last executing test programs: 35.746805084s ago: executing program 0 (id=1016): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xc, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0) (async) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r4 = syz_clone(0x821400, &(0x7f0000000500)="4e9f00db2d779be5d32dc3b1f9102ce2c349b3cc3053aa03579fc91f047cde48f8b676fd00854d3d7fe860a06e6dfa4d768af9f129102f3c0bc9dd70e3a9304258fdf3fb5eccc6bfb02de302f9e32ebe6b0acf7af341610f1a0b3e22bdfafb56d7", 0x61, &(0x7f0000000300), &(0x7f0000000580), &(0x7f0000000740)="e1173022a3a68b") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000010000000000000000000071120b00000000009500000000000000af4218565a9e885de76920f17150ca5555f97a2758"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) perf_event_open(&(0x7f0000000240)={0x6, 0x80, 0xe, 0xd0, 0x9, 0x3d, 0x0, 0x3, 0x58, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000200), 0x9}, 0x44, 0xd4, 0x5, 0x7, 0x3ff, 0x0, 0x7fff, 0x0, 0xe, 0x0, 0x3}, r4, 0x8, 0xffffffffffffffff, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r5}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffffffffffffbfff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 31.981337322s ago: executing program 0 (id=1016): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xc, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0) (async) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r4 = syz_clone(0x821400, &(0x7f0000000500)="4e9f00db2d779be5d32dc3b1f9102ce2c349b3cc3053aa03579fc91f047cde48f8b676fd00854d3d7fe860a06e6dfa4d768af9f129102f3c0bc9dd70e3a9304258fdf3fb5eccc6bfb02de302f9e32ebe6b0acf7af341610f1a0b3e22bdfafb56d7", 0x61, &(0x7f0000000300), &(0x7f0000000580), &(0x7f0000000740)="e1173022a3a68b") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000010000000000000000000071120b00000000009500000000000000af4218565a9e885de76920f17150ca5555f97a2758"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) perf_event_open(&(0x7f0000000240)={0x6, 0x80, 0xe, 0xd0, 0x9, 0x3d, 0x0, 0x3, 0x58, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000200), 0x9}, 0x44, 0xd4, 0x5, 0x7, 0x3ff, 0x0, 0x7fff, 0x0, 0xe, 0x0, 0x3}, r4, 0x8, 0xffffffffffffffff, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r5}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffffffffffffbfff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 26.818632506s ago: executing program 0 (id=1016): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xc, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0) (async) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r4 = syz_clone(0x821400, &(0x7f0000000500)="4e9f00db2d779be5d32dc3b1f9102ce2c349b3cc3053aa03579fc91f047cde48f8b676fd00854d3d7fe860a06e6dfa4d768af9f129102f3c0bc9dd70e3a9304258fdf3fb5eccc6bfb02de302f9e32ebe6b0acf7af341610f1a0b3e22bdfafb56d7", 0x61, &(0x7f0000000300), &(0x7f0000000580), &(0x7f0000000740)="e1173022a3a68b") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000010000000000000000000071120b00000000009500000000000000af4218565a9e885de76920f17150ca5555f97a2758"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) perf_event_open(&(0x7f0000000240)={0x6, 0x80, 0xe, 0xd0, 0x9, 0x3d, 0x0, 0x3, 0x58, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000200), 0x9}, 0x44, 0xd4, 0x5, 0x7, 0x3ff, 0x0, 0x7fff, 0x0, 0xe, 0x0, 0x3}, r4, 0x8, 0xffffffffffffffff, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r5}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffffffffffffbfff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 9.047827919s ago: executing program 0 (id=1016): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xc, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0) (async) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r4 = syz_clone(0x821400, &(0x7f0000000500)="4e9f00db2d779be5d32dc3b1f9102ce2c349b3cc3053aa03579fc91f047cde48f8b676fd00854d3d7fe860a06e6dfa4d768af9f129102f3c0bc9dd70e3a9304258fdf3fb5eccc6bfb02de302f9e32ebe6b0acf7af341610f1a0b3e22bdfafb56d7", 0x61, &(0x7f0000000300), &(0x7f0000000580), &(0x7f0000000740)="e1173022a3a68b") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000010000000000000000000071120b00000000009500000000000000af4218565a9e885de76920f17150ca5555f97a2758"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) perf_event_open(&(0x7f0000000240)={0x6, 0x80, 0xe, 0xd0, 0x9, 0x3d, 0x0, 0x3, 0x58, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000200), 0x9}, 0x44, 0xd4, 0x5, 0x7, 0x3ff, 0x0, 0x7fff, 0x0, 0xe, 0x0, 0x3}, r4, 0x8, 0xffffffffffffffff, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r5}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffffffffffffbfff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 5.340370707s ago: executing program 0 (id=1016): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xc, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0) (async) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r4 = syz_clone(0x821400, &(0x7f0000000500)="4e9f00db2d779be5d32dc3b1f9102ce2c349b3cc3053aa03579fc91f047cde48f8b676fd00854d3d7fe860a06e6dfa4d768af9f129102f3c0bc9dd70e3a9304258fdf3fb5eccc6bfb02de302f9e32ebe6b0acf7af341610f1a0b3e22bdfafb56d7", 0x61, &(0x7f0000000300), &(0x7f0000000580), &(0x7f0000000740)="e1173022a3a68b") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000010000000000000000000071120b00000000009500000000000000af4218565a9e885de76920f17150ca5555f97a2758"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) perf_event_open(&(0x7f0000000240)={0x6, 0x80, 0xe, 0xd0, 0x9, 0x3d, 0x0, 0x3, 0x58, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000200), 0x9}, 0x44, 0xd4, 0x5, 0x7, 0x3ff, 0x0, 0x7fff, 0x0, 0xe, 0x0, 0x3}, r4, 0x8, 0xffffffffffffffff, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r5}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffffffffffffbfff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 2.89331754s ago: executing program 2 (id=1568): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000009553f12e00710c57"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180300002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r8}, 0x18) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0xa0000, 0x9, 0x0, 0x10214, r7, 0x6, '\x00', r0, r5, 0x2, 0x1, 0x1, 0xa, @void, @value, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRES32], 0xfdef) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r11}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r12}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) write$cgroup_subtree(r10, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033300fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0xd, 0xe, &(0x7f0000000200)=ANY=[@ANYRES16=r2], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, @sock_ops, r10, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0)={0x0, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.86442541s ago: executing program 3 (id=1569): perf_event_open(&(0x7f0000001140)={0x2, 0x80, 0xad, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x80000001, 0x52768c7f}, 0x0, 0x8d05, 0x0, 0x8f12e96a47fe4417, 0xffffffffffffffff, 0x5, 0x97}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001100)={&(0x7f00000010c0)='fsi_master_acf_crc_rsp_error\x00', r1, 0x0, 0x5}, 0x18) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000001000)={0x4, 0x80, 0x42, 0x3, 0x5, 0x0, 0x0, 0x1000, 0x2122, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff, 0x1, @perf_config_ext={0x4, 0x9}, 0x6000, 0xffffffffffffffff, 0x2, 0x2, 0x6, 0x7, 0x0, 0x0, 0x4, 0x0, 0x4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x1000}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0x5, 0x2}, {0xe, 0x1}, {0xa, 0x3}, {0xb, 0x3}, {0xd, 0x3}]}]}}, &(0x7f0000000200)=""/263, 0x2a, 0x107, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8000000000000001, 0x6}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r7}, &(0x7f0000000000), &(0x7f00000005c0)=r8}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r7}, &(0x7f0000000180), &(0x7f0000000280)='%pI4 \x00'}, 0x20) socketpair(0x6, 0x1, 0x1000, &(0x7f0000000200)) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2.757531649s ago: executing program 4 (id=1570): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x16, 0xf, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x10, 0x38, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000340)={r1, r0}, 0xc) 2.678796139s ago: executing program 4 (id=1571): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x61, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000000000400000850000000800000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x2) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r5, 0x0, 0x280) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syz_tun\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8922, &(0x7f0000000080)) 2.678338279s ago: executing program 4 (id=1572): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) perf_event_open(&(0x7f0000000a40)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="090000000700000006000000080000"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000480), &(0x7f0000000380), 0x749b, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='mmap_lock_acquire_returned\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 1.988554647s ago: executing program 3 (id=1574): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x5, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open$cgroup(&(0x7f00000003c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x901, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xd, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd3, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0xb2, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0x17, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [@printk={@d}], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x7b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000400)="5aee41dea43e9eee28e622e563a3", 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000001080)) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[], 0xfdef) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.747215696s ago: executing program 2 (id=1575): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000540)='\x00') r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYRESOCT, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000880)="f2", &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000001c0), 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001000)=@bpf_tracing={0x1a, 0x21, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000cbd3f4002551a53cb400ff07000000cce8ec9f03fd76e01cc335", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000d573e0ff100000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000010085000000060000008500000040000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000080000008500000006000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x5, 0x94, &(0x7f00000008c0)=""/148, 0x41100, 0x53, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x5, 0x90f, 0x9}, 0x10, 0xa576, r4, 0x4, &(0x7f0000000440)=[0xffffffffffffffff, r0, r0], &(0x7f0000000bc0)=[{0x0, 0x2, 0xf, 0x8}, {0x2, 0x5, 0x4, 0x5}, {0x3, 0x3, 0xd, 0x7}, {0x1, 0x4, 0xd, 0x2}], 0x10, 0x2, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x26, &(0x7f0000000dc0)=ANY=[@ANYBLOB="180000000900000000fa5dc7338d5cb64a0000007b00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800002c0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018460000f8ffffff000000000000000055", @ANYRES32=r3, @ANYRES16=r6, @ANYRES32=r3, @ANYRESDEC=r6], 0x0, 0x5, 0x6e, &(0x7f00000009c0)=""/110, 0x40f00, 0x28, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000c40)={0x2, 0xc, 0x7fffffff, 0x7}, 0x10, 0x0, r5, 0x1, &(0x7f0000000c80)=[r3, r3], &(0x7f0000000c00)=[{0x0, 0x2, 0xb, 0x5}], 0x10, 0xe, @void, @value}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f447333de39c7095758218a68bc5142f0cb2229fa6c8b0d7c8126aee6d3def94cd964218564fb1d255bce6cef9bea8322326039744a98eead8c59bc75bb5b42123eef53ae4bc331b0ad09a8efc4175c484ad74df9158ff1882cdd83c97c03a35e91c30a0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071105000000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095", @ANYRES16=r9, @ANYRESDEC, @ANYRES8=r7, @ANYRES8=r5, @ANYRESHEX=r6], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000fc0)=ANY=[], 0x0, 0x4000002, 0x0, 0x0, 0x40f00, 0x64, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r2) 1.508043506s ago: executing program 3 (id=1576): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x12, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x55}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) 1.377665035s ago: executing program 4 (id=1579): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x3abe, 0x0, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x5, 0x0, r5, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) write$cgroup_subtree(r8, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r11}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 1.122426604s ago: executing program 4 (id=1580): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'pim6reg1\x00', 0x1}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'team_slave_0\x00', 0x400}) 1.040218154s ago: executing program 3 (id=1581): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x1, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000020007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000500d5547fc6c7"], &(0x7f0000000340)='syzkaller\x00', 0x9, 0x25, &(0x7f00000009c0)=""/37, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b00)={0x2, 0xa, 0x0, 0xb}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000d00)=[0xffffffffffffffff], &(0x7f0000000d40)=[{0x3, 0x3, 0xc}, {0x1, 0x1, 0x3, 0xc}, {0x4, 0x2, 0xc, 0xe}, {0x3, 0x1, 0xc, 0x8}, {0x2, 0x1, 0x2, 0x1}], 0x10, 0x2, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB="08000000040000000400000022bf000000000000", @ANYRES32, @ANYRESHEX=r5, @ANYRES64=r5, @ANYRES32, @ANYBLOB="0000000004"], 0x48) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_ext={0x1c, 0x19, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000001000000e37339000000000200000018360000050000000000000000000000cf960400ffffffff18", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000003d40004000000001834000004000000000000000000000018150000", @ANYRES32, @ANYBLOB="000000000000000018290000", @ANYRES32=r1, @ANYBLOB="00000000ff7f00009784ffff0000000018170000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x5, 0x65, &(0x7f00000004c0)=""/101, 0x41000, 0x40, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x4, 0x9, 0x4}, 0x10, 0xab92, r2, 0x4, 0x0, &(0x7f0000000580)=[{0x4, 0x4, 0xa}, {0x0, 0x1, 0xf, 0x4}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x3, 0x6, 0x6}], 0x10, 0xff, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x90) 699.716323ms ago: executing program 1 (id=1582): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x9, 0x5, 0x7, 0xc1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r0}, 0x38) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xee, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (async) perf_event_open(0x0, 0xffffffffffffffff, 0x800000000000000, 0xffffffffffffffff, 0x2) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880), 0x0, 0x1, r0}, 0x38) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x40401, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x7101}) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) write$cgroup_devices(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="1e031800dd5c980128854d4a828e00000000002f"], 0xffdd) 698.802933ms ago: executing program 3 (id=1583): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, 0x0, &(0x7f0000000000)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81a01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0xf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000003c0)='\x00') perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000340)={r3, r2}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) socketpair(0x11, 0x2, 0x300, &(0x7f0000000000)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000600), 0x12) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 684.407973ms ago: executing program 1 (id=1584): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, 0x0, &(0x7f0000000300)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000900)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r1, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x20, &(0x7f00000004c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x2b, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x3, [@func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x8, 0x1}, {0x10, 0x5}, {0x1, 0x3}, {0x3}, {0xd, 0x2}, {0x4, 0x5}]}]}, {0x0, [0x5f]}}, &(0x7f0000000bc0)=""/178, 0x57, 0xb2, 0x0, 0xfffffc2e, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c80)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x0, '\x00', r2, r3, 0x1, 0x2, 0x5, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) (async) r6 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) (async) sendmsg$unix(r8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="14"], 0x18}, 0x0) (async) close(r7) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) mkdir(&(0x7f0000000880)='./file0\x00', 0x8) (async) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r10 = syz_clone(0x10000000, &(0x7f0000000680)="bf53afb9583322172436e43627efc32f5f5ca9ded11e9e6d1c82d8605311a1a467ea64a3d88ca9438ea852c548c8ee85c7ed32bbd81521e39d8a0fd70acf33516846cd52df490deff21f5b83c46e5be6d5f10a7d10523db9743a49c1bef7275e221aea05b0abe3fd", 0x68, &(0x7f00000002c0), &(0x7f0000000580), &(0x7f0000000780)="f43ed3c591c0157da591fee3a0b5a11d7cefe13f3201447dc4f2347f077dd71236c46520b71234b0f5a1f164c7ee4ae427e9152697ead241d0b94d0c08d20d99a305fce01b0e56b69ae39638effa5235df9faa09785b51a83ee8ad5ce1eb61e40aaba00e35c14182c841fe8bd7947cf285347be2f65fb7171baac4694acda898b72008514fa37f2df53a01f1a3abad11b039bc47c3e4b3bc3ce2faac9e7748ce44cda695ad0de2fe18268506ce17a9a85673b355c199f9aed172e2d6a23d6859b9417cfe3d21791086085962e18582100647751fb03189c4c44156ddbce5fd1c4f7e406de82610dc3c") perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x4, 0xce, 0x27, 0xff, 0x0, 0xffffffff, 0x8000, 0x6, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x4, 0x9, 0x2, 0x4e0c, 0xfffffb6f, 0x0, 0x0, 0x91, 0x0, 0x1}, r10, 0xb, r6, 0x1) (async) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) close(r11) 683.280433ms ago: executing program 2 (id=1585): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000021c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xba4}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, 0x0, 0xfffffe06) write$cgroup_int(r8, &(0x7f0000000000)=0x3, 0x12) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f00000021c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6d) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0}}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xba4}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) close(r7) (async) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r8, 0x0, 0xfffffe06) (async) write$cgroup_int(r8, &(0x7f0000000000)=0x3, 0x12) (async) 596.029243ms ago: executing program 4 (id=1586): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x12}}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x5}, 0x0, 0x0, 0x1}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="d0210000ffffffff0100"/20, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) write$cgroup_pid(r2, &(0x7f0000000c40), 0x12) 595.625333ms ago: executing program 1 (id=1587): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000140)=@framed={{}, [@printk={@p, {}, {}, {}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x5}, {}, {0x85, 0x0, 0x0, 0x73}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000030000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000a61a7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/163, 0xa3}], 0x300}, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x3, 0x80, 0x8c, 0x58, 0x0, 0x3, 0x0, 0x9, 0x3000, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x4900, 0x6, 0x2, 0x0, 0x3, 0x5, 0x3, 0x0, 0x4, 0x0, 0x7}, r5, 0x10, r3, 0x2) 568.419742ms ago: executing program 2 (id=1588): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001dc0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="fc0b000000000000", @ANYRES32, @ANYBLOB='\x00'/14], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", 0x0, 0x5, r4}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x5b) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000080)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYBLOB='f'], 0x44) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x13, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000005000000000000008100000081b203000200000018110000ff42aa06938580c6bff59e807e3b5544ac039d41a191596c6b4704998d86daa28d81c7a263fe463469a993f9803089ebad4317bf0acf322db33f6f48ee74efa36840c84f3f20431a8647ec47cce8e2f8c9ba70528d57b5b90466f06e78478485316315bfe87346e885190a0ba3ea582faacce621e1704e801d28bb49094ddca7f5d99735cd1a20d213329da2c4d8b33397ea46", @ANYRES32=r3, @ANYBLOB], &(0x7f0000000580)='syzkaller\x00', 0x7, 0x86, &(0x7f00000006c0)=""/134, 0x41000, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x2, 0x10, 0x400, 0x7f}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x14, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r7, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x11, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0x5}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 539.572952ms ago: executing program 1 (id=1589): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000fc0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x18, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000081000000000000000100000018110000", @ANYRES32, @ANYBLOB="000000ff0f000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000600000085100000fdffffff61560800f0ffffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000000221080004000000bf91000000000000b7020000030000008500000085000000b7000000000000009500000000000000"], &(0x7f00000002c0)='GPL\x00', 0x1, 0x90, &(0x7f0000000540)=""/144, 0x41100, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x9, 0x1, 0x9}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000c80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000cc0)=[{0x1, 0x1, 0x2, 0x1}, {0x1, 0x5, 0x10, 0x9}, {0x2, 0x4, 0xc, 0x9}, {0x1, 0x1, 0x1, 0x1}, {0x4, 0x3, 0x3, 0x9}], 0x10, 0x8, @void, @value}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.stat\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x7, &(0x7f0000000480)=ANY=[@ANYBLOB="85100000fcffffffd3470c00ffffffff18110000", @ANYRES32=r2, @ANYBLOB="0000010000000000b7020000000000009fdcf33f958fb54775a8d540e258f750af"], &(0x7f0000000280)='syzkaller\x00', 0x2, 0x16, &(0x7f0000000340)=""/22, 0x40f00, 0x40, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f00000003c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x5, 0x4, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r2, r2, r2, r2], 0x0, 0x10, 0x9, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) write$cgroup_freezer_state(r7, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @local}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000004c0)='mm_collapse_huge_page_swapin\x00', r7, 0x0, 0xffffffffffffffec}, 0x18) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) r9 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r9, r4, 0x0, 0x4, &(0x7f0000000180)='*\xe4-\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000080)) 495.910522ms ago: executing program 3 (id=1590): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="917f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r2, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 494.448032ms ago: executing program 2 (id=1591): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x12, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x55}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) 229.175122ms ago: executing program 1 (id=1592): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x108, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xf, 0x0, 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'wg2\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000340)='sched_switch\x00') bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) sendmsg$inet(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f00000002c0)="05197ca22464ff66c26b6435e24002e36822dc8c892b0d7d8cc3ccd51f855b8fa0eae8c5395bb56c44d179c273d23578662c69c1815bbf16ee84a43e31d42037a04cdce6394ec19720c95f3cb604d7eef8904f89dd185efa3aa2536fa132212168673cfac028c523bafad809e7ef088f80bfd91d7c81c6c15f1ed277564bb0f01f8b60171ff81978246c3f631192467dd55779c445ca12c56d43", 0x9a}, {&(0x7f0000000440)="0a6c2ac29a1e2a429a2cfa8c6ecdc7f4a5441939854b747bbddfb58ce4d6dfbfe6d0a6d5d316fc59b359177b034097a3b243d36707d6574b0b8a0df85fbbf04e89ed9ae92ae56e1c210059ea1c69a1daa0e8d46e90eb0458b24c27d528b191d5148f1a1e072469a1e71bd4aa638eebd6d680579621ad0a47e9580a5711837c89e0678ecba6dfba3631797355738fb08bec96d3aea67a22e31d8c6af23fe69d875fa433eb33f1924a81ac935b83e527e7a91327bd6a3cbadcdfbb448b3782eeadc87efe5a42ab7b6cfded4cfda7e6c919c0f2fd", 0xd3}], 0x2, &(0x7f0000000080)=[@ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x18}, 0x4004000) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa32"], 0xfdef) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES32=r0, @ANYBLOB='\"\x00\x00'], 0x10) 80.393141ms ago: executing program 2 (id=1593): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x4888, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632f77fbac141411e0000601be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) close(0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1200000002000000040000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000202000000064f4d9c9ecf1dd2f8a978b2570577e0f5d2df9632df8fc1028"], 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b00000008000000040000000600000001000000", @ANYRES32, @ANYBLOB="000000000000000000e6614a39883c848713000000000000000000000000000000009dfe25c7f5ea55e51284a9710a97f65e459f4ce2034ebef87fa1e214f30fe7fd0f29d472ba6d6d773a1df6390a45f0b353fab19190c78fdc03a5b4230f963164ba5dd8e61833da578d26b9e06d7a0b6fff67720594cc8ae45e8c41a1808f1e961c28e82185386e1886d204372beda20be878746ec5784016c9204ab426a90e75c51d791847b5511dfaa518fe3d7c728862446bf63527105fe01a1c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000401, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.715761ms ago: executing program 1 (id=1594): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x1, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000020007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000500d5547fc6c7"], &(0x7f0000000340)='syzkaller\x00', 0x9, 0x25, &(0x7f00000009c0)=""/37, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b00)={0x2, 0xa, 0x0, 0xb}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000d00)=[0xffffffffffffffff], &(0x7f0000000d40)=[{0x3, 0x3, 0xc}, {0x1, 0x1, 0x3, 0xc}, {0x4, 0x2, 0xc, 0xe}, {0x3, 0x1, 0xc, 0x8}, {0x2, 0x1, 0x2, 0x1}], 0x10, 0x2, @void, @value}, 0x94) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000200)=ANY=[@ANYBLOB="08000000040000000400000022bf000000000000", @ANYRES32, @ANYRESHEX=r5, @ANYRES64=r5, @ANYRES32, @ANYBLOB="0000000004"], 0x48) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_ext={0x1c, 0x19, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000001000000e37339000000000200000018360000050000000000000000000000cf960400ffffffff18", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000008200000003d40004000000001834000004000000000000000000000018150000", @ANYRES32, @ANYBLOB="000000000000000018290000", @ANYRES32=r1, @ANYBLOB="00000000ff7f00009784ffff0000000018170000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x5, 0x65, &(0x7f00000004c0)=""/101, 0x41000, 0x40, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000380)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x4, 0x9, 0x4}, 0x10, 0xab92, r2, 0x4, 0x0, &(0x7f0000000580)=[{0x4, 0x4, 0xa}, {0x0, 0x1, 0xf, 0x4}, {0x5, 0x5, 0x6, 0x7}, {0x1, 0x3, 0x6, 0x6}], 0x10, 0xff, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x90) 0s ago: executing program 0 (id=1016): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xc, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0) (async) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r4 = syz_clone(0x821400, &(0x7f0000000500)="4e9f00db2d779be5d32dc3b1f9102ce2c349b3cc3053aa03579fc91f047cde48f8b676fd00854d3d7fe860a06e6dfa4d768af9f129102f3c0bc9dd70e3a9304258fdf3fb5eccc6bfb02de302f9e32ebe6b0acf7af341610f1a0b3e22bdfafb56d7", 0x61, &(0x7f0000000300), &(0x7f0000000580), &(0x7f0000000740)="e1173022a3a68b") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000010000000000000000000071120b00000000009500000000000000af4218565a9e885de76920f17150ca5555f97a2758"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) perf_event_open(&(0x7f0000000240)={0x6, 0x80, 0xe, 0xd0, 0x9, 0x3d, 0x0, 0x3, 0x58, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000200), 0x9}, 0x44, 0xd4, 0x5, 0x7, 0x3ff, 0x0, 0x7fff, 0x0, 0xe, 0x0, 0x3}, r4, 0x8, 0xffffffffffffffff, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r5}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2}, 0x0, 0xffffffffffffbfff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) kernel console output (not intermixed with test programs): virt_wifi: link becomes ready [ 33.761247][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 33.769701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.779532][ T300] device veth0_vlan entered promiscuous mode [ 33.788613][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 33.798115][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.816264][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 33.827934][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.839056][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 33.849751][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.861708][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 33.873034][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.889553][ T298] device veth0_vlan entered promiscuous mode [ 33.898231][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.907343][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.920231][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 33.929117][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.942346][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.952686][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.968266][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.978557][ T302] device veth0_vlan entered promiscuous mode [ 33.987050][ T300] device veth1_macvtap entered promiscuous mode [ 34.004243][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.014548][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.028872][ T303] device veth0_vlan entered promiscuous mode [ 34.037397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.046536][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 34.056855][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.069222][ T301] device veth0_vlan entered promiscuous mode [ 34.077598][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.086656][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.098815][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.107054][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.117000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.128488][ T298] device veth1_macvtap entered promiscuous mode [ 34.144551][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.153702][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 34.163215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.172685][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.191889][ T302] device veth1_macvtap entered promiscuous mode [ 34.201362][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 34.210236][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.220057][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 34.245534][ T300] request_module fs-gadgetfs succeeded, but still no fs? [ 34.250734][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.263717][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.281373][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.294653][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.306264][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 34.318180][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.330437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.341523][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.353621][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 34.364880][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.376883][ T301] device veth1_macvtap entered promiscuous mode [ 34.410279][ T303] device veth1_macvtap entered promiscuous mode [ 34.426434][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 34.439031][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 34.449147][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.462466][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.475812][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.486574][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.498005][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.508772][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.539880][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 34.550240][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.567029][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.579675][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.709806][ C0] hrtimer: interrupt took 31616 ns [ 34.934088][ T338] device syzkaller0 entered promiscuous mode [ 34.965530][ T343] device veth0_vlan left promiscuous mode [ 34.973014][ T343] device veth0_vlan entered promiscuous mode [ 35.400734][ T350] device syzkaller0 entered promiscuous mode [ 35.704360][ T356] device syzkaller0 entered promiscuous mode [ 36.245579][ T368] device syzkaller0 entered promiscuous mode [ 36.373949][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 36.373970][ T30] audit: type=1400 audit(1737202263.407:112): avc: denied { read } for pid=371 comm="syz.2.14" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.430903][ T30] audit: type=1400 audit(1737202263.407:113): avc: denied { open } for pid=371 comm="syz.2.14" path="/dev/ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.470881][ T30] audit: type=1400 audit(1737202263.407:114): avc: denied { ioctl } for pid=371 comm="syz.2.14" path="/dev/ppp" dev="devtmpfs" ino=149 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.560641][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.565246][ T30] audit: type=1400 audit(1737202263.597:115): avc: denied { confidentiality } for pid=379 comm="syz.1.16" lockdown_reason="use of bpf to read kernel RAM" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 36.568172][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.696568][ T380] device bridge_slave_1 left promiscuous mode [ 36.705104][ T380] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.714791][ T380] device bridge_slave_0 left promiscuous mode [ 36.738137][ T380] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.118673][ T386] device syzkaller0 entered promiscuous mode [ 37.469125][ T385] device syzkaller0 entered promiscuous mode [ 38.657606][ T30] audit: type=1400 audit(1737202265.687:116): avc: denied { create } for pid=403 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 40.315877][ T432] device syzkaller0 entered promiscuous mode [ 41.078238][ T449] device syzkaller0 entered promiscuous mode [ 41.090444][ T30] audit: type=1400 audit(1737202268.137:117): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 41.622973][ T455] device syzkaller0 entered promiscuous mode [ 41.841022][ T459] device syzkaller0 entered promiscuous mode [ 41.905233][ T454] device syzkaller0 entered promiscuous mode [ 42.547396][ T472] device syzkaller0 entered promiscuous mode [ 42.612057][ T476] device veth0_vlan left promiscuous mode [ 42.620047][ T476] device veth0_vlan entered promiscuous mode [ 42.652089][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.683022][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.704834][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.035234][ T485] device syzkaller0 entered promiscuous mode [ 43.319262][ T483] device syzkaller0 entered promiscuous mode [ 43.628841][ T30] audit: type=1400 audit(1737202270.667:118): avc: denied { read } for pid=497 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 44.001949][ T30] audit: type=1400 audit(1737202270.717:119): avc: denied { cpu } for pid=497 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 45.605688][ T528] device syzkaller0 entered promiscuous mode [ 46.020610][ T537] device syzkaller0 entered promiscuous mode [ 46.376535][ T30] audit: type=1400 audit(1737202273.417:120): avc: denied { setopt } for pid=550 comm="syz.3.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 47.513716][ T101] udevd[101]: worker [324] terminated by signal 33 (Unknown signal 33) [ 47.599943][ T101] udevd[101]: worker [324] failed while handling '/devices/virtual/block/loop4' [ 50.451744][ T30] audit: type=1400 audit(1737202277.497:121): avc: denied { create } for pid=652 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 50.627529][ T30] audit: type=1400 audit(1737202277.667:122): avc: denied { write } for pid=647 comm="syz.3.97" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 51.017599][ T30] audit: type=1400 audit(1737202278.057:123): avc: denied { create } for pid=661 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 51.080084][ T663] device pim6reg1 entered promiscuous mode [ 51.287156][ T30] audit: type=1400 audit(1737202278.327:124): avc: denied { create } for pid=671 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 51.314664][ T672] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.329753][ T672] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.350021][ T30] audit: type=1400 audit(1737202279.377:125): avc: denied { create } for pid=704 comm="syz.4.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 52.408854][ T705] device sit0 entered promiscuous mode [ 54.156847][ T714] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 54.231259][ T722] syz.2.118[722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.231369][ T722] syz.2.118[722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.262630][ T633] syz.2.91 (633) used greatest stack depth: 21880 bytes left [ 54.436573][ T734] device bridge0 entered promiscuous mode [ 55.021980][ T760] device syzkaller0 entered promiscuous mode [ 55.050013][ T30] audit: type=1400 audit(1737202282.087:126): avc: denied { relabelfrom } for pid=759 comm="syz.3.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 55.091101][ T30] audit: type=1400 audit(1737202282.087:127): avc: denied { relabelto } for pid=759 comm="syz.3.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 55.388009][ T772] device pim6reg1 entered promiscuous mode [ 55.456284][ T776] device wg2 entered promiscuous mode [ 56.342539][ T833] syz.4.149 (833) used obsolete PPPIOCDETACH ioctl [ 56.608210][ T848] device sit0 entered promiscuous mode [ 57.156894][ T857] syz.4.157[857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.157029][ T857] syz.4.157[857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.482699][ T30] audit: type=1400 audit(1737202284.527:128): avc: denied { create } for pid=868 comm="syz.3.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 57.542302][ T30] audit: type=1400 audit(1737202284.577:129): avc: denied { create } for pid=855 comm="syz.4.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 57.737617][ T889] device sit0 entered promiscuous mode [ 58.031047][ T907] device sit0 left promiscuous mode [ 58.222289][ T909] device sit0 entered promiscuous mode [ 58.319516][ T30] audit: type=1400 audit(1737202285.357:130): avc: denied { create } for pid=916 comm="syz.3.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 58.796767][ T931] device sit0 left promiscuous mode [ 58.815363][ T933] device sit0 entered promiscuous mode [ 59.751259][ T954] Ÿë: port 1(veth0_to_team) entered blocking state [ 59.830220][ T954] Ÿë: port 1(veth0_to_team) entered disabled state [ 59.870585][ T954] device veth0_to_team entered promiscuous mode [ 61.434923][ T996] device veth0_vlan left promiscuous mode [ 61.444063][ T30] audit: type=1400 audit(1737202288.477:131): avc: denied { create } for pid=990 comm="syz.4.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 61.450992][ T996] device veth0_vlan entered promiscuous mode [ 61.501727][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.517444][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.580639][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.644896][ T992] device macsec0 entered promiscuous mode [ 61.802736][ T30] audit: type=1400 audit(1737202288.847:132): avc: denied { create } for pid=1008 comm="syz.0.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 61.973338][ T1002] device syzkaller0 entered promiscuous mode [ 62.156300][ T30] audit: type=1400 audit(1737202289.197:133): avc: denied { create } for pid=1018 comm="syz.2.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 62.266535][ T1016] device syzkaller0 entered promiscuous mode [ 62.645030][ T30] audit: type=1400 audit(1737202289.687:134): avc: denied { setopt } for pid=1024 comm="syz.0.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 62.647823][ T1021] device syzkaller0 entered promiscuous mode [ 63.156713][ T1032] device veth0_vlan left promiscuous mode [ 63.163995][ T1032] device veth0_vlan entered promiscuous mode [ 63.172966][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.188666][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 63.212203][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.509490][ T1066] device syzkaller0 entered promiscuous mode [ 65.418607][ T30] audit: type=1400 audit(1737202292.457:135): avc: denied { read } for pid=1100 comm="syz.3.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 65.509193][ T30] audit: type=1400 audit(1737202292.507:136): avc: denied { write } for pid=1100 comm="syz.3.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 65.612850][ T30] audit: type=1400 audit(1737202292.657:137): avc: denied { ioctl } for pid=1104 comm="syz.3.228" path="socket:[18767]" dev="sockfs" ino=18767 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 66.079795][ C1] sched: RT throttling activated [ 67.788258][ T1113] device syzkaller0 entered promiscuous mode [ 67.966067][ T1120] device veth0_vlan left promiscuous mode [ 68.009039][ T1120] device veth0_vlan entered promiscuous mode [ 68.133560][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.178123][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.206035][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.208087][ T1151] device veth0_vlan left promiscuous mode [ 69.239030][ T1151] device veth0_vlan entered promiscuous mode [ 69.248002][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.275909][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.301217][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.387082][ T30] audit: type=1400 audit(1737202296.427:138): avc: denied { create } for pid=1169 comm="syz.3.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 69.583125][ T1167] device syzkaller0 entered promiscuous mode [ 69.813176][ T1166] device syzkaller0 entered promiscuous mode [ 70.203572][ T1196] bond_slave_1: mtu less than device minimum [ 70.270712][ T1198] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 70.345133][ T1198] syz.3.258[1198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.356255][ T1198] syz.3.258[1198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.667904][ T1209] device sit0 entered promiscuous mode [ 71.048931][ T1215] device sit0 left promiscuous mode [ 73.048882][ T1233] device veth1_macvtap left promiscuous mode [ 73.061115][ T30] audit: type=1400 audit(1737202300.107:139): avc: denied { create } for pid=1234 comm="syz.2.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 73.091000][ T1233] device macsec0 entered promiscuous mode [ 73.423109][ T1263] device sit0 entered promiscuous mode [ 75.039394][ T1311] device sit0 left promiscuous mode [ 75.375469][ T1321] device veth0_vlan left promiscuous mode [ 75.382730][ T1321] device veth0_vlan entered promiscuous mode [ 75.395382][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 75.415979][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 75.432211][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 75.541987][ T1325] device pim6reg1 entered promiscuous mode [ 75.587572][ T30] audit: type=1400 audit(1737202302.627:140): avc: denied { tracepoint } for pid=1327 comm="syz.4.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 76.846750][ T30] audit: type=1400 audit(1737202303.887:141): avc: denied { write } for pid=1405 comm="syz.2.314" name="cgroup.subtree_control" dev="cgroup2" ino=302 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 76.930165][ T30] audit: type=1400 audit(1737202303.937:142): avc: denied { open } for pid=1405 comm="syz.2.314" path="" dev="cgroup2" ino=302 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 78.964684][ T1498] device pim6reg1 entered promiscuous mode [ 79.022972][ T1493] ªªªªªª: renamed from vlan0 [ 80.601328][ T30] audit: type=1400 audit(1737202307.647:143): avc: denied { create } for pid=1566 comm="syz.2.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 80.638660][ T1564] device pim6reg1 entered promiscuous mode [ 80.690608][ T1569] device sit0 left promiscuous mode [ 80.832170][ T1578] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.869975][ T30] audit: type=1400 audit(1737202307.907:144): avc: denied { create } for pid=1580 comm="syz.0.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 82.166214][ T1603] syz.0.363 (1603) used greatest stack depth: 21536 bytes left [ 82.915912][ T1637] device veth0_vlan left promiscuous mode [ 83.127274][ T1637] device veth0_vlan entered promiscuous mode [ 83.301306][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 83.318494][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 83.344839][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 84.350290][ T1684] device pim6reg1 entered promiscuous mode [ 84.445727][ T30] audit: type=1400 audit(1737202311.487:145): avc: denied { create } for pid=1683 comm="syz.2.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 84.605795][ T1695] device syzkaller0 entered promiscuous mode [ 84.859919][ T1714] device veth0_vlan left promiscuous mode [ 84.879361][ T1714] device veth0_vlan entered promiscuous mode [ 84.917963][ T1723] device veth0_vlan left promiscuous mode [ 84.936786][ T1723] device veth0_vlan entered promiscuous mode [ 84.946284][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.971047][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 84.981111][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.939455][ T30] audit: type=1400 audit(1737202312.977:146): avc: denied { create } for pid=1830 comm="syz.1.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 86.249036][ T1833] device syzkaller0 entered promiscuous mode [ 86.856815][ T1884] device pim6reg1 entered promiscuous mode [ 89.144252][ T1942] device sit0 entered promiscuous mode [ 89.468492][ T1940] device sit0 left promiscuous mode [ 91.632488][ T1993] device veth0_vlan left promiscuous mode [ 91.691758][ T1993] device veth0_vlan entered promiscuous mode [ 91.740607][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.792968][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.805475][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.858074][ T2000] device veth0_vlan left promiscuous mode [ 91.864735][ T2000] device veth0_vlan entered promiscuous mode [ 91.874700][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.884841][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.902993][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 92.009205][ T30] audit: type=1400 audit(1737202319.047:147): avc: denied { create } for pid=2010 comm="syz.4.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 92.243632][ T30] audit: type=1400 audit(1737202319.287:148): avc: denied { create } for pid=2025 comm="syz.2.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 92.735978][ T2036] device veth1_macvtap left promiscuous mode [ 92.760359][ T2036] device macsec0 entered promiscuous mode [ 92.831015][ T2041] bond_slave_1: mtu less than device minimum [ 92.951300][ T2054] device wg2 entered promiscuous mode [ 93.503892][ T2076] device syzkaller0 entered promiscuous mode [ 93.583126][ T2082] device syzkaller0 entered promiscuous mode [ 94.549747][ T2118] device veth0_vlan left promiscuous mode [ 94.557152][ T2118] device veth0_vlan entered promiscuous mode [ 94.867873][ T2133] device syzkaller0 entered promiscuous mode [ 95.024572][ T2159] device syzkaller0 entered promiscuous mode [ 95.201958][ T30] audit: type=1400 audit(1737202322.237:149): avc: denied { create } for pid=2179 comm="syz.1.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 95.226103][ T30] audit: type=1400 audit(1737202322.247:150): avc: denied { create } for pid=2179 comm="syz.1.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 95.333363][ T2182] device wg2 left promiscuous mode [ 95.380906][ T30] audit: type=1400 audit(1737202322.427:151): avc: denied { create } for pid=2186 comm="syz.3.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 95.424371][ T2182] device wg2 entered promiscuous mode [ 95.470612][ T2187] device syzkaller0 entered promiscuous mode [ 95.549404][ T2195] device sit0 left promiscuous mode [ 95.631045][ T2195] device sit0 entered promiscuous mode [ 95.976259][ T30] audit: type=1400 audit(1737202323.017:152): avc: denied { create } for pid=2223 comm="syz.4.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 96.042011][ T30] audit: type=1400 audit(1737202323.087:153): avc: denied { append } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 96.179063][ T30] audit: type=1400 audit(1737202323.087:154): avc: denied { open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 96.282479][ T30] audit: type=1400 audit(1737202323.087:155): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 96.777379][ T2267] device syzkaller0 entered promiscuous mode [ 97.162012][ T2270] device syzkaller0 entered promiscuous mode [ 97.288423][ T2294] device syzkaller0 entered promiscuous mode [ 97.428991][ T2305] tun0: tun_chr_ioctl cmd 1074025677 [ 97.439955][ T2305] tun0: linktype set to 270 [ 97.559137][ T30] audit: type=1400 audit(1737202324.597:156): avc: denied { append } for pid=2309 comm="syz.4.566" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 98.064213][ T2337] device pim6reg1 entered promiscuous mode [ 98.626403][ T2345] device syzkaller0 entered promiscuous mode [ 98.835334][ T2374] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.879422][ T2407] device syzkaller0 entered promiscuous mode [ 100.543542][ T2475] device wg2 left promiscuous mode [ 102.190926][ T30] audit: type=1400 audit(1737202329.237:157): avc: denied { create } for pid=2541 comm="syz.0.629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 102.388399][ T2551] device pim6reg1 entered promiscuous mode [ 102.520376][ T2565] bond_slave_1: mtu less than device minimum [ 102.532741][ T2566] device veth1_macvtap left promiscuous mode [ 102.540170][ T2566] device macsec0 entered promiscuous mode [ 102.905949][ T2581] device wg2 entered promiscuous mode [ 105.488061][ T2634] device syzkaller0 entered promiscuous mode [ 105.571732][ T2645] device veth0_vlan left promiscuous mode [ 105.578967][ T2645] device veth0_vlan entered promiscuous mode [ 105.588184][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.602902][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.612345][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.885901][ T2662] device syzkaller0 entered promiscuous mode [ 106.530735][ T2683] device syzkaller0 entered promiscuous mode [ 106.688099][ T2703] device sit0 left promiscuous mode [ 108.210255][ T2785] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.220315][ T2785] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.318214][ T2785] device bridge0 left promiscuous mode [ 108.384924][ T2796] device bridge_slave_1 left promiscuous mode [ 108.403292][ T2796] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.422193][ T2796] device bridge_slave_0 left promiscuous mode [ 108.434280][ T2796] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.001231][ T30] audit: type=1400 audit(1737202336.047:158): avc: denied { create } for pid=2829 comm="syz.3.712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 109.009164][ T2831] device syzkaller0 entered promiscuous mode [ 110.735246][ T2903] FAULT_INJECTION: forcing a failure. [ 110.735246][ T2903] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 110.899949][ T2903] CPU: 0 PID: 2903 Comm: syz.2.732 Not tainted 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 110.911516][ T2903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 110.923145][ T2903] Call Trace: [ 110.926686][ T2903] [ 110.931403][ T2903] dump_stack_lvl+0x151/0x1c0 [ 110.938021][ T2903] ? io_uring_drop_tctx_refs+0x190/0x190 [ 110.944945][ T2903] ? kstrtouint_from_user+0x20a/0x2a0 [ 110.951731][ T2903] dump_stack+0x15/0x20 [ 110.955900][ T2903] should_fail+0x3c6/0x510 [ 110.960504][ T2903] should_fail_usercopy+0x1a/0x20 [ 110.966823][ T2903] _copy_to_user+0x20/0x90 [ 110.971629][ T2903] simple_read_from_buffer+0xc7/0x150 [ 110.978859][ T2903] proc_fail_nth_read+0x1a3/0x210 [ 110.985295][ T2903] ? proc_fault_inject_write+0x390/0x390 [ 110.992349][ T2903] ? fsnotify_perm+0x269/0x5b0 [ 110.998686][ T2903] ? security_file_permission+0x86/0xb0 [ 111.005292][ T2903] ? proc_fault_inject_write+0x390/0x390 [ 111.012925][ T2903] vfs_read+0x27d/0xd40 [ 111.017884][ T2903] ? kernel_read+0x1f0/0x1f0 [ 111.024163][ T2903] ? __kasan_check_write+0x14/0x20 [ 111.030350][ T2903] ? mutex_lock+0xb6/0x1e0 [ 111.035734][ T2903] ? wait_for_completion_killable_timeout+0x10/0x10 [ 111.043856][ T2903] ? __fdget_pos+0x2e7/0x3a0 [ 111.050544][ T2903] ? ksys_read+0x77/0x2c0 [ 111.055280][ T2903] ksys_read+0x199/0x2c0 [ 111.059884][ T2903] ? vfs_write+0x1110/0x1110 [ 111.064965][ T2903] ? debug_smp_processor_id+0x17/0x20 [ 111.071751][ T2903] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 111.079558][ T2903] __x64_sys_read+0x7b/0x90 [ 111.084894][ T2903] x64_sys_call+0x28/0x9a0 [ 111.090627][ T2903] do_syscall_64+0x3b/0xb0 [ 111.095873][ T2903] ? clear_bhb_loop+0x35/0x90 [ 111.101423][ T2903] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 111.109271][ T2903] RIP: 0033:0x7fb7e55d573c [ 111.113952][ T2903] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 111.135507][ T2903] RSP: 002b:00007fb7e3c48030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 111.145008][ T2903] RAX: ffffffffffffffda RBX: 00007fb7e57c6fa0 RCX: 00007fb7e55d573c [ 111.154480][ T2903] RDX: 000000000000000f RSI: 00007fb7e3c480a0 RDI: 0000000000000007 [ 111.164156][ T2903] RBP: 00007fb7e3c48090 R08: 0000000000000000 R09: 0000000000000000 [ 111.174193][ T2903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.183372][ T2903] R13: 0000000000000000 R14: 00007fb7e57c6fa0 R15: 00007ffe763123d8 [ 111.193784][ T2903] [ 111.473333][ T2907] device syzkaller0 entered promiscuous mode [ 112.164011][ T2926] device syzkaller0 entered promiscuous mode [ 112.400308][ T2930] syz.0.742[2930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.400386][ T2930] syz.0.742[2930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.298994][ T2977] device syzkaller0 entered promiscuous mode [ 113.775585][ T2981] device syzkaller0 entered promiscuous mode [ 114.161582][ T2990] device syzkaller0 entered promiscuous mode [ 114.370359][ T3006] Â: renamed from pim6reg1 [ 114.429543][ T3019] device pim6reg1 entered promiscuous mode [ 115.380916][ T3080] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.642185][ T3087] device bridge_slave_1 left promiscuous mode [ 115.649209][ T3087] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.658898][ T3087] device bridge_slave_0 left promiscuous mode [ 115.666670][ T3087] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.711031][ T3092] netpci0: tun_chr_ioctl cmd 1074025676 [ 115.717329][ T3092] netpci0: owner set to 0 [ 115.739875][ T30] audit: type=1400 audit(1737202342.767:159): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 115.774617][ T30] audit: type=1400 audit(1737202342.767:160): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 115.803696][ T30] audit: type=1400 audit(1737202342.767:161): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 117.043137][ T3124] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 117.260988][ T3131] device veth0_vlan left promiscuous mode [ 117.268673][ T3131] device veth0_vlan entered promiscuous mode [ 117.276776][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 117.287637][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 117.306025][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 117.726646][ T3156] device macsec0 left promiscuous mode [ 117.917169][ T3156] device veth1_macvtap entered promiscuous mode [ 117.926375][ T3156] device macsec0 entered promiscuous mode [ 117.955482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 118.308658][ T3182] device syzkaller0 entered promiscuous mode [ 118.691310][ T3206] device veth0_vlan left promiscuous mode [ 118.708612][ T3206] device veth0_vlan entered promiscuous mode [ 118.783390][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.795109][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.817937][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 119.553201][ T3228] ªªªªªª: renamed from vlan0 [ 119.877801][ T3230] device syzkaller0 entered promiscuous mode [ 121.389388][ T3280] device syzkaller0 entered promiscuous mode [ 122.659417][ T3341] device syzkaller0 entered promiscuous mode [ 123.239701][ T3387] FAULT_INJECTION: forcing a failure. [ 123.239701][ T3387] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 123.387772][ T3387] CPU: 1 PID: 3387 Comm: syz.2.865 Not tainted 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 123.399326][ T3387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 123.411236][ T3387] Call Trace: [ 123.414969][ T3387] [ 123.418149][ T3387] dump_stack_lvl+0x151/0x1c0 [ 123.423675][ T3387] ? io_uring_drop_tctx_refs+0x190/0x190 [ 123.430225][ T3387] ? __kasan_check_write+0x14/0x20 [ 123.436122][ T3387] dump_stack+0x15/0x20 [ 123.441075][ T3387] should_fail+0x3c6/0x510 [ 123.446118][ T3387] should_fail_usercopy+0x1a/0x20 [ 123.452087][ T3387] _copy_from_user+0x20/0xd0 [ 123.456665][ T3387] br_ioctl_stub+0x2b7/0x8d0 [ 123.461759][ T3387] ? br_dev_siocdevprivate+0x1cf0/0x1cf0 [ 123.468568][ T3387] ? __kasan_check_write+0x14/0x20 [ 123.473824][ T3387] ? mutex_lock+0xb6/0x1e0 [ 123.478154][ T3387] ? file_end_write+0x1c0/0x1c0 [ 123.482839][ T3387] ? wait_for_completion_killable_timeout+0x10/0x10 [ 123.489359][ T3387] ? selinux_file_ioctl+0x3cc/0x540 [ 123.494676][ T3387] ? br_dev_siocdevprivate+0x1cf0/0x1cf0 [ 123.500872][ T3387] sock_ioctl+0x291/0x740 [ 123.505937][ T3387] ? sock_poll+0x400/0x400 [ 123.510798][ T3387] ? __fget_files+0x31e/0x380 [ 123.516474][ T3387] ? security_file_ioctl+0x84/0xb0 [ 123.522135][ T3387] ? sock_poll+0x400/0x400 [ 123.527103][ T3387] __se_sys_ioctl+0x114/0x190 [ 123.532566][ T3387] __x64_sys_ioctl+0x7b/0x90 [ 123.537667][ T3387] x64_sys_call+0x98/0x9a0 [ 123.542184][ T3387] do_syscall_64+0x3b/0xb0 [ 123.546739][ T3387] ? clear_bhb_loop+0x35/0x90 [ 123.551550][ T3387] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 123.557686][ T3387] RIP: 0033:0x7fb7e55d6d29 [ 123.562191][ T3387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.583819][ T3387] RSP: 002b:00007fb7e3c27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 123.594081][ T3387] RAX: ffffffffffffffda RBX: 00007fb7e57c7080 RCX: 00007fb7e55d6d29 [ 123.602768][ T3387] RDX: 0000000020000080 RSI: 00000000000089a0 RDI: 000000000000000e [ 123.612163][ T3387] RBP: 00007fb7e3c27090 R08: 0000000000000000 R09: 0000000000000000 [ 123.621610][ T3387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 123.630038][ T3387] R13: 0000000000000000 R14: 00007fb7e57c7080 R15: 00007ffe763123d8 [ 123.639173][ T3387] [ 124.417926][ T3422] device syzkaller0 entered promiscuous mode [ 124.454144][ T3437] device veth0_vlan left promiscuous mode [ 124.494968][ T3437] device veth0_vlan entered promiscuous mode [ 124.560804][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 124.579332][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 124.607508][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 124.702277][ T3465] syzkaller0: tun_chr_ioctl cmd 35111 [ 124.716495][ T3465] syzkaller0: tun_chr_ioctl cmd 1074025698 [ 124.847537][ T3470] device syzkaller0 entered promiscuous mode [ 126.281953][ T3512] device syzkaller0 entered promiscuous mode [ 126.345866][ T3537] bond_slave_1: mtu less than device minimum [ 126.378470][ T3540] device sit0 entered promiscuous mode [ 127.392406][ T3597] device syzkaller0 entered promiscuous mode [ 127.922246][ T3639] device sit0 left promiscuous mode [ 128.033844][ T3641] device sit0 entered promiscuous mode [ 128.877828][ T3668] device syzkaller0 entered promiscuous mode [ 129.049476][ T3666] device syzkaller0 entered promiscuous mode [ 129.075964][ T3671] bond_slave_1: mtu less than device minimum [ 129.455533][ T3683] device veth1_macvtap left promiscuous mode [ 129.767730][ T3699] device sit0 entered promiscuous mode [ 130.648454][ T3729] device syzkaller0 entered promiscuous mode [ 130.961993][ T3744] device syzkaller0 entered promiscuous mode [ 132.363081][ T3780] device syzkaller0 entered promiscuous mode [ 132.734682][ T3787] device syzkaller0 entered promiscuous mode [ 133.761765][ T3827] device syzkaller0 entered promiscuous mode [ 135.249293][ T298] syz-executor (298) used greatest stack depth: 20000 bytes left [ 136.460803][ T3928] device syzkaller0 entered promiscuous mode [ 136.645296][ T3943] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 136.728447][ T3914] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.738327][ T3914] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.756701][ T3914] device bridge_slave_0 entered promiscuous mode [ 136.781262][ T3914] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.813998][ T3914] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.833377][ T3914] device bridge_slave_1 entered promiscuous mode [ 137.163622][ T3978] syz.4.1035[3978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.166980][ T3978] syz.4.1035[3978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.186396][ T3914] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.205177][ T3914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.212684][ T3914] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.220168][ T3914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.319443][ T3982] device sit0 left promiscuous mode [ 137.355756][ T3984] device sit0 entered promiscuous mode [ 137.529560][ T347] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.539241][ T347] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.552127][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.563676][ T347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.574944][ T45] device bridge_slave_1 left promiscuous mode [ 137.582228][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.590971][ T45] device bridge_slave_0 left promiscuous mode [ 137.598014][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.767436][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.790557][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.797978][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.813634][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.823714][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.830967][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.857949][ T3914] device veth0_vlan entered promiscuous mode [ 137.883102][ T3914] device veth1_macvtap entered promiscuous mode [ 137.913436][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 137.975444][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.024238][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.081729][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.148533][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 138.217147][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.287637][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 138.360547][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.433857][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 138.473194][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 138.486250][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 138.502734][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.517166][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.541516][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 138.557237][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.576143][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.587664][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.632580][ T30] audit: type=1400 audit(1737202365.677:162): avc: denied { mounton } for pid=3914 comm="syz-executor" path="/root/syzkaller.CNK5cI/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 138.861122][ T30] audit: type=1400 audit(1737202365.677:163): avc: denied { mount } for pid=3914 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 139.020401][ T30] audit: type=1400 audit(1737202365.707:164): avc: denied { mounton } for pid=3914 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 139.254859][ T30] audit: type=1400 audit(1737202366.297:165): avc: denied { create } for pid=4034 comm="syz.2.1053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 139.905841][ T4042] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.919888][ T4042] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.927560][ T4042] device bridge_slave_0 entered promiscuous mode [ 139.940710][ T4042] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.959045][ T4042] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.967687][ T4042] device bridge_slave_1 entered promiscuous mode [ 140.582201][ T45] device bridge_slave_1 left promiscuous mode [ 140.588447][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.656806][ T45] device bridge_slave_0 left promiscuous mode [ 140.707153][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.789989][ T45] device veth1_macvtap left promiscuous mode [ 140.796081][ T45] device veth0_vlan left promiscuous mode [ 141.000975][ T4079] device dummy0 entered promiscuous mode [ 141.058800][ T4080] device sit0 left promiscuous mode [ 141.179363][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 141.189094][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.211857][ T4083] device sit0 entered promiscuous mode [ 141.460174][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 141.468531][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.490174][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.497191][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.529885][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 141.542266][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.554189][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.561985][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.571815][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 141.591812][ T4097] device sit0 entered promiscuous mode [ 141.877203][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 141.885563][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.893947][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 141.902299][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.911053][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 141.919404][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.958395][ T4042] device veth0_vlan entered promiscuous mode [ 141.970956][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 141.982104][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.011218][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.018913][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.042226][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 142.070283][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 142.151014][ T4115] bond_slave_1: mtu less than device minimum [ 142.215117][ T4042] device veth1_macvtap entered promiscuous mode [ 142.264363][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 142.272548][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 142.284420][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 142.337999][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 142.387031][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 142.665239][ T4139] device veth0_vlan left promiscuous mode [ 142.688148][ T4139] device veth0_vlan entered promiscuous mode [ 142.903241][ T4144] device syzkaller0 entered promiscuous mode [ 143.067613][ T4148] device syzkaller0 entered promiscuous mode [ 143.327107][ T4170] device syzkaller0 entered promiscuous mode [ 143.483100][ T4177] netpci0: tun_chr_ioctl cmd 1074025676 [ 143.489157][ T4177] netpci0: owner set to 0 [ 143.531992][ T4149] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.538863][ T4149] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.550422][ T4149] device bridge_slave_0 entered promiscuous mode [ 143.618754][ T4149] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.626824][ T4149] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.637922][ T4149] device bridge_slave_1 entered promiscuous mode [ 143.882354][ T4149] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.889243][ T4149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.896633][ T4149] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.903851][ T4149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.961315][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.990088][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.100543][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.135176][ T4193] device veth1_macvtap left promiscuous mode [ 144.169937][ T4193] device macsec0 left promiscuous mode [ 144.262877][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.276736][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.283943][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.300775][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.313762][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.321171][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.334489][ T4200] device veth1_macvtap entered promiscuous mode [ 144.349684][ T4200] device macsec0 entered promiscuous mode [ 144.402754][ T4202] device syzkaller0 entered promiscuous mode [ 144.433082][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.445227][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 144.454826][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.550454][ T4204] device syzkaller0 entered promiscuous mode [ 144.596056][ T4207] device syzkaller0 entered promiscuous mode [ 144.620847][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 144.630729][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.658705][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 144.667964][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 144.708518][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 144.719594][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.737251][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.747585][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 144.761508][ T4149] device veth0_vlan entered promiscuous mode [ 144.809497][ T4231] device syzkaller0 entered promiscuous mode [ 144.927249][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 144.936254][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 144.949059][ T4149] device veth1_macvtap entered promiscuous mode [ 144.971176][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 144.979260][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 144.988453][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 145.029729][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 145.062406][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 145.133514][ T45] device bridge_slave_1 left promiscuous mode [ 145.139694][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.157102][ T45] device bridge_slave_0 left promiscuous mode [ 145.172746][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.191957][ T45] device veth1_macvtap left promiscuous mode [ 145.197905][ T45] device veth0_vlan left promiscuous mode [ 145.945117][ T4269] device veth0_vlan left promiscuous mode [ 146.002509][ T4269] device veth0_vlan entered promiscuous mode [ 146.150301][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 146.186961][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 146.285345][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 146.837771][ T4281] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.845196][ T4281] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.852881][ T4281] device bridge_slave_0 entered promiscuous mode [ 146.862738][ T45] device bridge_slave_1 left promiscuous mode [ 146.868811][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.876913][ T45] device bridge_slave_0 left promiscuous mode [ 146.884341][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.892717][ T45] device veth1_macvtap left promiscuous mode [ 146.898646][ T45] device veth0_vlan left promiscuous mode [ 146.981603][ T4281] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.988771][ T4281] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.996365][ T4281] device bridge_slave_1 entered promiscuous mode [ 147.195810][ T4281] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.202726][ T4281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.209857][ T4281] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.216704][ T4281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.409339][ T4349] device syzkaller0 entered promiscuous mode [ 147.505386][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.514879][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.579694][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.605022][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.632790][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.649284][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.658777][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.665687][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.673725][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.682640][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.691322][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.698292][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.760542][ T4281] device veth0_vlan entered promiscuous mode [ 147.766851][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.796483][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.796480][ T30] audit: type=1400 audit(1737202374.827:166): avc: denied { create } for pid=4368 comm="syz.4.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 147.828049][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.836981][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.846746][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 147.856644][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 147.865571][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 147.874380][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.882542][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.889966][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.935000][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 147.960361][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 147.971516][ T4281] device veth1_macvtap entered promiscuous mode [ 147.984582][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 147.993522][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 148.008799][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 148.038719][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 148.048874][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 148.070471][ T4395] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.094357][ T4431] device syzkaller0 entered promiscuous mode [ 149.167184][ T4425] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.197729][ T4425] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.216719][ T4425] device bridge_slave_0 entered promiscuous mode [ 149.280199][ T4425] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.287077][ T4425] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.413106][ T4425] device bridge_slave_1 entered promiscuous mode [ 149.574728][ T45] device bridge_slave_1 left promiscuous mode [ 149.588277][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.612652][ T45] device bridge_slave_0 left promiscuous mode [ 149.621256][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.630026][ T45] device veth1_macvtap left promiscuous mode [ 149.635872][ T45] device veth0_vlan left promiscuous mode [ 150.216191][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.229451][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.290821][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 150.315332][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.332511][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.339440][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.347563][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.356388][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.365064][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.372429][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.380346][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.391850][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.449314][ T4425] device veth0_vlan entered promiscuous mode [ 150.462094][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 150.472033][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.480241][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.487543][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 150.494922][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.507002][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 150.536399][ T4425] device veth1_macvtap entered promiscuous mode [ 150.548522][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 150.562774][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 150.810982][ T4493] device syzkaller0 entered promiscuous mode [ 151.493891][ T4502] device pim6reg1 entered promiscuous mode [ 151.596414][ T4505] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.605086][ T4505] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.612867][ T4505] device bridge_slave_0 entered promiscuous mode [ 151.622515][ T4505] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.645707][ T4505] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.664876][ T4505] device bridge_slave_1 entered promiscuous mode [ 151.783693][ T4505] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.790732][ T4505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.797799][ T4505] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.804688][ T4505] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.836182][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.844271][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.851894][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.870663][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.878837][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.885822][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.904201][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.912364][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.919327][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.930076][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 151.938133][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.949434][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 151.957851][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.976623][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 151.986274][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 151.997210][ T45] device bridge_slave_1 left promiscuous mode [ 152.003722][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.011523][ T45] device bridge_slave_0 left promiscuous mode [ 152.017650][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.025883][ T45] device veth1_macvtap left promiscuous mode [ 152.031831][ T45] device veth0_vlan left promiscuous mode [ 152.123555][ T4527] device pim6reg1 entered promiscuous mode [ 152.136252][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 152.144170][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.152213][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.159698][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.168410][ T4505] device veth0_vlan entered promiscuous mode [ 152.179570][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 152.188075][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.198016][ T4505] device veth1_macvtap entered promiscuous mode [ 152.208923][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 152.216983][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 152.225920][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 152.237113][ T4534] bond_slave_1: mtu less than device minimum [ 152.246995][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 152.255845][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 152.445829][ T4536] device wg2 entered promiscuous mode [ 153.221465][ T4553] device pim6reg1 entered promiscuous mode [ 153.254421][ T45] device bridge_slave_1 left promiscuous mode [ 153.261850][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.270569][ T45] device bridge_slave_0 left promiscuous mode [ 153.277429][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.294806][ T45] device veth1_macvtap left promiscuous mode [ 153.304847][ T45] device veth0_vlan left promiscuous mode [ 153.643139][ T4566] device sit0 left promiscuous mode [ 153.812430][ T4570] device sit0 entered promiscuous mode [ 154.003737][ T4558] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.027089][ T4558] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.050796][ T4558] device bridge_slave_0 entered promiscuous mode [ 154.174109][ T4558] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.181993][ T4558] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.189824][ T4558] device bridge_slave_1 entered promiscuous mode [ 154.490229][ T4595] FAULT_INJECTION: forcing a failure. [ 154.490229][ T4595] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 154.519397][ T4595] CPU: 1 PID: 4595 Comm: syz.4.1208 Not tainted 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 154.529801][ T4595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 154.539775][ T4595] Call Trace: [ 154.542985][ T4595] [ 154.545771][ T4595] dump_stack_lvl+0x151/0x1c0 [ 154.550279][ T4595] ? io_uring_drop_tctx_refs+0x190/0x190 [ 154.555750][ T4595] ? __kasan_check_write+0x14/0x20 [ 154.560778][ T4595] dump_stack+0x15/0x20 [ 154.564775][ T4595] should_fail+0x3c6/0x510 [ 154.569032][ T4595] should_fail_usercopy+0x1a/0x20 [ 154.573882][ T4595] _copy_from_user+0x20/0xd0 [ 154.578306][ T4595] sock_do_ioctl+0x229/0x5a0 [ 154.582769][ T4595] ? sock_show_fdinfo+0xa0/0xa0 [ 154.587425][ T4595] ? selinux_file_ioctl+0x3cc/0x540 [ 154.592456][ T4595] sock_ioctl+0x455/0x740 [ 154.596719][ T4595] ? sock_poll+0x400/0x400 [ 154.600974][ T4595] ? __fget_files+0x31e/0x380 [ 154.605494][ T4595] ? security_file_ioctl+0x84/0xb0 [ 154.610538][ T4595] ? sock_poll+0x400/0x400 [ 154.614769][ T4595] __se_sys_ioctl+0x114/0x190 [ 154.619283][ T4595] __x64_sys_ioctl+0x7b/0x90 [ 154.623710][ T4595] x64_sys_call+0x98/0x9a0 [ 154.627961][ T4595] do_syscall_64+0x3b/0xb0 [ 154.632224][ T4595] ? clear_bhb_loop+0x35/0x90 [ 154.636728][ T4595] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 154.642669][ T4595] RIP: 0033:0x7faadf9f5d29 [ 154.646915][ T4595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.666577][ T4595] RSP: 002b:00007faade067038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 154.674883][ T4595] RAX: ffffffffffffffda RBX: 00007faadfbe5fa0 RCX: 00007faadf9f5d29 [ 154.682871][ T4595] RDX: 0000000020000000 RSI: 0000000000008914 RDI: 0000000000000007 [ 154.690692][ T4595] RBP: 00007faade067090 R08: 0000000000000000 R09: 0000000000000000 [ 154.698577][ T4595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.706416][ T4595] R13: 0000000000000000 R14: 00007faadfbe5fa0 R15: 00007fffe12d9a98 [ 154.714400][ T4595] [ 154.756651][ T4603] ip6_vti0: mtu greater than device maximum [ 154.773507][ T4603] device veth0_vlan left promiscuous mode [ 154.779296][ T4603] device veth0_vlan entered promiscuous mode [ 154.787675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.796962][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.805128][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.840517][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.851207][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.858831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.868405][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.876584][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.883490][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.892018][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.902074][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.914062][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.921052][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.181980][ T4610] device syzkaller0 entered promiscuous mode [ 155.283932][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.292029][ T4613] device veth0_vlan left promiscuous mode [ 155.297843][ T4613] device veth0_vlan entered promiscuous mode [ 155.324818][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.333581][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 155.341642][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.349430][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.357743][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.366003][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.374409][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.407602][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 155.416641][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 155.436672][ T4558] device veth0_vlan entered promiscuous mode [ 155.455376][ T4558] device veth1_macvtap entered promiscuous mode [ 155.470248][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 155.488136][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.496529][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 155.504713][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 155.512975][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 155.531090][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.544678][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 155.999191][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 156.007663][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.016073][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 156.024449][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.188906][ T4643] device veth0_vlan left promiscuous mode [ 156.219917][ T4643] FAULT_INJECTION: forcing a failure. [ 156.219917][ T4643] name failslab, interval 1, probability 0, space 0, times 1 [ 156.253066][ T4643] CPU: 0 PID: 4643 Comm: syz.3.1221 Not tainted 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 156.262896][ T4643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 156.272790][ T4643] Call Trace: [ 156.275924][ T4643] [ 156.278684][ T4643] dump_stack_lvl+0x151/0x1c0 [ 156.283197][ T4643] ? io_uring_drop_tctx_refs+0x190/0x190 [ 156.289015][ T4643] ? release_firmware_map_entry+0x190/0x190 [ 156.294746][ T4643] ? vprintk+0x74/0x80 [ 156.298747][ T4643] dump_stack+0x15/0x20 [ 156.302825][ T4643] should_fail+0x3c6/0x510 [ 156.307076][ T4643] __should_failslab+0xa4/0xe0 [ 156.311801][ T4643] ? __alloc_skb+0xbe/0x550 [ 156.316134][ T4643] should_failslab+0x9/0x20 [ 156.320473][ T4643] slab_pre_alloc_hook+0x37/0xd0 [ 156.325449][ T4643] ? __alloc_skb+0xbe/0x550 [ 156.329785][ T4643] kmem_cache_alloc+0x44/0x250 [ 156.334398][ T4643] __alloc_skb+0xbe/0x550 [ 156.338647][ T4643] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 156.343895][ T4643] rtmsg_ifinfo+0x78/0x120 [ 156.348097][ T4643] __dev_notify_flags+0xdd/0x610 [ 156.352956][ T4643] ? __kasan_check_read+0x11/0x20 [ 156.357938][ T4643] ? __dev_change_flags+0x6e0/0x6e0 [ 156.362968][ T4643] ? __dev_change_flags+0x505/0x6e0 [ 156.368004][ T4643] ? dev_get_flags+0x1e0/0x1e0 [ 156.372743][ T4643] ? _kstrtoull+0x3a0/0x4a0 [ 156.377373][ T4643] dev_change_flags+0xf0/0x1a0 [ 156.382119][ T4643] dev_ifsioc+0x147/0x10c0 [ 156.386372][ T4643] ? dev_ioctl+0xe70/0xe70 [ 156.390888][ T4643] ? mutex_lock+0xb6/0x1e0 [ 156.395140][ T4643] ? wait_for_completion_killable_timeout+0x10/0x10 [ 156.401924][ T4643] dev_ioctl+0x54d/0xe70 [ 156.406475][ T4643] sock_do_ioctl+0x34f/0x5a0 [ 156.410983][ T4643] ? sock_show_fdinfo+0xa0/0xa0 [ 156.415667][ T4643] ? selinux_file_ioctl+0x3cc/0x540 [ 156.420689][ T4643] sock_ioctl+0x455/0x740 [ 156.424858][ T4643] ? sock_poll+0x400/0x400 [ 156.429122][ T4643] ? __fget_files+0x31e/0x380 [ 156.433722][ T4643] ? security_file_ioctl+0x84/0xb0 [ 156.438659][ T4643] ? sock_poll+0x400/0x400 [ 156.443042][ T4643] __se_sys_ioctl+0x114/0x190 [ 156.447827][ T4643] __x64_sys_ioctl+0x7b/0x90 [ 156.452279][ T4643] x64_sys_call+0x98/0x9a0 [ 156.456520][ T4643] do_syscall_64+0x3b/0xb0 [ 156.460728][ T4643] ? clear_bhb_loop+0x35/0x90 [ 156.465264][ T4643] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 156.470983][ T4643] RIP: 0033:0x7feee37bad29 [ 156.475226][ T4643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.494663][ T4643] RSP: 002b:00007feee1e2c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 156.502941][ T4643] RAX: ffffffffffffffda RBX: 00007feee39aafa0 RCX: 00007feee37bad29 [ 156.510722][ T4643] RDX: 0000000020000000 RSI: 0000000000008914 RDI: 0000000000000007 [ 156.518803][ T4643] RBP: 00007feee1e2c090 R08: 0000000000000000 R09: 0000000000000000 [ 156.526787][ T4643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.534684][ T4643] R13: 0000000000000000 R14: 00007feee39aafa0 R15: 00007ffeac4a5c68 [ 156.542775][ T4643] [ 156.598955][ T4643] device veth0_vlan entered promiscuous mode [ 156.605996][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.614250][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.622003][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 157.723585][ T4652] device syzkaller0 entered promiscuous mode [ 157.908400][ T45] device bridge_slave_1 left promiscuous mode [ 157.915720][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.923570][ T45] device bridge_slave_0 left promiscuous mode [ 157.929665][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.938073][ T45] device veth1_macvtap left promiscuous mode [ 157.944431][ T45] device veth0_vlan left promiscuous mode [ 158.232543][ T4667] device syzkaller0 entered promiscuous mode [ 158.387166][ T4663] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.394151][ T4663] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.401757][ T4663] device bridge_slave_0 entered promiscuous mode [ 158.437314][ T4663] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.493141][ T4663] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.540334][ T4663] device bridge_slave_1 entered promiscuous mode [ 158.906232][ T4693] FAULT_INJECTION: forcing a failure. [ 158.906232][ T4693] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 158.928000][ T4693] CPU: 0 PID: 4693 Comm: syz.4.1234 Not tainted 5.15.176-syzkaller-00972-g829d9f138569 #0 [ 158.937921][ T4693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 158.947806][ T4693] Call Trace: [ 158.950957][ T4693] [ 158.953711][ T4693] dump_stack_lvl+0x151/0x1c0 [ 158.958230][ T4693] ? io_uring_drop_tctx_refs+0x190/0x190 [ 158.963688][ T4693] ? _raw_spin_unlock_bh+0x51/0x60 [ 158.968636][ T4693] ? vsnprintf+0x1dd/0x1c70 [ 158.972984][ T4693] dump_stack+0x15/0x20 [ 158.976968][ T4693] should_fail+0x3c6/0x510 [ 158.981222][ T4693] should_fail_usercopy+0x1a/0x20 [ 158.986080][ T4693] _copy_from_user+0x20/0xd0 [ 158.990592][ T4693] kstrtouint_from_user+0xca/0x2a0 [ 158.995546][ T4693] ? kstrtol_from_user+0x310/0x310 [ 159.000486][ T4693] ? snprintf+0xd6/0x120 [ 159.004567][ T4693] ? check_stack_object+0x114/0x130 [ 159.009598][ T4693] ? __kasan_check_read+0x11/0x20 [ 159.014462][ T4693] ? _copy_to_user+0x78/0x90 [ 159.018899][ T4693] proc_fail_nth_write+0xa6/0x290 [ 159.023755][ T4693] ? selinux_file_permission+0x2c4/0x570 [ 159.029342][ T4693] ? proc_fail_nth_read+0x210/0x210 [ 159.034372][ T4693] ? fsnotify_perm+0x6a/0x5b0 [ 159.038917][ T4693] ? security_file_permission+0x86/0xb0 [ 159.044261][ T4693] ? proc_fail_nth_read+0x210/0x210 [ 159.049298][ T4693] vfs_write+0x406/0x1110 [ 159.053465][ T4693] ? file_end_write+0x1c0/0x1c0 [ 159.058151][ T4693] ? __kasan_check_write+0x14/0x20 [ 159.063129][ T4693] ? mutex_lock+0xb6/0x1e0 [ 159.067361][ T4693] ? wait_for_completion_killable_timeout+0x10/0x10 [ 159.073864][ T4693] ? __fdget_pos+0x2e7/0x3a0 [ 159.078280][ T4693] ? ksys_write+0x77/0x2c0 [ 159.082689][ T4693] ksys_write+0x199/0x2c0 [ 159.086855][ T4693] ? __ia32_sys_read+0x90/0x90 [ 159.091626][ T4693] ? debug_smp_processor_id+0x17/0x20 [ 159.096840][ T4693] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 159.102733][ T4693] __x64_sys_write+0x7b/0x90 [ 159.107158][ T4693] x64_sys_call+0x2f/0x9a0 [ 159.111411][ T4693] do_syscall_64+0x3b/0xb0 [ 159.115670][ T4693] ? clear_bhb_loop+0x35/0x90 [ 159.120272][ T4693] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 159.126003][ T4693] RIP: 0033:0x7faadf9f47df [ 159.130253][ T4693] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 159.149905][ T4693] RSP: 002b:00007faade067030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 159.158201][ T4693] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007faadf9f47df [ 159.166274][ T4693] RDX: 0000000000000001 RSI: 00007faade0670a0 RDI: 0000000000000008 [ 159.174082][ T4693] RBP: 00007faade067090 R08: 0000000000000000 R09: 0000000000000000 [ 159.181891][ T4693] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 159.189793][ T4693] R13: 0000000000000000 R14: 00007faadfbe5fa0 R15: 00007fffe12d9a98 [ 159.197615][ T4693] [ 159.321577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 159.336616][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.375612][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 159.405271][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.414398][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.421305][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.428849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 159.437729][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 159.446241][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.453221][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.482438][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.494779][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.503081][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.685637][ T4711] device syzkaller0 entered promiscuous mode [ 159.788792][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 159.805115][ T4663] device veth0_vlan entered promiscuous mode [ 159.816038][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.826789][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.834840][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.871316][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 159.886890][ T4663] device veth1_macvtap entered promiscuous mode [ 159.997295][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 160.019142][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 160.071785][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 160.117018][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 161.522368][ T4768] ÿÿÿÿÿÿ: renamed from vlan1 [ 161.596911][ T4759] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.610733][ T4759] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.624531][ T4759] device bridge_slave_0 entered promiscuous mode [ 161.631521][ T4759] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.638476][ T4759] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.645795][ T4759] device bridge_slave_1 entered promiscuous mode [ 161.794610][ T8] device bridge_slave_1 left promiscuous mode [ 161.802893][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.846888][ T8] device bridge_slave_0 left promiscuous mode [ 161.883481][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.931192][ T8] device veth1_macvtap left promiscuous mode [ 161.967466][ T8] device veth0_vlan left promiscuous mode [ 162.519015][ T4804] device veth0_vlan left promiscuous mode [ 162.538817][ T4804] device veth0_vlan entered promiscuous mode [ 162.579168][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.625142][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 162.683046][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 163.041573][ T4822] cgroup: fork rejected by pids controller in /syz2 [ 163.072853][ T4822] : renamed from ipvlan1 [ 163.168707][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.201318][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.212372][ T4831] device veth1_macvtap entered promiscuous mode [ 163.250531][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.272007][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.284780][ T30] audit: type=1400 audit(1737202390.327:167): avc: denied { create } for pid=4839 comm="syz.1.1279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 163.340130][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.347000][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.366252][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.374816][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.384817][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.391732][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.399146][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.420616][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.428896][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.599528][ T4852] device syzkaller0 entered promiscuous mode [ 163.629064][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.645430][ T4759] device veth0_vlan entered promiscuous mode [ 163.672588][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.680439][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.688477][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.696491][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.716952][ T4759] device veth1_macvtap entered promiscuous mode [ 163.756648][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.766111][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.774453][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 163.795968][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.814527][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.825651][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.834968][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 164.261928][ T4885] device syzkaller0 entered promiscuous mode [ 164.316282][ T4869] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.323420][ T4869] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.331068][ T4869] device bridge_slave_0 entered promiscuous mode [ 164.345981][ T4869] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.352911][ T4869] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.362123][ T4869] device bridge_slave_1 entered promiscuous mode [ 164.433694][ T4869] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.440584][ T4869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.447820][ T4869] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.454723][ T4869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.483999][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.499889][ T326] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.507156][ T326] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.528242][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.536463][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.543417][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.550719][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.558715][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.565662][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.580349][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.589629][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.606030][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.618725][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.627627][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.635043][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.644364][ T4869] device veth0_vlan entered promiscuous mode [ 164.663610][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.671937][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.682564][ T4869] device veth1_macvtap entered promiscuous mode [ 164.692774][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 164.700624][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 164.708738][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 164.732110][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 164.742104][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.504247][ T4901] device syzkaller0 entered promiscuous mode [ 165.537890][ T8] device bridge_slave_1 left promiscuous mode [ 165.544649][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.559946][ T8] device bridge_slave_0 left promiscuous mode [ 165.585838][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.599407][ T8] device veth1_macvtap left promiscuous mode [ 165.605831][ T8] device veth0_vlan left promiscuous mode [ 165.611851][ T8] device veth0_vlan left promiscuous mode [ 165.901837][ T4910] device syzkaller0 entered promiscuous mode [ 165.920292][ T4907] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.950689][ T4907] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.958150][ T4907] device bridge_slave_0 entered promiscuous mode [ 165.965643][ T4907] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.972752][ T4907] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.980343][ T4907] device bridge_slave_1 entered promiscuous mode [ 166.383156][ T4907] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.390052][ T4907] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.397148][ T4907] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.404038][ T4907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.449842][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.471668][ T326] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.489462][ T326] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.528014][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.555706][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.562839][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.579442][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.588005][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.594883][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.602607][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.620651][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.667820][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.692564][ T4907] device veth0_vlan entered promiscuous mode [ 166.702511][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.713879][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.721637][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.984752][ T4907] device veth1_macvtap entered promiscuous mode [ 166.995601][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.062520][ T4967] device bridge0 entered promiscuous mode [ 167.077516][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.086420][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.159996][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 167.179303][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 168.822068][ T5016] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.829239][ T5016] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.843708][ T5016] device bridge0 left promiscuous mode [ 168.844590][ T5022] cgroup: fork rejected by pids controller in /syz3 [ 168.856940][ T8] device bridge_slave_1 left promiscuous mode [ 168.880097][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.888903][ T8] device bridge_slave_0 left promiscuous mode [ 168.900125][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.908712][ T8] device veth1_macvtap left promiscuous mode [ 168.914917][ T8] device veth0_vlan left promiscuous mode [ 169.047349][ T5007] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.054277][ T5007] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.061798][ T5007] device bridge_slave_0 entered promiscuous mode [ 169.068657][ T5016] device bridge_slave_1 left promiscuous mode [ 169.075006][ T5016] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.083431][ T5016] device bridge_slave_0 left promiscuous mode [ 169.089552][ T5016] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.168346][ T5007] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.176096][ T5007] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.183582][ T5007] device bridge_slave_1 entered promiscuous mode [ 169.872285][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.890028][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.924325][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.962054][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.990069][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.996928][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.031763][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.039303][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.048940][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.057021][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.063991][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.074534][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.083210][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.164233][ T5007] device veth0_vlan entered promiscuous mode [ 170.170711][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.179275][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.188916][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.197223][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.226563][ T5007] device veth1_macvtap entered promiscuous mode [ 170.234804][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 170.247504][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.265523][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 170.391826][ T5173] device syzkaller0 entered promiscuous mode [ 170.427158][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.437664][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.480029][ T5166] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.486977][ T5166] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.494299][ T5166] device bridge_slave_0 entered promiscuous mode [ 170.506414][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.514891][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.536314][ T5166] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.544567][ T5166] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.552684][ T5166] device bridge_slave_1 entered promiscuous mode [ 170.806856][ T5180] device syzkaller0 entered promiscuous mode [ 170.896511][ T5166] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.903402][ T5166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.910572][ T5166] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.917418][ T5166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.944877][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.953643][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.961328][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.987581][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.998400][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.005280][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.013464][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.022021][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.028879][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.055486][ T5166] device veth0_vlan entered promiscuous mode [ 171.069087][ T5166] device veth1_macvtap entered promiscuous mode [ 171.091187][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.100289][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.108225][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.115856][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.123533][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.132047][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.140728][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.162469][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 171.171027][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 171.201415][ T8] device veth1_macvtap left promiscuous mode [ 171.987817][ T5188] device sit0 left promiscuous mode [ 172.248670][ T5184] device pim6reg1 entered promiscuous mode [ 172.263114][ T5194] device sit0 entered promiscuous mode [ 172.389057][ T5193] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.409032][ T5193] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.432266][ T5193] device bridge_slave_0 entered promiscuous mode [ 172.544410][ T5193] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.596157][ T5193] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.608924][ T5193] device bridge_slave_1 entered promiscuous mode [ 172.950576][ T5231] device syzkaller0 entered promiscuous mode [ 173.521172][ T8] device bridge_slave_1 left promiscuous mode [ 173.527156][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.539274][ T8] device bridge_slave_0 left promiscuous mode [ 173.553000][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.569976][ T8] device veth1_macvtap left promiscuous mode [ 173.582365][ T8] device veth0_vlan left promiscuous mode [ 173.822880][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.832850][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.905552][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.916025][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.935836][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.942727][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.967155][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.981144][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.997112][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.004095][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.016938][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.026041][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.034026][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.099261][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 174.112635][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.120982][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.128529][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.139558][ T5193] device veth0_vlan entered promiscuous mode [ 174.177105][ T5193] device veth1_macvtap entered promiscuous mode [ 174.190322][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 174.199147][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 174.207698][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.221122][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 174.229276][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 175.123358][ T8] device bridge_slave_1 left promiscuous mode [ 175.129363][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.136922][ T8] device bridge_slave_0 left promiscuous mode [ 175.143518][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.152990][ T8] device veth1_macvtap left promiscuous mode [ 175.158809][ T8] device veth0_vlan left promiscuous mode [ 175.990170][ T5270] device syzkaller0 entered promiscuous mode [ 176.311960][ T5281] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.318840][ T5281] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.369858][ T5281] device bridge_slave_0 entered promiscuous mode [ 176.404176][ T5281] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.411086][ T5281] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.418544][ T5281] device bridge_slave_1 entered promiscuous mode [ 176.867568][ T5306] device syzkaller0 entered promiscuous mode [ 176.913699][ T5297] device pim6reg1 entered promiscuous mode [ 177.095279][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 177.111473][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.175850][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.184504][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.201062][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.208035][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.246272][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.260003][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.292409][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.301727][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.308636][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.054602][ T5328] device syzkaller0 entered promiscuous mode [ 179.108094][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.193179][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.209375][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.235855][ T5281] device veth0_vlan entered promiscuous mode [ 179.247458][ T5342] device pim6reg1 entered promiscuous mode [ 179.272221][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 179.281899][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 179.290714][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 179.298500][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.329967][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.337397][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.344895][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 179.353064][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 179.370699][ T5281] device veth1_macvtap entered promiscuous mode [ 179.401883][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 179.410174][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 179.418348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 179.523189][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.582206][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 181.020673][ T8] device bridge_slave_1 left promiscuous mode [ 181.026621][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.034173][ T8] device bridge_slave_0 left promiscuous mode [ 181.040377][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.048051][ T8] device veth1_macvtap left promiscuous mode [ 181.053915][ T8] device veth0_vlan left promiscuous mode [ 181.730677][ T5383] device sit0 entered promiscuous mode [ 181.938784][ T5384] device syzkaller0 entered promiscuous mode [ 182.286468][ T5379] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.293494][ T5379] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.301234][ T5379] device bridge_slave_0 entered promiscuous mode [ 182.308183][ T5379] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.315552][ T5379] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.323102][ T5379] device bridge_slave_1 entered promiscuous mode [ 183.065999][ T5379] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.073001][ T5379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.080141][ T5379] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.087006][ T5379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.250075][ T4639] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.281221][ T4639] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.485801][ T5442] device syzkaller0 entered promiscuous mode [ 183.607985][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.617188][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.679956][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.689393][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.700118][ T4639] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.706994][ T4639] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.753576][ T5444] device veth0_vlan left promiscuous mode [ 183.759457][ T5444] device veth0_vlan entered promiscuous mode [ 183.767289][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.777969][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.785312][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.894103][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.902388][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.910468][ T4639] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.917309][ T4639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.976915][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.984949][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.999863][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.007863][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.023843][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 184.032367][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.045367][ T5379] device veth0_vlan entered promiscuous mode [ 184.079141][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 184.087146][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.095599][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.103275][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.262114][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 184.276736][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.332702][ T5379] device veth1_macvtap entered promiscuous mode [ 184.351944][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 184.361606][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 184.373139][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.405783][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 184.418583][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 184.708721][ T5488] device syzkaller0 entered promiscuous mode [ 185.530748][ T8] device bridge_slave_1 left promiscuous mode [ 185.536688][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.544096][ T8] device bridge_slave_0 left promiscuous mode [ 185.550125][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.557915][ T8] device veth1_macvtap left promiscuous mode [ 185.563772][ T8] device veth0_vlan left promiscuous mode [ 186.263538][ T5511] device syzkaller0 entered promiscuous mode [ 186.382042][ T5513] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.388945][ T5513] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.396670][ T5513] device bridge_slave_0 entered promiscuous mode [ 186.410053][ T5513] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.418351][ T5513] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.425830][ T5513] device bridge_slave_1 entered promiscuous mode [ 186.631181][ T5513] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.638042][ T5513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.645286][ T5513] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.652151][ T5513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.680884][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.694517][ T326] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.702369][ T326] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.752331][ T5533] Â: renamed from pim6reg1 [ 186.774585][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.787174][ T326] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.794109][ T326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.818922][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.835916][ T326] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.842933][ T326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.058831][ T5535] device syzkaller0 entered promiscuous mode [ 187.167987][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.190252][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.254963][ T5513] device veth0_vlan entered promiscuous mode [ 187.313547][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.333271][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.360416][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.390607][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 187.430318][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.450496][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.621881][ T5513] device veth1_macvtap entered promiscuous mode [ 187.690818][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.950275][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 187.990348][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 188.017393][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 188.026159][ T326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 189.161009][ T45] device bridge_slave_1 left promiscuous mode [ 189.167151][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.174943][ T45] device bridge_slave_0 left promiscuous mode [ 189.181037][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.189145][ T45] device veth1_macvtap left promiscuous mode [ 189.195337][ T45] device veth0_vlan left promiscuous mode [ 190.049424][ T5583] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.056825][ T5583] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.065204][ T5583] device bridge_slave_0 entered promiscuous mode [ 190.079694][ T5583] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.092040][ T5583] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.109564][ T5583] device bridge_slave_1 entered promiscuous mode [ 190.385848][ T5583] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.392751][ T5583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.399977][ T5583] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.406819][ T5583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.485933][ T4639] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.495680][ T4639] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.604063][ T5600] device pim6reg1 entered promiscuous mode [ 190.770604][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.778650][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.810465][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.880021][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.941391][ T4639] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.948273][ T4639] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.069240][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.088633][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.098833][ T4639] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.105727][ T4639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.144791][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.199657][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.268026][ T5622] device syzkaller0 entered promiscuous mode [ 191.290450][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.304301][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.366960][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 191.381550][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 191.453544][ T5583] device veth0_vlan entered promiscuous mode [ 191.469555][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 191.486785][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.590009][ T5583] device veth1_macvtap entered promiscuous mode [ 191.609212][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.621810][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.650543][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 191.668744][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.688927][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 191.722986][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 191.777859][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 191.786483][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 191.802604][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 191.930321][ T5583] syz-executor (5583) used greatest stack depth: 19960 bytes left [ 193.420653][ T45] device bridge_slave_1 left promiscuous mode [ 193.426581][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.434025][ T45] device bridge_slave_0 left promiscuous mode [ 193.440063][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.447933][ T45] device veth1_macvtap left promiscuous mode [ 193.453813][ T45] device veth0_vlan left promiscuous mode [ 193.918779][ T5658] device syzkaller0 entered promiscuous mode [ 194.281939][ T5670] device syzkaller0 entered promiscuous mode [ 194.459848][ T5664] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.466776][ T5664] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.477189][ T5664] device bridge_slave_0 entered promiscuous mode [ 194.484305][ T5664] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.514459][ T5664] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.527773][ T5664] device bridge_slave_1 entered promiscuous mode [ 194.755276][ T5719] device syzkaller0 entered promiscuous mode [ 195.933443][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.941175][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.974771][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.983089][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.992804][ T5742] syz.1.1498[5742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.012501][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.030489][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.080447][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.094476][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.112898][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.119783][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.140356][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.152993][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.166794][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.315172][ T5751] device pim6reg1 entered promiscuous mode [ 196.340672][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.348806][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.377915][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 196.401073][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 196.415977][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 196.424056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 196.433317][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 196.446006][ T5664] device veth0_vlan entered promiscuous mode [ 196.459153][ T5763] tun0: tun_chr_ioctl cmd 1074812117 [ 196.474342][ T5763] device sit0 left promiscuous mode [ 196.503138][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 196.529997][ T5664] device veth1_macvtap entered promiscuous mode [ 196.562339][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 196.591103][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 196.698822][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 196.767855][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 197.372190][ T5779] device veth0_vlan left promiscuous mode [ 197.394084][ T5779] device veth0_vlan entered promiscuous mode [ 197.422191][ T5779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.448128][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.456116][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.464505][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.780636][ T4639] device bridge_slave_1 left promiscuous mode [ 198.786559][ T4639] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.793996][ T4639] device bridge_slave_0 left promiscuous mode [ 198.800010][ T4639] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.807809][ T4639] device veth1_macvtap left promiscuous mode [ 198.813691][ T4639] device veth0_vlan left promiscuous mode [ 199.366435][ T5814] device sit0 entered promiscuous mode [ 213.300591][ T5813] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.307786][ T5813] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.328045][ T5813] device bridge_slave_0 entered promiscuous mode [ 213.337279][ T5813] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.345638][ T5813] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.353189][ T5813] device bridge_slave_1 entered promiscuous mode [ 213.398719][ T5854] device syzkaller0 entered promiscuous mode [ 213.625650][ T5813] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.632535][ T5813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.639634][ T5813] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.646424][ T5813] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.680387][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.697229][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.721498][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.730387][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.976033][ T5875] device syzkaller0 entered promiscuous mode [ 214.105640][ T5878] device veth0_vlan left promiscuous mode [ 214.125638][ T5878] device veth0_vlan entered promiscuous mode [ 214.169012][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.178421][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.186151][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.227112][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.247208][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.299928][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 214.331580][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 214.359065][ T5813] device veth0_vlan entered promiscuous mode [ 214.372679][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 214.386150][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.449110][ T5813] device veth1_macvtap entered promiscuous mode [ 214.457562][ T5890] device syzkaller0 entered promiscuous mode [ 214.464983][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.473558][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.481852][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 214.492718][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 214.502028][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 214.545583][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.554433][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.584451][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.600771][ T4639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.740531][ T8] device bridge_slave_1 left promiscuous mode [ 215.746463][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.753966][ T8] device bridge_slave_0 left promiscuous mode [ 215.760092][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.767906][ T8] device veth1_macvtap left promiscuous mode [ 215.773778][ T8] device veth0_vlan left promiscuous mode [ 217.226594][ T5925] device syzkaller0 entered promiscuous mode [ 217.271600][ T5930] device veth0_vlan left promiscuous mode [ 217.279191][ T5930] device veth0_vlan entered promiscuous mode [ 217.356259][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.364607][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.383012][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.494648][ T30] audit: type=1400 audit(1737202444.537:168): avc: denied { create } for pid=5947 comm="syz.3.1550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 217.685928][ T5933] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.695605][ T5933] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.704809][ T5933] device bridge_slave_0 entered promiscuous mode [ 217.718975][ T5933] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.726615][ T5933] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.734191][ T5933] device bridge_slave_1 entered promiscuous mode [ 217.846036][ T5933] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.852951][ T5933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.860065][ T5933] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.866805][ T5933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.991371][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.002968][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.025791][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.065423][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.082398][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.089442][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.112362][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.129188][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.136165][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.168780][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.186505][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.219981][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.250969][ T5933] device veth0_vlan entered promiscuous mode [ 218.261934][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.279678][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.296091][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.323912][ T5933] device veth1_macvtap entered promiscuous mode [ 218.331535][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.344767][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.374812][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.630408][ T8] device bridge_slave_1 left promiscuous mode [ 219.636333][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.643683][ T8] device bridge_slave_0 left promiscuous mode [ 219.649590][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.657349][ T8] device veth1_macvtap left promiscuous mode [ 219.663237][ T8] device veth0_vlan left promiscuous mode [ 221.294956][ T6018] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.390044][ T6018] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.397463][ T6018] device bridge_slave_0 entered promiscuous mode [ 221.550677][ T6018] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.557541][ T6018] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.713800][ T6018] device bridge_slave_1 entered promiscuous mode [ 222.105917][ T6037] device syzkaller0 entered promiscuous mode [ 222.677335][ T6048] device syzkaller0 entered promiscuous mode [ 222.858849][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.880977][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.896154][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.921764][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.993030][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.000003][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.099959][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.123677][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.153488][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.160373][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.236985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.250814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.265725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.274412][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.282645][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.322355][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 223.339584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 223.353137][ T6018] device veth0_vlan entered promiscuous mode [ 223.359325][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 223.368830][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 223.377719][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 223.385594][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 223.408375][ T6018] device veth1_macvtap entered promiscuous mode [ 223.438694][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 223.447722][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 223.456199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 223.658422][ T6098] device syzkaller0 entered promiscuous mode [ 223.705300][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.720336][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.777012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.793076][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.814352][ T6101] device wg2 entered promiscuous mode SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=0 req=1016 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 224.100571][ T30] audit: type=1400 audit(1737202451.147:169): avc: denied { read } for pid=6108 comm="poweroff" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 224.403140][ T4639] device bridge_slave_1 left promiscuous mode [ 224.409098][ T4639] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.451103][ T4639] device bridge_slave_0 left promiscuous mode [ 224.460041][ T4639] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.494703][ T4639] device veth1_macvtap left promiscuous mode [ 224.509990][ T4639] device veth0_vlan left promiscuous mode [ 224.766908][ T30] audit: type=1400 audit(1737202451.807:170): avc: denied { unlink } for pid=139 comm="dhcpcd" name="sock" dev="tmpfs" ino=412 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 224.791582][ T30] audit: type=1400 audit(1737202451.837:171): avc: denied { unlink } for pid=139 comm="dhcpcd" name="pid" dev="tmpfs" ino=411 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 224.867353][ T30] audit: type=1400 audit(1737202451.907:172): avc: denied { search } for pid=6132 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 224.888876][ T30] audit: type=1400 audit(1737202451.907:173): avc: denied { write } for pid=6132 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 224.910486][ T30] audit: type=1400 audit(1737202451.907:174): avc: denied { add_name } for pid=6132 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 224.932711][ T30] audit: type=1400 audit(1737202451.907:175): avc: denied { create } for pid=6132 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 224.956561][ T30] audit: type=1400 audit(1737202451.907:176): avc: denied { read open } for pid=6132 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=726 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 224.980205][ T30] audit: type=1400 audit(1737202451.907:177): avc: denied { lock } for pid=6132 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=726 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 225.060680][ T30] audit: type=1400 audit(1737202452.107:178): avc: denied { remove_name } for pid=86 comm="acpid" name="acpid.pid" dev="tmpfs" ino=7 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 225.821387][ T4639] device bridge_slave_1 left promiscuous mode [ 225.827308][ T4639] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.834523][ T4639] device bridge_slave_0 left promiscuous mode [ 225.840450][ T4639] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.848183][ T4639] device veth0_to_team left promiscuous mode [ 225.854053][ T4639] Ÿë: port 1(veth0_to_team) entered disabled state [ 225.861679][ T4639] device bridge_slave_1 left promiscuous mode [ 225.867590][ T4639] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.874895][ T4639] device bridge_slave_0 left promiscuous mode [ 225.881219][ T4639] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.889950][ T4639] device veth1_macvtap left promiscuous mode [ 225.896183][ T4639] device veth1_macvtap left promiscuous mode [ 225.902034][ T4639] device veth0_vlan left promiscuous mode [ 225.907781][ T4639] device veth1_macvtap left promiscuous mode [ 225.913593][ T4639] device veth0_vlan left promiscuous mode [ 226.375145][ T6151] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 228.425805][ T6152] kvm: exiting hardware virtualization [ 228.432080][ T6152] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 228.438561][ T6152] ACPI: PM: Preparing to enter system sleep state S5 [ 228.445394][ T6152] reboot: Power down serialport: VM disconnected.