1d2/0x240 [ 77.983213][ T1695] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 77.989824][ T1695] ? exit_to_user_mode_loop+0x9b/0xb0 [ 77.995333][ T1695] ? __kasan_check_read+0x11/0x20 [ 78.001093][ T1695] unregister_netdevice_queue+0x31c/0x360 [ 78.007018][ T1695] ? linkwatch_schedule_work+0x161/0x190 [ 78.012914][ T1695] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 78.019619][ T1695] ? linkwatch_fire_event+0x1ed/0x240 [ 78.025455][ T1695] __tun_detach+0xca6/0x1460 [ 78.030547][ T1695] ? __cfi_mutex_lock+0x10/0x10 [ 78.036231][ T1695] tun_chr_close+0x92/0x140 [ 78.041435][ T1695] ? __cfi_tun_chr_close+0x10/0x10 [ 78.047381][ T1695] __fput+0x1fc/0x8f0 [ 78.051615][ T1695] ____fput+0x15/0x20 [ 78.055905][ T1695] task_work_run+0x1db/0x240 [ 78.060530][ T1695] ? __cfi_task_work_run+0x10/0x10 [ 78.065791][ T1695] ? filp_close+0x111/0x160 [ 78.070407][ T1695] exit_to_user_mode_loop+0x9b/0xb0 [ 78.075636][ T1695] exit_to_user_mode_prepare+0x5a/0xa0 [ 78.081426][ T1695] syscall_exit_to_user_mode+0x1a/0x30 [ 78.087137][ T1695] do_syscall_64+0x58/0xa0 [ 78.091641][ T1695] ? clear_bhb_loop+0x30/0x80 [ 78.096774][ T1695] ? clear_bhb_loop+0x30/0x80 [ 78.102020][ T1695] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 78.108014][ T1695] RIP: 0033:0x7f29f438eba9 [ 78.112727][ T1695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.133114][ T1695] RSP: 002b:00007f29f52ae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 78.141808][ T1695] RAX: 0000000000000000 RBX: 00007f29f45d5fa0 RCX: 00007f29f438eba9 [ 78.150583][ T1695] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 78.159815][ T1695] RBP: 00007f29f52ae090 R08: 0000000000000000 R09: 0000000000000000 [ 78.168505][ T1695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.176736][ T1695] R13: 00007f29f45d6038 R14: 00007f29f45d5fa0 R15: 00007ffe32b784e8 [ 78.185185][ T1695] [ 79.605951][ T1743] FAULT_INJECTION: forcing a failure. [ 79.605951][ T1743] name failslab, interval 1, probability 0, space 0, times 0 [ 79.626203][ T1743] CPU: 0 PID: 1743 Comm: syz.0.426 Not tainted syzkaller #0 [ 79.636663][ T1743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 79.650671][ T1743] Call Trace: [ 79.654363][ T1743] [ 79.657554][ T1743] __dump_stack+0x21/0x24 [ 79.662033][ T1743] dump_stack_lvl+0xee/0x150 [ 79.666776][ T1743] ? __cfi_dump_stack_lvl+0x8/0x8 [ 79.672108][ T1743] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 79.679550][ T1743] dump_stack+0x15/0x24 [ 79.684368][ T1743] should_fail_ex+0x3d4/0x520 [ 79.689328][ T1743] __should_failslab+0xac/0xf0 [ 79.694505][ T1743] ? kobject_get_path+0xbf/0x200 [ 79.699924][ T1743] should_failslab+0x9/0x20 [ 79.704501][ T1743] __kmem_cache_alloc_node+0x3d/0x2c0 [ 79.710192][ T1743] ? kobject_get_path+0xbf/0x200 [ 79.715293][ T1743] __kmalloc+0xa1/0x1e0 [ 79.722404][ T1743] kobject_get_path+0xbf/0x200 [ 79.727400][ T1743] kobject_uevent_env+0x2a0/0x730 [ 79.732628][ T1743] kobject_uevent+0x1d/0x30 [ 79.737631][ T1743] __kobject_del+0xd7/0x2f0 [ 79.742617][ T1743] kobject_put+0x1ee/0x280 [ 79.747203][ T1743] net_rx_queue_update_kobjects+0x45c/0x4d0 [ 79.753583][ T1743] netdev_unregister_kobject+0x105/0x250 [ 79.759719][ T1743] unregister_netdevice_many+0x135b/0x1820 [ 79.765763][ T1743] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 79.772262][ T1743] ? __queue_delayed_work+0x173/0x200 [ 79.777914][ T1743] ? queue_delayed_work_on+0x101/0x150 [ 79.783602][ T1743] ? linkwatch_fire_event+0x1d2/0x240 [ 79.789589][ T1743] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 79.795719][ T1743] ? exit_to_user_mode_loop+0x9b/0xb0 [ 79.801956][ T1743] ? __kasan_check_read+0x11/0x20 [ 79.808012][ T1743] unregister_netdevice_queue+0x31c/0x360 [ 79.814876][ T1743] ? linkwatch_schedule_work+0x161/0x190 [ 79.821092][ T1743] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 79.827422][ T1743] ? linkwatch_fire_event+0x1ed/0x240 [ 79.833362][ T1743] __tun_detach+0xca6/0x1460 [ 79.837985][ T1743] ? __cfi_mutex_lock+0x10/0x10 [ 79.843121][ T1743] tun_chr_close+0x92/0x140 [ 79.847756][ T1743] ? __cfi_tun_chr_close+0x10/0x10 [ 79.853253][ T1743] __fput+0x1fc/0x8f0 [ 79.857436][ T1743] ____fput+0x15/0x20 [ 79.861786][ T1743] task_work_run+0x1db/0x240 [ 79.866779][ T1743] ? __cfi_task_work_run+0x10/0x10 [ 79.872392][ T1743] ? filp_close+0x111/0x160 [ 79.877037][ T1743] exit_to_user_mode_loop+0x9b/0xb0 [ 79.882267][ T1743] exit_to_user_mode_prepare+0x5a/0xa0 [ 79.888098][ T1743] syscall_exit_to_user_mode+0x1a/0x30 [ 79.893837][ T1743] do_syscall_64+0x58/0xa0 [ 79.898462][ T1743] ? clear_bhb_loop+0x30/0x80 [ 79.903563][ T1743] ? clear_bhb_loop+0x30/0x80 [ 79.908451][ T1743] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 79.917936][ T1743] RIP: 0033:0x7ff61d98eba9 [ 79.922815][ T1743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.943799][ T1743] RSP: 002b:00007ff61e7c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 79.953292][ T1743] RAX: 0000000000000000 RBX: 00007ff61dbd5fa0 RCX: 00007ff61d98eba9 [ 79.961654][ T1743] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 79.970352][ T1743] RBP: 00007ff61e7c5090 R08: 0000000000000000 R09: 0000000000000000 [ 79.978992][ T1743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 79.987172][ T1743] R13: 00007ff61dbd6038 R14: 00007ff61dbd5fa0 R15: 00007ffc801dc8d8 [ 79.995878][ T1743] [ 80.111714][ T1752] device sit0 left promiscuous mode [ 80.200577][ T1755] device sit0 entered promiscuous mode [ 81.784352][ T1774] device syzkaller0 entered promiscuous mode [ 82.971614][ T1826] device wg2 entered promiscuous mode [ 83.962985][ T1870] syz.3.466 uses obsolete (PF_INET,SOCK_PACKET) [ 84.143801][ T1869] device syzkaller0 entered promiscuous mode [ 84.500954][ T1878] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.510172][ T1878] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.216095][ T1913] device wg2 entered promiscuous mode [ 85.342870][ T1923] FAULT_INJECTION: forcing a failure. [ 85.342870][ T1923] name failslab, interval 1, probability 0, space 0, times 0 [ 85.364397][ T1923] CPU: 0 PID: 1923 Comm: syz.0.481 Not tainted syzkaller #0 [ 85.373490][ T1923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 85.384623][ T1923] Call Trace: [ 85.389636][ T1923] [ 85.392866][ T1923] __dump_stack+0x21/0x24 [ 85.398357][ T1923] dump_stack_lvl+0xee/0x150 [ 85.404086][ T1923] ? __cfi_dump_stack_lvl+0x8/0x8 [ 85.412384][ T1923] ? format_decode+0xbdc/0x1520 [ 85.417726][ T1923] dump_stack+0x15/0x24 [ 85.422708][ T1923] should_fail_ex+0x3d4/0x520 [ 85.427793][ T1923] __should_failslab+0xac/0xf0 [ 85.434388][ T1923] should_failslab+0x9/0x20 [ 85.439191][ T1923] kmem_cache_alloc_node+0x42/0x340 [ 85.444739][ T1923] ? __alloc_skb+0xea/0x4b0 [ 85.449556][ T1923] ? add_uevent_var+0x27e/0x430 [ 85.454657][ T1923] __alloc_skb+0xea/0x4b0 [ 85.459312][ T1923] alloc_uevent_skb+0x85/0x240 [ 85.464473][ T1923] ? __cfi_netdev_queue_namespace+0x10/0x10 [ 85.470866][ T1923] kobject_uevent_net_broadcast+0x1b4/0x5b0 [ 85.477484][ T1923] kobject_uevent_env+0x54f/0x730 [ 85.482694][ T1923] kobject_uevent+0x1d/0x30 [ 85.487694][ T1923] __kobject_del+0xd7/0x2f0 [ 85.492782][ T1923] kobject_put+0x1ee/0x280 [ 85.497463][ T1923] netdev_queue_update_kobjects+0x3db/0x470 [ 85.503847][ T1923] netdev_unregister_kobject+0x112/0x250 [ 85.509876][ T1923] unregister_netdevice_many+0x135b/0x1820 [ 85.516295][ T1923] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 85.522751][ T1923] ? __cfi_unregister_netdevice_many+0x10/0x10 [ 85.529395][ T1923] ? ref_tracker_alloc+0x2a5/0x430 [ 85.534728][ T1923] ? __kasan_check_write+0x14/0x20 [ 85.539941][ T1923] ? queue_delayed_work_on+0x101/0x150 [ 85.545628][ T1923] ? linkwatch_fire_event+0x1d2/0x240 [ 85.552235][ T1923] ? __cfi_queue_delayed_work_on+0x10/0x10 [ 85.559611][ T1923] ? exit_to_user_mode_loop+0x9b/0xb0 [ 85.565996][ T1923] ? __kasan_check_read+0x11/0x20 [ 85.571081][ T1923] unregister_netdevice_queue+0x31c/0x360 [ 85.577292][ T1923] ? linkwatch_schedule_work+0x161/0x190 [ 85.583283][ T1923] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 85.589601][ T1923] ? linkwatch_fire_event+0x1ed/0x240 [ 85.595024][ T1923] __tun_detach+0xca6/0x1460 [ 85.600178][ T1923] ? __cfi_mutex_lock+0x10/0x10 [ 85.607776][ T1923] tun_chr_close+0x92/0x140 [ 85.612492][ T1923] ? __cfi_tun_chr_close+0x10/0x10 [ 85.617853][ T1923] __fput+0x1fc/0x8f0 [ 85.622264][ T1923] ____fput+0x15/0x20 [ 85.626681][ T1923] task_work_run+0x1db/0x240 [ 85.631761][ T1923] ? __cfi_task_work_run+0x10/0x10 [ 85.636928][ T1923] ? filp_close+0x111/0x160 [ 85.641569][ T1923] exit_to_user_mode_loop+0x9b/0xb0 [ 85.647091][ T1923] exit_to_user_mode_prepare+0x5a/0xa0 [ 85.653223][ T1923] syscall_exit_to_user_mode+0x1a/0x30 [ 85.658740][ T1923] do_syscall_64+0x58/0xa0 [ 85.663647][ T1923] ? clear_bhb_loop+0x30/0x80 [ 85.668457][ T1923] ? clear_bhb_loop+0x30/0x80 [ 85.673752][ T1923] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 85.680561][ T1923] RIP: 0033:0x7ff61d98eba9 [ 85.685531][ T1923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.714205][ T1923] RSP: 002b:00007ff61e7c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 85.724200][ T1923] RAX: 0000000000000000 RBX: 00007ff61dbd5fa0 RCX: 00007ff61d98eba9 [ 85.732652][ T1923] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 85.742753][ T1923] RBP: 00007ff61e7c5090 R08: 0000000000000000 R09: 0000000000000000 [ 85.751654][ T1923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 85.762332][ T1923] R13: 00007ff61dbd6038 R14: 00007ff61dbd5fa0 R15: 00007ffc801dc8d8 [ 85.771573][ T1923] [ 86.360175][ T1951] device syzkaller0 entered promiscuous mode [ 88.351592][ T2017] device sit0 left promiscuous mode [ 88.932847][ T2043] device syzkaller0 entered promiscuous mode [ 88.939956][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 89.650022][ T2077] device wg2 left promiscuous mode [ 89.686841][ T2077] device wg2 entered promiscuous mode [ 90.597404][ T2123] device pim6reg1 entered promiscuous mode [ 92.950356][ T2209] device sit0 entered promiscuous mode [ 93.502003][ T2214] device pim6reg1 entered promiscuous mode [ 93.913406][ T2231] device veth1_macvtap left promiscuous mode [ 93.930199][ T2231] device macsec0 left promiscuous mode [ 93.999202][ T2232] device veth1_macvtap entered promiscuous mode [ 94.012203][ T2232] device macsec0 entered promiscuous mode [ 94.116749][ T2231] tap0: tun_chr_ioctl cmd 1074812117 [ 94.693020][ T2259] device syzkaller0 entered promiscuous mode [ 94.853587][ T2266] device pim6reg1 entered promiscuous mode [ 95.922339][ T2269] device pim6reg1 entered promiscuous mode [ 96.108610][ T28] audit: type=1400 audit(1757673138.829:133): avc: denied { create } for pid=2296 comm="syz.4.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 96.701276][ T2331] device pim6reg1 entered promiscuous mode [ 97.080173][ T2357] syz.3.602[2357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.080242][ T2358] syz.3.602[2358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.080254][ T2357] syz.3.602[2357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.117837][ T2354] device sit0 entered promiscuous mode [ 97.894456][ T28] audit: type=1400 audit(1757673140.609:134): avc: denied { create } for pid=2395 comm="syz.1.614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 99.164297][ T2452] device sit0 entered promiscuous mode [ 100.077263][ T2492] device veth1_macvtap left promiscuous mode [ 100.093719][ T2492] device macsec0 left promiscuous mode [ 100.159976][ T2495] device veth1_macvtap entered promiscuous mode [ 100.171148][ T2495] device macsec0 entered promiscuous mode [ 100.538475][ T2506] device syzkaller0 entered promiscuous mode [ 100.645001][ T2520] device wg2 left promiscuous mode [ 100.656104][ T2520] syz.2.650[2520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.656233][ T2520] syz.2.650[2520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 100.684076][ T2520] device wg2 entered promiscuous mode [ 102.057617][ T2571] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.065436][ T2571] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.188310][ T28] audit: type=1400 audit(1757673146.889:135): avc: denied { create } for pid=2613 comm="syz.3.679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 105.570239][ T2627] device syzkaller0 entered promiscuous mode [ 105.611760][ T2637] device veth0_vlan left promiscuous mode [ 105.619802][ T2637] device veth0_vlan entered promiscuous mode [ 105.684954][ T1403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.701921][ T1403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.751943][ T1403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.720848][ T2673] syz.3.694[2673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 106.720933][ T2673] syz.3.694[2673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.907868][ T2707] device pim6reg1 entered promiscuous mode [ 108.460668][ T2714] device pim6reg1 entered promiscuous mode [ 108.674460][ T2724] device veth0_vlan left promiscuous mode [ 108.688214][ T2724] device veth0_vlan entered promiscuous mode [ 108.727134][ T1403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.740410][ T1403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.749219][ T1403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.430687][ T2755] device veth1_macvtap left promiscuous mode [ 110.378643][ T2784] device syzkaller0 entered promiscuous mode [ 110.682143][ T2788] device sit0 left promiscuous mode [ 110.705073][ T2792] device sit0 entered promiscuous mode [ 111.180093][ T2803] device wg2 left promiscuous mode [ 111.205992][ T2804] device wg2 entered promiscuous mode [ 112.072753][ T28] audit: type=1400 audit(1757673154.789:136): avc: denied { create } for pid=2828 comm="syz.2.741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 112.331502][ T2835] device pim6reg1 entered promiscuous mode [ 112.903223][ T28] audit: type=1400 audit(1757673155.619:137): avc: denied { create } for pid=2849 comm="syz.3.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 114.231923][ T2890] device veth1_macvtap left promiscuous mode [ 114.261211][ T2890] device macsec0 left promiscuous mode [ 115.291399][ T2961] device syzkaller0 entered promiscuous mode [ 115.495926][ T2975] device pim6reg1 entered promiscuous mode [ 116.925719][ T28] audit: type=1400 audit(1757673159.639:138): avc: denied { create } for pid=3027 comm="syz.4.795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 117.952959][ T3060] ±ÿ: renamed from team_slave_1 [ 119.297813][ T3122] device syzkaller0 entered promiscuous mode [ 120.920893][ T3134] device veth0_vlan left promiscuous mode [ 120.934718][ T3134] device veth0_vlan entered promiscuous mode [ 120.953027][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.053798][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.063224][ T2145] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 123.089469][ T3178] FAULT_INJECTION: forcing a failure. [ 123.089469][ T3178] name failslab, interval 1, probability 0, space 0, times 0 [ 123.103569][ T3178] CPU: 0 PID: 3178 Comm: syz.1.834 Not tainted syzkaller #0 [ 123.111599][ T3178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 123.122556][ T3178] Call Trace: [ 123.126086][ T3178] [ 123.130290][ T3178] __dump_stack+0x21/0x24 [ 123.134767][ T3178] dump_stack_lvl+0xee/0x150 [ 123.139572][ T3178] ? __cfi_dump_stack_lvl+0x8/0x8 [ 123.144821][ T3178] ? skb_release_data+0x1d2/0x890 [ 123.150341][ T3178] ? skb_ensure_writable+0x2f8/0x470 [ 123.156211][ T3178] dump_stack+0x15/0x24 [ 123.160790][ T3178] should_fail_ex+0x3d4/0x520 [ 123.166216][ T3178] ? skb_clone+0x1f5/0x380 [ 123.170989][ T3178] __should_failslab+0xac/0xf0 [ 123.175966][ T3178] should_failslab+0x9/0x20 [ 123.180492][ T3178] kmem_cache_alloc+0x3b/0x330 [ 123.185328][ T3178] skb_clone+0x1f5/0x380 [ 123.190783][ T3178] bpf_clone_redirect+0xa7/0x3c0 [ 123.196648][ T3178] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 123.202779][ T3178] ? kasan_set_track+0x60/0x70 [ 123.207837][ T3178] ? kasan_set_track+0x4b/0x70 [ 123.212840][ T3178] ? kasan_save_alloc_info+0x25/0x30 [ 123.218859][ T3178] ? __kasan_slab_alloc+0x72/0x80 [ 123.224392][ T3178] ? slab_post_alloc_hook+0x4f/0x2d0 [ 123.230358][ T3178] ? kmem_cache_alloc+0x16e/0x330 [ 123.235602][ T3178] ? build_skb+0x2a/0x220 [ 123.240427][ T3178] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 123.246615][ T3178] ? bpf_prog_test_run+0x3e3/0x630 [ 123.252384][ T3178] ? __sys_bpf+0x56d/0x780 [ 123.257011][ T3178] ? __x64_sys_bpf+0x7c/0x90 [ 123.262181][ T3178] ? x64_sys_call+0x488/0x9a0 [ 123.269398][ T3178] ? do_syscall_64+0x4c/0xa0 [ 123.274737][ T3178] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 123.281385][ T3178] ? __kasan_check_read+0x11/0x20 [ 123.286808][ T3178] ? bpf_test_timer_continue+0x147/0x4a0 [ 123.295336][ T3178] bpf_test_run+0x349/0x8d0 [ 123.301503][ T3178] ? __kasan_slab_alloc+0x72/0x80 [ 123.309161][ T3178] ? convert___skb_to_skb+0x5b0/0x5b0 [ 123.315706][ T3178] ? __cfi_eth_type_trans+0x10/0x10 [ 123.330162][ T3178] ? convert___skb_to_skb+0x40/0x5b0 [ 123.340846][ T3178] bpf_prog_test_run_skb+0xaec/0x1290 [ 123.346797][ T3178] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 123.355422][ T3178] bpf_prog_test_run+0x3e3/0x630 [ 123.361118][ T3178] ? bpf_prog_query+0x270/0x270 [ 123.366610][ T3178] ? selinux_bpf+0xce/0xf0 [ 123.371266][ T3178] ? security_bpf+0x93/0xb0 [ 123.376206][ T3178] __sys_bpf+0x56d/0x780 [ 123.381022][ T3178] ? bpf_link_show_fdinfo+0x320/0x320 [ 123.387403][ T3178] ? __cfi_ksys_write+0x10/0x10 [ 123.394914][ T3178] ? __bpf_trace_sys_enter+0x62/0x70 [ 123.400947][ T3178] __x64_sys_bpf+0x7c/0x90 [ 123.407274][ T3178] x64_sys_call+0x488/0x9a0 [ 123.412703][ T3178] do_syscall_64+0x4c/0xa0 [ 123.420642][ T3178] ? clear_bhb_loop+0x30/0x80 [ 123.430579][ T3178] ? clear_bhb_loop+0x30/0x80 [ 123.437742][ T3178] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 123.444208][ T3178] RIP: 0033:0x7fa300b8eba9 [ 123.450284][ T3178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.479195][ T3178] RSP: 002b:00007fa301951038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 123.494543][ T3178] RAX: ffffffffffffffda RBX: 00007fa300dd5fa0 RCX: 00007fa300b8eba9 [ 123.509159][ T3178] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 123.522122][ T3178] RBP: 00007fa301951090 R08: 0000000000000000 R09: 0000000000000000 [ 123.533365][ T3178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 123.543877][ T3178] R13: 00007fa300dd6038 R14: 00007fa300dd5fa0 R15: 00007ffdb0ba2388 [ 123.553032][ T3178] [ 124.833080][ T3219] device pim6reg1 entered promiscuous mode [ 125.800951][ T3226] device syzkaller0 entered promiscuous mode [ 126.552126][ T3253] device sit0 entered promiscuous mode [ 126.900975][ T28] audit: type=1400 audit(1757673169.619:139): avc: denied { create } for pid=3258 comm="syz.1.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 126.994308][ T3262] FAULT_INJECTION: forcing a failure. [ 126.994308][ T3262] name failslab, interval 1, probability 0, space 0, times 0 [ 127.013173][ T3262] CPU: 1 PID: 3262 Comm: syz.4.858 Not tainted syzkaller #0 [ 127.021171][ T3262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 127.032091][ T3262] Call Trace: [ 127.035501][ T3262] [ 127.038567][ T3262] __dump_stack+0x21/0x24 [ 127.043499][ T3262] dump_stack_lvl+0xee/0x150 [ 127.048318][ T3262] ? __cfi_dump_stack_lvl+0x8/0x8 [ 127.053908][ T3262] ? skb_release_data+0x1d2/0x890 [ 127.059857][ T3262] ? skb_ensure_writable+0x2f8/0x470 [ 127.065771][ T3262] dump_stack+0x15/0x24 [ 127.071300][ T3262] should_fail_ex+0x3d4/0x520 [ 127.076901][ T3262] ? skb_clone+0x1f5/0x380 [ 127.081864][ T3262] __should_failslab+0xac/0xf0 [ 127.087281][ T3262] should_failslab+0x9/0x20 [ 127.092060][ T3262] kmem_cache_alloc+0x3b/0x330 [ 127.097611][ T3262] skb_clone+0x1f5/0x380 [ 127.104071][ T3262] bpf_clone_redirect+0xa7/0x3c0 [ 127.109619][ T3262] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 127.115550][ T3262] ? kasan_set_track+0x60/0x70 [ 127.121238][ T3262] ? kasan_set_track+0x4b/0x70 [ 127.126056][ T3262] ? kasan_save_alloc_info+0x25/0x30 [ 127.131501][ T3262] ? __kasan_slab_alloc+0x72/0x80 [ 127.136756][ T3262] ? slab_post_alloc_hook+0x4f/0x2d0 [ 127.142792][ T3262] ? kmem_cache_alloc+0x16e/0x330 [ 127.148124][ T3262] ? build_skb+0x2a/0x220 [ 127.152960][ T3262] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 127.158927][ T3262] ? bpf_prog_test_run+0x3e3/0x630 [ 127.164257][ T3262] ? __sys_bpf+0x56d/0x780 [ 127.169379][ T3262] ? __x64_sys_bpf+0x7c/0x90 [ 127.174022][ T3262] ? x64_sys_call+0x488/0x9a0 [ 127.180551][ T3262] ? do_syscall_64+0x4c/0xa0 [ 127.185442][ T3262] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 127.193038][ T3262] ? __kasan_check_read+0x11/0x20 [ 127.199367][ T3262] ? bpf_test_timer_continue+0x147/0x4a0 [ 127.205319][ T3262] bpf_test_run+0x349/0x8d0 [ 127.210605][ T3262] ? __kasan_slab_alloc+0x72/0x80 [ 127.216385][ T3262] ? convert___skb_to_skb+0x5b0/0x5b0 [ 127.221904][ T3262] ? __cfi_eth_type_trans+0x10/0x10 [ 127.227402][ T3262] ? convert___skb_to_skb+0x40/0x5b0 [ 127.233007][ T3262] bpf_prog_test_run_skb+0xaec/0x1290 [ 127.239444][ T3262] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 127.245626][ T3262] bpf_prog_test_run+0x3e3/0x630 [ 127.251008][ T3262] ? slab_free_freelist_hook+0xc2/0x190 [ 127.258582][ T3262] ? bpf_prog_query+0x270/0x270 [ 127.264966][ T3262] ? selinux_bpf+0xce/0xf0 [ 127.269598][ T3262] ? security_bpf+0x93/0xb0 [ 127.274239][ T3262] __sys_bpf+0x56d/0x780 [ 127.279289][ T3262] ? bpf_link_show_fdinfo+0x320/0x320 [ 127.284890][ T3262] ? __cfi_ksys_write+0x10/0x10 [ 127.290477][ T3262] ? debug_smp_processor_id+0x17/0x20 [ 127.296790][ T3262] __x64_sys_bpf+0x7c/0x90 [ 127.302433][ T3262] x64_sys_call+0x488/0x9a0 [ 127.306982][ T3262] do_syscall_64+0x4c/0xa0 [ 127.311686][ T3262] ? clear_bhb_loop+0x30/0x80 [ 127.317189][ T3262] ? clear_bhb_loop+0x30/0x80 [ 127.322420][ T3262] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 127.328685][ T3262] RIP: 0033:0x7fda1798eba9 [ 127.333587][ T3262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.354945][ T3262] RSP: 002b:00007fda1878d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 127.366446][ T3262] RAX: ffffffffffffffda RBX: 00007fda17bd5fa0 RCX: 00007fda1798eba9 [ 127.375663][ T3262] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 127.385860][ T3262] RBP: 00007fda1878d090 R08: 0000000000000000 R09: 0000000000000000 [ 127.394455][ T3262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 127.403675][ T3262] R13: 00007fda17bd6038 R14: 00007fda17bd5fa0 R15: 00007fff8c6f62a8 [ 127.414892][ T3262] [ 128.907542][ T3287] device pim6reg1 entered promiscuous mode [ 129.054899][ T28] audit: type=1400 audit(1757673171.769:140): avc: denied { create } for pid=3295 comm="syz.2.868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 129.079619][ T3296] Ÿë: port 1(ip6gretap0) entered blocking state [ 129.107787][ T3296] Ÿë: port 1(ip6gretap0) entered disabled state [ 129.115398][ T3296] device ip6gretap0 entered promiscuous mode [ 129.224283][ T3303] device pim6reg1 entered promiscuous mode [ 129.399272][ T3319] syz.3.877[3319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.399358][ T3319] syz.3.877[3319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.511426][ T3324] device pim6reg1 entered promiscuous mode [ 129.812653][ T3334] device veth0_vlan left promiscuous mode [ 129.867497][ T3334] device veth0_vlan entered promiscuous mode [ 129.932700][ T1403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.950840][ T1403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.982537][ T1403] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.606161][ T28] audit: type=1400 audit(1757673173.319:141): avc: denied { create } for pid=3350 comm="syz.1.887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 130.773429][ T3379] device veth0_vlan left promiscuous mode [ 130.809048][ T3379] device veth0_vlan entered promiscuous mode [ 130.816755][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.858198][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.884325][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.118622][ T3386] device veth0_vlan left promiscuous mode [ 131.138018][ T3386] device veth0_vlan entered promiscuous mode [ 131.184085][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.198400][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.223810][ T364] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.464791][ T28] audit: type=1400 audit(1757673174.179:142): avc: denied { create } for pid=3398 comm="syz.3.903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 133.107609][ T3435] tap0: tun_chr_ioctl cmd 1074812117 [ 134.142389][ T28] audit: type=1400 audit(1757673176.859:143): avc: denied { write } for pid=3468 comm="syz.1.921" name="cgroup.subtree_control" dev="cgroup2" ino=409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 134.262296][ T28] audit: type=1400 audit(1757673176.889:144): avc: denied { open } for pid=3468 comm="syz.1.921" path="" dev="cgroup2" ino=409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 138.219391][ T3548] device sit0 entered promiscuous mode [ 139.043166][ T3565] device wg2 left promiscuous mode [ 139.076334][ T3565] device wg2 entered promiscuous mode [ 140.005558][ T28] audit: type=1400 audit(1757673182.719:145): avc: denied { create } for pid=3566 comm="syz.3.948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 140.605074][ T3580] device syzkaller0 entered promiscuous mode [ 140.757388][ T28] audit: type=1400 audit(1757673183.469:146): avc: denied { read } for pid=3584 comm="syz.2.953" dev="nsfs" ino=4026532639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 140.785987][ T28] audit: type=1400 audit(1757673183.469:147): avc: denied { open } for pid=3584 comm="syz.2.953" path="net:[4026532639]" dev="nsfs" ino=4026532639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 140.966105][ T3583] device pim6reg1 entered promiscuous mode [ 140.979607][ T3591] device wg2 left promiscuous mode [ 141.008040][ T3595] device wg2 entered promiscuous mode [ 142.038163][ T3640] device pim6reg1 entered promiscuous mode [ 142.877394][ T342] udevd (342) used greatest stack depth: 21056 bytes left [ 142.878171][ T103] udevd[103]: worker [342] terminated by signal 33 (Unknown signal 33) [ 142.912864][ T103] udevd[103]: worker [342] failed while handling '/devices/virtual/block/loop1' [ 143.007302][ T3675] device sit0 left promiscuous mode [ 143.316343][ T3693] FAULT_INJECTION: forcing a failure. [ 143.316343][ T3693] name failslab, interval 1, probability 0, space 0, times 0 [ 143.371314][ T3693] CPU: 1 PID: 3693 Comm: syz.2.985 Not tainted syzkaller #0 [ 143.379053][ T3693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 143.389754][ T3693] Call Trace: [ 143.393328][ T3693] [ 143.396374][ T3693] __dump_stack+0x21/0x24 [ 143.400843][ T3693] dump_stack_lvl+0xee/0x150 [ 143.405470][ T3693] ? __cfi_dump_stack_lvl+0x8/0x8 [ 143.410981][ T3693] ? skb_release_data+0x1d2/0x890 [ 143.416235][ T3693] ? skb_ensure_writable+0x2f8/0x470 [ 143.423133][ T3693] dump_stack+0x15/0x24 [ 143.427520][ T3693] should_fail_ex+0x3d4/0x520 [ 143.432623][ T3693] ? skb_clone+0x1f5/0x380 [ 143.437627][ T3693] __should_failslab+0xac/0xf0 [ 143.442492][ T3693] should_failslab+0x9/0x20 [ 143.447210][ T3693] kmem_cache_alloc+0x3b/0x330 [ 143.452886][ T3693] skb_clone+0x1f5/0x380 [ 143.457187][ T3693] bpf_clone_redirect+0xa7/0x3c0 [ 143.462910][ T3693] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 143.468765][ T3693] ? kasan_set_track+0x60/0x70 [ 143.475695][ T3693] ? kasan_set_track+0x4b/0x70 [ 143.480938][ T3693] ? kasan_save_alloc_info+0x25/0x30 [ 143.487948][ T3693] ? __kasan_slab_alloc+0x72/0x80 [ 143.493213][ T3693] ? slab_post_alloc_hook+0x4f/0x2d0 [ 143.498734][ T3693] ? kmem_cache_alloc+0x16e/0x330 [ 143.503977][ T3693] ? build_skb+0x2a/0x220 [ 143.508344][ T3693] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 143.514108][ T3693] ? bpf_prog_test_run+0x3e3/0x630 [ 143.519356][ T3693] ? __sys_bpf+0x56d/0x780 [ 143.523934][ T3693] ? __x64_sys_bpf+0x7c/0x90 [ 143.528674][ T3693] ? x64_sys_call+0x488/0x9a0 [ 143.533583][ T3693] ? do_syscall_64+0x4c/0xa0 [ 143.538209][ T3693] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 143.544634][ T3693] ? __kasan_check_read+0x11/0x20 [ 143.549710][ T3693] ? bpf_test_timer_continue+0x147/0x4a0 [ 143.555601][ T3693] bpf_test_run+0x349/0x8d0 [ 143.560727][ T3693] ? __kasan_slab_alloc+0x72/0x80 [ 143.565971][ T3693] ? convert___skb_to_skb+0x5b0/0x5b0 [ 143.571409][ T3693] ? __cfi_eth_type_trans+0x10/0x10 [ 143.576804][ T3693] ? convert___skb_to_skb+0x40/0x5b0 [ 143.582600][ T3693] bpf_prog_test_run_skb+0xaec/0x1290 [ 143.588318][ T3693] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 143.594274][ T3693] bpf_prog_test_run+0x3e3/0x630 [ 143.599269][ T3693] ? slab_free_freelist_hook+0xc2/0x190 [ 143.605054][ T3693] ? bpf_prog_query+0x270/0x270 [ 143.610051][ T3693] ? selinux_bpf+0xce/0xf0 [ 143.615113][ T3693] ? security_bpf+0x93/0xb0 [ 143.619649][ T3693] __sys_bpf+0x56d/0x780 [ 143.624033][ T3693] ? bpf_link_show_fdinfo+0x320/0x320 [ 143.630018][ T3693] ? __cfi_ksys_write+0x10/0x10 [ 143.635018][ T3693] ? debug_smp_processor_id+0x17/0x20 [ 143.640873][ T3693] __x64_sys_bpf+0x7c/0x90 [ 143.645735][ T3693] x64_sys_call+0x488/0x9a0 [ 143.650506][ T3693] do_syscall_64+0x4c/0xa0 [ 143.654967][ T3693] ? clear_bhb_loop+0x30/0x80 [ 143.660404][ T3693] ? clear_bhb_loop+0x30/0x80 [ 143.665569][ T3693] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 143.671733][ T3693] RIP: 0033:0x7f29f438eba9 [ 143.676271][ T3693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.696438][ T3693] RSP: 002b:00007f29f52ae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 143.705575][ T3693] RAX: ffffffffffffffda RBX: 00007f29f45d5fa0 RCX: 00007f29f438eba9 [ 143.713840][ T3693] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 143.722087][ T3693] RBP: 00007f29f52ae090 R08: 0000000000000000 R09: 0000000000000000 [ 143.731006][ T3693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 143.739276][ T3693] R13: 00007f29f45d6038 R14: 00007f29f45d5fa0 R15: 00007ffe32b784e8 [ 143.748179][ T3693] [ 143.781936][ T3682] device sit0 entered promiscuous mode [ 143.807216][ T3691] device wg2 entered promiscuous mode [ 144.012369][ T3700] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 144.106169][ T3700] device syzkaller0 entered promiscuous mode [ 144.401524][ T3718] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.411565][ T3718] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.560056][ T28] audit: type=1400 audit(1757673187.279:148): avc: denied { create } for pid=3726 comm="syz.3.997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 146.162741][ T3777] FAULT_INJECTION: forcing a failure. [ 146.162741][ T3777] name failslab, interval 1, probability 0, space 0, times 0 [ 146.180373][ T3777] CPU: 0 PID: 3777 Comm: syz.0.1012 Not tainted syzkaller #0 [ 146.188171][ T3777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 146.198531][ T3777] Call Trace: [ 146.201852][ T3777] [ 146.204802][ T3777] __dump_stack+0x21/0x24 [ 146.209166][ T3777] dump_stack_lvl+0xee/0x150 [ 146.214251][ T3777] ? __cfi_dump_stack_lvl+0x8/0x8 [ 146.219413][ T3777] ? skb_release_data+0x1d2/0x890 [ 146.224530][ T3777] ? skb_ensure_writable+0x2f8/0x470 [ 146.229945][ T3777] dump_stack+0x15/0x24 [ 146.234233][ T3777] should_fail_ex+0x3d4/0x520 [ 146.239041][ T3777] ? skb_clone+0x1f5/0x380 [ 146.243739][ T3777] __should_failslab+0xac/0xf0 [ 146.248837][ T3777] should_failslab+0x9/0x20 [ 146.253845][ T3777] kmem_cache_alloc+0x3b/0x330 [ 146.258760][ T3777] skb_clone+0x1f5/0x380 [ 146.263141][ T3777] bpf_clone_redirect+0xa7/0x3c0 [ 146.268322][ T3777] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 146.274543][ T3777] ? kasan_set_track+0x60/0x70 [ 146.279462][ T3777] ? kasan_set_track+0x4b/0x70 [ 146.284615][ T3777] ? kasan_save_alloc_info+0x25/0x30 [ 146.290480][ T3777] ? __kasan_slab_alloc+0x72/0x80 [ 146.296167][ T3777] ? slab_post_alloc_hook+0x4f/0x2d0 [ 146.301582][ T3777] ? kmem_cache_alloc+0x16e/0x330 [ 146.306912][ T3777] ? build_skb+0x2a/0x220 [ 146.311317][ T3777] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 146.317268][ T3777] ? bpf_prog_test_run+0x3e3/0x630 [ 146.322672][ T3777] ? __sys_bpf+0x56d/0x780 [ 146.327296][ T3777] ? __x64_sys_bpf+0x7c/0x90 [ 146.332026][ T3777] ? x64_sys_call+0x488/0x9a0 [ 146.337635][ T3777] ? do_syscall_64+0x4c/0xa0 [ 146.342632][ T3777] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 146.348910][ T3777] ? __kasan_check_read+0x11/0x20 [ 146.354144][ T3777] ? bpf_test_timer_continue+0x147/0x4a0 [ 146.360162][ T3777] bpf_test_run+0x349/0x8d0 [ 146.364714][ T3777] ? __kasan_slab_alloc+0x72/0x80 [ 146.370288][ T3777] ? convert___skb_to_skb+0x5b0/0x5b0 [ 146.375725][ T3777] ? __cfi_eth_type_trans+0x10/0x10 [ 146.381756][ T3777] ? convert___skb_to_skb+0x40/0x5b0 [ 146.387267][ T3777] bpf_prog_test_run_skb+0xaec/0x1290 [ 146.392957][ T3777] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 146.399348][ T3777] bpf_prog_test_run+0x3e3/0x630 [ 146.404930][ T3777] ? slab_free_freelist_hook+0xc2/0x190 [ 146.410789][ T3777] ? bpf_prog_query+0x270/0x270 [ 146.415885][ T3777] ? selinux_bpf+0xce/0xf0 [ 146.420538][ T3777] ? security_bpf+0x93/0xb0 [ 146.425088][ T3777] __sys_bpf+0x56d/0x780 [ 146.429501][ T3777] ? bpf_link_show_fdinfo+0x320/0x320 [ 146.435167][ T3777] ? __cfi_ksys_write+0x10/0x10 [ 146.440072][ T3777] ? debug_smp_processor_id+0x17/0x20 [ 146.445585][ T3777] __x64_sys_bpf+0x7c/0x90 [ 146.450252][ T3777] x64_sys_call+0x488/0x9a0 [ 146.454802][ T3777] do_syscall_64+0x4c/0xa0 [ 146.459244][ T3777] ? clear_bhb_loop+0x30/0x80 [ 146.464055][ T3777] ? clear_bhb_loop+0x30/0x80 [ 146.469157][ T3777] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 146.475108][ T3777] RIP: 0033:0x7ff61d98eba9 [ 146.479601][ T3777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.499696][ T3777] RSP: 002b:00007ff61e7c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 146.508210][ T3777] RAX: ffffffffffffffda RBX: 00007ff61dbd5fa0 RCX: 00007ff61d98eba9 [ 146.516452][ T3777] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 146.524805][ T3777] RBP: 00007ff61e7c5090 R08: 0000000000000000 R09: 0000000000000000 [ 146.532885][ T3777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 146.540964][ T3777] R13: 00007ff61dbd6038 R14: 00007ff61dbd5fa0 R15: 00007ffc801dc8d8 [ 146.549220][ T3777] [ 146.823383][ T3795] device veth1_macvtap left promiscuous mode [ 146.831103][ T3795] device macsec0 left promiscuous mode [ 148.089070][ T3844] device syzkaller0 entered promiscuous mode [ 148.455272][ T3882] device veth1_macvtap left promiscuous mode [ 148.463372][ T3882] device macsec0 left promiscuous mode [ 148.815153][ T3894] device pim6reg1 entered promiscuous mode [ 148.881683][ T3894] device wg2 left promiscuous mode [ 149.072097][ T3896] tap0: tun_chr_ioctl cmd 2147767521 [ 149.235061][ T3907] FAULT_INJECTION: forcing a failure. [ 149.235061][ T3907] name failslab, interval 1, probability 0, space 0, times 0 [ 149.249069][ T3907] CPU: 0 PID: 3907 Comm: syz.1.1045 Not tainted syzkaller #0 [ 149.256539][ T3907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 149.266962][ T3907] Call Trace: [ 149.270370][ T3907] [ 149.273354][ T3907] __dump_stack+0x21/0x24 [ 149.277729][ T3907] dump_stack_lvl+0xee/0x150 [ 149.282359][ T3907] ? __cfi_dump_stack_lvl+0x8/0x8 [ 149.287687][ T3907] ? skb_release_data+0x1d2/0x890 [ 149.293096][ T3907] ? skb_ensure_writable+0x2f8/0x470 [ 149.300278][ T3907] dump_stack+0x15/0x24 [ 149.304560][ T3907] should_fail_ex+0x3d4/0x520 [ 149.309547][ T3907] ? skb_clone+0x1f5/0x380 [ 149.313981][ T3907] __should_failslab+0xac/0xf0 [ 149.318780][ T3907] should_failslab+0x9/0x20 [ 149.323486][ T3907] kmem_cache_alloc+0x3b/0x330 [ 149.328320][ T3907] skb_clone+0x1f5/0x380 [ 149.332628][ T3907] bpf_clone_redirect+0xa7/0x3c0 [ 149.337628][ T3907] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 149.343219][ T3907] ? kasan_set_track+0x60/0x70 [ 149.348332][ T3907] ? kasan_set_track+0x4b/0x70 [ 149.353139][ T3907] ? kasan_save_alloc_info+0x25/0x30 [ 149.358464][ T3907] ? __kasan_slab_alloc+0x72/0x80 [ 149.364008][ T3907] ? slab_post_alloc_hook+0x4f/0x2d0 [ 149.369407][ T3907] ? kmem_cache_alloc+0x16e/0x330 [ 149.374533][ T3907] ? build_skb+0x2a/0x220 [ 149.378964][ T3907] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 149.384616][ T3907] ? bpf_prog_test_run+0x3e3/0x630 [ 149.390284][ T3907] ? __sys_bpf+0x56d/0x780 [ 149.394727][ T3907] ? __x64_sys_bpf+0x7c/0x90 [ 149.399371][ T3907] ? x64_sys_call+0x488/0x9a0 [ 149.404263][ T3907] ? do_syscall_64+0x4c/0xa0 [ 149.409392][ T3907] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 149.415573][ T3907] ? __kasan_check_read+0x11/0x20 [ 149.420890][ T3907] ? bpf_test_timer_continue+0x147/0x4a0 [ 149.427009][ T3907] bpf_test_run+0x349/0x8d0 [ 149.431756][ T3907] ? __kasan_slab_alloc+0x72/0x80 [ 149.436809][ T3907] ? convert___skb_to_skb+0x5b0/0x5b0 [ 149.442219][ T3907] ? __cfi_eth_type_trans+0x10/0x10 [ 149.447525][ T3907] ? convert___skb_to_skb+0x40/0x5b0 [ 149.452868][ T3907] bpf_prog_test_run_skb+0xaec/0x1290 [ 149.458535][ T3907] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 149.464535][ T3907] bpf_prog_test_run+0x3e3/0x630 [ 149.469492][ T3907] ? slab_free_freelist_hook+0xc2/0x190 [ 149.475237][ T3907] ? bpf_prog_query+0x270/0x270 [ 149.480178][ T3907] ? selinux_bpf+0xce/0xf0 [ 149.484600][ T3907] ? security_bpf+0x93/0xb0 [ 149.489123][ T3907] __sys_bpf+0x56d/0x780 [ 149.493557][ T3907] ? bpf_link_show_fdinfo+0x320/0x320 [ 149.498940][ T3907] ? __cfi_ksys_write+0x10/0x10 [ 149.503991][ T3907] ? debug_smp_processor_id+0x17/0x20 [ 149.509403][ T3907] __x64_sys_bpf+0x7c/0x90 [ 149.514131][ T3907] x64_sys_call+0x488/0x9a0 [ 149.518659][ T3907] do_syscall_64+0x4c/0xa0 [ 149.523192][ T3907] ? clear_bhb_loop+0x30/0x80 [ 149.527935][ T3907] ? clear_bhb_loop+0x30/0x80 [ 149.532658][ T3907] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 149.538590][ T3907] RIP: 0033:0x7fa300b8eba9 [ 149.543015][ T3907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.563011][ T3907] RSP: 002b:00007fa301951038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 149.571617][ T3907] RAX: ffffffffffffffda RBX: 00007fa300dd5fa0 RCX: 00007fa300b8eba9 [ 149.579726][ T3907] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 149.588174][ T3907] RBP: 00007fa301951090 R08: 0000000000000000 R09: 0000000000000000 [ 149.596697][ T3907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 149.605825][ T3907] R13: 00007fa300dd6038 R14: 00007fa300dd5fa0 R15: 00007ffdb0ba2388 [ 149.615188][ T3907] [ 149.711008][ T28] audit: type=1400 audit(1757673192.419:149): avc: denied { create } for pid=3915 comm="syz.4.1047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 149.904342][ T3917] device syzkaller0 entered promiscuous mode [ 150.439322][ T3940] device pim6reg1 entered promiscuous mode [ 150.466784][ T3941] device wg2 left promiscuous mode [ 150.697664][ T3948] bond_slave_1: mtu less than device minimum [ 150.813240][ T3953] FAULT_INJECTION: forcing a failure. [ 150.813240][ T3953] name failslab, interval 1, probability 0, space 0, times 0 [ 150.827012][ T3953] CPU: 1 PID: 3953 Comm: syz.4.1059 Not tainted syzkaller #0 [ 150.835569][ T3953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 150.846184][ T3953] Call Trace: [ 150.849599][ T3953] [ 150.852666][ T3953] __dump_stack+0x21/0x24 [ 150.857034][ T3953] dump_stack_lvl+0xee/0x150 [ 150.861669][ T3953] ? __cfi_dump_stack_lvl+0x8/0x8 [ 150.867572][ T3953] ? skb_release_data+0x1d2/0x890 [ 150.873103][ T3953] ? skb_ensure_writable+0x2f8/0x470 [ 150.878618][ T3953] dump_stack+0x15/0x24 [ 150.882913][ T3953] should_fail_ex+0x3d4/0x520 [ 150.888118][ T3953] ? skb_clone+0x1f5/0x380 [ 150.892775][ T3953] __should_failslab+0xac/0xf0 [ 150.898468][ T3953] should_failslab+0x9/0x20 [ 150.903188][ T3953] kmem_cache_alloc+0x3b/0x330 [ 150.908181][ T3953] skb_clone+0x1f5/0x380 [ 150.912937][ T3953] bpf_clone_redirect+0xa7/0x3c0 [ 150.918234][ T3953] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 150.924432][ T3953] ? kasan_set_track+0x60/0x70 [ 150.929821][ T3953] ? kasan_set_track+0x4b/0x70 [ 150.935594][ T3953] ? kasan_save_alloc_info+0x25/0x30 [ 150.941129][ T3953] ? __kasan_slab_alloc+0x72/0x80 [ 150.947230][ T3953] ? slab_post_alloc_hook+0x4f/0x2d0 [ 150.953944][ T3953] ? kmem_cache_alloc+0x16e/0x330 [ 150.959832][ T3953] ? build_skb+0x2a/0x220 [ 150.964969][ T3953] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 150.971468][ T3953] ? bpf_prog_test_run+0x3e3/0x630 [ 150.976660][ T3953] ? __sys_bpf+0x56d/0x780 [ 150.981379][ T3953] ? __x64_sys_bpf+0x7c/0x90 [ 150.986454][ T3953] ? x64_sys_call+0x488/0x9a0 [ 150.991787][ T3953] ? do_syscall_64+0x4c/0xa0 [ 150.996969][ T3953] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 151.003978][ T3953] ? __kasan_check_read+0x11/0x20 [ 151.010259][ T3953] ? bpf_test_timer_continue+0x147/0x4a0 [ 151.017154][ T3953] bpf_test_run+0x349/0x8d0 [ 151.023321][ T3953] ? __kasan_slab_alloc+0x72/0x80 [ 151.029588][ T3953] ? convert___skb_to_skb+0x5b0/0x5b0 [ 151.035224][ T3953] ? __cfi_eth_type_trans+0x10/0x10 [ 151.040677][ T3953] ? convert___skb_to_skb+0x40/0x5b0 [ 151.046227][ T3953] bpf_prog_test_run_skb+0xaec/0x1290 [ 151.051920][ T3953] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 151.058041][ T3953] bpf_prog_test_run+0x3e3/0x630 [ 151.063018][ T3953] ? slab_free_freelist_hook+0xc2/0x190 [ 151.068713][ T3953] ? bpf_prog_query+0x270/0x270 [ 151.073695][ T3953] ? selinux_bpf+0xce/0xf0 [ 151.078522][ T3953] ? security_bpf+0x93/0xb0 [ 151.083252][ T3953] __sys_bpf+0x56d/0x780 [ 151.087646][ T3953] ? bpf_link_show_fdinfo+0x320/0x320 [ 151.093707][ T3953] ? __cfi_ksys_write+0x10/0x10 [ 151.098740][ T3953] ? debug_smp_processor_id+0x17/0x20 [ 151.105994][ T3953] __x64_sys_bpf+0x7c/0x90 [ 151.111165][ T3953] x64_sys_call+0x488/0x9a0 [ 151.116325][ T3953] do_syscall_64+0x4c/0xa0 [ 151.124735][ T3953] ? clear_bhb_loop+0x30/0x80 [ 151.129638][ T3953] ? clear_bhb_loop+0x30/0x80 [ 151.135069][ T3953] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 151.141443][ T3953] RIP: 0033:0x7fda1798eba9 [ 151.146531][ T3953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.167669][ T3953] RSP: 002b:00007fda1878d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 151.176474][ T3953] RAX: ffffffffffffffda RBX: 00007fda17bd5fa0 RCX: 00007fda1798eba9 [ 151.187055][ T3953] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 151.196711][ T3953] RBP: 00007fda1878d090 R08: 0000000000000000 R09: 0000000000000000 [ 151.206000][ T3953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 151.215460][ T3953] R13: 00007fda17bd6038 R14: 00007fda17bd5fa0 R15: 00007fff8c6f62a8 [ 151.225068][ T3953] [ 152.462148][ T3990] FAULT_INJECTION: forcing a failure. [ 152.462148][ T3990] name failslab, interval 1, probability 0, space 0, times 0 [ 152.489731][ T3990] CPU: 0 PID: 3990 Comm: syz.2.1071 Not tainted syzkaller #0 [ 152.497277][ T3990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 152.507538][ T3990] Call Trace: [ 152.510964][ T3990] [ 152.513931][ T3990] __dump_stack+0x21/0x24 [ 152.518477][ T3990] dump_stack_lvl+0xee/0x150 [ 152.523193][ T3990] ? __cfi_dump_stack_lvl+0x8/0x8 [ 152.528289][ T3990] ? skb_release_data+0x1d2/0x890 [ 152.533646][ T3990] ? skb_ensure_writable+0x2f8/0x470 [ 152.539613][ T3990] dump_stack+0x15/0x24 [ 152.543817][ T3990] should_fail_ex+0x3d4/0x520 [ 152.548728][ T3990] ? skb_clone+0x1f5/0x380 [ 152.553330][ T3990] __should_failslab+0xac/0xf0 [ 152.558346][ T3990] should_failslab+0x9/0x20 [ 152.562989][ T3990] kmem_cache_alloc+0x3b/0x330 [ 152.567880][ T3990] skb_clone+0x1f5/0x380 [ 152.572154][ T3990] bpf_clone_redirect+0xa7/0x3c0 [ 152.577313][ T3990] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 152.582835][ T3990] ? kasan_set_track+0x60/0x70 [ 152.587640][ T3990] ? kasan_set_track+0x4b/0x70 [ 152.592438][ T3990] ? kasan_save_alloc_info+0x25/0x30 [ 152.597782][ T3990] ? __kasan_slab_alloc+0x72/0x80 [ 152.602846][ T3990] ? slab_post_alloc_hook+0x4f/0x2d0 [ 152.608431][ T3990] ? kmem_cache_alloc+0x16e/0x330 [ 152.613935][ T3990] ? build_skb+0x2a/0x220 [ 152.618306][ T3990] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 152.623891][ T3990] ? bpf_prog_test_run+0x3e3/0x630 [ 152.629217][ T3990] ? __sys_bpf+0x56d/0x780 [ 152.633887][ T3990] ? __x64_sys_bpf+0x7c/0x90 [ 152.638524][ T3990] ? x64_sys_call+0x488/0x9a0 [ 152.643244][ T3990] ? do_syscall_64+0x4c/0xa0 [ 152.647874][ T3990] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 152.653984][ T3990] ? __kasan_check_read+0x11/0x20 [ 152.659063][ T3990] ? bpf_test_timer_continue+0x147/0x4a0 [ 152.664746][ T3990] bpf_test_run+0x349/0x8d0 [ 152.669303][ T3990] ? __kasan_slab_alloc+0x72/0x80 [ 152.674421][ T3990] ? convert___skb_to_skb+0x5b0/0x5b0 [ 152.679853][ T3990] ? __cfi_eth_type_trans+0x10/0x10 [ 152.685098][ T3990] ? convert___skb_to_skb+0x40/0x5b0 [ 152.690512][ T3990] bpf_prog_test_run_skb+0xaec/0x1290 [ 152.695932][ T3990] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 152.701788][ T3990] bpf_prog_test_run+0x3e3/0x630 [ 152.706762][ T3990] ? slab_free_freelist_hook+0xc2/0x190 [ 152.712526][ T3990] ? bpf_prog_query+0x270/0x270 [ 152.717598][ T3990] ? selinux_bpf+0xce/0xf0 [ 152.723023][ T3990] ? security_bpf+0x93/0xb0 [ 152.727743][ T3990] __sys_bpf+0x56d/0x780 [ 152.732698][ T3990] ? bpf_link_show_fdinfo+0x320/0x320 [ 152.738647][ T3990] ? __cfi_ksys_write+0x10/0x10 [ 152.744484][ T3990] ? debug_smp_processor_id+0x17/0x20 [ 152.751385][ T3990] __x64_sys_bpf+0x7c/0x90 [ 152.755888][ T3990] x64_sys_call+0x488/0x9a0 [ 152.761863][ T3990] do_syscall_64+0x4c/0xa0 [ 152.766443][ T3990] ? clear_bhb_loop+0x30/0x80 [ 152.771568][ T3990] ? clear_bhb_loop+0x30/0x80 [ 152.776813][ T3990] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 152.783238][ T3990] RIP: 0033:0x7f29f438eba9 [ 152.787803][ T3990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.810972][ T3990] RSP: 002b:00007f29f52ae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 152.820871][ T3990] RAX: ffffffffffffffda RBX: 00007f29f45d5fa0 RCX: 00007f29f438eba9 [ 152.829910][ T3990] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 152.838470][ T3990] RBP: 00007f29f52ae090 R08: 0000000000000000 R09: 0000000000000000 [ 152.846650][ T3990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 152.855603][ T3990] R13: 00007f29f45d6038 R14: 00007f29f45d5fa0 R15: 00007ffe32b784e8 [ 152.864138][ T3990] [ 153.126583][ T4012] device veth1_macvtap entered promiscuous mode [ 153.153222][ T4012] device macsec0 entered promiscuous mode [ 153.286485][ T4019] device wg2 left promiscuous mode [ 153.310983][ T4019] device wg2 entered promiscuous mode [ 153.353074][ T4025] device veth0_vlan left promiscuous mode [ 153.360076][ T4025] device veth0_vlan entered promiscuous mode [ 153.377353][ T1385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.386162][ T1385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.394207][ T1385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.392858][ T4072] FAULT_INJECTION: forcing a failure. [ 154.392858][ T4072] name failslab, interval 1, probability 0, space 0, times 0 [ 154.406247][ T4072] CPU: 0 PID: 4072 Comm: syz.4.1094 Not tainted syzkaller #0 [ 154.413749][ T4072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 154.423940][ T4072] Call Trace: [ 154.428275][ T4072] [ 154.431332][ T4072] __dump_stack+0x21/0x24 [ 154.435804][ T4072] dump_stack_lvl+0xee/0x150 [ 154.440610][ T4072] ? __cfi_dump_stack_lvl+0x8/0x8 [ 154.447159][ T4072] ? skb_release_data+0x1d2/0x890 [ 154.452346][ T4072] ? skb_ensure_writable+0x2f8/0x470 [ 154.458553][ T4072] dump_stack+0x15/0x24 [ 154.463462][ T4072] should_fail_ex+0x3d4/0x520 [ 154.468197][ T4072] ? skb_clone+0x1f5/0x380 [ 154.472655][ T4072] __should_failslab+0xac/0xf0 [ 154.478339][ T4072] should_failslab+0x9/0x20 [ 154.482898][ T4072] kmem_cache_alloc+0x3b/0x330 [ 154.488960][ T4072] skb_clone+0x1f5/0x380 [ 154.493608][ T4072] bpf_clone_redirect+0xa7/0x3c0 [ 154.499804][ T4072] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 154.505481][ T4072] ? kasan_set_track+0x60/0x70 [ 154.510551][ T4072] ? kasan_set_track+0x4b/0x70 [ 154.515602][ T4072] ? kasan_save_alloc_info+0x25/0x30 [ 154.523206][ T4072] ? __kasan_slab_alloc+0x72/0x80 [ 154.528483][ T4072] ? slab_post_alloc_hook+0x4f/0x2d0 [ 154.534093][ T4072] ? kmem_cache_alloc+0x16e/0x330 [ 154.540502][ T4072] ? build_skb+0x2a/0x220 [ 154.545073][ T4072] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 154.550873][ T4072] ? bpf_prog_test_run+0x3e3/0x630 [ 154.556333][ T4072] ? __sys_bpf+0x56d/0x780 [ 154.561435][ T4072] ? __x64_sys_bpf+0x7c/0x90 [ 154.566249][ T4072] ? x64_sys_call+0x488/0x9a0 [ 154.571048][ T4072] ? do_syscall_64+0x4c/0xa0 [ 154.575760][ T4072] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 154.581989][ T4072] ? __kasan_check_read+0x11/0x20 [ 154.587163][ T4072] ? bpf_test_timer_continue+0x147/0x4a0 [ 154.593461][ T4072] bpf_test_run+0x349/0x8d0 [ 154.598293][ T4072] ? __kasan_slab_alloc+0x72/0x80 [ 154.603642][ T4072] ? convert___skb_to_skb+0x5b0/0x5b0 [ 154.609241][ T4072] ? __cfi_eth_type_trans+0x10/0x10 [ 154.614575][ T4072] ? convert___skb_to_skb+0x40/0x5b0 [ 154.620526][ T4072] bpf_prog_test_run_skb+0xaec/0x1290 [ 154.626579][ T4072] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 154.632726][ T4072] bpf_prog_test_run+0x3e3/0x630 [ 154.637972][ T4072] ? slab_free_freelist_hook+0xc2/0x190 [ 154.643830][ T4072] ? bpf_prog_query+0x270/0x270 [ 154.649077][ T4072] ? selinux_bpf+0xce/0xf0 [ 154.653623][ T4072] ? security_bpf+0x93/0xb0 [ 154.658568][ T4072] __sys_bpf+0x56d/0x780 [ 154.662848][ T4072] ? bpf_link_show_fdinfo+0x320/0x320 [ 154.668960][ T4072] ? __cfi_ksys_write+0x10/0x10 [ 154.673982][ T4072] ? debug_smp_processor_id+0x17/0x20 [ 154.679512][ T4072] __x64_sys_bpf+0x7c/0x90 [ 154.684162][ T4072] x64_sys_call+0x488/0x9a0 [ 154.688702][ T4072] do_syscall_64+0x4c/0xa0 [ 154.693400][ T4072] ? clear_bhb_loop+0x30/0x80 [ 154.698265][ T4072] ? clear_bhb_loop+0x30/0x80 [ 154.703461][ T4072] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 154.710695][ T4072] RIP: 0033:0x7fda1798eba9 [ 154.715620][ T4072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.737444][ T4072] RSP: 002b:00007fda1878d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 154.748524][ T4072] RAX: ffffffffffffffda RBX: 00007fda17bd5fa0 RCX: 00007fda1798eba9 [ 154.757356][ T4072] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 154.770051][ T4072] RBP: 00007fda1878d090 R08: 0000000000000000 R09: 0000000000000000 [ 154.780870][ T4072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 154.789589][ T4072] R13: 00007fda17bd6038 R14: 00007fda17bd5fa0 R15: 00007fff8c6f62a8 [ 154.798060][ T4072] [ 154.908463][ T4070] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.090729][ T4131] device syzkaller0 entered promiscuous mode [ 156.534389][ T4171] device sit0 left promiscuous mode [ 157.195851][ T4192] device pim6reg1 entered promiscuous mode [ 160.553435][ T4300] device bridge_slave_1 left promiscuous mode [ 160.596850][ T4300] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.676752][ T4300] device O3ãc¤± left promiscuous mode [ 160.712383][ T4300] bridge0: port 1(O3ãc¤±) entered disabled state [ 161.936385][ T4324] device pim6reg1 entered promiscuous mode [ 162.633228][ T4354] device pim6reg1 entered promiscuous mode [ 162.688314][ T4347] device wg2 entered promiscuous mode [ 162.727834][ T4356] device veth0_vlan left promiscuous mode [ 162.733924][ T4356] device veth0_vlan entered promiscuous mode [ 162.748416][ T2149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.764703][ T2149] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.788010][ T2149] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.955682][ T4381] device pim6reg1 entered promiscuous mode [ 164.967550][ C0] sched: RT throttling activated [ 166.225881][ T4477] device syzkaller0 entered promiscuous mode [ 166.663586][ T4504] device pim6reg1 entered promiscuous mode [ 166.924951][ T4534] bond_slave_1: mtu less than device minimum [ 172.581283][ T4674] device pim6reg1 entered promiscuous mode [ 172.597165][ T4674] device wg2 left promiscuous mode [ 172.648455][ T28] audit: type=1400 audit(1757673215.359:150): avc: denied { ioctl } for pid=4676 comm="syz.2.1264" path="pid:[4026532372]" dev="nsfs" ino=4026532372 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 172.684509][ T4674] device wg2 entered promiscuous mode [ 173.993831][ T4713] device syzkaller0 entered promiscuous mode [ 174.137109][ T4731] device pim6reg1 entered promiscuous mode [ 174.577251][ T4754] device pim6reg1 entered promiscuous mode [ 174.626678][ T28] audit: type=1400 audit(1757673217.339:151): avc: denied { create } for pid=4762 comm="syz.1.1287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 175.907198][ T4818] device wg2 left promiscuous mode [ 176.103102][ T4827] device syzkaller0 entered promiscuous mode [ 176.511119][ T4839] device pim6reg1 entered promiscuous mode [ 176.588295][ T4839] device wg2 entered promiscuous mode [ 176.833014][ T4852] device pim6reg1 entered promiscuous mode [ 177.582765][ T4875] device pim6reg1 entered promiscuous mode [ 178.211941][ T4890] device sit0 left promiscuous mode [ 178.339050][ T4890] device sit0 entered promiscuous mode [ 178.425567][ T4900] device wg2 left promiscuous mode [ 178.842342][ T4900] device wg2 entered promiscuous mode [ 179.148836][ T4912] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 179.197104][ T4912] device syzkaller0 entered promiscuous mode [ 179.341638][ T28] audit: type=1400 audit(1757673222.059:152): avc: denied { read } for pid=4922 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 180.098082][ T28] audit: type=1400 audit(1757673222.809:153): avc: denied { create } for pid=4955 comm="syz.3.1340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 196) OK Stopping crond: stopped /usr/sbin/crond (pid 187) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 141) Stopping network: [ 181.087326][ T28] audit: type=1400 audit(1757673223.799:154): avc: denied { search } for pid=4995 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 181.789327][ T28] audit: type=1400 audit(1757673224.509:155): avc: denied { write } for pid=142 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 181.980372][ T28] audit: type=1400 audit(1757673224.509:156): avc: denied { remove_name } for pid=142 comm="dhcpcd" name="sock" dev="tmpfs" ino=491 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping iptables: OK [ 182.245122][ T28] audit: type=1400 audit(1757673224.509:157): avc: denied { unlink } for pid=142 comm="dhcpcd" name="sock" dev="tmpfs" ino=491 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 Stopping system message bus: [ 182.414795][ T28] audit: type=1400 audit(1757673224.579:158): avc: denied { unlink } for pid=142 comm="dhcpcd" name="pid" dev="tmpfs" ino=490 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 182.504931][ T28] audit: type=1400 audit(1757673224.919:159): avc: denied { search } for pid=5054 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 182.547781][ T28] audit: type=1400 audit(1757673224.919:160): avc: denied { write } for pid=5054 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 done [ 182.611111][ T28] audit: type=1400 audit(1757673224.919:161): avc: denied { add_name } for pid=5054 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 182.714302][ T5080] device pim6reg1 entered promiscuous mode killall: can't kill pid 335: No such process Stopping klogd: OK Stopping acpid: [ 183.174852][ T5080] device wg2 entered promiscuous mode OK Stopping syslogd: stopped /sbin/syslogd (pid 85) OK [ 184.445572][ T5169] device pim6reg1 entered promiscuous mode [ 184.500679][ T5168] device wg2 left promiscuous mode [ 184.546648][ T5168] device wg2 entered promiscuous mode umount: can't remount debugfs read-only [ 184.719360][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 184.719377][ T28] audit: type=1400 audit(1757673227.439:169): avc: denied { module_request } for pid=5177 comm="syz.1.1390" kmod="netdev-bridge_slave_0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only Connection to 10.128.1.25 closed by remote host. The system is going down NOW! Sent SIGTERM to all processes [ 185.107738][ T28] audit: type=1400 audit(1757673227.809:170): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[14324]" dev="pipefs" ino=14324 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 Sent SIGKILL to all processes Requesting system poweroff [ 186.478634][ T364] device ip6gretap0 left promiscuous mode [ 186.484503][ T364] Ÿë: port 1(ip6gretap0) entered disabled state [ 187.038989][ T364] device bridge_slave_1 left promiscuous mode [ 187.045156][ T364] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.052613][ T364] device bridge_slave_0 left promiscuous mode [ 187.058881][ T364] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.066691][ T364] device bridge_slave_1 left promiscuous mode [ 187.072868][ T364] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.080325][ T364] device bridge_slave_0 left promiscuous mode [ 187.086458][ T364] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.095020][ T364] device veth1_macvtap left promiscuous mode [ 187.101162][ T364] device veth0_vlan left promiscuous mode [ 187.107261][ T364] device veth0_vlan left promiscuous mode [ 187.223045][ T5188] kvm: exiting hardware virtualization [ 187.230229][ T5188] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 187.237123][ T5188] ACPI: PM: Preparing to enter system sleep state S5 [ 187.246555][ T5188] reboot: Power down serialport: VM disconnected.