last executing test programs: 19.078999739s ago: executing program 2 (id=3356): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e01, 0x0, @perf_bp={0x0, 0x5}, 0x6c8d, 0x5, 0x0, 0x4, 0x0, 0x6e, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x10}}], 0x80}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xfffffffffffffff8}, 0x0, 0x20, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 15.333209208s ago: executing program 2 (id=3356): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e01, 0x0, @perf_bp={0x0, 0x5}, 0x6c8d, 0x5, 0x0, 0x4, 0x0, 0x6e, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x10}}], 0x80}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xfffffffffffffff8}, 0x0, 0x20, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 11.668247796s ago: executing program 2 (id=3356): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e01, 0x0, @perf_bp={0x0, 0x5}, 0x6c8d, 0x5, 0x0, 0x4, 0x0, 0x6e, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x10}}], 0x80}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xfffffffffffffff8}, 0x0, 0x20, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 8.086074573s ago: executing program 2 (id=3356): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e01, 0x0, @perf_bp={0x0, 0x5}, 0x6c8d, 0x5, 0x0, 0x4, 0x0, 0x6e, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x10}}], 0x80}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xfffffffffffffff8}, 0x0, 0x20, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 5.536562503s ago: executing program 4 (id=3851): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, 0x0, &(0x7f0000001340)=""/4096, 0x4}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085", @ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x1a, &(0x7f0000000000), 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xd, 0x0, 0x0, 0x0, 0x0, 0x5d30, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x40, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="13000000100000000200"/20, @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c000000"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r3, 0x20, &(0x7f0000000380)={&(0x7f0000004000)=""/4096, 0xfffffe74, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000800"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socketpair(0x3, 0x1, 0x8, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r5, 0xffff0000, 0xe, 0x0, &(0x7f00000003c0)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000200000000000000010009107cbf00000200"/50], 0x0, 0x32, 0xfffffffffffffeea, 0x0, 0x0, 0x0, @void, @value}, 0x28) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb87af09a673486a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) 5.011324481s ago: executing program 4 (id=3853): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80007}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r2, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r4}, 0x18) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8982, &(0x7f0000000080)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') 4.774586835s ago: executing program 4 (id=3855): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="000300f9fffffff7ff000000000000a3516454326a2cf63161ede6999ec0d4002d1cfa437f0aa7530ff4baf5690bcbd48fb933e8091a940bb1dd859c29286b9395ebeb411aad9f16cde87722a443d5de26c0d55933c242b290", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000500), 0x5fc, r2}, 0x38) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x76, &(0x7f0000000580), &(0x7f00000006c0)=""/118, 0x80000000, 0x0, 0xab, 0xe, &(0x7f0000000740)="ceb00cad9665d008c4d4f248549415945fa1691db2cad1c76b79d7cccc6407bd02a222349f68078f9aae3155f5efc2673c3679f62280a3f0a38d7a0aba9057f36ccd47e56925359ef97b3180943d07191957252a41f196ba48fe88ae1600ec23acb0467c3792a70c102c89232211bd4af6503a3ca85c9d41f48eaca51a3b1b8e1cee26d7788363ea417692a6cfc6caa6904fb0406d3c33f212d394aba23670025cd4a0a7db45d4fff3994f", &(0x7f00000003c0)="08de42d32db8f37ec7e9ebc9cffd", 0x1, 0x0, 0x2}, 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000060000000000000000000000711070000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000600)={'syz_tun\x00', 0xc00}) close(r3) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000000300)={&(0x7f0000000280)=@x25, 0x80, &(0x7f0000000180)=[{&(0x7f0000000540)=""/94, 0x5e}, {&(0x7f0000000a00)=""/4096, 0x1000}, {0x0}], 0x3}, 0x10121) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[], 0x2) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='er -rl\x00'/17], 0x11) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, @void, @value}, 0x94) 4.529514938s ago: executing program 3 (id=3857): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r0}, 0x0, &(0x7f0000000200)}, 0x20) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80021, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_config_ext, 0x0, 0x0, 0x3fffc, 0x0, 0x6, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) 4.298595212s ago: executing program 3 (id=3858): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="000300f9fffffff7ff000000000000a3516454326a2cf63161ede6999ec0d4002d1cfa437f0aa7530ff4baf5690bcbd48fb933e8091a940bb1dd859c29286b9395ebeb411aad9f16cde87722a443d5de26c0d55933c242b290", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000500), 0x5fc}, 0x38) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x76, &(0x7f0000000580), &(0x7f00000006c0)=""/118, 0x80000000, 0x0, 0xab, 0xe, &(0x7f0000000740)="ceb00cad9665d008c4d4f248549415945fa1691db2cad1c76b79d7cccc6407bd02a222349f68078f9aae3155f5efc2673c3679f62280a3f0a38d7a0aba9057f36ccd47e56925359ef97b3180943d07191957252a41f196ba48fe88ae1600ec23acb0467c3792a70c102c89232211bd4af6503a3ca85c9d41f48eaca51a3b1b8e1cee26d7788363ea417692a6cfc6caa6904fb0406d3c33f212d394aba23670025cd4a0a7db45d4fff3994f", &(0x7f00000003c0)="08de42d32db8f37ec7e9ebc9cffd", 0x1, 0x0, 0x2}, 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000060000000000000000000000711070000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000600)={'syz_tun\x00', 0xc00}) close(r2) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000300)={&(0x7f0000000280)=@x25, 0x80, &(0x7f0000000180)=[{&(0x7f0000000540)=""/94, 0x5e}, {&(0x7f0000000a00)=""/4096, 0x1000}, {0x0}], 0x3}, 0x10121) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[], 0x2) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='er -rl\x00'/17], 0x11) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, @void, @value}, 0x94) 4.250419533s ago: executing program 2 (id=3356): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e01, 0x0, @perf_bp={0x0, 0x5}, 0x6c8d, 0x5, 0x0, 0x4, 0x0, 0x6e, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x10}}], 0x80}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xfffffffffffffff8}, 0x0, 0x20, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 2.132765886s ago: executing program 1 (id=3860): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r0, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@decl_tag={0x5, 0x0, 0x0, 0x11, 0x1, 0x9}, @fwd={0xc}]}, {0x0, [0x30]}}, &(0x7f00000005c0)=""/20, 0x37, 0x14, 0x0, 0x10, 0x10000, @value}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x17, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x40000000}, {}, {}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x7, 0xc, &(0x7f0000000400)=""/12, 0x41000, 0x48, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000640)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x8, 0x411e, 0x8000}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000700)=[r0, r3, r0, r0, r0], &(0x7f0000000740)=[{0x3, 0x3, 0x0, 0xb}], 0x10, 0x3, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f00000005c0)=r5, 0x12) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(r9, &(0x7f0000000040)=0x1, 0x12) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r11) 2.132398096s ago: executing program 3 (id=3861): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffdf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@rights={{0x18, 0x1, 0x1, [r3, r4]}}], 0x18, 0x40000}, 0x4000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000001000000000000001811000024237e244506f1804d7d1f4f7192fc3ab14456ca64ca7f64a15a09d8ad11e7242a95a1a4b7c975d4dbe2955407efd500f4c1c628cf7bbc114a7cb06de5ccb2d6ab8656adaa2d19f0cc675f73b6c3e395886a68d395f170c51507338d74dac4102d5196fbd9a433ac612e5b05ce7ea470109f20ae975b41faf9", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r2, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) 2.131575436s ago: executing program 4 (id=3863): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x120, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000001000)={0x0, r0}, 0x8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001140)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001080)='cq_process\x00'}, 0x18) r2 = perf_event_open(0x0, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4300c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x101028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc593}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x3, 0x13, &(0x7f0000001400)=ANY=[@ANYRESDEC=r2], &(0x7f0000000200)='GPL\x00', 0x0, 0xffffffffffffffac, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0x10, 0xfffffef3, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x5562, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) openat$cgroup_subtree(r3, &(0x7f0000003000), 0x201, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000001040), 0x2, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8924, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000001200)=ANY=[@ANYBLOB="9feb010018000000000000009600000096000000070000000a000093e5aad7d792000900000f020000000100000001000000f0000005000000be0b000004800000050000000800000005000000fbfffffe04ffffff030000000c00010070080000000000000200000001000000030000000080000008000000040000000100000001010000030000000600000007000000fd780400000000000001000000000900160103000000000000080400000000615f00"], &(0x7f00000012c0)=""/175, 0xb7, 0xaf, 0x0, 0xc, 0x10000, @value}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) close(0xffffffffffffffff) close(r6) openat$tun(0xffffffffffffff9c, 0x0, 0x4900, 0x0) 2.058327548s ago: executing program 1 (id=3864): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00'}, 0x10) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r0}, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair(0x10, 0x3, 0x9, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000400)='sched_switch\x00'}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x19, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004000000050001"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x3, &(0x7f0000000340)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r4, 0x9, 0x1db13d802da972e1}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00'}, 0x10) (async) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r0}, 0x8) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000dc0)={&(0x7f0000000c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) (async) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) socketpair(0x10, 0x3, 0x9, 0x0) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) (async) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000400)='sched_switch\x00'}, 0x18) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) (async) bpf$MAP_LOOKUP_BATCH(0x19, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004000000050001"], 0x48) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x3, &(0x7f0000000340)}, 0x10) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4}, 0xc) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r4, 0x9, 0x1db13d802da972e1}, 0xc) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) 1.992207048s ago: executing program 0 (id=3865): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)="678153cd205b35ae00000000806dd329f727b08c5fbe7da1b3838787a874746aa256833d546e16c6ef18104818c9a77802d7027edfb435020ede19d50000700f830c0000004c7b351068f8dc7d4b43dc6b7d0e18dcff122e7ee73f9d00844108f86fb4a6bf59794a7d1c7fef528419ded8c3f424ae126d79224302335564f08cb95bd15bec1ccb3a5a0ce7d6a102cd129978877db4285391292aa3b6aa43d2036edd21798cf4c759e1a955c5edfa134f40fc274ce2db99fc2fb86999c557e50967fc7a9da20de5df4e19183a2e307bd1985bc4a81d7237cafc8851e7932199991b7df641a59b3ad823918fb8eca7120ef3e75a3de467005325d3b228ee0ca60969b3c594c02ecd1ac89dd7c35c48f73c12437c836442f661d0ab002b3d886b4fa79e6fa201ad6da6d925fa2acd748ab2f62f96798a1cea1e02493dc07b03") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000400000008000000054fcc9cd9774639eb9af37218ec2f8dfbb743a47488c0a59b567d7f9b657aa6da86d125aa1f5518aaa6c7c2cd06e749a074767f5ccd48917a", @ANYRESOCT], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1e00000000a92d0400", @ANYRES32, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000000000000030000000d00"/28], 0x50) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x7d, 0x2, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x19, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x8, 0x0, 0x0, 0x100, 0x0, '\x00', r6, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x1, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, r4, 0x1, 0x0, &(0x7f0000000940)=[{0x2, 0x3, 0x1, 0xb}], 0x10, 0x8000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x7, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair(0x23, 0xa, 0x7, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdc8, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.960811489s ago: executing program 3 (id=3866): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000e00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120030", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000851000000300000018000000000000000000000000000000950000000000000095000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.87798773s ago: executing program 3 (id=3867): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=0x1, @ANYBLOB="000300f9fffffff7ff000000000000a3516454326a2cf63161ede6999ec0d4002d1cfa437f0aa7530ff4baf5690bcbd48fb933e8091a940bb1dd859c29286b9395ebeb411aad9f16cde87722a443d5de26c0d55933c242b290", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000500), 0x5fc, r2}, 0x38) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x76, &(0x7f0000000580), &(0x7f00000006c0)=""/118, 0x80000000, 0x0, 0xab, 0xe, &(0x7f0000000740)="ceb00cad9665d008c4d4f248549415945fa1691db2cad1c76b79d7cccc6407bd02a222349f68078f9aae3155f5efc2673c3679f62280a3f0a38d7a0aba9057f36ccd47e56925359ef97b3180943d07191957252a41f196ba48fe88ae1600ec23acb0467c3792a70c102c89232211bd4af6503a3ca85c9d41f48eaca51a3b1b8e1cee26d7788363ea417692a6cfc6caa6904fb0406d3c33f212d394aba23670025cd4a0a7db45d4fff3994f", &(0x7f00000003c0)="08de42d32db8f37ec7e9ebc9cffd", 0x1, 0x0, 0x2}, 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000060000000000000000000000711070000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000600)={'syz_tun\x00', 0xc00}) close(r3) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[], 0x2) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='er -rl\x00'/17], 0x11) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, @void, @value}, 0x94) 1.620377594s ago: executing program 4 (id=3868): perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000005c0)=r0, 0x12) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) r4 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r5}, 0x10) write$cgroup_int(r4, &(0x7f0000000040)=0x1, 0x12) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r7}, 0x38) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x10, 0x80000001, 0x8, 0x7, 0x0, 0x1, 0x2000004, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r8, &(0x7f0000000080)="8065292ca5", &(0x7f0000000180)=""/86}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x20000, 0x0) ioctl$TUNSETQUEUE(r10, 0x400454d9, &(0x7f00000005c0)={'gretap0\x00'}) 1.617721754s ago: executing program 0 (id=3878): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000e00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120040", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000851000000300000018000000000000000000000000000000950000000000000095000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.574261005s ago: executing program 0 (id=3869): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r0}, 0x0, &(0x7f0000000200)}, 0x20) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80021, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_config_ext, 0x0, 0x0, 0x3fffc, 0x0, 0x6, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) 1.189870281s ago: executing program 1 (id=3870): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x18, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7fffffff, 0x1, &(0x7f00000000c0)=""/1, 0x41100, 0x49, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x2, 0x3, 0x80b7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000e40)=[{0x4, 0x1, 0x7, 0xc}, {0x5, 0x1, 0x4, 0x9}], 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000100000000000000097cd30000aa7a00000000005c040400040000009500000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0xc, 0x7}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000600)=[0xffffffffffffffff], &(0x7f0000000640)=[{0x2, 0x1, 0x4, 0x8}, {0x0, 0x3, 0x2, 0x3}, {0x5, 0x2, 0xc, 0xb}, {0x4, 0x2, 0xb, 0x2}], 0x10, 0x1000, @void, @value}, 0x94) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)=0xfff) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x0, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbf22, 0x480, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r6, r7}, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000040), 0x1) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.072721163s ago: executing program 0 (id=3871): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xca7}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x2}, 0x40000100) 989.258115ms ago: executing program 4 (id=3872): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r0) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x18, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7fffffff, 0x1, &(0x7f00000000c0)=""/1, 0x41100, 0x49, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x2, 0x3, 0x80b7, 0x40}, 0x10, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000e40)=[{0x4, 0x1, 0x7, 0xc}, {0x5, 0x1, 0x4, 0x9}], 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000100000000000000097cd30000aa7a00000000005c040400040000009500000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x4, 0xc, 0x7}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000600)=[0xffffffffffffffff], &(0x7f0000000640)=[{0x2, 0x1, 0x4, 0x8}, {0x0, 0x3, 0x2, 0x3}, {0x5, 0x2, 0xc, 0xb}, {0x4, 0x2, 0xb, 0x2}], 0x10, 0x1000, @void, @value}, 0x94) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)=0xfff) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x0, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbf22, 0x480, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r6, r7}, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 800.083457ms ago: executing program 3 (id=3873): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="000300f9fffffff7ff000000000000a3516454326a2cf63161ede6999ec0d4002d1cfa437f0aa7530ff4baf5690bcbd48fb933e8091a940bb1dd859c29286b9395ebeb411aad9f16cde87722a443d5de26c0d55933c242b290", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x2, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000500), 0x5fc, r2}, 0x38) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0, 0x76, &(0x7f0000000580), &(0x7f00000006c0)=""/118, 0x80000000, 0x0, 0xab, 0xe, &(0x7f0000000740)="ceb00cad9665d008c4d4f248549415945fa1691db2cad1c76b79d7cccc6407bd02a222349f68078f9aae3155f5efc2673c3679f62280a3f0a38d7a0aba9057f36ccd47e56925359ef97b3180943d07191957252a41f196ba48fe88ae1600ec23acb0467c3792a70c102c89232211bd4af6503a3ca85c9d41f48eaca51a3b1b8e1cee26d7788363ea417692a6cfc6caa6904fb0406d3c33f212d394aba23670025cd4a0a7db45d4fff3994f", &(0x7f00000003c0)="08de42d32db8f37ec7e9ebc9cffd", 0x1, 0x0, 0x2}, 0x50) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000060000000000000000000000711070000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000600)={'syz_tun\x00', 0xc00}) close(r3) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000000300)={&(0x7f0000000280)=@x25, 0x80, &(0x7f0000000180)=[{&(0x7f0000000540)=""/94, 0x5e}, {&(0x7f0000000a00)=""/4096, 0x1000}, {0x0}], 0x3}, 0x10121) write$cgroup_subtree(r3, &(0x7f00000000c0)=ANY=[], 0x2) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='er -rl\x00'/17], 0x11) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, @void, @value}, 0x94) 276.915796ms ago: executing program 1 (id=3874): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58, &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 64) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3, 0xffffffffffffffff}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a00)={r4, 0x58, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) r8 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000fc0)={r5, 0xe0, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000d00)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb9, &(0x7f0000000dc0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000e00), &(0x7f0000000e40), 0x8, 0x100af, 0x8, 0x8, &(0x7f0000000e80)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x15, 0x13, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x8}, [@tail_call, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000680)='syzkaller\x00', 0x1ede58db, 0x3e, &(0x7f00000006c0)=""/62, 0x41100, 0x9, '\x00', r7, @fallback=0x9, r8, 0x8, &(0x7f0000000cc0)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, r9, r6, 0x1, &(0x7f0000001000)=[r3], &(0x7f0000001040)=[{0x4, 0x2, 0xc, 0x7}], 0x10, 0xfffffff7, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x11, 0x4, &(0x7f0000000000)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}], &(0x7f0000000040)='syzkaller\x00', 0x43d, 0x1000, &(0x7f0000000180)=""/4096, 0x41000, 0x64, '\x00', r1, @fallback=0x28, r2, 0x8, &(0x7f0000001200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000001240)={0x5, 0xb, 0x5, 0x8}, 0x10, r9, 0xffffffffffffffff, 0xa, 0x0, &(0x7f0000001280)=[{0x1, 0x5, 0xa, 0x9}, {0x1, 0x5, 0x5, 0x9}, {0x4, 0x4, 0x0, 0xc}, {0x4, 0x4, 0xf, 0xb}, {0x0, 0x4, 0x4, 0x9}, {0x2, 0x3, 0xe, 0xb}, {0x4, 0x3, 0x9, 0x5}, {0x2, 0x1, 0xe, 0xc}, {0x3, 0x4, 0x7, 0xa}, {0x3, 0x3, 0x4, 0x1}], 0x10, 0xbe8, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x80000001}}]}, {0x0, [0x61]}}, 0x0, 0x53, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 198.837097ms ago: executing program 0 (id=3875): socketpair(0x1, 0x1, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01", @ANYRES32=0x0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x97fa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair(0x10, 0x1, 0x8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='thermal_zone_trip\x00', r2, 0x0, 0xffffffffffffffaa}, 0x18) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00'}, 0x10) write$cgroup_pid(r5, &(0x7f00000005c0), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r3}, 0x10) 133.916608ms ago: executing program 1 (id=3876): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xfffffff8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r1, 0x8922, &(0x7f0000002280)={'ip6tnl0\x00', @random="7fff00004ec6"}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x4, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000300)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x3, 0xdd, 0x80000001, 0x1, 0x8063, r2, 0x8e, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2, 0x0, @value, @void, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x16, &(0x7f0000000300)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x2, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 46.331219ms ago: executing program 0 (id=3877): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000a8c5000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b300000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80007}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000004c80323df200ecff00000000b180c9517952547fc11ff4f5c4c2dbe7b97570a3967287123f8fc6d2971e00000076ed5f86973c4e57543053788480eb27585ff9d6a5e8fe54f4536d04ce360736a1f795a5294b46c98b", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r1], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x18) mkdir(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8982, &(0x7f0000000080)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r5 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') 1.03124ms ago: executing program 1 (id=3879): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='ext4_update_sb\x00', r1}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 0s ago: executing program 2 (id=3356): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e01, 0x0, @perf_bp={0x0, 0x5}, 0x6c8d, 0x5, 0x0, 0x4, 0x0, 0x6e, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x10}}], 0x80}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xfffffffffffffff8}, 0x0, 0x20, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) kernel console output (not intermixed with test programs): ][ T6046] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.719289][ T28] audit: type=1400 audit(1743785765.274:150): avc: denied { write } for pid=6067 comm="syz.4.1856" name="cgroup.subtree_control" dev="cgroup2" ino=331 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 171.918077][ T28] audit: type=1400 audit(1743785765.274:151): avc: denied { open } for pid=6067 comm="syz.4.1856" path="" dev="cgroup2" ino=331 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 172.926478][ T6106] device sit0 left promiscuous mode [ 174.749896][ T6176] device syzkaller0 entered promiscuous mode [ 174.886087][ T6179] device syzkaller0 entered promiscuous mode [ 175.651252][ T6220] device syzkaller0 entered promiscuous mode [ 178.632580][ T6334] device veth0_vlan left promiscuous mode [ 178.669124][ T6334] device veth0_vlan entered promiscuous mode [ 178.711577][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.728397][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.742077][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.112506][ T28] audit: type=1400 audit(1743785772.664:152): avc: denied { ioctl } for pid=6373 comm="syz.2.1964" path="uts:[4026532560]" dev="nsfs" ino=4026532560 ioctlcmd=0x5829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 179.269169][ T6381] syz.0.1966[6381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.947307][ T6454] FAULT_INJECTION: forcing a failure. [ 180.947307][ T6454] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 180.998897][ T6454] CPU: 0 PID: 6454 Comm: syz.1.1988 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 181.008556][ T6454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 181.018451][ T6454] Call Trace: [ 181.021572][ T6454] [ 181.024350][ T6454] dump_stack_lvl+0x151/0x1b7 [ 181.028865][ T6454] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 181.034165][ T6454] dump_stack+0x15/0x18 [ 181.038151][ T6454] should_fail_ex+0x3d0/0x520 [ 181.042665][ T6454] should_fail+0xb/0x10 [ 181.046655][ T6454] should_fail_usercopy+0x1a/0x20 [ 181.051519][ T6454] _copy_to_user+0x1e/0x90 [ 181.055769][ T6454] simple_read_from_buffer+0xc7/0x150 [ 181.060981][ T6454] proc_fail_nth_read+0x1a3/0x210 [ 181.065845][ T6454] ? proc_fault_inject_write+0x390/0x390 [ 181.071303][ T6454] ? fsnotify_perm+0x269/0x5b0 [ 181.075908][ T6454] ? security_file_permission+0x86/0xb0 [ 181.081287][ T6454] ? proc_fault_inject_write+0x390/0x390 [ 181.086757][ T6454] vfs_read+0x26c/0xae0 [ 181.090760][ T6454] ? kernel_read+0x1f0/0x1f0 [ 181.095174][ T6454] ? mutex_lock+0xb1/0x1e0 [ 181.099425][ T6454] ? bit_wait_io_timeout+0x120/0x120 [ 181.104548][ T6454] ? __fdget_pos+0x2e2/0x390 [ 181.108971][ T6454] ? ksys_read+0x77/0x2c0 [ 181.113138][ T6454] ksys_read+0x199/0x2c0 [ 181.117221][ T6454] ? __this_cpu_preempt_check+0x13/0x20 [ 181.122607][ T6454] ? xfd_validate_state+0x6f/0x170 [ 181.127547][ T6454] ? vfs_write+0xed0/0xed0 [ 181.131800][ T6454] ? fpregs_restore_userregs+0x130/0x290 [ 181.137267][ T6454] __x64_sys_read+0x7b/0x90 [ 181.141607][ T6454] x64_sys_call+0x28/0x9a0 [ 181.145861][ T6454] do_syscall_64+0x3b/0xb0 [ 181.150112][ T6454] ? clear_bhb_loop+0x55/0xb0 [ 181.154636][ T6454] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 181.160352][ T6454] RIP: 0033:0x7f041378bb7c [ 181.164610][ T6454] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 181.184056][ T6454] RSP: 002b:00007f0414529030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 181.192295][ T6454] RAX: ffffffffffffffda RBX: 00007f04139a5fa0 RCX: 00007f041378bb7c [ 181.200110][ T6454] RDX: 000000000000000f RSI: 00007f04145290a0 RDI: 0000000000000007 [ 181.207920][ T6454] RBP: 00007f0414529090 R08: 0000000000000000 R09: 0000000000000000 [ 181.215732][ T6454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 181.223543][ T6454] R13: 0000000000000000 R14: 00007f04139a5fa0 R15: 00007ffc46f93508 [ 181.231358][ T6454] [ 183.944163][ T6538] device veth1_macvtap left promiscuous mode [ 183.968471][ T6538] device macsec0 left promiscuous mode [ 184.038591][ T6544] device veth1_macvtap entered promiscuous mode [ 184.063993][ T6544] device macsec0 entered promiscuous mode [ 187.492066][ T6691] device syzkaller0 entered promiscuous mode [ 189.998029][ T6799] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.006165][ T6799] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.126886][ T6807] device bridge_slave_1 left promiscuous mode [ 190.133477][ T6807] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.182790][ T6807] device bridge_slave_0 left promiscuous mode [ 190.207966][ T6807] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.256722][ T6873] device sit0 left promiscuous mode [ 192.413490][ T6874] device sit0 entered promiscuous mode [ 194.230221][ T6946] device syzkaller0 entered promiscuous mode [ 194.800484][ T6974] device syzkaller0 entered promiscuous mode [ 195.165817][ T28] audit: type=1400 audit(1743785788.714:153): avc: denied { create } for pid=6995 comm="syz.4.2161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 195.748052][ T7022] device pim6reg1 entered promiscuous mode [ 198.400857][ T7132] device veth1_macvtap left promiscuous mode [ 198.407242][ T7132] device macsec0 left promiscuous mode [ 198.733880][ T7155] device veth1_macvtap left promiscuous mode [ 198.772902][ T7155] device macsec0 left promiscuous mode [ 198.841487][ T7159] device veth1_macvtap entered promiscuous mode [ 198.908924][ T7159] device macsec0 entered promiscuous mode [ 199.062062][ T7157] device syzkaller0 entered promiscuous mode [ 200.583475][ T28] audit: type=1400 audit(1743785794.134:154): avc: denied { create } for pid=7206 comm="syz.0.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 202.036794][ T7269] device veth0_vlan left promiscuous mode [ 202.044854][ T7269] device veth0_vlan entered promiscuous mode [ 202.070433][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.096025][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.108823][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.355207][ T7349] device veth0_vlan left promiscuous mode [ 204.433107][ T7349] device veth0_vlan entered promiscuous mode [ 206.116111][ T7399] bridge0: port 3(dummy0) entered disabled state [ 206.122382][ T7399] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.129311][ T7399] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.509498][ T7454] device syzkaller0 entered promiscuous mode [ 209.834608][ T7536] device sit0 entered promiscuous mode [ 210.476265][ T7555] device syzkaller0 entered promiscuous mode [ 210.539390][ T28] audit: type=1400 audit(1743785804.094:155): avc: denied { create } for pid=7554 comm="syz.0.2336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 211.679859][ T28] audit: type=1400 audit(1743785805.234:156): avc: denied { append } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 211.701733][ T28] audit: type=1400 audit(1743785805.234:157): avc: denied { open } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 211.728502][ T28] audit: type=1400 audit(1743785805.234:158): avc: denied { getattr } for pid=85 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 211.763761][ T7612] syz.2.2354[7612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.763816][ T7612] syz.2.2354[7612] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.166328][ T7623] device syzkaller0 entered promiscuous mode [ 213.983069][ T7677] device dummy0 left promiscuous mode [ 213.988781][ T7677] bridge0: port 3(dummy0) entered disabled state [ 214.024839][ T7677] device bridge_slave_1 left promiscuous mode [ 214.098062][ T7677] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.135316][ T7677] device bridge_slave_0 left promiscuous mode [ 214.165881][ T7677] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.067839][ T7712] device sit0 left promiscuous mode [ 216.204242][ T7717] device sit0 entered promiscuous mode [ 216.672192][ T7719] device wg2 left promiscuous mode [ 220.210360][ T7862] gretap0: refused to change device tx_queue_len [ 220.636644][ T7887] device sit0 left promiscuous mode [ 220.744798][ T7890] device sit0 entered promiscuous mode [ 221.442578][ T7940] device veth1_macvtap left promiscuous mode [ 221.670960][ T7943] device veth1_macvtap entered promiscuous mode [ 221.705829][ T7943] device macsec0 entered promiscuous mode [ 225.225241][ T28] audit: type=1400 audit(1743785818.774:159): avc: denied { create } for pid=8109 comm="syz.0.2511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 225.303386][ T8112] FAULT_INJECTION: forcing a failure. [ 225.303386][ T8112] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 225.472312][ T8112] CPU: 0 PID: 8112 Comm: syz.4.2510 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 225.481981][ T8112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 225.491876][ T8112] Call Trace: [ 225.495157][ T8112] [ 225.497945][ T8112] dump_stack_lvl+0x151/0x1b7 [ 225.502447][ T8112] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 225.507741][ T8112] ? vfs_write+0x952/0xed0 [ 225.511998][ T8112] ? __kasan_slab_free+0x11/0x20 [ 225.516767][ T8112] dump_stack+0x15/0x18 [ 225.520760][ T8112] should_fail_ex+0x3d0/0x520 [ 225.525274][ T8112] should_fail+0xb/0x10 [ 225.529265][ T8112] should_fail_usercopy+0x1a/0x20 [ 225.534128][ T8112] _copy_from_user+0x1e/0xc0 [ 225.538553][ T8112] __sys_bpf+0x23b/0x7f0 [ 225.542636][ T8112] ? bpf_link_show_fdinfo+0x300/0x300 [ 225.547844][ T8112] ? __ia32_sys_read+0x90/0x90 [ 225.552442][ T8112] ? debug_smp_processor_id+0x17/0x20 [ 225.557649][ T8112] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 225.563555][ T8112] __x64_sys_bpf+0x7c/0x90 [ 225.567805][ T8112] x64_sys_call+0x87f/0x9a0 [ 225.572143][ T8112] do_syscall_64+0x3b/0xb0 [ 225.576393][ T8112] ? clear_bhb_loop+0x55/0xb0 [ 225.580911][ T8112] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 225.586636][ T8112] RIP: 0033:0x7f748038d169 [ 225.590887][ T8112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 225.610341][ T8112] RSP: 002b:00007f74811de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 225.618581][ T8112] RAX: ffffffffffffffda RBX: 00007f74805a5fa0 RCX: 00007f748038d169 [ 225.626388][ T8112] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 2000000000000000 [ 225.634211][ T8112] RBP: 00007f74811de090 R08: 0000000000000000 R09: 0000000000000000 [ 225.642015][ T8112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 225.649824][ T8112] R13: 0000000000000000 R14: 00007f74805a5fa0 R15: 00007ffce2ac1fc8 [ 225.657636][ T8112] [ 226.067620][ T28] audit: type=1400 audit(1743785819.614:160): avc: denied { ioctl } for pid=8125 comm="syz.0.2516" path="socket:[38582]" dev="sockfs" ino=38582 ioctlcmd=0x8b18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 229.469014][ T8311] bond_slave_1: mtu less than device minimum [ 229.511034][ T8311] device pim6reg1 entered promiscuous mode [ 230.110304][ T8338] device sit0 left promiscuous mode [ 230.381217][ T8348] device sit0 entered promiscuous mode [ 230.920236][ T8368] device pim6reg1 entered promiscuous mode [ 231.288972][ T293] syz-executor (293) used greatest stack depth: 21488 bytes left [ 231.454138][ T8391] device syzkaller0 entered promiscuous mode [ 233.325179][ T8399] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.369059][ T8399] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.376485][ T8399] device bridge_slave_0 entered promiscuous mode [ 233.385810][ T8399] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.420561][ T8399] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.449767][ T8399] device bridge_slave_1 entered promiscuous mode [ 234.224307][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.242203][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.283966][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.359583][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.403949][ T518] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.410856][ T518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.453448][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.514449][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.564857][ T518] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.571780][ T518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.629430][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.649621][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.678072][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.706771][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.738211][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.779018][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 234.799145][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.821670][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 234.855935][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.916990][ T8399] device veth0_vlan entered promiscuous mode [ 234.937594][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.985715][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.039570][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.088171][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.142787][ T8399] device veth1_macvtap entered promiscuous mode [ 235.193823][ T8458] device syzkaller0 entered promiscuous mode [ 235.235785][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.254737][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.264076][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.298270][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 235.387962][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 235.480959][ T28] audit: type=1400 audit(1743785829.034:161): avc: denied { mounton } for pid=8399 comm="syz-executor" path="/root/syzkaller.3dOnrv/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 235.556213][ T28] audit: type=1400 audit(1743785829.064:162): avc: denied { mount } for pid=8399 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 235.730680][ T28] audit: type=1400 audit(1743785829.064:163): avc: denied { mounton } for pid=8399 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=528 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 235.863520][ T28] audit: type=1400 audit(1743785829.414:164): avc: denied { create } for pid=8491 comm="syz.2.2638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 238.096732][ T8619] device pim6reg1 entered promiscuous mode [ 238.166930][ T8613] device veth1_macvtap left promiscuous mode [ 238.245136][ T8615] device veth1_macvtap entered promiscuous mode [ 238.320117][ T8636] device syzkaller0 entered promiscuous mode [ 239.168052][ T8693] device syzkaller0 entered promiscuous mode [ 239.846876][ T8719] device syzkaller0 entered promiscuous mode [ 240.289632][ T8750] FAULT_INJECTION: forcing a failure. [ 240.289632][ T8750] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 240.318007][ T8750] CPU: 0 PID: 8750 Comm: syz.2.2729 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 240.327662][ T8750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 240.337646][ T8750] Call Trace: [ 240.340766][ T8750] [ 240.343544][ T8750] dump_stack_lvl+0x151/0x1b7 [ 240.348059][ T8750] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 240.353360][ T8750] dump_stack+0x15/0x18 [ 240.357344][ T8750] should_fail_ex+0x3d0/0x520 [ 240.361860][ T8750] should_fail+0xb/0x10 [ 240.365850][ T8750] should_fail_usercopy+0x1a/0x20 [ 240.370713][ T8750] _copy_to_user+0x1e/0x90 [ 240.374963][ T8750] simple_read_from_buffer+0xc7/0x150 [ 240.380176][ T8750] proc_fail_nth_read+0x1a3/0x210 [ 240.385031][ T8750] ? proc_fault_inject_write+0x390/0x390 [ 240.390502][ T8750] ? fsnotify_perm+0x269/0x5b0 [ 240.395104][ T8750] ? security_file_permission+0x86/0xb0 [ 240.400480][ T8750] ? proc_fault_inject_write+0x390/0x390 [ 240.405948][ T8750] vfs_read+0x26c/0xae0 [ 240.409944][ T8750] ? __kasan_check_write+0x14/0x20 [ 240.414890][ T8750] ? kernel_read+0x1f0/0x1f0 [ 240.419316][ T8750] ? mutex_lock+0xb1/0x1e0 [ 240.423568][ T8750] ? bit_wait_io_timeout+0x120/0x120 [ 240.428690][ T8750] ? __fdget_pos+0x2e2/0x390 [ 240.433112][ T8750] ? ksys_read+0x77/0x2c0 [ 240.437282][ T8750] ksys_read+0x199/0x2c0 [ 240.441364][ T8750] ? vfs_write+0xed0/0xed0 [ 240.445616][ T8750] ? debug_smp_processor_id+0x17/0x20 [ 240.450822][ T8750] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 240.456726][ T8750] __x64_sys_read+0x7b/0x90 [ 240.461066][ T8750] x64_sys_call+0x28/0x9a0 [ 240.465316][ T8750] do_syscall_64+0x3b/0xb0 [ 240.469567][ T8750] ? clear_bhb_loop+0x55/0xb0 [ 240.474080][ T8750] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 240.479825][ T8750] RIP: 0033:0x7fb97498bb7c [ 240.484061][ T8750] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 240.503505][ T8750] RSP: 002b:00007fb975746030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 240.511752][ T8750] RAX: ffffffffffffffda RBX: 00007fb974ba5fa0 RCX: 00007fb97498bb7c [ 240.519563][ T8750] RDX: 000000000000000f RSI: 00007fb9757460a0 RDI: 0000000000000006 [ 240.527373][ T8750] RBP: 00007fb975746090 R08: 0000000000000000 R09: 0000000000000000 [ 240.535187][ T8750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.542995][ T8750] R13: 0000000000000000 R14: 00007fb974ba5fa0 R15: 00007ffc0e4309a8 [ 240.550811][ T8750] [ 240.901378][ T8774] device syzkaller0 entered promiscuous mode [ 241.852515][ T8828] device sit0 left promiscuous mode [ 241.912933][ T8820] device sit0 entered promiscuous mode [ 242.104473][ T8830] device veth1_macvtap left promiscuous mode [ 242.163073][ T8831] device veth1_macvtap entered promiscuous mode [ 242.171856][ T8831] device macsec0 entered promiscuous mode [ 242.242339][ T8840] device syzkaller0 entered promiscuous mode [ 242.629031][ T8851] device pim6reg1 entered promiscuous mode [ 243.867606][ T8900] device wg2 left promiscuous mode [ 243.983483][ T8903] device pim6reg1 entered promiscuous mode [ 244.179892][ T8904] device wg2 entered promiscuous mode [ 245.240725][ T8937] device syzkaller0 entered promiscuous mode [ 247.641256][ T8989] device syzkaller0 entered promiscuous mode [ 249.017833][ T9043] device sit0 left promiscuous mode [ 251.471998][ T9137] device wg2 entered promiscuous mode [ 252.051766][ T9153] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 252.216750][ T9153] device syzkaller0 entered promiscuous mode [ 253.472691][ T9200] device syzkaller0 entered promiscuous mode [ 254.287958][ T9224] device veth0_vlan left promiscuous mode [ 254.316625][ T9224] device veth0_vlan entered promiscuous mode [ 255.015137][ T9246] device syzkaller0 entered promiscuous mode [ 255.466580][ T9280] syz.0.2881[9280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.466660][ T9280] syz.0.2881[9280] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.794143][ T9295] device syzkaller0 entered promiscuous mode [ 257.098202][ T9356] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 257.261764][ T9356] device syzkaller0 entered promiscuous mode [ 257.447521][ T9371] 7Ս֕: renamed from syzkaller0 [ 258.969571][ T28] audit: type=1400 audit(1743785852.524:165): avc: denied { create } for pid=9429 comm="syz.4.2934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 259.106670][ T9426] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.136811][ T9426] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.145169][ T9426] device bridge_slave_0 entered promiscuous mode [ 259.166197][ T9426] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.205166][ T9426] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.248318][ T9426] device bridge_slave_1 entered promiscuous mode [ 259.380482][ T9443] device veth0_vlan left promiscuous mode [ 259.419749][ T9443] device veth0_vlan entered promiscuous mode [ 259.474630][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.483380][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.580640][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.038148][ T9470] device syzkaller0 entered promiscuous mode [ 260.103140][ T518] device bridge_slave_1 left promiscuous mode [ 260.125054][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.158076][ T518] device bridge_slave_0 left promiscuous mode [ 260.176276][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.205180][ T518] device veth1_macvtap left promiscuous mode [ 260.227311][ T518] device veth0_vlan left promiscuous mode [ 260.453454][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.469624][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.504630][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.539299][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.564279][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.571185][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.597399][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.626369][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.642777][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.651326][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.658222][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.739078][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 260.768516][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.794400][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 260.822165][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.848499][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.877093][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.922480][ T9426] device veth0_vlan entered promiscuous mode [ 260.941769][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.956112][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.980393][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.054567][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.135078][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 261.182837][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.220518][ T9426] device veth1_macvtap entered promiscuous mode [ 261.266799][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 261.276728][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.308752][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.423582][ T9513] device syzkaller0 entered promiscuous mode [ 261.475194][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.498768][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 265.799393][ T9652] device syzkaller0 entered promiscuous mode [ 265.922580][ T9657] device syzkaller0 entered promiscuous mode [ 267.604036][ T9703] device syzkaller0 entered promiscuous mode [ 268.206371][ T9715] device syzkaller0 entered promiscuous mode [ 270.004395][ T9764] device sit0 entered promiscuous mode [ 270.219241][ T9761] device syzkaller0 entered promiscuous mode [ 271.702884][ T9825] device sit0 entered promiscuous mode [ 272.128448][ T9831] device syzkaller0 entered promiscuous mode [ 272.814114][ T9888] device sit0 left promiscuous mode [ 273.011831][ T9888] device sit0 entered promiscuous mode [ 273.228695][ T9899] device syzkaller0 entered promiscuous mode [ 273.714525][ T294] syz-executor (294) used greatest stack depth: 21040 bytes left [ 274.217177][ T9918] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.236785][ T9918] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.281196][ T9918] device bridge_slave_0 entered promiscuous mode [ 274.352027][ T9918] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.359062][ T9918] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.366473][ T9918] device bridge_slave_1 entered promiscuous mode [ 274.446054][ T9936] device syzkaller0 entered promiscuous mode [ 274.580584][ T313] device veth1_macvtap left promiscuous mode [ 274.936714][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 274.950884][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.994542][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 275.016661][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 275.025474][ T518] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.032365][ T518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.043447][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 275.063311][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.089684][ T518] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.096599][ T518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.166080][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 275.183810][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 275.222439][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 275.237276][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 275.296458][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 275.318540][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 275.368012][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 275.389707][ T9918] device veth0_vlan entered promiscuous mode [ 275.434737][ T9984] device syzkaller0 entered promiscuous mode [ 275.473289][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 275.488202][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 275.515440][ T9918] device veth1_macvtap entered promiscuous mode [ 275.559868][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 275.570201][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 275.580136][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 275.609103][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 275.645618][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 275.692520][ T9992] device pim6reg1 entered promiscuous mode [ 276.362420][T10032] device syzkaller0 entered promiscuous mode [ 276.873063][ T28] audit: type=1400 audit(1743785870.424:166): avc: denied { create } for pid=10056 comm="syz.4.3112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 277.262773][T10072] device syzkaller0 entered promiscuous mode [ 278.962313][T10134] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.972580][T10134] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.008295][T10134] device bridge_slave_0 entered promiscuous mode [ 279.021817][T10134] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.028787][T10134] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.036127][T10134] device bridge_slave_1 entered promiscuous mode [ 279.171770][T10134] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.178770][T10134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.185843][T10134] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.192672][T10134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.248598][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 279.265463][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.302262][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.361168][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.408048][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.414943][ T381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.450707][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.492930][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.499858][ T381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.626584][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.662733][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.726252][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.780989][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 279.804468][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 279.863609][T10134] device veth0_vlan entered promiscuous mode [ 279.901525][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 279.909506][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.937592][T10134] device veth1_macvtap entered promiscuous mode [ 279.949930][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 279.961480][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.991401][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 280.013402][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 280.040894][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 280.074514][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 280.100084][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 280.151934][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 280.193495][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 280.360807][ T8] device veth1_macvtap left promiscuous mode [ 280.372600][ T8] device veth0_vlan left promiscuous mode [ 280.733254][T10212] device syzkaller0 entered promiscuous mode [ 281.248653][T10240] device syzkaller0 entered promiscuous mode [ 281.468701][T10254] FAULT_INJECTION: forcing a failure. [ 281.468701][T10254] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 281.481861][T10254] CPU: 1 PID: 10254 Comm: syz.0.3172 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 281.491594][T10254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 281.501474][T10254] Call Trace: [ 281.504604][T10254] [ 281.507382][T10254] dump_stack_lvl+0x151/0x1b7 [ 281.511890][T10254] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 281.517180][T10254] ? vfs_write+0x952/0xed0 [ 281.521440][T10254] dump_stack+0x15/0x18 [ 281.525426][T10254] should_fail_ex+0x3d0/0x520 [ 281.529941][T10254] should_fail+0xb/0x10 [ 281.533933][T10254] should_fail_usercopy+0x1a/0x20 [ 281.538793][T10254] _copy_from_user+0x1e/0xc0 [ 281.543220][T10254] __sys_bpf+0x23b/0x7f0 [ 281.547301][T10254] ? bpf_link_show_fdinfo+0x300/0x300 [ 281.552520][T10254] ? __ia32_sys_read+0x90/0x90 [ 281.557105][T10254] ? debug_smp_processor_id+0x17/0x20 [ 281.562337][T10254] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 281.568222][T10254] __x64_sys_bpf+0x7c/0x90 [ 281.572469][T10254] x64_sys_call+0x87f/0x9a0 [ 281.576811][T10254] do_syscall_64+0x3b/0xb0 [ 281.581060][T10254] ? clear_bhb_loop+0x55/0xb0 [ 281.585573][T10254] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 281.591303][T10254] RIP: 0033:0x7ff43598d169 [ 281.595554][T10254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 281.615000][T10254] RSP: 002b:00007ff43675e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 281.623242][T10254] RAX: ffffffffffffffda RBX: 00007ff435ba5fa0 RCX: 00007ff43598d169 [ 281.631051][T10254] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 281.638868][T10254] RBP: 00007ff43675e090 R08: 0000000000000000 R09: 0000000000000000 [ 281.646682][T10254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.654596][T10254] R13: 0000000000000000 R14: 00007ff435ba5fa0 R15: 00007fff2b32e298 [ 281.662410][T10254] [ 281.999453][T10270] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.006318][T10270] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.060457][T10270] device bridge_slave_0 entered promiscuous mode [ 282.069721][T10270] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.076639][T10270] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.084451][T10270] device bridge_slave_1 entered promiscuous mode [ 282.324411][T10270] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.331334][T10270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.338444][T10270] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.345294][T10270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.403830][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.421233][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.453922][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.485910][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 282.548158][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.555141][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.640070][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 282.672962][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.679878][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.781140][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 282.816770][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 282.926774][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 282.945233][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 283.020128][T10303] device syzkaller0 entered promiscuous mode [ 283.039156][T10270] device veth0_vlan entered promiscuous mode [ 283.095173][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 283.103751][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.150027][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 283.158658][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.174991][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 283.191868][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 283.224982][T10270] device veth1_macvtap entered promiscuous mode [ 283.274709][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 283.288229][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 283.316483][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 283.370562][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 283.433009][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 283.560391][T10338] device sit0 entered promiscuous mode [ 283.910468][ T8] device bridge_slave_1 left promiscuous mode [ 283.939122][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.978569][ T8] device bridge_slave_0 left promiscuous mode [ 283.984550][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.759973][T10374] device syzkaller0 entered promiscuous mode [ 285.204483][T10393] FAULT_INJECTION: forcing a failure. [ 285.204483][T10393] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 285.221362][T10393] CPU: 1 PID: 10393 Comm: syz.4.3216 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 285.231094][T10393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 285.240986][T10393] Call Trace: [ 285.244107][T10393] [ 285.246886][T10393] dump_stack_lvl+0x151/0x1b7 [ 285.251399][T10393] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 285.256695][T10393] dump_stack+0x15/0x18 [ 285.260686][T10393] should_fail_ex+0x3d0/0x520 [ 285.265198][T10393] should_fail+0xb/0x10 [ 285.269198][T10393] should_fail_usercopy+0x1a/0x20 [ 285.274050][T10393] _copy_from_user+0x1e/0xc0 [ 285.278477][T10393] generic_map_update_batch+0x4d9/0x8c0 [ 285.283858][T10393] ? generic_map_delete_batch+0x5c0/0x5c0 [ 285.289414][T10393] ? generic_map_delete_batch+0x5c0/0x5c0 [ 285.294969][T10393] bpf_map_do_batch+0x4cc/0x630 [ 285.299655][T10393] __sys_bpf+0x66b/0x7f0 [ 285.303733][T10393] ? bpf_link_show_fdinfo+0x300/0x300 [ 285.308944][T10393] ? __ia32_sys_read+0x90/0x90 [ 285.313543][T10393] ? debug_smp_processor_id+0x17/0x20 [ 285.318747][T10393] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 285.324655][T10393] __x64_sys_bpf+0x7c/0x90 [ 285.328904][T10393] x64_sys_call+0x87f/0x9a0 [ 285.333248][T10393] do_syscall_64+0x3b/0xb0 [ 285.337496][T10393] ? clear_bhb_loop+0x55/0xb0 [ 285.342012][T10393] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 285.347736][T10393] RIP: 0033:0x7f294d38d169 [ 285.351993][T10393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 285.371432][T10393] RSP: 002b:00007f294e1a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 285.379675][T10393] RAX: ffffffffffffffda RBX: 00007f294d5a5fa0 RCX: 00007f294d38d169 [ 285.387489][T10393] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 285.395302][T10393] RBP: 00007f294e1a4090 R08: 0000000000000000 R09: 0000000000000000 [ 285.403112][T10393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.410921][T10393] R13: 0000000000000000 R14: 00007f294d5a5fa0 R15: 00007ffd0118b798 [ 285.418739][T10393] [ 285.437108][ T28] audit: type=1400 audit(1743785878.984:167): avc: denied { rename } for pid=85 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 285.499301][ T28] audit: type=1400 audit(1743785878.984:168): avc: denied { unlink } for pid=85 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 285.637643][ T28] audit: type=1400 audit(1743785878.984:169): avc: denied { create } for pid=85 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 285.784742][T10412] device syzkaller0 entered promiscuous mode [ 286.038710][T10430] device sit0 entered promiscuous mode [ 286.094892][T10443] FAULT_INJECTION: forcing a failure. [ 286.094892][T10443] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 286.147858][T10443] CPU: 0 PID: 10443 Comm: syz.4.3240 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 286.157600][T10443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 286.167494][T10443] Call Trace: [ 286.170618][T10443] [ 286.173392][T10443] dump_stack_lvl+0x151/0x1b7 [ 286.177907][T10443] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 286.183202][T10443] ? __check_object_size+0x76/0x650 [ 286.188237][T10443] dump_stack+0x15/0x18 [ 286.192225][T10443] should_fail_ex+0x3d0/0x520 [ 286.196741][T10443] should_fail+0xb/0x10 [ 286.200737][T10443] should_fail_usercopy+0x1a/0x20 [ 286.205590][T10443] _copy_from_user+0x1e/0xc0 [ 286.210017][T10443] generic_map_update_batch+0x54c/0x8c0 [ 286.215402][T10443] ? generic_map_delete_batch+0x5c0/0x5c0 [ 286.220955][T10443] ? generic_map_delete_batch+0x5c0/0x5c0 [ 286.226507][T10443] bpf_map_do_batch+0x4cc/0x630 [ 286.231196][T10443] __sys_bpf+0x66b/0x7f0 [ 286.235273][T10443] ? bpf_link_show_fdinfo+0x300/0x300 [ 286.240486][T10443] ? __ia32_sys_read+0x90/0x90 [ 286.245084][T10443] ? debug_smp_processor_id+0x17/0x20 [ 286.250287][T10443] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 286.256193][T10443] __x64_sys_bpf+0x7c/0x90 [ 286.260445][T10443] x64_sys_call+0x87f/0x9a0 [ 286.264781][T10443] do_syscall_64+0x3b/0xb0 [ 286.269035][T10443] ? clear_bhb_loop+0x55/0xb0 [ 286.273547][T10443] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 286.279278][T10443] RIP: 0033:0x7f294d38d169 [ 286.283539][T10443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.302971][T10443] RSP: 002b:00007f294e1a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 286.311226][T10443] RAX: ffffffffffffffda RBX: 00007f294d5a5fa0 RCX: 00007f294d38d169 [ 286.319026][T10443] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 286.326848][T10443] RBP: 00007f294e1a4090 R08: 0000000000000000 R09: 0000000000000000 [ 286.334650][T10443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.342461][T10443] R13: 0000000000000000 R14: 00007f294d5a5fa0 R15: 00007ffd0118b798 [ 286.350277][T10443] [ 286.403003][T10453] device sit0 entered promiscuous mode [ 286.468151][T10452] device syzkaller0 entered promiscuous mode [ 287.644728][T10513] device syzkaller0 entered promiscuous mode [ 289.070177][T10583] device syzkaller0 entered promiscuous mode [ 289.502750][T10606] device pim6reg1 entered promiscuous mode [ 290.133325][T10634] device syzkaller0 entered promiscuous mode [ 292.147923][T10699] device sit0 left promiscuous mode [ 292.175963][T10703] device sit0 entered promiscuous mode [ 292.288739][T10712] FAULT_INJECTION: forcing a failure. [ 292.288739][T10712] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 292.302250][T10712] CPU: 0 PID: 10712 Comm: syz.0.3328 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 292.311995][T10712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 292.321889][T10712] Call Trace: [ 292.325015][T10712] [ 292.327790][T10712] dump_stack_lvl+0x151/0x1b7 [ 292.332304][T10712] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 292.337592][T10712] ? migrate_enable+0x1cb/0x2b0 [ 292.342283][T10712] dump_stack+0x15/0x18 [ 292.346274][T10712] should_fail_ex+0x3d0/0x520 [ 292.350790][T10712] should_fail+0xb/0x10 [ 292.354778][T10712] should_fail_usercopy+0x1a/0x20 [ 292.359638][T10712] _copy_from_user+0x1e/0xc0 [ 292.364065][T10712] generic_map_update_batch+0x4d9/0x8c0 [ 292.369449][T10712] ? generic_map_delete_batch+0x5c0/0x5c0 [ 292.375003][T10712] ? generic_map_delete_batch+0x5c0/0x5c0 [ 292.380560][T10712] bpf_map_do_batch+0x4cc/0x630 [ 292.385247][T10712] __sys_bpf+0x66b/0x7f0 [ 292.389323][T10712] ? bpf_link_show_fdinfo+0x300/0x300 [ 292.394534][T10712] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 292.400524][T10712] __x64_sys_bpf+0x7c/0x90 [ 292.404777][T10712] x64_sys_call+0x87f/0x9a0 [ 292.409112][T10712] do_syscall_64+0x3b/0xb0 [ 292.413364][T10712] ? clear_bhb_loop+0x55/0xb0 [ 292.417883][T10712] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 292.423607][T10712] RIP: 0033:0x7fc7d8b8d169 [ 292.427860][T10712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 292.447303][T10712] RSP: 002b:00007fc7d9aac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 292.455554][T10712] RAX: ffffffffffffffda RBX: 00007fc7d8da5fa0 RCX: 00007fc7d8b8d169 [ 292.463358][T10712] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 292.471168][T10712] RBP: 00007fc7d9aac090 R08: 0000000000000000 R09: 0000000000000000 [ 292.478981][T10712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 292.486791][T10712] R13: 0000000000000000 R14: 00007fc7d8da5fa0 R15: 00007fffefcaea48 [ 292.494612][T10712] [ 292.516022][T10705] device pim6reg1 entered promiscuous mode [ 294.042400][T10761] FAULT_INJECTION: forcing a failure. [ 294.042400][T10761] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 294.100963][T10761] CPU: 0 PID: 10761 Comm: syz.2.3343 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 294.110705][T10761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 294.120602][T10761] Call Trace: [ 294.123722][T10761] [ 294.126503][T10761] dump_stack_lvl+0x151/0x1b7 [ 294.131015][T10761] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 294.136313][T10761] dump_stack+0x15/0x18 [ 294.140301][T10761] should_fail_ex+0x3d0/0x520 [ 294.144815][T10761] should_fail+0xb/0x10 [ 294.148809][T10761] should_fail_usercopy+0x1a/0x20 [ 294.153670][T10761] _copy_from_user+0x1e/0xc0 [ 294.158093][T10761] generic_map_update_batch+0x54c/0x8c0 [ 294.163480][T10761] ? generic_map_delete_batch+0x5c0/0x5c0 [ 294.169043][T10761] ? generic_map_delete_batch+0x5c0/0x5c0 [ 294.174587][T10761] bpf_map_do_batch+0x4cc/0x630 [ 294.179273][T10761] __sys_bpf+0x66b/0x7f0 [ 294.183354][T10761] ? bpf_link_show_fdinfo+0x300/0x300 [ 294.188560][T10761] ? __ia32_sys_read+0x90/0x90 [ 294.193160][T10761] ? debug_smp_processor_id+0x17/0x20 [ 294.198365][T10761] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 294.204271][T10761] __x64_sys_bpf+0x7c/0x90 [ 294.208520][T10761] x64_sys_call+0x87f/0x9a0 [ 294.212860][T10761] do_syscall_64+0x3b/0xb0 [ 294.217111][T10761] ? clear_bhb_loop+0x55/0xb0 [ 294.221631][T10761] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 294.227356][T10761] RIP: 0033:0x7ff78418d169 [ 294.231614][T10761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 294.251136][T10761] RSP: 002b:00007ff7850a3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 294.259385][T10761] RAX: ffffffffffffffda RBX: 00007ff7843a5fa0 RCX: 00007ff78418d169 [ 294.267192][T10761] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 294.275003][T10761] RBP: 00007ff7850a3090 R08: 0000000000000000 R09: 0000000000000000 [ 294.282815][T10761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 294.290627][T10761] R13: 0000000000000000 R14: 00007ff7843a5fa0 R15: 00007ffc7862fa48 [ 294.298443][T10761] [ 296.500848][T10812] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.510675][T10812] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.518430][T10812] device bridge_slave_0 entered promiscuous mode [ 296.626929][T10812] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.641597][T10812] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.705989][T10812] device bridge_slave_1 entered promiscuous mode [ 296.839698][ T8] device bridge_slave_1 left promiscuous mode [ 296.845701][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.866042][T10828] FAULT_INJECTION: forcing a failure. [ 296.866042][T10828] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 296.890242][ T8] device bridge_slave_0 left promiscuous mode [ 296.896295][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.904789][T10828] CPU: 1 PID: 10828 Comm: syz.3.3362 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 296.914523][T10828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 296.924414][T10828] Call Trace: [ 296.927587][T10828] [ 296.930315][T10828] dump_stack_lvl+0x151/0x1b7 [ 296.934827][T10828] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 296.940124][T10828] ? migrate_enable+0x1cb/0x2b0 [ 296.944812][T10828] dump_stack+0x15/0x18 [ 296.948802][T10828] should_fail_ex+0x3d0/0x520 [ 296.953314][T10828] should_fail+0xb/0x10 [ 296.957305][T10828] should_fail_usercopy+0x1a/0x20 [ 296.962173][T10828] _copy_from_user+0x1e/0xc0 [ 296.966595][T10828] generic_map_update_batch+0x4d9/0x8c0 [ 296.971977][T10828] ? generic_map_delete_batch+0x5c0/0x5c0 [ 296.977531][T10828] ? generic_map_delete_batch+0x5c0/0x5c0 [ 296.983086][T10828] bpf_map_do_batch+0x4cc/0x630 [ 296.987770][T10828] __sys_bpf+0x66b/0x7f0 [ 296.991848][T10828] ? bpf_link_show_fdinfo+0x300/0x300 [ 296.997065][T10828] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 297.003050][T10828] __x64_sys_bpf+0x7c/0x90 [ 297.007300][T10828] x64_sys_call+0x87f/0x9a0 [ 297.011635][T10828] do_syscall_64+0x3b/0xb0 [ 297.015886][T10828] ? clear_bhb_loop+0x55/0xb0 [ 297.020403][T10828] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 297.026136][T10828] RIP: 0033:0x7f6003f8d169 [ 297.030388][T10828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.049827][T10828] RSP: 002b:00007f6004d50038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 297.058073][T10828] RAX: ffffffffffffffda RBX: 00007f60041a5fa0 RCX: 00007f6003f8d169 [ 297.065884][T10828] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 297.073696][T10828] RBP: 00007f6004d50090 R08: 0000000000000000 R09: 0000000000000000 [ 297.081507][T10828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 297.089316][T10828] R13: 0000000000000000 R14: 00007f60041a5fa0 R15: 00007ffd2f2216b8 [ 297.097135][T10828] [ 297.114342][ T8] device veth1_macvtap left promiscuous mode [ 297.125386][ T8] device veth0_vlan left promiscuous mode [ 297.998480][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 298.018020][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.072123][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 298.096588][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.128088][ T518] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.135084][ T518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.193242][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 298.221111][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.250031][ T518] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.256904][ T518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.315157][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 298.350618][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 298.378498][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.409514][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 298.448319][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 298.492841][T10812] device veth0_vlan entered promiscuous mode [ 298.538717][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 298.557363][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 298.570926][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 298.579101][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.605735][T10812] device veth1_macvtap entered promiscuous mode [ 298.658704][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.666399][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.698441][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 298.766271][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 298.780305][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 298.822879][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 298.831596][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 298.841147][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 298.849799][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 299.607524][ T8] device bridge_slave_1 left promiscuous mode [ 299.627852][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.653737][ T8] device bridge_slave_0 left promiscuous mode [ 299.667531][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.700171][ T8] device veth1_macvtap left promiscuous mode [ 299.706059][ T8] device veth0_vlan left promiscuous mode [ 300.202034][T10894] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.209001][T10894] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.216267][T10894] device bridge_slave_0 entered promiscuous mode [ 300.224781][T10894] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.231852][T10894] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.240387][T10894] device bridge_slave_1 entered promiscuous mode [ 300.538994][T10894] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.545907][T10894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.553008][T10894] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.559784][T10894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.771236][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.804313][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.853566][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.907089][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.919198][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.926192][ T381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.979410][T10894] device veth0_vlan entered promiscuous mode [ 300.996042][T10894] device veth1_macvtap entered promiscuous mode [ 301.019048][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 301.027673][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.036087][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.043960][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 301.052652][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 301.061179][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.075685][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.082575][ T381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.096983][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.106196][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.194279][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 301.205635][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 301.219979][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 301.259346][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 302.008730][ T8] device bridge_slave_1 left promiscuous mode [ 302.021112][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.058533][ T8] device bridge_slave_0 left promiscuous mode [ 302.064534][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.113222][ T8] device veth1_macvtap left promiscuous mode [ 302.138504][ T8] device veth0_vlan left promiscuous mode [ 302.901446][T10996] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.956888][T10996] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.005687][T10996] device bridge_slave_0 entered promiscuous mode [ 303.013058][T10996] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.020096][T10996] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.027493][T10996] device bridge_slave_1 entered promiscuous mode [ 303.372190][T11042] FAULT_INJECTION: forcing a failure. [ 303.372190][T11042] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 303.413537][T10996] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.420429][T10996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.427525][T10996] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.434338][T10996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.441604][T11042] CPU: 1 PID: 11042 Comm: syz.0.3427 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 303.451328][T11042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 303.461229][T11042] Call Trace: [ 303.464347][T11042] [ 303.467127][T11042] dump_stack_lvl+0x151/0x1b7 [ 303.471639][T11042] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 303.476932][T11042] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 303.482926][T11042] dump_stack+0x15/0x18 [ 303.486931][T11042] should_fail_ex+0x3d0/0x520 [ 303.491427][T11042] should_fail+0xb/0x10 [ 303.495418][T11042] should_fail_usercopy+0x1a/0x20 [ 303.500279][T11042] _copy_from_user+0x1e/0xc0 [ 303.504709][T11042] generic_map_update_batch+0x4d9/0x8c0 [ 303.510089][T11042] ? generic_map_delete_batch+0x5c0/0x5c0 [ 303.515649][T11042] ? generic_map_delete_batch+0x5c0/0x5c0 [ 303.521197][T11042] bpf_map_do_batch+0x4cc/0x630 [ 303.525891][T11042] __sys_bpf+0x66b/0x7f0 [ 303.529963][T11042] ? clockevents_program_event+0x22f/0x300 [ 303.535608][T11042] ? bpf_link_show_fdinfo+0x300/0x300 [ 303.540816][T11042] ? __sched_clock_gtod_offset+0x100/0x100 [ 303.546455][T11042] ? debug_smp_processor_id+0x17/0x20 [ 303.551663][T11042] __x64_sys_bpf+0x7c/0x90 [ 303.555914][T11042] x64_sys_call+0x87f/0x9a0 [ 303.560253][T11042] do_syscall_64+0x3b/0xb0 [ 303.561665][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.564540][T11042] ? clear_bhb_loop+0x55/0xb0 [ 303.576051][T11042] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 303.581777][T11042] RIP: 0033:0x7fc7d8b8d169 [ 303.586030][T11042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 303.605474][T11042] RSP: 002b:00007fc7d9aac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 303.613719][T11042] RAX: ffffffffffffffda RBX: 00007fc7d8da5fa0 RCX: 00007fc7d8b8d169 [ 303.621705][T11042] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 303.629513][T11042] RBP: 00007fc7d9aac090 R08: 0000000000000000 R09: 0000000000000000 [ 303.637325][T11042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 303.645135][T11042] R13: 0000000000000000 R14: 00007fc7d8da5fa0 R15: 00007fffefcaea48 [ 303.652955][T11042] [ 303.657143][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.698060][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.746256][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.784947][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.835224][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.842141][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.932782][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.950458][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.965501][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.972397][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.980158][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 303.991175][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 303.999522][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.007536][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.087241][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 304.117193][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.164892][T10996] device veth0_vlan entered promiscuous mode [ 304.194046][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 304.220483][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.266291][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.304828][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.352207][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 304.371987][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 304.390813][T10996] device veth1_macvtap entered promiscuous mode [ 304.402784][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 304.412984][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 304.428423][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 304.500118][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 304.536536][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 305.309185][ T313] device bridge_slave_1 left promiscuous mode [ 305.334593][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.386248][ T313] device bridge_slave_0 left promiscuous mode [ 305.427896][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.490813][ T313] device veth1_macvtap left promiscuous mode [ 305.506862][ T313] device veth0_vlan left promiscuous mode [ 306.195206][T11107] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.247131][T11107] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.268402][T11107] device bridge_slave_0 entered promiscuous mode [ 306.353401][T11107] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.364868][T11107] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.398735][T11107] device bridge_slave_1 entered promiscuous mode [ 306.550559][ T28] audit: type=1400 audit(1743785900.104:170): avc: denied { create } for pid=11126 comm="syz.0.3449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 306.692724][T11130] FAULT_INJECTION: forcing a failure. [ 306.692724][T11130] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 306.768794][T11130] CPU: 1 PID: 11130 Comm: syz.1.3450 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 306.778627][T11130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 306.788519][T11130] Call Trace: [ 306.791639][T11130] [ 306.794418][T11130] dump_stack_lvl+0x151/0x1b7 [ 306.798930][T11130] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 306.804221][T11130] ? migrate_enable+0x1cb/0x2b0 [ 306.808914][T11130] dump_stack+0x15/0x18 [ 306.812907][T11130] should_fail_ex+0x3d0/0x520 [ 306.817415][T11130] should_fail+0xb/0x10 [ 306.821407][T11130] should_fail_usercopy+0x1a/0x20 [ 306.826266][T11130] _copy_from_user+0x1e/0xc0 [ 306.830697][T11130] generic_map_update_batch+0x4d9/0x8c0 [ 306.836078][T11130] ? generic_map_delete_batch+0x5c0/0x5c0 [ 306.841634][T11130] ? generic_map_delete_batch+0x5c0/0x5c0 [ 306.847185][T11130] bpf_map_do_batch+0x4cc/0x630 [ 306.851876][T11130] __sys_bpf+0x66b/0x7f0 [ 306.855949][T11130] ? clockevents_program_event+0x22f/0x300 [ 306.861680][T11130] ? bpf_link_show_fdinfo+0x300/0x300 [ 306.866893][T11130] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 306.872879][T11130] __x64_sys_bpf+0x7c/0x90 [ 306.877246][T11130] x64_sys_call+0x87f/0x9a0 [ 306.881588][T11130] do_syscall_64+0x3b/0xb0 [ 306.885829][T11130] ? clear_bhb_loop+0x55/0xb0 [ 306.890344][T11130] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 306.896084][T11130] RIP: 0033:0x7fa40378d169 [ 306.900332][T11130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 306.919854][T11130] RSP: 002b:00007fa4046bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 306.928097][T11130] RAX: ffffffffffffffda RBX: 00007fa4039a5fa0 RCX: 00007fa40378d169 [ 306.935912][T11130] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 306.943727][T11130] RBP: 00007fa4046bf090 R08: 0000000000000000 R09: 0000000000000000 [ 306.951622][T11130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 306.959428][T11130] R13: 0000000000000000 R14: 00007fa4039a5fa0 R15: 00007fffab98e558 [ 306.967247][T11130] [ 307.106951][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 307.129071][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 307.145260][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 307.163833][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 307.172405][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.179290][ T381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.206402][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 307.214753][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 307.223680][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 307.231818][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.238718][ T381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.246749][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 307.255743][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 307.300290][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 307.335953][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 307.377184][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 307.402386][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 307.426686][T11107] device veth0_vlan entered promiscuous mode [ 307.441913][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 307.457289][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.496925][T11107] device veth1_macvtap entered promiscuous mode [ 307.578791][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.597339][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.619251][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 307.627374][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 307.676801][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 307.698555][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 307.727314][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 307.758280][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 308.816379][T11202] FAULT_INJECTION: forcing a failure. [ 308.816379][T11202] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 308.922184][T11202] CPU: 1 PID: 11202 Comm: syz.4.3475 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 308.932026][T11202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 308.941914][T11202] Call Trace: [ 308.945035][T11202] [ 308.947825][T11202] dump_stack_lvl+0x151/0x1b7 [ 308.952325][T11202] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 308.957625][T11202] dump_stack+0x15/0x18 [ 308.961615][T11202] should_fail_ex+0x3d0/0x520 [ 308.966127][T11202] should_fail+0xb/0x10 [ 308.970119][T11202] should_fail_usercopy+0x1a/0x20 [ 308.974981][T11202] _copy_from_user+0x1e/0xc0 [ 308.979405][T11202] generic_map_update_batch+0x54c/0x8c0 [ 308.984788][T11202] ? generic_map_delete_batch+0x5c0/0x5c0 [ 308.990343][T11202] ? generic_map_delete_batch+0x5c0/0x5c0 [ 308.995901][T11202] bpf_map_do_batch+0x4cc/0x630 [ 309.000587][T11202] __sys_bpf+0x66b/0x7f0 [ 309.004663][T11202] ? bpf_link_show_fdinfo+0x300/0x300 [ 309.009874][T11202] ? __ia32_sys_read+0x90/0x90 [ 309.014471][T11202] ? debug_smp_processor_id+0x17/0x20 [ 309.019674][T11202] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 309.025580][T11202] __x64_sys_bpf+0x7c/0x90 [ 309.029830][T11202] x64_sys_call+0x87f/0x9a0 [ 309.034169][T11202] do_syscall_64+0x3b/0xb0 [ 309.038423][T11202] ? clear_bhb_loop+0x55/0xb0 [ 309.042934][T11202] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 309.048663][T11202] RIP: 0033:0x7f294d38d169 [ 309.052915][T11202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 309.072359][T11202] RSP: 002b:00007f294e1a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 309.080601][T11202] RAX: ffffffffffffffda RBX: 00007f294d5a5fa0 RCX: 00007f294d38d169 [ 309.088411][T11202] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 309.096228][T11202] RBP: 00007f294e1a4090 R08: 0000000000000000 R09: 0000000000000000 [ 309.104036][T11202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 309.111847][T11202] R13: 0000000000000000 R14: 00007f294d5a5fa0 R15: 00007ffd0118b798 [ 309.119668][T11202] [ 309.380344][ T313] device bridge_slave_1 left promiscuous mode [ 309.386416][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.411464][ T313] device bridge_slave_0 left promiscuous mode [ 309.436367][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.475070][ T313] device veth1_macvtap left promiscuous mode [ 309.526413][ T313] device veth0_vlan left promiscuous mode [ 310.249200][T11233] syz.1.3484 (11233) used greatest stack depth: 20216 bytes left [ 310.315853][T11214] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.348871][T11214] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.368104][T11214] device bridge_slave_0 entered promiscuous mode [ 310.375175][T11214] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.382452][T11214] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.389919][T11214] device bridge_slave_1 entered promiscuous mode [ 310.660138][T11214] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.667028][T11214] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.820420][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.882605][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.901410][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.966051][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 311.027953][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.096557][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.103539][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.262772][T11262] device syzkaller0 entered promiscuous mode [ 311.280310][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 311.301616][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.308512][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.341288][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 311.349926][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 311.362005][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 311.371613][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 311.402598][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 311.412531][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 311.423479][T11214] device veth0_vlan entered promiscuous mode [ 311.460397][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 311.478219][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.541596][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.553824][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 311.561748][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 311.569992][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 311.588782][T11214] device veth1_macvtap entered promiscuous mode [ 311.618353][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 311.626493][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 311.642190][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 311.667040][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 311.676215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 312.499004][ T313] device bridge_slave_1 left promiscuous mode [ 312.505011][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.526827][ T313] device bridge_slave_0 left promiscuous mode [ 312.549290][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.565181][ T313] device veth1_macvtap left promiscuous mode [ 312.578206][ T313] device veth0_vlan left promiscuous mode [ 313.544407][T11335] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.581238][T11335] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.645040][T11335] device bridge_slave_0 entered promiscuous mode [ 313.652227][T11335] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.659257][T11335] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.666822][T11335] device bridge_slave_1 entered promiscuous mode [ 314.278764][T11335] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.285665][T11335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.293393][T11335] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.300255][T11335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.427080][ T2417] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.457954][ T2417] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.564352][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 314.580689][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 314.629819][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 314.649435][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.662540][ T2417] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.669445][ T2417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.739979][T11370] device wg2 entered promiscuous mode [ 314.780132][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.788864][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.802078][ T2417] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.808972][ T2417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.834816][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 314.843046][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.851502][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 314.859794][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.868036][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 314.876582][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.893050][T11335] device veth0_vlan entered promiscuous mode [ 314.904093][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 314.911994][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.920017][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.927330][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.001952][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 315.010348][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 315.024278][T11335] device veth1_macvtap entered promiscuous mode [ 315.101320][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 315.109385][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 315.118334][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 315.182047][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 315.209172][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 315.829486][ T2417] device bridge_slave_1 left promiscuous mode [ 315.835600][ T2417] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.842891][ T2417] device bridge_slave_0 left promiscuous mode [ 315.848987][ T2417] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.856761][ T2417] device veth1_macvtap left promiscuous mode [ 315.862906][ T2417] device veth0_vlan left promiscuous mode [ 316.512806][T11423] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.519985][T11423] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.529483][T11423] device bridge_slave_0 entered promiscuous mode [ 316.589889][T11423] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.653539][T11423] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.705735][T11423] device bridge_slave_1 entered promiscuous mode [ 317.261253][T11423] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.268170][T11423] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.275255][T11423] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.282055][T11423] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.546894][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.573939][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.717217][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 317.738956][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 317.831206][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 317.848710][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 317.925558][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.932476][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.033874][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.070899][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.079188][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.086065][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.098032][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 318.113011][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 318.121892][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 318.151088][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 318.206224][T11423] device veth0_vlan entered promiscuous mode [ 318.236542][T11461] device syzkaller0 entered promiscuous mode [ 318.255961][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 318.264664][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 318.273399][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 318.281522][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 318.295053][T11423] device veth1_macvtap entered promiscuous mode [ 318.355669][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 318.363342][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 318.371152][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 318.379456][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 318.387535][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 318.449224][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 318.466315][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 318.521522][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 318.598145][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 318.844345][T11485] device syzkaller0 entered promiscuous mode [ 319.022952][T11489] device syzkaller0 entered promiscuous mode [ 319.060176][T11485] device sit0 left promiscuous mode [ 319.839050][ T2417] device bridge_slave_1 left promiscuous mode [ 319.857381][ T2417] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.885655][ T2417] device bridge_slave_0 left promiscuous mode [ 319.975897][ T2417] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.021405][ T2417] device veth1_macvtap left promiscuous mode [ 320.027293][ T2417] device veth0_vlan left promiscuous mode [ 320.327122][T11519] device syzkaller0 entered promiscuous mode [ 320.493348][T11532] FAULT_INJECTION: forcing a failure. [ 320.493348][T11532] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 320.522980][T11532] CPU: 1 PID: 11532 Comm: syz.4.3569 Not tainted 6.1.129-syzkaller-00055-gca24c52e3c25 #0 [ 320.532728][T11532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 320.542620][T11532] Call Trace: [ 320.545743][T11532] [ 320.548520][T11532] dump_stack_lvl+0x151/0x1b7 [ 320.553035][T11532] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 320.558329][T11532] ? dump_stack+0x9/0x18 [ 320.562417][T11532] dump_stack+0x15/0x18 [ 320.566413][T11532] should_fail_ex+0x3d0/0x520 [ 320.570915][T11532] should_fail+0xb/0x10 [ 320.574906][T11532] should_fail_usercopy+0x1a/0x20 [ 320.579767][T11532] _copy_from_user+0x1e/0xc0 [ 320.584190][T11532] generic_map_update_batch+0x4d9/0x8c0 [ 320.589574][T11532] ? generic_map_delete_batch+0x5c0/0x5c0 [ 320.595132][T11532] ? bpf_map_do_batch+0x37c/0x630 [ 320.599988][T11532] ? generic_map_delete_batch+0x5c0/0x5c0 [ 320.605541][T11532] bpf_map_do_batch+0x4cc/0x630 [ 320.610229][T11532] __sys_bpf+0x66b/0x7f0 [ 320.614321][T11532] ? bpf_link_show_fdinfo+0x300/0x300 [ 320.619524][T11532] ? __ia32_sys_read+0x90/0x90 [ 320.624132][T11532] ? debug_smp_processor_id+0x17/0x20 [ 320.629323][T11532] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 320.635230][T11532] __x64_sys_bpf+0x7c/0x90 [ 320.639478][T11532] x64_sys_call+0x87f/0x9a0 [ 320.643819][T11532] do_syscall_64+0x3b/0xb0 [ 320.648070][T11532] ? clear_bhb_loop+0x55/0xb0 [ 320.652583][T11532] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 320.658310][T11532] RIP: 0033:0x7f294d38d169 [ 320.662567][T11532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.682007][T11532] RSP: 002b:00007f294e1a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 320.690250][T11532] RAX: ffffffffffffffda RBX: 00007f294d5a5fa0 RCX: 00007f294d38d169 [ 320.698061][T11532] RDX: 0000000000000038 RSI: 0000200000000500 RDI: 000000000000001a [ 320.705879][T11532] RBP: 00007f294e1a4090 R08: 0000000000000000 R09: 0000000000000000 [ 320.713693][T11532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 320.721495][T11532] R13: 0000000000000000 R14: 00007f294d5a5fa0 R15: 00007ffd0118b798 [ 320.729311][T11532] [ 320.763776][T11516] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.787712][T11516] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.795115][T11516] device bridge_slave_0 entered promiscuous mode [ 320.848655][T11516] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.855530][T11516] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.931284][T11516] device bridge_slave_1 entered promiscuous mode [ 321.596022][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.628084][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.684070][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.764996][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.808966][ T2417] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.815851][ T2417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.926864][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.944403][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 321.994886][ T2417] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.001788][ T2417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.043825][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 322.118062][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.141456][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.194181][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.229047][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.281219][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 322.305302][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 322.354895][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 322.363036][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.371250][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.383671][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.392076][T11516] device veth0_vlan entered promiscuous mode [ 322.426726][T11568] device syzkaller0 entered promiscuous mode [ 322.455626][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 322.470495][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.488791][T11516] device veth1_macvtap entered promiscuous mode [ 322.533713][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 322.551476][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 322.562765][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.588092][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 322.635617][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 323.608748][ T381] device bridge_slave_1 left promiscuous mode [ 323.614831][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.622154][ T381] device bridge_slave_0 left promiscuous mode [ 323.628401][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.636033][ T381] device veth1_macvtap left promiscuous mode [ 323.641917][ T381] device veth0_vlan left promiscuous mode [ 323.999215][T11613] device syzkaller0 entered promiscuous mode [ 324.438292][T11622] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.445178][T11622] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.462627][T11622] device bridge_slave_0 entered promiscuous mode [ 324.533524][T11622] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.541085][T11622] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.548731][T11622] device bridge_slave_1 entered promiscuous mode [ 325.090256][T11622] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.097169][T11622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.104269][T11622] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.111136][T11622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.126495][ T381] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.136061][ T381] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.273460][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 325.291859][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 325.392086][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 325.416672][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 325.468853][ T2417] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.475733][ T2417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.518045][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 325.546736][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 325.569368][ T2417] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.576250][ T2417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.615740][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 325.630442][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 325.701170][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 325.715406][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 325.738446][ T28] audit: type=1400 audit(1743785919.284:171): avc: denied { create } for pid=11687 comm="syz.1.3618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 325.772674][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 325.821194][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 325.866517][T11622] device veth0_vlan entered promiscuous mode [ 325.891102][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 325.958453][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 326.024738][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 326.037528][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 326.155523][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 326.176068][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 326.260807][T11622] device veth1_macvtap entered promiscuous mode [ 326.354663][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 326.371264][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 326.437798][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 326.461480][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 327.028571][ T2417] device bridge_slave_1 left promiscuous mode [ 327.034569][ T2417] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.042373][ T2417] device bridge_slave_0 left promiscuous mode [ 327.048470][ T2417] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.056666][ T2417] device veth1_macvtap left promiscuous mode [ 327.062573][ T2417] device veth0_vlan left promiscuous mode [ 328.141827][T11749] device syzkaller0 entered promiscuous mode [ 328.425107][T11742] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.447706][T11742] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.465909][T11742] device bridge_slave_0 entered promiscuous mode [ 328.488600][T11742] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.495469][T11742] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.503019][T11742] device bridge_slave_1 entered promiscuous mode [ 328.524565][T11759] device syzkaller0 entered promiscuous mode [ 329.081495][T11742] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.088424][T11742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.095506][T11742] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.102299][T11742] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.255198][ T2417] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.268896][ T2417] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.300915][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 329.331544][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 329.405579][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 329.414269][ T2417] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.421172][ T2417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.454083][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 329.504960][ T2417] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.511883][ T2417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.598186][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 329.637218][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 329.699468][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 329.749862][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 329.801417][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 329.840966][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 329.920338][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 329.932438][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.958461][T11742] device veth0_vlan entered promiscuous mode [ 330.015233][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 330.055713][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 330.114068][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 330.134991][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 330.177518][T11742] device veth1_macvtap entered promiscuous mode [ 330.289243][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 330.296772][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 330.330699][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 330.349047][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 330.357299][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 331.269202][ T518] device bridge_slave_1 left promiscuous mode [ 331.275187][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.282894][ T518] device bridge_slave_0 left promiscuous mode [ 331.288984][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.297033][ T518] device veth1_macvtap left promiscuous mode [ 331.303274][ T518] device veth0_vlan left promiscuous mode [ 332.788959][T11867] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.795832][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.908309][T11867] device bridge_slave_0 entered promiscuous mode [ 332.915238][T11867] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.001819][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.028503][T11867] device bridge_slave_1 entered promiscuous mode [ 333.658521][T11867] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.665415][T11867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.672538][T11867] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.679405][T11867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.739031][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.747517][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.873416][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 333.922159][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 333.952643][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 334.037528][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 334.100583][ T518] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.107481][ T518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 334.177884][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 334.212247][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 334.245479][ T518] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.252406][ T518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.443600][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 334.471388][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 334.479963][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 334.499278][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 334.527611][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 334.559243][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 334.654685][T11867] device veth0_vlan entered promiscuous mode [ 334.667650][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 334.682144][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.741910][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 334.793186][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 334.809503][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 334.844406][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 334.899281][T11867] device veth1_macvtap entered promiscuous mode [ 334.929695][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 334.978234][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 334.999885][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 335.048616][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 335.128662][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 336.078308][ T43] device bridge_slave_1 left promiscuous mode [ 336.084362][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.091751][ T43] device bridge_slave_0 left promiscuous mode [ 336.097860][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.105690][ T43] device veth1_macvtap left promiscuous mode [ 336.111598][ T43] device veth0_vlan left promiscuous mode [ 337.637415][T11991] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.647768][T11991] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.691802][T11991] device bridge_slave_0 entered promiscuous mode [ 337.748602][T11991] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.755474][T11991] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.805249][T11991] device bridge_slave_1 entered promiscuous mode [ 338.100623][T11991] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.107604][T11991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.114737][T11991] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.121611][T11991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.151572][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.209475][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.635401][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 338.673372][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 338.809320][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 338.848467][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 338.899186][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.906073][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.935152][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 338.949975][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 338.958477][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.965343][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.972932][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 338.981308][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 338.989582][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 338.997600][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 339.063697][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 339.095767][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 339.191862][T11991] device veth0_vlan entered promiscuous mode [ 339.199788][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 339.208231][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 339.267098][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 339.279176][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 339.288114][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 339.298446][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 339.322955][T11991] device veth1_macvtap entered promiscuous mode [ 339.391506][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 339.439560][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 339.488073][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 339.539107][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 339.574507][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 339.728113][T12054] device syzkaller0 entered promiscuous mode [ 340.699020][ T2417] device bridge_slave_1 left promiscuous mode [ 340.704956][ T2417] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.712317][ T2417] device bridge_slave_0 left promiscuous mode [ 340.718327][ T2417] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.725953][ T2417] device veth1_macvtap left promiscuous mode [ 340.731835][ T2417] device veth0_vlan left promiscuous mode [ 342.214182][T12097] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.221503][T12097] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.229631][T12097] device bridge_slave_0 entered promiscuous mode [ 342.310710][T12097] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.355439][T12097] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.389600][T12097] device bridge_slave_1 entered promiscuous mode [ 342.621196][T12121] device syzkaller0 entered promiscuous mode [ 342.756380][T12125] device syzkaller0 entered promiscuous mode [ 343.149070][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 343.164333][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.214562][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 343.259002][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.305132][ T518] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.312051][ T518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.389262][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 343.397625][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.406135][ T518] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.413031][ T518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.420906][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 343.468563][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 343.481067][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.544617][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 343.562842][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.605414][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 343.662355][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 343.755885][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 343.781884][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.799983][T12097] device veth0_vlan entered promiscuous mode [ 343.820335][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 343.828562][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 343.857194][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 343.866158][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 343.876725][T12097] device veth1_macvtap entered promiscuous mode [ 343.947965][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 343.960274][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 343.991909][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 344.018818][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 344.049628][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 345.378291][ T43] device bridge_slave_1 left promiscuous mode [ 345.384235][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.391669][ T43] device bridge_slave_0 left promiscuous mode [ 345.397593][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.405510][ T43] device veth1_macvtap left promiscuous mode [ 345.411396][ T43] device veth0_vlan left promiscuous mode [ 346.283769][T12184] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.290760][T12184] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.298490][T12184] device bridge_slave_0 entered promiscuous mode [ 346.305453][T12184] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.312626][T12184] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.334195][T12184] device bridge_slave_1 entered promiscuous mode [ 346.701140][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.711668][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.733459][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 346.741926][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 346.751648][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.758530][ T381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.767329][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 346.775835][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 346.784083][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.790967][ T381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.861037][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 346.902875][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.119381][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 347.142384][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.164736][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.190073][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 347.261132][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 347.301611][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 347.333986][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 347.364960][T12184] device veth0_vlan entered promiscuous mode [ 347.408096][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 347.429105][T12184] device veth1_macvtap entered promiscuous mode [ 347.446365][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 347.458205][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 347.512252][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 347.554699][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 348.198232][ T43] device bridge_slave_1 left promiscuous mode [ 348.204167][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.211732][ T43] device bridge_slave_0 left promiscuous mode [ 348.217761][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.225603][ T43] device veth1_macvtap left promiscuous mode [ 348.231515][ T43] device veth0_vlan left promiscuous mode [ 351.080194][T12248] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.105307][T12248] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.139442][T12248] device bridge_slave_0 entered promiscuous mode [ 351.186315][T12248] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.193260][T12248] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.200790][T12248] device bridge_slave_1 entered promiscuous mode [ 351.291543][T12248] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.298469][T12248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.305547][T12248] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.312371][T12248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.361229][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.397900][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.415317][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 351.422929][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 351.457040][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 351.465901][ T2417] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.472820][ T2417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.481249][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 351.489999][ T2417] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.496887][ T2417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.525073][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 351.533534][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 351.641470][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 351.669999][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.735489][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 351.784890][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.866630][T12248] device veth0_vlan entered promiscuous mode [ 351.922004][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 352.009294][T12248] device veth1_macvtap entered promiscuous mode [ 352.079437][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 352.093267][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 352.127457][T12303] bridge0: port 3(dummy0) entered blocking state [ 352.164708][T12303] bridge0: port 3(dummy0) entered disabled state [ 352.188483][T12303] device dummy0 entered promiscuous mode [ 352.194063][T12303] bridge0: port 3(dummy0) entered blocking state [ 352.200255][T12303] bridge0: port 3(dummy0) entered forwarding state [ 352.264330][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 352.279191][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 352.306217][T12308] device dummy0 left promiscuous mode [ 352.322609][T12308] bridge0: port 3(dummy0) entered disabled state [ 352.898653][ T43] device bridge_slave_1 left promiscuous mode [ 352.904586][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.911992][ T43] device bridge_slave_0 left promiscuous mode [ 352.917939][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.925660][ T43] device veth1_macvtap left promiscuous mode [ 352.931556][ T43] device veth0_vlan left promiscuous mode [ 354.774411][T12334] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.802661][T12334] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.837017][T12334] device bridge_slave_0 entered promiscuous mode [ 354.870838][T12334] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.908091][T12334] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.944459][T12334] device bridge_slave_1 entered promiscuous mode [ 355.244790][T12334] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.251694][T12334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.258807][T12334] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.265672][T12334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.315420][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.338773][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.358712][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.375380][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.397953][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.419468][ T518] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.426339][ T518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.436383][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 355.444529][ T518] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.451432][ T518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.512367][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 355.538499][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.571881][T12334] device veth0_vlan entered promiscuous mode [ 355.591799][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.639401][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 355.707998][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 355.731915][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 355.768025][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 355.828654][T12334] device veth1_macvtap entered promiscuous mode [ 355.915561][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 355.926013][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 355.934758][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 355.943386][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 357.038298][ T518] device bridge_slave_1 left promiscuous mode [ 357.044243][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.051705][ T518] device bridge_slave_0 left promiscuous mode [ 357.057627][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.065463][ T518] device veth1_macvtap left promiscuous mode [ 357.071308][ T518] device veth0_vlan left promiscuous mode [ 358.744527][T12402] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.851254][T12402] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.875560][T12402] device bridge_slave_0 entered promiscuous mode [ 358.891854][T12402] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.899360][T12402] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.906691][T12402] device bridge_slave_1 entered promiscuous mode [ 359.249975][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 359.264184][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 359.299533][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 359.329246][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 359.350622][ T518] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.357538][ T518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.377328][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 359.392712][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 359.401193][ T518] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.408108][ T518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.426956][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.434559][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.460246][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.486336][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 359.509337][T12402] device veth0_vlan entered promiscuous mode [ 359.516625][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.536559][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.552235][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 359.573696][T12402] device veth1_macvtap entered promiscuous mode [ 359.587921][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 359.605539][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 359.635041][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 360.268577][ T518] device bridge_slave_1 left promiscuous mode [ 360.274513][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.281840][ T518] device bridge_slave_0 left promiscuous mode [ 360.287995][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.295632][ T518] device veth1_macvtap left promiscuous mode [ 360.301530][ T518] device veth0_vlan left promiscuous mode [ 362.466549][T12472] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.492383][T12472] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.504435][T12472] device bridge_slave_0 entered promiscuous mode [ 362.511506][T12472] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.519023][T12472] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.526452][T12472] device bridge_slave_1 entered promiscuous mode [ 362.654214][T12472] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.661218][T12472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.668328][T12472] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.675176][T12472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.708634][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.716527][ T2417] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.753129][ T2417] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.785510][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.805762][ T2417] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.812689][ T2417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.849683][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.861172][ T2417] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.868086][ T2417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.910724][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.919512][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.958996][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 362.982410][T12472] device veth0_vlan entered promiscuous mode [ 363.007563][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.030105][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.062859][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.104876][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 363.131441][T12472] device veth1_macvtap entered promiscuous mode [ 363.173130][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 363.184461][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 363.216762][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 363.225317][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 364.428315][ T518] device bridge_slave_1 left promiscuous mode [ 364.434249][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.441654][ T518] device bridge_slave_0 left promiscuous mode [ 364.447585][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.455375][ T518] device veth1_macvtap left promiscuous mode [ 364.461272][ T518] device veth0_vlan left promiscuous mode [ 366.091183][T12545] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.110777][T12545] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.145208][T12545] device bridge_slave_0 entered promiscuous mode [ 366.174172][T12545] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.195659][T12545] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.223432][T12545] device bridge_slave_1 entered promiscuous mode [ 366.542094][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 366.550048][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 366.579760][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 366.593522][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 366.609487][ T2417] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.616399][ T2417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.635417][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 366.679933][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 366.728737][ T2417] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.735642][ T2417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.781974][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 366.790113][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 366.800522][ T2417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 366.863112][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 366.896341][T12545] device veth0_vlan entered promiscuous mode [ 366.912509][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 366.920863][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 366.936582][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 366.963797][T12545] device veth1_macvtap entered promiscuous mode [ 366.979062][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 367.005603][T12581] device syzkaller0 entered promiscuous mode [ 367.019393][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 367.030069][ T518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 368.078244][ T43] device bridge_slave_1 left promiscuous mode [ 368.084178][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.091562][ T43] device bridge_slave_0 left promiscuous mode [ 368.097481][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.105336][ T43] device veth1_macvtap left promiscuous mode [ 368.111198][ T43] device veth0_vlan left promiscuous mode [ 370.016849][T12624] device syzkaller0 entered promiscuous mode [ 370.269746][T12613] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.293821][T12613] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.331791][T12613] device bridge_slave_0 entered promiscuous mode [ 370.338803][T12613] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.345660][T12613] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.353214][T12613] device bridge_slave_1 entered promiscuous mode [ 370.658032][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 370.679679][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 370.759092][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 370.767292][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 370.776402][ T381] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.783290][ T381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.793968][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 370.802209][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 370.810535][ T381] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.817397][ T381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.824931][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 370.833163][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 370.896329][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 370.905473][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 370.974028][T12613] device veth0_vlan entered promiscuous mode [ 371.008225][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 371.028368][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 371.057504][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 371.124585][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 371.151079][T12613] device veth1_macvtap entered promiscuous mode [ 371.196117][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 371.229149][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 371.266536][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 371.276125][ T381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=3356 state=3 status=67 (errno 9: Bad file descriptor) [ 372.409117][ T518] device bridge_slave_1 left promiscuous mode [ 372.415050][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.422478][ T518] device bridge_slave_0 left promiscuous mode [ 372.428479][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.436217][ T518] device bridge_slave_1 left promiscuous mode [ 372.442340][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.449627][ T518] device bridge_slave_0 left promiscuous mode [ 372.455537][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.464140][ T518] device bridge_slave_1 left promiscuous mode [ 372.470137][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.477451][ T518] device bridge_slave_0 left promiscuous mode [ 372.483762][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.491465][ T518] device bridge_slave_1 left promiscuous mode [ 372.497383][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.505092][ T518] device bridge_slave_0 left promiscuous mode [ 372.511042][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.518773][ T518] device bridge_slave_1 left promiscuous mode [ 372.524704][ T518] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.532039][ T518] device bridge_slave_0 left promiscuous mode [ 372.538076][ T518] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.546556][ T518] device veth1_macvtap left promiscuous mode [ 372.552470][ T518] device veth0_vlan left promiscuous mode [ 372.558297][ T518] device veth1_macvtap left promiscuous mode [ 372.564131][ T518] device veth0_vlan left promiscuous mode [ 372.569980][ T518] device veth1_macvtap left promiscuous mode [ 372.575794][ T518] device veth0_vlan left promiscuous mode [ 372.581704][ T518] device veth1_macvtap left promiscuous mode [ 372.587513][ T518] device veth0_vlan left promiscuous mode [ 372.593473][ T518] device veth1_macvtap left promiscuous mode [ 372.599464][ T518] device veth0_vlan left promiscuous mode