last executing test programs: 17.064646074s ago: executing program 1 (id=2096): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0xc000000}, @struct={0x0, 0x0, 0x0, 0x9, 0x0, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x3e, 0xf0, 0x1}, 0x20) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x7, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000006b114300f80000bfabac8ab74d23c385000000810000009523872b445fd791990b082ef29ab1572a24216bd306d7aaa55183e226ea665ffcaf79e6f27dbe1149072ad6c13c1411e2fcffacc0616f1f6aa4f95017905673ccedba4b4218041d0bec92cfe99ef8299baf8a529092e40d5f5b88260f21bc3504cb80f3d7217262dbe9c14c90e8c98a20a65ef7e1569668af95c7d7864c0185eb6a1cede81454192c8f9576b99a5f191e860e128172ceb56e7e06bc150e6c4e0e690a02a58adb874ea9ad6bd3c2"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf20000000000000070000000f0000003d030100000000009500ffb1000000006926000000000000bf6700000000000036000b000fff52004507faff15300000d60600000ee60000bf050000000000003d63000000000000650700000200000007070000fbffffff1f75000000000000bf54000000000000070000000410f900bd430100000000009500000000000000050000000000000095000000000000001c15a3ce747c693a74b62fd0758b15f09429c09074bc4b2bd2dc480dd7a064b8673e2060162cc43bcba1060999eef9d60bb39d0af449deaa27ea949e8f9000d885deea2783835e29eba8546fc020c1966f8b5f32b095f566edf66b7751828da9dbd5b996b9e8d897e461c01c697671d100000000400036c17fb01dde179c1f26cac1c7b21bde7d1a55d6ebe700b3be005e47ef55e0dd81244b18590e000000000000356d82e43407a6d7fa94b21002f06cd247b126b6349ab62d7b07ba0a71a72145edade9941f49f300a8c8913e0e4ea9e4c77740ab3312edee62a4dc2fc85755d387d8a1bc8eb71fbe11b2216cc8d1f0160c237d929b49d828724b95555b459f4763c6222175c974be2f76fb5f330b015a68587a75c013000000000000000000000003000000000000d6ddc46e58eff8f4fbadfc6a3af8123b7f4240713a4c0cdc9d7820c4eb67cc0f8b5fe9258eeacb5776aebbab3d5c55020000006082778366dadfc36029633e0514cbcee1f3928970bde148c940434f33acd377cbad17673b2d30b6339255c98eba97efb4e9ac1f11be815dd6045592edcbee7f253ec74c7c1313505bd7ff8fd58b3a6569c91dbdef1df585aeaea7346a2a65caee5c85f9eddeeeee3c8a2e523c864ac430eb47cb4d0c8767b9d4125661b5a1a170c04b64da3a99ddb93bf14fae3ca2d1e882375b8dbac83978e136c34f90b33cc0eeb57debcfe26589efc08125d5d62a7e593c9738a50171adf051ea4f07e7e7e770c2016eeacbe8511afffffbea75759a1ea5404f5453c0b5c46c9700808c096cf8cf5223f341cbea3841b5cd224c1b381d56afebe9f99a00e3cd94dc0bb7af9e8709db487cc4d9b3b96723d69d512ddd57b0dee9b9f6ae80a502cce352098603e77f9ecced07fa25e99e9e415414c91f8bfd1c150570512f26c4ee34a64c131dce3800000000000000006c86287945bd8d258442870e000000000000000000000000f7e6a10de4bf7369b0d5b5373829b09bf5b7b34099b27ac7770fca449d4c4ca15f88b588b2429af2e1d1a4e1fa44cb80fcfae6e50d7e5b4675d7e0be706224f34e6eed553b40e2b897e73752fc7d1e4b0f4c5967eefd7448d5fde5841fa464a67267c631052bd7333769a4b8d19d4794357edce762e8136ab9d7ed34a72baffd849b90579b96b3"], &(0x7f0000000100)='GPL\x00'}, 0x48) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x55) 14.840428176s ago: executing program 0 (id=2546): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x10, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) 13.906449852s ago: executing program 0 (id=2556): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc/..\x00\x82q\xee !\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x40}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) socketpair(0x15, 0x3, 0x3, &(0x7f0000000000)) r1 = openat$cgroup_pressure(r0, &(0x7f0000000300)='cpu.pressure\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@fallback=r1, 0x11, 0x1, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0]}, 0x40) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020200828500000017000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r3) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r4, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=r5, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000340)=r6, 0x4) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r5, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r7, r4, 0x0, r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x0, 0x62, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 13.884038763s ago: executing program 1 (id=2096): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0xc000000}, @struct={0x0, 0x0, 0x0, 0x9, 0x0, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x3e, 0xf0, 0x1}, 0x20) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x7, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000006b114300f80000bfabac8ab74d23c385000000810000009523872b445fd791990b082ef29ab1572a24216bd306d7aaa55183e226ea665ffcaf79e6f27dbe1149072ad6c13c1411e2fcffacc0616f1f6aa4f95017905673ccedba4b4218041d0bec92cfe99ef8299baf8a529092e40d5f5b88260f21bc3504cb80f3d7217262dbe9c14c90e8c98a20a65ef7e1569668af95c7d7864c0185eb6a1cede81454192c8f9576b99a5f191e860e128172ceb56e7e06bc150e6c4e0e690a02a58adb874ea9ad6bd3c2"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x55) 12.135418657s ago: executing program 0 (id=2558): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES64], 0x0, 0x3, 0x0, 0x0, 0x41100}, 0x94) close(0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x14, 0x4, 0x4, 0x3}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000000800000042"], 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r1, 0x0, 0x67, 0x48, &(0x7f0000000180)="e09c54fece78d80f725172b8a5bfb9a5bc445d204d245b54d26345daa819ee6f723fb8a266ff4224f7243552d121dff8e955fb51c8c3e302fa46515d6ac13b3b9943991f1888b8edd2ecdddfe5d6f1ff1022d8240b9522d5c2a46fafb58b164f22e1cf5c98571a", &(0x7f0000000280)=""/72, 0x7, 0x0, 0xd7, 0xd2, &(0x7f00000004c0)="07cfd2189f10e5a606551e49e73578e299b3ea85214a555a18132111c8504c34a3ca62dc088ced1e045f5409c9d36551efe5421bfccde79abc7d25d2742b6029fe35c473864603c94e4f1007fd1570a7d674c1ed1df34c2eda59d4044f8fc261a154b7572ff307a4c5cf6860515fcc45fde8730015ab7a77f45856313cd7a27dd797de058e3b0466c7cb5ad0aacd3cacebe5ea485bbdc63d761a50fc8af5a550ac420acf3173cc07c380be3990ce17295570f14145babd105d65e82fa13636cfba6c450eab462d1042709cfd9ffb703b5f89a12e7d3e58", &(0x7f00000005c0)="6b8e7d7cd2fbf2004dc810ca3732297c4d89d4e7c9d063b96fd2fba8d20906db80dc15a33e1b19e730a3d2041e1bac52d1e27749a55aebdce24b2a98b084c0897011cc0e75e9ef13430f63bbbe5e7dcbf255748d7b236307a2b183803b7aecc612f60c05369331115d82ca423b9c34e35f86b818cfa284b5976717e02828b33aeadcfbe5dc640e54482171230c05010d40097fa6176f16dbc0e2dc9642b729c99a99ffad798b1e1047da3ca0d34a8b12c701385add94cd5e061713ebaa6e3d091d1bd1f488e7f2b1a687cb537cf1a748dd78", 0xb, 0x0, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r3, 0x58, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x0, 0x3, 0x3, 0x30a44, 0x1, 0x800000, '\x00', r4, r0, 0x4, 0x4, 0x1, 0xd, @void, @value, @value=r5}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r8 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r7}, 0x8) write$cgroup_int(r8, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r8, 0x58, &(0x7f00000008c0)}, 0x10) 11.281363278s ago: executing program 0 (id=2573): write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x6, 0x8, 0x8, 0x40}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f00000033c0)=ANY=[], 0xfe33) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_ext={0x1c, 0x20, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x3ff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @call={0x85, 0x0, 0x0, 0x68}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xf22657dd68269f2a}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x7, 0xd5, &(0x7f0000000600)=""/213, 0x41000, 0x34, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040)={0x1, 0x0, 0x7f, 0x5}, 0x10, 0x670f, r1, 0x6, &(0x7f0000000080)=[r0, r0, r0], &(0x7f0000000100)=[{0x4, 0x1, 0xe, 0xb}, {0x1, 0x1, 0x2, 0x1}, {0x0, 0x2, 0xd, 0x8}, {0x3, 0x5, 0x6, 0x9}, {0x0, 0x3, 0xc, 0x9}, {0x3, 0x2, 0xd, 0x7}], 0x10, 0x3}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001900)={{r0}, &(0x7f0000001880), &(0x7f00000018c0)=r1}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f00000000c0), &(0x7f0000000180)=r1}, 0x20) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) 11.155521446s ago: executing program 0 (id=2574): syz_clone(0x280800, &(0x7f0000000000)="93de34fa32c5c2ef71e18bab75f3b2c867e3fb0936164082b47c101ec39c6c45cb5ca9eb003b324f3c1ee08613792da1a94c673125da6eae495bc34b14fbbcdad7724aab2d0bbf83e815036c53b304732afc4d929d4e15961fb5f29c5462ebff77e06c42cd786613dfadfa651b2e5b21d40f53270e92af4b5fda", 0x7a, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="c38999e8c276864aa61529072bcf934044973565c6da1b94245a2fa433282eb13012b5947145e2ce58567806d7647651") 11.152693526s ago: executing program 0 (id=2575): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2d, 'pids'}, {0x2d, 'cpu'}]}, 0xb) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0x1, 0x12) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000000c0)) 10.837138715s ago: executing program 1 (id=2096): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0xc000000}, @struct={0x0, 0x0, 0x0, 0x9, 0x0, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x3e, 0xf0, 0x1}, 0x20) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x7, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000006b114300f80000bfabac8ab74d23c385000000810000009523872b445fd791990b082ef29ab1572a24216bd306d7aaa55183e226ea665ffcaf79e6f27dbe1149072ad6c13c1411e2fcffacc0616f1f6aa4f95017905673ccedba4b4218041d0bec92cfe99ef8299baf8a529092e40d5f5b88260f21bc3504cb80f3d7217262dbe9c14c90e8c98a20a65ef7e1569668af95c7d7864c0185eb6a1cede81454192c8f9576b99a5f191e860e128172ceb56e7e06bc150e6c4e0e690a02a58adb874ea9ad6bd3c2"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf20000000000000070000000f0000003d030100000000009500ffb1000000006926000000000000bf6700000000000036000b000fff52004507faff15300000d60600000ee60000bf050000000000003d63000000000000650700000200000007070000fbffffff1f75000000000000bf54000000000000070000000410f900bd430100000000009500000000000000050000000000000095000000000000001c15a3ce747c693a74b62fd0758b15f09429c09074bc4b2bd2dc480dd7a064b8673e2060162cc43bcba1060999eef9d60bb39d0af449deaa27ea949e8f9000d885deea2783835e29eba8546fc020c1966f8b5f32b095f566edf66b7751828da9dbd5b996b9e8d897e461c01c697671d100000000400036c17fb01dde179c1f26cac1c7b21bde7d1a55d6ebe700b3be005e47ef55e0dd81244b18590e000000000000356d82e43407a6d7fa94b21002f06cd247b126b6349ab62d7b07ba0a71a72145edade9941f49f300a8c8913e0e4ea9e4c77740ab3312edee62a4dc2fc85755d387d8a1bc8eb71fbe11b2216cc8d1f0160c237d929b49d828724b95555b459f4763c6222175c974be2f76fb5f330b015a68587a75c013000000000000000000000003000000000000d6ddc46e58eff8f4fbadfc6a3af8123b7f4240713a4c0cdc9d7820c4eb67cc0f8b5fe9258eeacb5776aebbab3d5c55020000006082778366dadfc36029633e0514cbcee1f3928970bde148c940434f33acd377cbad17673b2d30b6339255c98eba97efb4e9ac1f11be815dd6045592edcbee7f253ec74c7c1313505bd7ff8fd58b3a6569c91dbdef1df585aeaea7346a2a65caee5c85f9eddeeeee3c8a2e523c864ac430eb47cb4d0c8767b9d4125661b5a1a170c04b64da3a99ddb93bf14fae3ca2d1e882375b8dbac83978e136c34f90b33cc0eeb57debcfe26589efc08125d5d62a7e593c9738a50171adf051ea4f07e7e7e770c2016eeacbe8511afffffbea75759a1ea5404f5453c0b5c46c9700808c096cf8cf5223f341cbea3841b5cd224c1b381d56afebe9f99a00e3cd94dc0bb7af9e8709db487cc4d9b3b96723d69d512ddd57b0dee9b9f6ae80a502cce352098603e77f9ecced07fa25e99e9e415414c91f8bfd1c150570512f26c4ee34a64c131dce3800000000000000006c86287945bd8d258442870e000000000000000000000000f7e6a10de4bf7369b0d5b5373829b09bf5b7b34099b27ac7770fca449d4c4ca15f88b588b2429af2e1d1a4e1fa44cb80fcfae6e50d7e5b4675d7e0be706224f34e6eed553b40e2b897e73752fc7d1e4b0f4c5967eefd7448d5fde5841fa464a67267c631052bd7333769a4b8d19d4794357edce762e8136ab9d7ed34a72baffd849b90579b96b3"], &(0x7f0000000100)='GPL\x00'}, 0x48) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x55) 7.810873595s ago: executing program 1 (id=2096): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0xc000000}, @struct={0x0, 0x0, 0x0, 0x9, 0x0, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x3e, 0xf0, 0x1}, 0x20) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x7, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000006b114300f80000bfabac8ab74d23c385000000810000009523872b445fd791990b082ef29ab1572a24216bd306d7aaa55183e226ea665ffcaf79e6f27dbe1149072ad6c13c1411e2fcffacc0616f1f6aa4f95017905673ccedba4b4218041d0bec92cfe99ef8299baf8a529092e40d5f5b88260f21bc3504cb80f3d7217262dbe9c14c90e8c98a20a65ef7e1569668af95c7d7864c0185eb6a1cede81454192c8f9576b99a5f191e860e128172ceb56e7e06bc150e6c4e0e690a02a58adb874ea9ad6bd3c2"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x55) 5.615863205s ago: executing program 2 (id=2599): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000009208500000072000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x10, 0x38, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b70300000000002085000000"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x8000000000000000, 0x7ff}, 0x110c40, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000180), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r4, &(0x7f0000000a00)=ANY=[@ANYBLOB='-cpu'], 0x5) (async) r5 = openat$cgroup_type(r2, &(0x7f0000000040), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xb, 0x6, 0x0, &(0x7f00000002c0)) (async) write$cgroup_type(r5, &(0x7f0000000080), 0x9) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x1f2f, 0xb1, 0x0, &(0x7f0000000680)="9f44948721919580684010a486fcd9b32763a24b3e271d60cb95d35408c1173c771355f26c5680e7a446469f208d10794877eb22fa715d17dc329151dba8108f8278ff01cc1bc1b44fb374e9fec42d83783b7f540c614e2f09059376b87bb68fc850e1fd02f3e99ea5308358616b6aaed56aa1302c203a7519d608a0ecb8fcf4a1bfd061e6c3cf1216cfba17c5fd8e7681db816e7146138e0f14c1e9f3e8678970c3bd524e4bdf1cda86fe5b3a3c5336d0", 0x0, 0x241, 0x0, 0xfd1b, 0x0, 0x0, &(0x7f0000000000), 0x3}, 0xc) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x4, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0xe000001}, 0x23) (async) syz_clone(0x200000, &(0x7f0000000240)="fce2", 0x2, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="12000000040000000400000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x5, 0x5, 0x2, 0x4}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001000)=@bloom_filter={0x1e, 0x7, 0x38000, 0x5, 0x61040, r6, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x6}, 0x50) 5.532379331s ago: executing program 2 (id=2600): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x5, 0x7, 0x8, 0x5, 0x80}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/uts\x00') syz_open_procfs$namespace(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x25, &(0x7f0000000540), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x18) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x3}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000200)='((+)') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4.091831866s ago: executing program 1 (id=2096): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0xc000000}, @struct={0x0, 0x0, 0x0, 0x9, 0x0, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x3e, 0xf0, 0x1}, 0x20) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x7, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000006b114300f80000bfabac8ab74d23c385000000810000009523872b445fd791990b082ef29ab1572a24216bd306d7aaa55183e226ea665ffcaf79e6f27dbe1149072ad6c13c1411e2fcffacc0616f1f6aa4f95017905673ccedba4b4218041d0bec92cfe99ef8299baf8a529092e40d5f5b88260f21bc3504cb80f3d7217262dbe9c14c90e8c98a20a65ef7e1569668af95c7d7864c0185eb6a1cede81454192c8f9576b99a5f191e860e128172ceb56e7e06bc150e6c4e0e690a02a58adb874ea9ad6bd3c2"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x55) 2.058459927s ago: executing program 2 (id=2610): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r0) (async) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000540), &(0x7f00000005c0)='%+9llu \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00', @ANYRES32], 0x50) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2a}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r7, 0x2006300, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x4}, 0x48) (async) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) syz_clone(0x94010600, &(0x7f00000000c0)="e1256298d7122cfc59874497fba04620d4aa31e365c67709704370cec570853aa707794829ada5ae7795b258e536753a0953cdce751342582fdccd67fc10bf20cc15e8787a0df556d80ebf7b8f7287fe46da2116ef2f71ca2096db605635ed9242ff76fbe915d4d11a2efcf788663aad", 0x70, &(0x7f0000000140), &(0x7f0000000280), &(0x7f0000000780)="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") socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) (async) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) close(r5) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r10 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = getpid() bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x8, 0xfe9ad7d68a7ab65e}, 0xc) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, r11, 0xffffefffffffffff, r10, 0x0) (async) close(r10) 2.051598957s ago: executing program 3 (id=2611): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x1, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x2, 0x1, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x3, 0x4, 0x4}, 0x50) sendmsg$inet(0xffffffffffffffff, 0x0, 0x24004001) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x3, 0xc, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80000001}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x45}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xe, 0x0, &(0x7f00000002c0)="e02742e86c0d85ff9782762f0800", 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r3, 0x80047441, 0x1) 1.935017514s ago: executing program 4 (id=2614): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/13, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)=@generic={&(0x7f0000000580)='./file0\x00', 0x0, 0x10}, 0x18) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000fffffff88500000004000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r3}, 0xc) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000fce3ffffff00000018111b00", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000080)='cgroup.freeze\x00', 0x275a, 0x0) openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6d, 0x1, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x2991, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x108b45, 0xffffffffffffffff, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r6, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x82, &(0x7f00000006c0)='/proc/1/XNq\xee\xe5\x17\xab}\xdaC\xa0\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97\x97w\xe6\x1b;\xfc\x8d\xe0\x94\x19O\x9e\xe0\f\xaaq\x18#\xf6\xac\xc1I\x0f\xa4\x90C\xb8\a\xec+\xd6\x9b\x95\xd16\xdf\xe6\xafO\xce\xa1\xe7\xd5\xd17&\xaf,\xf2\x96\xf7;w\x0e\xabF{|\x1b\xc8\x9cqY,.\x9ct\xeb\r/\xbf\xea!\'\x92\x9b\xea9g\x14\xe8\x10Q\n\x03&l\x99\x19\x14$\r\xee(N\xf0~4\x14\x11\xde+k)\t1\xa8\xf4\">x\x1c\x81\x16\xc49\xab;M\x11\xc6\xa2\x9e\x99\x99|i\xe0z\xaa-5?\x99\x14\xe19<\x9e\x82\xfd\xfb\x90\x81\t\x97+\xbe\x0eg\x8d\xa6\xe4\xbf\xab[z1@\x9d\x14/\x17(-}(?\xf23=\x93\xc0{\xad\xc9r\xf9O\xa7f\x8b\xd2[\x1c\xbf\x02t\xe2a0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8912, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) close(r4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async, rerun: 64) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) (async, rerun: 64) write$cgroup_subtree(r4, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x90) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) socketpair(0x18, 0x1, 0x4, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a2, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x94) 1.856461409s ago: executing program 4 (id=2616): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x404c0c5) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ff"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x800, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r2) (async, rerun: 64) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd74) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002064070000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xfb, 0x0, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) 933.183514ms ago: executing program 4 (id=2617): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x6, 0x4000000, 0x3, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000380)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRESHEX, @ANYBLOB="f12e9c"], 0x48) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22ffef) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x13, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000010000000000a247c22218110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000852c76d84d2582261f090000000000005509010000000000aa00000000000000181100001f4037ddb2806ed3e689840df7b1c7b9879fa0badf1adb70d5af7aa867abc9e011a523", @ANYBLOB], 0x0, 0x5, 0x0, 0x0, 0x1f00, 0x4}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000580)=ANY=[@ANYRESDEC=r5], 0xfdef) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r7}, &(0x7f0000000800), &(0x7f0000000840)=r8}, 0x20) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x58, &(0x7f0000000040)={0x0, 0x0}}, 0x10) close(r1) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={r9, 0xfffffff8}, 0xc) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x8, &(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(0x4) 908.881195ms ago: executing program 2 (id=2618): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x4}, 0x10003, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e488a863728864"], 0x12) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0xd6, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xc}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 744.511695ms ago: executing program 3 (id=2619): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x3, 0xf, &(0x7f00000002c0)=ANY=[@ANYRES16=r0, @ANYRES32=r0, @ANYBLOB="0000000000000010bf02000000000000850000008680000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0xa3) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async, rerun: 32) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0xfffffffe, '\x00', 0x0, 0x0}, 0x50) (rerun: 32) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r3, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000300)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={r4}, 0x4) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000160900ffffffff00000071104100000000009500000700000000144221a25d334ec8abf8ba7217514768afee394eab13f1d5aa94913d166631d74ec88119dc6908384e669d4e7f3d134abd1a0a09e3949fd88cf07f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000029c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x2d1, 0xfffffffffffffd85, &(0x7f00000000c0)="b9ff0303000d698cb89e40f008006000000e00001100630a77", 0x0, 0x100, 0x2000000, 0x0, 0x0, &(0x7f0000000440)}, 0x28) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x10, &(0x7f0000000a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) (async, rerun: 32) sendmsg$sock(r7, &(0x7f0000001940)={0x0, 0x0, 0x0}, 0x20000000) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0x0, &(0x7f0000000900)="928e04b416cac951c35f7f4586e6", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 742.939305ms ago: executing program 3 (id=2620): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)=r1}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4020940d, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f0000002880)={&(0x7f0000001000)=@id={0x1e, 0x3, 0x1, {0x4e22, 0x1}}, 0x10, 0x0, 0x3f, 0x0, 0x2d}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYRESHEX=r1], 0x0, 0x2000000, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x1610, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x9}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0xd, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r7 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001140)={&(0x7f0000001180)="acdd2a9a836ec6021101761f87806914bd4b452cc87252a1591dd1832a20f6b5b9857ffb07ce1b4926fd509f1f5bd8d03918f930e204f581b863401d1edc5c80cc323f427acf90ae5f6211ec58cef27435785bb93c72a623555d6d8bde0a400b88de2f0fb322fdea3a3df9bc17d232abc566ac5fb763d73e2043671d392d3b7bb87f6f8b8184f22e55d63549668bea18fd00a5c2ec8ae5a3c94a665a03aa91ae5c96526ce0d1130741010ffb31bcf60561a9e8c95cac579d0d48df4810dba4bc013e3799487215093fe9f4d20e6df1e2cecf8b7064fe8b95fa9f252b8852d7df4fd1b7", 0x0, 0x0, 0x0, 0x4f, r6, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') bpf$PROG_BIND_MAP(0xa, &(0x7f0000001a00)={r1, 0x1}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x100000, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f00000005000000010001000a00000001000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000091ae1c27000000000000000075e30219273070f300000000"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r9}, 0xc) 729.028206ms ago: executing program 2 (id=2621): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x8000}, r2, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c25000000000a2020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000100b180850000002d000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r7}, 0x2c) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000a80)=ANY=[@ANYBLOB="18000000feffffff000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r8}, 0xc) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffffffffffff, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0], 0x0, 0x50, &(0x7f0000000740)=[{}], 0x8, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0xc3, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000980), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000c40)={0xffffffffffffffff, 0x20, &(0x7f0000000c00)={&(0x7f0000000a00)=""/98, 0x62, 0x0, &(0x7f0000000b00)=""/215, 0xd7}}, 0x10) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c80)={0x3, 0x4, 0x4, 0xa, 0x0, r5, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x5}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000340)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @generic={0xb, 0xa, 0x4, 0x3, 0x5}, @generic={0xb4, 0x0, 0xf, 0xa4b1, 0x4}], &(0x7f0000000200)='syzkaller\x00', 0x8, 0x9, &(0x7f00000004c0)=""/9, 0x41100, 0x1a, '\x00', r9, 0x1b, r10, 0x8, &(0x7f00000009c0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r11, 0x0, 0x5, &(0x7f0000000d00)=[r6, r5, r6, r12, r6, r5, r4], &(0x7f0000000d40)=[{0x5, 0x5, 0x4, 0x3}, {0x4, 0x2, 0x2, 0x3}, {0x1, 0x5, 0x1, 0x5}, {0x4, 0x3, 0x1, 0x5}, {0x1, 0x2, 0x2, 0x7}], 0x10, 0x4}, 0x94) r13 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r13, 0x40042408, r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xc, [@enum={0x8, 0x2, 0x0, 0x6, 0x4, [{0x5, 0x90}, {0x2, 0x7ff}]}]}, {0x0, [0x0, 0x5f, 0x61, 0x0, 0x5f, 0x2e, 0x2e, 0x5f, 0x30, 0x5f]}}, &(0x7f0000000580)=""/249, 0x40, 0xf9, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg=0x1800, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 684.352669ms ago: executing program 3 (id=2622): socketpair$tipc(0x1e, 0x1, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x16, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="850000006100000054000000000000009500000000000000b4a8b1541206000000e9c79077fa15ba36eca61299de54cf77c9062430bc068829afff36b31fa7e35ce95d04", @ANYBLOB="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"], &(0x7f0000000100)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x2}, 0x50) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000001c0)=r1, 0x4) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0x24, 0x5e, &(0x7f0000000240)="58dd3086df1335cfe9bbddff0066b3c9bbac88a8862c002d642fdffd0013dd0000000000", 0x0, 0x800, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1}, 0x23) 563.017046ms ago: executing program 4 (id=2623): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020, 0x0, 0x0, 0x5, 0x1, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x10, 0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000100000000000000fac0c860512f017900"/37], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup(r5, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8912, &(0x7f0000000080)) (async) syz_clone(0x800d400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x2, 0x300}, {0x6e, 0x0, 0xd}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x35}, {0x3, 0x0, 0x6, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 561.054296ms ago: executing program 4 (id=2624): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000072000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10002, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x12, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) (async) sendmsg$inet(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000013c0)="d080", 0xfdef}], 0x1, 0x0, 0x0, 0x800300}, 0x20000801) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 557.748306ms ago: executing program 3 (id=2625): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x50}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=@base={0xf, 0x4, 0x8, 0x1}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x15, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018000000000000000000000000000000950000002304f866"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0xe1, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe66}, 0x3f) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b0000000f000000cc000200060000ec05"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)='T', &(0x7f0000000240), 0x4af, r4}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x2, r4}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b40)={r1, 0xe0, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, &(0x7f00000018c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x51, &(0x7f0000001940)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000001980), &(0x7f00000019c0), 0x8, 0xd3, 0x8, 0x8, &(0x7f0000001a00)}}, 0x10) sendmsg$inet(r3, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000100)="317545215ffd897613d871caf013c93b7095f60a98d0daec2783344ddbdb6bfba4232c95badb6a2e3b9575c242a3384b3019835a1f9daa94d465c2a796c4062df5492056a23efb30d36ef70415dc6032ff693c471b49b0403fabdf862bf8201566f3523b46b1708e38b7e94f7d78963f1b0bbe40932f37d117aff63a1996363004f294704b96bde4d5ddb449c468302b1c335e5fd573de8c1f83fc62f09aeb698269ed6ffcd158216437feaa0403f529d3739c273050aedb3d0d054ea08a8d3f30f2b8ce64f044e9b2c8fbc73a7fb3edeecdbc9ac159895987bb43331d94160f6e6e32aefe07cf9ab7442d93d761782f4eb02720e16a", 0xf6}, {&(0x7f0000000000)="facb5c89978b8217cef862bbcff3871c6a78594ce91ea0cdb67b24c9ac22cacd3692", 0x22}, {&(0x7f0000001240)="6e4e4b5a4e291a5423bc0faf44c2b3fcb415252d977de186af56bd41732974201f3d8ecb9432ccbe9692af9797ac6c9027e21dc310f66cfd2c00a500f455f185216b252ff015b06591da3d7c61bf1c95e2d107824cf45b1ec8a350230d59a6605ea87550014f0c65e9ae9c2dfbda1734", 0x70}, {&(0x7f0000001540)="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", 0xfd}, {&(0x7f0000001640)="f9ab21ecb7f9be135fd4919f1d6128ad1ed0c5dfc96ad4f38582bb7ae241fe49a3b5a85a831a5ef3db57c4a34427c1ddc7a4d44c40d3d68504455e7ae97c320d96c09ac1e4a8237699be707550a7924bcfb6e83539d73c5367adbd9cc1681a51afe92d68c68b3627de845f34f12f07658714489501a30642f071fdf7736902093c7fb571487a98fe9615a4f9b1de4952ff511a3bfafbdd78d251490d2657291000f5c31b9fd98ab3087d9c037b48f31597e5e2bc406cc41d38e2a109e73aa448d7", 0xc1}, {&(0x7f0000001380)="000aa7f6f9fb3b329572b4e00d8a10dc02e35933752da3b4fdb3540fd387ae1c16c041766b192d55d7080cec4e4553dc09486168a2347d394e9db5b48cb1f88d7f1b0b45acef5a701c1c3a5a562b77df8249a956ab0b4022c6007fecbe143cc20cc910d4e8da73419c4e672d39b8", 0x6e}, {&(0x7f0000001740)="5d58db549a735986152f4429bcfff314e323fa925eebbed892f2830ee6cdffab9244507273d5a4a9b4a50c6e70842237bf64baf9052ecc9ba1cf88dec0bb08870e8607c089a8728fdba570f321e48d33cfbffb22f2c43a0e74418211ce2b8c7c0f1c1c54752e1b870a188fee9ece0ca370ae417107e1860b44a8b369f5ddc23243bbab22a282628877e299615b8f645d4b5e8b172c60e0387ed9fbccf744cecaf19b6efa671fda4bf5b83796593f2207b2bae24203a00cf040f7af11959d2f1f0d858bf6da7f66da7e6d43d004b625e9e252b0314aa3888fe54d3f0290e0b9127b49aaf747fa4a0c2e3162", 0xeb}], 0x7, &(0x7f0000001b80)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @broadcast, @broadcast}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1ff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xda}}], 0x68}, 0x4000) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, 0x0) 511.80952ms ago: executing program 4 (id=2626): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000001", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2c, 0x3, 0x6, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, &(0x7f0000010080)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f00000005c0)=r4, 0x12) r7 = openat$cgroup_ro(r5, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000040)=0x1, 0x12) r8 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r8, &(0x7f0000000080), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0100000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="00000000000004001800001f000900000000000039", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) unlink(&(0x7f0000000040)='./file0\x00') r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r9}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000500000002000000ffff000005000000", @ANYRES32, @ANYBLOB="0000000000000000000000001500000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x48) 171.018589ms ago: executing program 3 (id=2627): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x6000000}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {0x4}}}, &(0x7f0000000200)='syzkaller\x00', 0x2, 0x100b, &(0x7f0000001e40)=""/4107}, 0x4c) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="020000"], 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb9d001800000000000000280600002800000002"], 0x0, 0x42}, 0x28) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xfffffff7}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000068ade10828fef1112784fe6d51cb007df5c4e3c6054536321d780f02688cabdaad58cf8d63e6f82287f0a452697d3f403c35156b5bf417b87e5fbe3d6876d5f54ae03646a6454b152a3f250cedef5e67b9868b1fa50b13bc4899cbc3c3d5074040fc1c0b51f99e1823f7a8de2308d15b23f08a319cf58c5fb282f7364c4ab25ff1a005c14a744adcb64a07df"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x967f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xff00, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 0s ago: executing program 1 (id=2096): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0xc000000}, @struct={0x0, 0x0, 0x0, 0x9, 0x0, 0x2}]}}, &(0x7f00000005c0)=""/240, 0x3e, 0xf0, 0x1}, 0x20) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x7, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000006b114300f80000bfabac8ab74d23c385000000810000009523872b445fd791990b082ef29ab1572a24216bd306d7aaa55183e226ea665ffcaf79e6f27dbe1149072ad6c13c1411e2fcffacc0616f1f6aa4f95017905673ccedba4b4218041d0bec92cfe99ef8299baf8a529092e40d5f5b88260f21bc3504cb80f3d7217262dbe9c14c90e8c98a20a65ef7e1569668af95c7d7864c0185eb6a1cede81454192c8f9576b99a5f191e860e128172ceb56e7e06bc150e6c4e0e690a02a58adb874ea9ad6bd3c2"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x55) kernel console output (not intermixed with test programs): probe_write_user helper that may corrupt user memory! [ 59.992966][ T1574] syz.2.353[1574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.005680][ T1574] syz.2.353[1574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.020166][ T1574] syz.2.353[1574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.043777][ T1574] syz.2.353[1574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.618576][ T30] audit: type=1400 audit(1770411885.056:139): avc: denied { create } for pid=1658 comm="syz.4.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 60.657358][ T1656] device syzkaller0 entered promiscuous mode [ 60.947591][ T30] audit: type=1400 audit(1770411885.396:140): avc: denied { create } for pid=1685 comm="syz.4.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 61.289124][ T1699] device syzkaller0 entered promiscuous mode [ 61.312184][ T1712] tap0: tun_chr_ioctl cmd 2147767520 [ 63.072322][ T1814] ªªªªªª: renamed from vlan0 [ 63.445894][ T1844] device syzkaller0 entered promiscuous mode [ 63.625457][ T1838] syz.0.428 (1838) used greatest stack depth: 22400 bytes left [ 65.461399][ T1968] device syzkaller0 entered promiscuous mode [ 65.567223][ T30] audit: type=1400 audit(1770411890.016:141): avc: denied { create } for pid=1971 comm="syz.2.468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 65.817189][ T1986] device macsec0 entered promiscuous mode [ 66.574174][ T30] audit: type=1400 audit(1770411891.016:142): avc: denied { ioctl } for pid=2011 comm="syz.2.482" path="socket:[21133]" dev="sockfs" ino=21133 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 67.718608][ T2081] device sit0 left promiscuous mode [ 67.758454][ T2081] device sit0 entered promiscuous mode [ 69.209572][ T2160] device syzkaller0 entered promiscuous mode [ 69.584135][ T2205] device syzkaller0 entered promiscuous mode [ 70.089454][ T2237] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 70.267767][ T2222] device syzkaller0 entered promiscuous mode [ 70.453331][ T30] audit: type=1400 audit(1770411894.896:143): avc: denied { create } for pid=2244 comm="syz.3.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 70.703455][ T2279] device pim6reg1 entered promiscuous mode [ 70.717597][ T2278] device syzkaller0 entered promiscuous mode [ 70.739647][ T30] audit: type=1400 audit(1770411895.186:144): avc: denied { create } for pid=2280 comm="syz.0.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 71.424299][ T2319] device wg2 entered promiscuous mode [ 72.004197][ T2380] device syzkaller0 entered promiscuous mode [ 78.335066][ T30] audit: type=1400 audit(1770411902.786:145): avc: denied { create } for pid=2490 comm="syz.1.621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 78.496947][ T2529] device veth0_vlan left promiscuous mode [ 78.550950][ T2529] device veth0_vlan entered promiscuous mode [ 79.510827][ T2554] Â: renamed from pim6reg1 [ 79.547877][ T30] audit: type=1400 audit(1770411903.996:146): avc: denied { create } for pid=2552 comm="syz.0.637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 79.961486][ T2597] syz.3.650 uses obsolete (PF_INET,SOCK_PACKET) [ 80.089194][ T30] audit: type=1400 audit(1770411904.536:147): avc: denied { create } for pid=2600 comm="syz.1.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 84.341854][ T30] audit: type=1400 audit(1770411908.786:148): avc: denied { read } for pid=2665 comm="syz.0.668" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.379303][ T30] audit: type=1400 audit(1770411908.816:149): avc: denied { open } for pid=2665 comm="syz.0.668" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 85.135454][ T2735] device syzkaller0 entered promiscuous mode [ 85.701522][ T2778] device wg2 entered promiscuous mode [ 86.185057][ T2806] device bridge_slave_1 left promiscuous mode [ 86.191639][ T2806] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.201652][ T2806] device bridge_slave_0 left promiscuous mode [ 86.208266][ T2806] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.360479][ T30] audit: type=1400 audit(1770411910.806:150): avc: denied { ioctl } for pid=2814 comm="syz.4.710" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.975126][ T2856] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 87.193505][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 87.795258][ T2906] tap0: tun_chr_ioctl cmd 1074025680 [ 88.198548][ T2941] -1: renamed from syzkaller0 [ 97.141123][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 97.167144][ T3154] device veth1_to_bond left promiscuous mode [ 98.934334][ T3297] device syzkaller0 entered promiscuous mode [ 100.108242][ T3394] device syzkaller0 entered promiscuous mode [ 100.583124][ T3429] device syzkaller0 entered promiscuous mode [ 100.711171][ T3447] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 101.430946][ T3495] device veth1_macvtap left promiscuous mode [ 101.930014][ T3530] device pim6reg1 entered promiscuous mode [ 102.159765][ T3539] device syzkaller0 entered promiscuous mode [ 102.667887][ T3559] device syzkaller0 entered promiscuous mode [ 103.168276][ T3572] device syzkaller0 entered promiscuous mode [ 107.521630][ T30] audit: type=1400 audit(1770411931.966:151): avc: denied { create } for pid=3775 comm="syz.3.966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 108.392756][ T3831] device syzkaller0 entered promiscuous mode [ 108.921777][ T3868] device bridge_slave_1 left promiscuous mode [ 108.979094][ T3868] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.017160][ T3868] device bridge_slave_0 left promiscuous mode [ 109.028127][ T3868] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.257304][ T3888] device syzkaller0 entered promiscuous mode [ 110.919328][ T30] audit: type=1400 audit(1770411935.346:152): avc: denied { append } for pid=3986 comm="syz.3.1030" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 111.997184][ T4047] @ÿ: renamed from bond_slave_0 [ 112.257562][ T4057] FAULT_INJECTION: forcing a failure. [ 112.257562][ T4057] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 112.284803][ T4057] CPU: 1 PID: 4057 Comm: syz.0.1053 Tainted: G W syzkaller #0 [ 112.293716][ T4057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 112.303808][ T4057] Call Trace: [ 112.307104][ T4057] [ 112.310049][ T4057] __dump_stack+0x21/0x30 [ 112.314421][ T4057] dump_stack_lvl+0x110/0x170 [ 112.319143][ T4057] ? show_regs_print_info+0x20/0x20 [ 112.324358][ T4057] ? vfs_write+0xc72/0xfd0 [ 112.328798][ T4057] dump_stack+0x15/0x20 [ 112.332967][ T4057] should_fail+0x3c1/0x510 [ 112.337397][ T4057] should_fail_usercopy+0x1a/0x20 [ 112.342430][ T4057] _copy_from_user+0x20/0xd0 [ 112.347029][ T4057] __sys_bpf+0x258/0x7d0 [ 112.351282][ T4057] ? bpf_link_show_fdinfo+0x330/0x330 [ 112.356669][ T4057] ? debug_smp_processor_id+0x17/0x20 [ 112.362059][ T4057] __x64_sys_bpf+0x7c/0x90 [ 112.366490][ T4057] x64_sys_call+0x4b9/0x9a0 [ 112.371000][ T4057] do_syscall_64+0x4c/0xa0 [ 112.375425][ T4057] ? clear_bhb_loop+0x50/0xa0 [ 112.380116][ T4057] ? clear_bhb_loop+0x50/0xa0 [ 112.384815][ T4057] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 112.390727][ T4057] RIP: 0033:0x7f2d296aceb9 [ 112.395152][ T4057] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 112.414772][ T4057] RSP: 002b:00007f2d28109028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 112.423203][ T4057] RAX: ffffffffffffffda RBX: 00007f2d29927fa0 RCX: 00007f2d296aceb9 [ 112.431187][ T4057] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 112.439170][ T4057] RBP: 00007f2d28109090 R08: 0000000000000000 R09: 0000000000000000 [ 112.447149][ T4057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.455134][ T4057] R13: 00007f2d29928038 R14: 00007f2d29927fa0 R15: 00007ffea75c5748 [ 112.463118][ T4057] [ 112.822812][ T30] audit: type=1400 audit(1770411937.266:153): avc: denied { create } for pid=4066 comm="syz.0.1057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 113.022515][ T4089] device syzkaller0 entered promiscuous mode [ 113.750104][ T4110] FAULT_INJECTION: forcing a failure. [ 113.750104][ T4110] name failslab, interval 1, probability 0, space 0, times 1 [ 113.834721][ T4110] CPU: 1 PID: 4110 Comm: syz.2.1068 Tainted: G W syzkaller #0 [ 113.843556][ T4110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 113.853644][ T4110] Call Trace: [ 113.856927][ T4110] [ 113.859866][ T4110] __dump_stack+0x21/0x30 [ 113.864209][ T4110] dump_stack_lvl+0x110/0x170 [ 113.868888][ T4110] ? show_regs_print_info+0x20/0x20 [ 113.874098][ T4110] ? unwind_get_return_address+0x4d/0x90 [ 113.879754][ T4110] ? stack_trace_save+0xf0/0xf0 [ 113.884613][ T4110] ? arch_stack_walk+0xee/0x140 [ 113.889475][ T4110] dump_stack+0x15/0x20 [ 113.893657][ T4110] should_fail+0x3c1/0x510 [ 113.898076][ T4110] __should_failslab+0xa4/0xe0 [ 113.902848][ T4110] should_failslab+0x9/0x20 [ 113.907358][ T4110] slab_pre_alloc_hook+0x3b/0xe0 [ 113.912304][ T4110] __kmalloc+0x6d/0x2c0 [ 113.916471][ T4110] ? kvmalloc_node+0x211/0x320 [ 113.921241][ T4110] ? kasan_set_track+0x5b/0x70 [ 113.926009][ T4110] kvmalloc_node+0x211/0x320 [ 113.930630][ T4110] ? __x64_sys_openat+0x136/0x160 [ 113.935693][ T4110] ? x64_sys_call+0x219/0x9a0 [ 113.940378][ T4110] ? do_syscall_64+0x4c/0xa0 [ 113.944972][ T4110] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 113.951055][ T4110] ? vm_mmap+0xb0/0xb0 [ 113.955130][ T4110] __htab_map_lookup_and_delete_batch+0x4a4/0x1c00 [ 113.961639][ T4110] ? kstrtol_from_user+0x2a0/0x2a0 [ 113.966765][ T4110] ? __kasan_check_write+0x14/0x20 [ 113.971896][ T4110] ? proc_fail_nth_write+0x180/0x200 [ 113.977199][ T4110] ? htab_free_prealloced_timers+0x320/0x320 [ 113.983195][ T4110] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 113.990232][ T4110] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 113.997351][ T4110] bpf_map_do_batch+0x463/0x5f0 [ 114.002209][ T4110] __sys_bpf+0x65c/0x7d0 [ 114.006455][ T4110] ? bpf_link_show_fdinfo+0x330/0x330 [ 114.011848][ T4110] ? debug_smp_processor_id+0x17/0x20 [ 114.017228][ T4110] __x64_sys_bpf+0x7c/0x90 [ 114.021648][ T4110] x64_sys_call+0x4b9/0x9a0 [ 114.026154][ T4110] do_syscall_64+0x4c/0xa0 [ 114.030576][ T4110] ? clear_bhb_loop+0x50/0xa0 [ 114.035258][ T4110] ? clear_bhb_loop+0x50/0xa0 [ 114.039943][ T4110] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 114.045855][ T4110] RIP: 0033:0x7f3a82134eb9 [ 114.050287][ T4110] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 114.069909][ T4110] RSP: 002b:00007f3a80b91028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 114.078333][ T4110] RAX: ffffffffffffffda RBX: 00007f3a823affa0 RCX: 00007f3a82134eb9 [ 114.086321][ T4110] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 114.094295][ T4110] RBP: 00007f3a80b91090 R08: 0000000000000000 R09: 0000000000000000 [ 114.102266][ T4110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.110234][ T4110] R13: 00007f3a823b0038 R14: 00007f3a823affa0 R15: 00007ffe30a48588 [ 114.118228][ T4110] [ 114.862882][ T4168] FAULT_INJECTION: forcing a failure. [ 114.862882][ T4168] name failslab, interval 1, probability 0, space 0, times 0 [ 114.864233][ T4163] device syzkaller0 entered promiscuous mode [ 114.933815][ T4163] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 114.956013][ T4168] CPU: 0 PID: 4168 Comm: syz.3.1085 Tainted: G W syzkaller #0 [ 114.964910][ T4168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 114.974980][ T4168] Call Trace: [ 114.978276][ T4168] [ 114.981217][ T4168] __dump_stack+0x21/0x30 [ 114.985561][ T4168] dump_stack_lvl+0x110/0x170 [ 114.990272][ T4168] ? show_regs_print_info+0x20/0x20 [ 114.995488][ T4168] dump_stack+0x15/0x20 [ 114.999677][ T4168] should_fail+0x3c1/0x510 [ 115.004122][ T4168] __should_failslab+0xa4/0xe0 [ 115.008957][ T4168] should_failslab+0x9/0x20 [ 115.013497][ T4168] slab_pre_alloc_hook+0x3b/0xe0 [ 115.018455][ T4168] __kmalloc+0x6d/0x2c0 [ 115.022647][ T4168] ? kvmalloc_node+0x211/0x320 [ 115.027424][ T4168] kvmalloc_node+0x211/0x320 [ 115.032024][ T4168] ? __x64_sys_openat+0x136/0x160 [ 115.037063][ T4168] ? x64_sys_call+0x219/0x9a0 [ 115.041756][ T4168] ? do_syscall_64+0x4c/0xa0 [ 115.046369][ T4168] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 115.052492][ T4168] ? vm_mmap+0xb0/0xb0 [ 115.056578][ T4168] __htab_map_lookup_and_delete_batch+0x4c4/0x1c00 [ 115.063105][ T4168] ? kstrtol_from_user+0x2a0/0x2a0 [ 115.068245][ T4168] ? __kasan_check_write+0x14/0x20 [ 115.073371][ T4168] ? proc_fail_nth_write+0x180/0x200 [ 115.078708][ T4168] ? htab_free_prealloced_timers+0x320/0x320 [ 115.084711][ T4168] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 115.091749][ T4168] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 115.098878][ T4168] bpf_map_do_batch+0x463/0x5f0 [ 115.103754][ T4168] __sys_bpf+0x65c/0x7d0 [ 115.108012][ T4168] ? bpf_link_show_fdinfo+0x330/0x330 [ 115.113402][ T4168] ? debug_smp_processor_id+0x17/0x20 [ 115.118791][ T4168] __x64_sys_bpf+0x7c/0x90 [ 115.123235][ T4168] x64_sys_call+0x4b9/0x9a0 [ 115.127939][ T4168] do_syscall_64+0x4c/0xa0 [ 115.132367][ T4168] ? clear_bhb_loop+0x50/0xa0 [ 115.137051][ T4168] ? clear_bhb_loop+0x50/0xa0 [ 115.141734][ T4168] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 115.147652][ T4168] RIP: 0033:0x7fe01c7c9eb9 [ 115.152071][ T4168] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 115.171683][ T4168] RSP: 002b:00007fe01b205028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 115.180115][ T4168] RAX: ffffffffffffffda RBX: 00007fe01ca45090 RCX: 00007fe01c7c9eb9 [ 115.188097][ T4168] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 115.196081][ T4168] RBP: 00007fe01b205090 R08: 0000000000000000 R09: 0000000000000000 [ 115.204068][ T4168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.212050][ T4168] R13: 00007fe01ca45128 R14: 00007fe01ca45090 R15: 00007ffd0366e448 [ 115.220036][ T4168] [ 115.534432][ T4187] device bridge_slave_1 left promiscuous mode [ 115.555553][ T4187] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.600766][ T4187] device bridge_slave_0 left promiscuous mode [ 115.625538][ T4187] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.174483][ T4227] FAULT_INJECTION: forcing a failure. [ 116.174483][ T4227] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.187658][ T4227] CPU: 0 PID: 4227 Comm: syz.4.1103 Tainted: G W syzkaller #0 [ 116.196447][ T4227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 116.206528][ T4227] Call Trace: [ 116.209833][ T4227] [ 116.212786][ T4227] __dump_stack+0x21/0x30 [ 116.217138][ T4227] dump_stack_lvl+0x110/0x170 [ 116.221835][ T4227] ? show_regs_print_info+0x20/0x20 [ 116.227053][ T4227] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 116.232524][ T4227] ? _raw_spin_lock+0xf0/0xf0 [ 116.237217][ T4227] dump_stack+0x15/0x20 [ 116.241401][ T4227] should_fail+0x3c1/0x510 [ 116.245837][ T4227] should_fail_usercopy+0x1a/0x20 [ 116.250869][ T4227] _copy_to_user+0x20/0x90 [ 116.255307][ T4227] __htab_map_lookup_and_delete_batch+0x1776/0x1c00 [ 116.261907][ T4227] ? htab_free_prealloced_timers+0x320/0x320 [ 116.267904][ T4227] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 116.274930][ T4227] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 116.282049][ T4227] bpf_map_do_batch+0x463/0x5f0 [ 116.286902][ T4227] __sys_bpf+0x65c/0x7d0 [ 116.291159][ T4227] ? bpf_link_show_fdinfo+0x330/0x330 [ 116.296537][ T4227] ? debug_smp_processor_id+0x17/0x20 [ 116.302037][ T4227] __x64_sys_bpf+0x7c/0x90 [ 116.306451][ T4227] x64_sys_call+0x4b9/0x9a0 [ 116.310960][ T4227] do_syscall_64+0x4c/0xa0 [ 116.315376][ T4227] ? clear_bhb_loop+0x50/0xa0 [ 116.320055][ T4227] ? clear_bhb_loop+0x50/0xa0 [ 116.324735][ T4227] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 116.330631][ T4227] RIP: 0033:0x7f9441378eb9 [ 116.335048][ T4227] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 116.354661][ T4227] RSP: 002b:00007f943fdd5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 116.363072][ T4227] RAX: ffffffffffffffda RBX: 00007f94415f3fa0 RCX: 00007f9441378eb9 [ 116.371044][ T4227] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 116.379015][ T4227] RBP: 00007f943fdd5090 R08: 0000000000000000 R09: 0000000000000000 [ 116.386987][ T4227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.394966][ T4227] R13: 00007f94415f4038 R14: 00007f94415f3fa0 R15: 00007fff5b18b6c8 [ 116.402957][ T4227] [ 116.774930][ T4269] tap0: tun_chr_ioctl cmd 1074025677 [ 116.780330][ T4269] tap0: linktype set to 24 [ 116.894834][ T4272] FAULT_INJECTION: forcing a failure. [ 116.894834][ T4272] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.932960][ T4272] CPU: 1 PID: 4272 Comm: syz.3.1118 Tainted: G W syzkaller #0 [ 116.941780][ T4272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 116.951863][ T4272] Call Trace: [ 116.955163][ T4272] [ 116.958154][ T4272] __dump_stack+0x21/0x30 [ 116.962502][ T4272] dump_stack_lvl+0x110/0x170 [ 116.967201][ T4272] ? show_regs_print_info+0x20/0x20 [ 116.972416][ T4272] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 116.977935][ T4272] ? _raw_spin_lock+0xf0/0xf0 [ 116.982629][ T4272] dump_stack+0x15/0x20 [ 116.986827][ T4272] should_fail+0x3c1/0x510 [ 116.991257][ T4272] should_fail_usercopy+0x1a/0x20 [ 116.996318][ T4272] _copy_to_user+0x20/0x90 [ 117.000749][ T4272] __htab_map_lookup_and_delete_batch+0x17e5/0x1c00 [ 117.007371][ T4272] ? htab_free_prealloced_timers+0x320/0x320 [ 117.013369][ T4272] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 117.020422][ T4272] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 117.027557][ T4272] bpf_map_do_batch+0x463/0x5f0 [ 117.032430][ T4272] __sys_bpf+0x65c/0x7d0 [ 117.036697][ T4272] ? bpf_link_show_fdinfo+0x330/0x330 [ 117.042095][ T4272] ? debug_smp_processor_id+0x17/0x20 [ 117.047480][ T4272] __x64_sys_bpf+0x7c/0x90 [ 117.051921][ T4272] x64_sys_call+0x4b9/0x9a0 [ 117.056449][ T4272] do_syscall_64+0x4c/0xa0 [ 117.060890][ T4272] ? clear_bhb_loop+0x50/0xa0 [ 117.065575][ T4272] ? clear_bhb_loop+0x50/0xa0 [ 117.070282][ T4272] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 117.076198][ T4272] RIP: 0033:0x7fe01c7c9eb9 [ 117.080630][ T4272] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 117.100261][ T4272] RSP: 002b:00007fe01b226028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 117.108698][ T4272] RAX: ffffffffffffffda RBX: 00007fe01ca44fa0 RCX: 00007fe01c7c9eb9 [ 117.116691][ T4272] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 117.124694][ T4272] RBP: 00007fe01b226090 R08: 0000000000000000 R09: 0000000000000000 [ 117.132681][ T4272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.140668][ T4272] R13: 00007fe01ca45038 R14: 00007fe01ca44fa0 R15: 00007ffd0366e448 [ 117.148655][ T4272] [ 117.658493][ T4335] FAULT_INJECTION: forcing a failure. [ 117.658493][ T4335] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 117.701059][ T4335] CPU: 0 PID: 4335 Comm: syz.4.1136 Tainted: G W syzkaller #0 [ 117.709897][ T4335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 117.719993][ T4335] Call Trace: [ 117.723313][ T4335] [ 117.726289][ T4335] __dump_stack+0x21/0x30 [ 117.730673][ T4335] dump_stack_lvl+0x110/0x170 [ 117.735392][ T4335] ? show_regs_print_info+0x20/0x20 [ 117.740614][ T4335] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 117.746103][ T4335] ? _raw_spin_lock+0xf0/0xf0 [ 117.750813][ T4335] dump_stack+0x15/0x20 [ 117.754990][ T4335] should_fail+0x3c1/0x510 [ 117.759427][ T4335] should_fail_usercopy+0x1a/0x20 [ 117.764478][ T4335] _copy_to_user+0x20/0x90 [ 117.768908][ T4335] __htab_map_lookup_and_delete_batch+0x1776/0x1c00 [ 117.775537][ T4335] ? htab_free_prealloced_timers+0x320/0x320 [ 117.781542][ T4335] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 117.788583][ T4335] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 117.795724][ T4335] bpf_map_do_batch+0x463/0x5f0 [ 117.800623][ T4335] __sys_bpf+0x65c/0x7d0 [ 117.804896][ T4335] ? bpf_link_show_fdinfo+0x330/0x330 [ 117.810312][ T4335] ? debug_smp_processor_id+0x17/0x20 [ 117.815713][ T4335] __x64_sys_bpf+0x7c/0x90 [ 117.820149][ T4335] x64_sys_call+0x4b9/0x9a0 [ 117.824673][ T4335] do_syscall_64+0x4c/0xa0 [ 117.829112][ T4335] ? clear_bhb_loop+0x50/0xa0 [ 117.833811][ T4335] ? clear_bhb_loop+0x50/0xa0 [ 117.838518][ T4335] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 117.844449][ T4335] RIP: 0033:0x7f9441378eb9 [ 117.848889][ T4335] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 117.868515][ T4335] RSP: 002b:00007f943fdd5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 117.876955][ T4335] RAX: ffffffffffffffda RBX: 00007f94415f3fa0 RCX: 00007f9441378eb9 [ 117.884941][ T4335] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 117.892931][ T4335] RBP: 00007f943fdd5090 R08: 0000000000000000 R09: 0000000000000000 [ 117.900914][ T4335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.908898][ T4335] R13: 00007f94415f4038 R14: 00007f94415f3fa0 R15: 00007fff5b18b6c8 [ 117.916885][ T4335] [ 118.281073][ T4390] FAULT_INJECTION: forcing a failure. [ 118.281073][ T4390] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.334937][ T4389] device veth0_vlan left promiscuous mode [ 118.348584][ T4389] device veth0_vlan entered promiscuous mode [ 118.395538][ T4390] CPU: 1 PID: 4390 Comm: syz.4.1151 Tainted: G W syzkaller #0 [ 118.404384][ T4390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 118.414454][ T4390] Call Trace: [ 118.417748][ T4390] [ 118.420709][ T4390] __dump_stack+0x21/0x30 [ 118.425068][ T4390] dump_stack_lvl+0x110/0x170 [ 118.429768][ T4390] ? show_regs_print_info+0x20/0x20 [ 118.434990][ T4390] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 118.440470][ T4390] ? _raw_spin_lock+0xf0/0xf0 [ 118.445185][ T4390] dump_stack+0x15/0x20 [ 118.449362][ T4390] should_fail+0x3c1/0x510 [ 118.453814][ T4390] should_fail_usercopy+0x1a/0x20 [ 118.458850][ T4390] _copy_to_user+0x20/0x90 [ 118.463283][ T4390] __htab_map_lookup_and_delete_batch+0x17e5/0x1c00 [ 118.469900][ T4390] ? htab_free_prealloced_timers+0x320/0x320 [ 118.475901][ T4390] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 118.482946][ T4390] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 118.490081][ T4390] bpf_map_do_batch+0x463/0x5f0 [ 118.494954][ T4390] __sys_bpf+0x65c/0x7d0 [ 118.499213][ T4390] ? bpf_link_show_fdinfo+0x330/0x330 [ 118.504631][ T4390] ? debug_smp_processor_id+0x17/0x20 [ 118.510027][ T4390] __x64_sys_bpf+0x7c/0x90 [ 118.514471][ T4390] x64_sys_call+0x4b9/0x9a0 [ 118.519005][ T4390] do_syscall_64+0x4c/0xa0 [ 118.523452][ T4390] ? clear_bhb_loop+0x50/0xa0 [ 118.528166][ T4390] ? clear_bhb_loop+0x50/0xa0 [ 118.532864][ T4390] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 118.538779][ T4390] RIP: 0033:0x7f9441378eb9 [ 118.543326][ T4390] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 118.562949][ T4390] RSP: 002b:00007f943fdb4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 118.571370][ T4390] RAX: ffffffffffffffda RBX: 00007f94415f4090 RCX: 00007f9441378eb9 [ 118.579346][ T4390] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 118.587324][ T4390] RBP: 00007f943fdb4090 R08: 0000000000000000 R09: 0000000000000000 [ 118.595297][ T4390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.603273][ T4390] R13: 00007f94415f4128 R14: 00007f94415f4090 R15: 00007fff5b18b6c8 [ 118.611400][ T4390] [ 118.620407][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.648928][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 118.672500][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 120.528278][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 121.567810][ T4432] FAULT_INJECTION: forcing a failure. [ 121.567810][ T4432] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 121.590396][ T4432] CPU: 1 PID: 4432 Comm: syz.4.1164 Tainted: G W syzkaller #0 [ 121.599223][ T4432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 121.609301][ T4432] Call Trace: [ 121.612588][ T4432] [ 121.615517][ T4432] __dump_stack+0x21/0x30 [ 121.619857][ T4432] dump_stack_lvl+0x110/0x170 [ 121.624543][ T4432] ? show_regs_print_info+0x20/0x20 [ 121.629757][ T4432] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 121.635223][ T4432] ? _raw_spin_lock+0xf0/0xf0 [ 121.639908][ T4432] dump_stack+0x15/0x20 [ 121.644096][ T4432] should_fail+0x3c1/0x510 [ 121.648526][ T4432] should_fail_usercopy+0x1a/0x20 [ 121.653574][ T4432] _copy_to_user+0x20/0x90 [ 121.657990][ T4432] __htab_map_lookup_and_delete_batch+0x1776/0x1c00 [ 121.664597][ T4432] ? htab_free_prealloced_timers+0x320/0x320 [ 121.670584][ T4432] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 121.677612][ T4432] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 121.684737][ T4432] bpf_map_do_batch+0x463/0x5f0 [ 121.689591][ T4432] __sys_bpf+0x65c/0x7d0 [ 121.693836][ T4432] ? bpf_link_show_fdinfo+0x330/0x330 [ 121.699212][ T4432] ? debug_smp_processor_id+0x17/0x20 [ 121.704595][ T4432] __x64_sys_bpf+0x7c/0x90 [ 121.709016][ T4432] x64_sys_call+0x4b9/0x9a0 [ 121.713521][ T4432] do_syscall_64+0x4c/0xa0 [ 121.717941][ T4432] ? clear_bhb_loop+0x50/0xa0 [ 121.722622][ T4432] ? clear_bhb_loop+0x50/0xa0 [ 121.727301][ T4432] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 121.733199][ T4432] RIP: 0033:0x7f9441378eb9 [ 121.737623][ T4432] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 121.757386][ T4432] RSP: 002b:00007f943fdd5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 121.765812][ T4432] RAX: ffffffffffffffda RBX: 00007f94415f3fa0 RCX: 00007f9441378eb9 [ 121.773789][ T4432] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 121.781762][ T4432] RBP: 00007f943fdd5090 R08: 0000000000000000 R09: 0000000000000000 [ 121.789733][ T4432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.797710][ T4432] R13: 00007f94415f4038 R14: 00007f94415f3fa0 R15: 00007fff5b18b6c8 [ 121.805693][ T4432] [ 121.844024][ T4435] -: renamed from syzkaller0 [ 122.019037][ T4453] device syzkaller0 entered promiscuous mode [ 122.073621][ T4470] FAULT_INJECTION: forcing a failure. [ 122.073621][ T4470] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 122.086978][ T4470] CPU: 0 PID: 4470 Comm: syz.4.1176 Tainted: G W syzkaller #0 [ 122.095765][ T4470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 122.105833][ T4470] Call Trace: [ 122.109121][ T4470] [ 122.112055][ T4470] __dump_stack+0x21/0x30 [ 122.116408][ T4470] dump_stack_lvl+0x110/0x170 [ 122.121088][ T4470] ? show_regs_print_info+0x20/0x20 [ 122.126502][ T4470] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 122.132011][ T4470] ? _raw_spin_lock+0xf0/0xf0 [ 122.136697][ T4470] dump_stack+0x15/0x20 [ 122.140860][ T4470] should_fail+0x3c1/0x510 [ 122.145282][ T4470] should_fail_usercopy+0x1a/0x20 [ 122.150311][ T4470] _copy_to_user+0x20/0x90 [ 122.154731][ T4470] __htab_map_lookup_and_delete_batch+0x17e5/0x1c00 [ 122.161338][ T4470] ? htab_free_prealloced_timers+0x320/0x320 [ 122.167330][ T4470] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 122.174358][ T4470] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 122.181474][ T4470] bpf_map_do_batch+0x463/0x5f0 [ 122.186329][ T4470] __sys_bpf+0x65c/0x7d0 [ 122.190580][ T4470] ? bpf_link_show_fdinfo+0x330/0x330 [ 122.195969][ T4470] ? debug_smp_processor_id+0x17/0x20 [ 122.201350][ T4470] __x64_sys_bpf+0x7c/0x90 [ 122.205773][ T4470] x64_sys_call+0x4b9/0x9a0 [ 122.210288][ T4470] do_syscall_64+0x4c/0xa0 [ 122.214709][ T4470] ? clear_bhb_loop+0x50/0xa0 [ 122.219416][ T4470] ? clear_bhb_loop+0x50/0xa0 [ 122.224102][ T4470] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 122.229998][ T4470] RIP: 0033:0x7f9441378eb9 [ 122.234440][ T4470] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 122.254048][ T4470] RSP: 002b:00007f943fdd5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 122.262462][ T4470] RAX: ffffffffffffffda RBX: 00007f94415f3fa0 RCX: 00007f9441378eb9 [ 122.270439][ T4470] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 122.278412][ T4470] RBP: 00007f943fdd5090 R08: 0000000000000000 R09: 0000000000000000 [ 122.286386][ T4470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 122.294366][ T4470] R13: 00007f94415f4038 R14: 00007f94415f3fa0 R15: 00007fff5b18b6c8 [ 122.302342][ T4470] [ 123.213568][ T4513] FAULT_INJECTION: forcing a failure. [ 123.213568][ T4513] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 123.296354][ T4513] CPU: 0 PID: 4513 Comm: syz.2.1188 Tainted: G W syzkaller #0 [ 123.305164][ T4513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 123.315223][ T4513] Call Trace: [ 123.318509][ T4513] [ 123.321451][ T4513] __dump_stack+0x21/0x30 [ 123.325804][ T4513] dump_stack_lvl+0x110/0x170 [ 123.330514][ T4513] ? show_regs_print_info+0x20/0x20 [ 123.335718][ T4513] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 123.341188][ T4513] ? _raw_spin_lock+0xf0/0xf0 [ 123.345876][ T4513] dump_stack+0x15/0x20 [ 123.350039][ T4513] should_fail+0x3c1/0x510 [ 123.354471][ T4513] should_fail_usercopy+0x1a/0x20 [ 123.359509][ T4513] _copy_to_user+0x20/0x90 [ 123.363946][ T4513] __htab_map_lookup_and_delete_batch+0x1776/0x1c00 [ 123.370551][ T4513] ? htab_free_prealloced_timers+0x320/0x320 [ 123.376549][ T4513] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 123.383587][ T4513] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 123.390711][ T4513] bpf_map_do_batch+0x463/0x5f0 [ 123.395571][ T4513] __sys_bpf+0x65c/0x7d0 [ 123.399822][ T4513] ? bpf_link_show_fdinfo+0x330/0x330 [ 123.405206][ T4513] ? debug_smp_processor_id+0x17/0x20 [ 123.410596][ T4513] __x64_sys_bpf+0x7c/0x90 [ 123.415030][ T4513] x64_sys_call+0x4b9/0x9a0 [ 123.419534][ T4513] do_syscall_64+0x4c/0xa0 [ 123.423960][ T4513] ? clear_bhb_loop+0x50/0xa0 [ 123.428658][ T4513] ? clear_bhb_loop+0x50/0xa0 [ 123.433348][ T4513] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 123.439261][ T4513] RIP: 0033:0x7f3a82134eb9 [ 123.443683][ T4513] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 123.463299][ T4513] RSP: 002b:00007f3a80b70028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 123.471731][ T4513] RAX: ffffffffffffffda RBX: 00007f3a823b0090 RCX: 00007f3a82134eb9 [ 123.479712][ T4513] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 123.487692][ T4513] RBP: 00007f3a80b70090 R08: 0000000000000000 R09: 0000000000000000 [ 123.495662][ T4513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 123.503635][ T4513] R13: 00007f3a823b0128 R14: 00007f3a823b0090 R15: 00007ffe30a48588 [ 123.511615][ T4513] [ 124.523936][ T4568] FAULT_INJECTION: forcing a failure. [ 124.523936][ T4568] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 124.537204][ T4568] CPU: 0 PID: 4568 Comm: syz.4.1208 Tainted: G W syzkaller #0 [ 124.545983][ T4568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 124.556053][ T4568] Call Trace: [ 124.559336][ T4568] [ 124.562308][ T4568] __dump_stack+0x21/0x30 [ 124.566642][ T4568] dump_stack_lvl+0x110/0x170 [ 124.571333][ T4568] ? show_regs_print_info+0x20/0x20 [ 124.576531][ T4568] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 124.581995][ T4568] ? _raw_spin_lock+0xf0/0xf0 [ 124.586708][ T4568] dump_stack+0x15/0x20 [ 124.590875][ T4568] should_fail+0x3c1/0x510 [ 124.595301][ T4568] should_fail_usercopy+0x1a/0x20 [ 124.600326][ T4568] _copy_to_user+0x20/0x90 [ 124.604755][ T4568] __htab_map_lookup_and_delete_batch+0x17e5/0x1c00 [ 124.611359][ T4568] ? htab_free_prealloced_timers+0x320/0x320 [ 124.617339][ T4568] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 124.624473][ T4568] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 124.631596][ T4568] bpf_map_do_batch+0x463/0x5f0 [ 124.636458][ T4568] __sys_bpf+0x65c/0x7d0 [ 124.640701][ T4568] ? bpf_link_show_fdinfo+0x330/0x330 [ 124.646080][ T4568] ? debug_smp_processor_id+0x17/0x20 [ 124.651455][ T4568] __x64_sys_bpf+0x7c/0x90 [ 124.655873][ T4568] x64_sys_call+0x4b9/0x9a0 [ 124.660392][ T4568] do_syscall_64+0x4c/0xa0 [ 124.664824][ T4568] ? clear_bhb_loop+0x50/0xa0 [ 124.669510][ T4568] ? clear_bhb_loop+0x50/0xa0 [ 124.674190][ T4568] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 124.680087][ T4568] RIP: 0033:0x7f9441378eb9 [ 124.684511][ T4568] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 124.704126][ T4568] RSP: 002b:00007f943fdd5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 124.712550][ T4568] RAX: ffffffffffffffda RBX: 00007f94415f3fa0 RCX: 00007f9441378eb9 [ 124.720547][ T4568] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 124.728524][ T4568] RBP: 00007f943fdd5090 R08: 0000000000000000 R09: 0000000000000000 [ 124.736509][ T4568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 124.744483][ T4568] R13: 00007f94415f4038 R14: 00007f94415f3fa0 R15: 00007fff5b18b6c8 [ 124.752462][ T4568] [ 125.511476][ T4619] FAULT_INJECTION: forcing a failure. [ 125.511476][ T4619] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 125.524652][ T4619] CPU: 1 PID: 4619 Comm: syz.1.1220 Tainted: G W syzkaller #0 [ 125.533441][ T4619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 125.543502][ T4619] Call Trace: [ 125.546793][ T4619] [ 125.549729][ T4619] __dump_stack+0x21/0x30 [ 125.554080][ T4619] dump_stack_lvl+0x110/0x170 [ 125.558765][ T4619] ? show_regs_print_info+0x20/0x20 [ 125.563976][ T4619] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 125.569447][ T4619] ? _raw_spin_lock+0xf0/0xf0 [ 125.574130][ T4619] dump_stack+0x15/0x20 [ 125.578287][ T4619] should_fail+0x3c1/0x510 [ 125.582708][ T4619] should_fail_usercopy+0x1a/0x20 [ 125.587732][ T4619] _copy_to_user+0x20/0x90 [ 125.592153][ T4619] __htab_map_lookup_and_delete_batch+0x1776/0x1c00 [ 125.598758][ T4619] ? htab_free_prealloced_timers+0x320/0x320 [ 125.604757][ T4619] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 125.611783][ T4619] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 125.618889][ T4619] bpf_map_do_batch+0x463/0x5f0 [ 125.623746][ T4619] __sys_bpf+0x65c/0x7d0 [ 125.627998][ T4619] ? bpf_link_show_fdinfo+0x330/0x330 [ 125.633375][ T4619] ? debug_smp_processor_id+0x17/0x20 [ 125.638764][ T4619] __x64_sys_bpf+0x7c/0x90 [ 125.643185][ T4619] x64_sys_call+0x4b9/0x9a0 [ 125.647698][ T4619] do_syscall_64+0x4c/0xa0 [ 125.652124][ T4619] ? clear_bhb_loop+0x50/0xa0 [ 125.656817][ T4619] ? clear_bhb_loop+0x50/0xa0 [ 125.661491][ T4619] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 125.667391][ T4619] RIP: 0033:0x7f034f059eb9 [ 125.671824][ T4619] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 125.691442][ T4619] RSP: 002b:00007f034dab6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 125.699863][ T4619] RAX: ffffffffffffffda RBX: 00007f034f2d4fa0 RCX: 00007f034f059eb9 [ 125.707988][ T4619] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 125.715974][ T4619] RBP: 00007f034dab6090 R08: 0000000000000000 R09: 0000000000000000 [ 125.723959][ T4619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 125.731946][ T4619] R13: 00007f034f2d5038 R14: 00007f034f2d4fa0 R15: 00007fff8cae86c8 [ 125.739930][ T4619] [ 126.361448][ T4660] FAULT_INJECTION: forcing a failure. [ 126.361448][ T4660] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 126.374634][ T4660] CPU: 1 PID: 4660 Comm: syz.2.1233 Tainted: G W syzkaller #0 [ 126.383434][ T4660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 126.393502][ T4660] Call Trace: [ 126.396787][ T4660] [ 126.399732][ T4660] __dump_stack+0x21/0x30 [ 126.404095][ T4660] dump_stack_lvl+0x110/0x170 [ 126.408787][ T4660] ? show_regs_print_info+0x20/0x20 [ 126.414001][ T4660] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 126.419479][ T4660] ? _raw_spin_lock+0xf0/0xf0 [ 126.424180][ T4660] dump_stack+0x15/0x20 [ 126.428343][ T4660] should_fail+0x3c1/0x510 [ 126.432783][ T4660] should_fail_usercopy+0x1a/0x20 [ 126.437830][ T4660] _copy_to_user+0x20/0x90 [ 126.442266][ T4660] __htab_map_lookup_and_delete_batch+0x17e5/0x1c00 [ 126.448891][ T4660] ? htab_free_prealloced_timers+0x320/0x320 [ 126.454903][ T4660] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 126.461976][ T4660] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 126.469100][ T4660] bpf_map_do_batch+0x463/0x5f0 [ 126.473990][ T4660] __sys_bpf+0x65c/0x7d0 [ 126.478252][ T4660] ? bpf_link_show_fdinfo+0x330/0x330 [ 126.483645][ T4660] ? debug_smp_processor_id+0x17/0x20 [ 126.489024][ T4660] __x64_sys_bpf+0x7c/0x90 [ 126.493434][ T4660] x64_sys_call+0x4b9/0x9a0 [ 126.497937][ T4660] do_syscall_64+0x4c/0xa0 [ 126.502348][ T4660] ? clear_bhb_loop+0x50/0xa0 [ 126.507027][ T4660] ? clear_bhb_loop+0x50/0xa0 [ 126.511697][ T4660] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 126.517590][ T4660] RIP: 0033:0x7f3a82134eb9 [ 126.521992][ T4660] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 126.541585][ T4660] RSP: 002b:00007f3a80b91028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 126.549995][ T4660] RAX: ffffffffffffffda RBX: 00007f3a823affa0 RCX: 00007f3a82134eb9 [ 126.557971][ T4660] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 126.565931][ T4660] RBP: 00007f3a80b91090 R08: 0000000000000000 R09: 0000000000000000 [ 126.573890][ T4660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 126.581853][ T4660] R13: 00007f3a823b0038 R14: 00007f3a823affa0 R15: 00007ffe30a48588 [ 126.589820][ T4660] [ 127.024153][ T4676] device sit0 entered promiscuous mode [ 127.481073][ T4686] device syzkaller0 entered promiscuous mode [ 127.765317][ T4703] FAULT_INJECTION: forcing a failure. [ 127.765317][ T4703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 127.793718][ T4703] CPU: 0 PID: 4703 Comm: syz.2.1246 Tainted: G W syzkaller #0 [ 127.802642][ T4703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 127.812708][ T4703] Call Trace: [ 127.816191][ T4703] [ 127.819132][ T4703] __dump_stack+0x21/0x30 [ 127.823491][ T4703] dump_stack_lvl+0x110/0x170 [ 127.828188][ T4703] ? show_regs_print_info+0x20/0x20 [ 127.833391][ T4703] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 127.838850][ T4703] ? _raw_spin_lock+0xf0/0xf0 [ 127.843533][ T4703] dump_stack+0x15/0x20 [ 127.847689][ T4703] should_fail+0x3c1/0x510 [ 127.852116][ T4703] should_fail_usercopy+0x1a/0x20 [ 127.857150][ T4703] _copy_to_user+0x20/0x90 [ 127.861570][ T4703] __htab_map_lookup_and_delete_batch+0x1776/0x1c00 [ 127.868173][ T4703] ? htab_free_prealloced_timers+0x320/0x320 [ 127.874185][ T4703] htab_lru_percpu_map_lookup_and_delete_batch+0x36/0x40 [ 127.881217][ T4703] ? htab_lru_percpu_map_lookup_and_delete_elem+0x50/0x50 [ 127.888490][ T4703] bpf_map_do_batch+0x463/0x5f0 [ 127.893344][ T4703] __sys_bpf+0x65c/0x7d0 [ 127.897594][ T4703] ? bpf_link_show_fdinfo+0x330/0x330 [ 127.902973][ T4703] ? debug_smp_processor_id+0x17/0x20 [ 127.908356][ T4703] __x64_sys_bpf+0x7c/0x90 [ 127.912787][ T4703] x64_sys_call+0x4b9/0x9a0 [ 127.917304][ T4703] do_syscall_64+0x4c/0xa0 [ 127.921737][ T4703] ? clear_bhb_loop+0x50/0xa0 [ 127.926424][ T4703] ? clear_bhb_loop+0x50/0xa0 [ 127.931103][ T4703] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 127.937035][ T4703] RIP: 0033:0x7f3a82134eb9 [ 127.941461][ T4703] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 127.961074][ T4703] RSP: 002b:00007f3a80b91028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 127.969509][ T4703] RAX: ffffffffffffffda RBX: 00007f3a823affa0 RCX: 00007f3a82134eb9 [ 127.977490][ T4703] RDX: 0000000000000038 RSI: 0000200000000280 RDI: 0000000000000019 [ 127.985467][ T4703] RBP: 00007f3a80b91090 R08: 0000000000000000 R09: 0000000000000000 [ 127.993440][ T4703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 128.001419][ T4703] R13: 00007f3a823b0038 R14: 00007f3a823affa0 R15: 00007ffe30a48588 [ 128.009418][ T4703] [ 128.261198][ T4718] device sit0 left promiscuous mode [ 128.693527][ T4726] device sit0 entered promiscuous mode [ 129.362889][ T4748] device wg2 left promiscuous mode [ 129.467927][ T4768] device wg2 entered promiscuous mode [ 130.161380][ T4792] device sit0 left promiscuous mode [ 130.235966][ T4797] device sit0 entered promiscuous mode [ 130.795627][ T4797] device syzkaller0 entered promiscuous mode [ 130.841268][ T4815] device wg2 entered promiscuous mode [ 131.543815][ T4863] device wg2 left promiscuous mode [ 131.577608][ T4863] device wg2 entered promiscuous mode [ 132.036474][ T4867] device wg2 entered promiscuous mode [ 132.072210][ T4884] bpf_get_probe_write_proto: 50 callbacks suppressed [ 132.072228][ T4884] syz.0.1301[4884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.079323][ T4884] syz.0.1301[4884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.693818][ T4909] device syzkaller0 entered promiscuous mode [ 133.833312][ T4998] device wg2 left promiscuous mode [ 133.843630][ T4998] device wg2 entered promiscuous mode [ 139.645961][ T5140] device veth0_vlan left promiscuous mode [ 139.662299][ T5140] device veth0_vlan entered promiscuous mode [ 139.713672][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.765445][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.779191][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.795964][ T30] audit: type=1400 audit(1770411965.246:154): avc: denied { create } for pid=5188 comm="syz.0.1395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 141.335160][ T5213] device veth0_vlan left promiscuous mode [ 141.376034][ T5213] device veth0_vlan entered promiscuous mode [ 141.478685][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.488114][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.506568][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.619173][ T5225] device syzkaller0 entered promiscuous mode [ 147.095390][ T5389] device syzkaller0 entered promiscuous mode [ 147.445902][ T5408] device veth1_macvtap left promiscuous mode [ 147.600963][ T5408] device veth0_vlan left promiscuous mode [ 147.654468][ T5408] device veth0_vlan entered promiscuous mode [ 149.173416][ T5491] device veth0_vlan left promiscuous mode [ 149.207293][ T5491] device veth0_vlan entered promiscuous mode [ 151.596861][ T5529] device syzkaller0 entered promiscuous mode [ 152.538253][ T5563] device syzkaller0 entered promiscuous mode [ 152.667471][ T5577] device veth0_vlan left promiscuous mode [ 152.686857][ T5577] device veth0_vlan entered promiscuous mode [ 152.747974][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.756454][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.764031][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.788378][ T5574] device wg2 left promiscuous mode [ 152.870885][ T5579] device wg2 entered promiscuous mode [ 152.901651][ T5586] device syzkaller0 entered promiscuous mode [ 153.676171][ T5640] device veth1_to_bond entered promiscuous mode [ 155.459822][ T5755] device syzkaller0 entered promiscuous mode [ 155.587611][ T5745] syz.3.1550 (5745) used greatest stack depth: 22024 bytes left [ 156.089533][ T5781] device syzkaller0 entered promiscuous mode [ 160.522245][ T5842] device syzkaller0 entered promiscuous mode [ 161.147507][ T5870] sock: sock_set_timeout: `syz.4.1582' (pid 5870) tries to set negative timeout [ 162.830282][ T5891] device syzkaller0 entered promiscuous mode [ 163.033453][ T5901] device syzkaller0 entered promiscuous mode [ 164.943690][ T5925] tap0: tun_chr_ioctl cmd 1074025677 [ 164.965861][ T5925] tap0: linktype set to 804 [ 165.251494][ T5940] device syzkaller0 entered promiscuous mode [ 165.578809][ T5954] device syzkaller0 entered promiscuous mode [ 165.711961][ T5965] device macsec0 entered promiscuous mode [ 165.825292][ T5972] device syzkaller0 entered promiscuous mode [ 166.109510][ T30] audit: type=1400 audit(1770411990.556:155): avc: denied { create } for pid=5985 comm="syz.4.1614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 167.049350][ T6028] @0Ù: renamed from bond_slave_1 [ 167.106048][ T6030] device syzkaller0 entered promiscuous mode [ 167.112765][ T6030] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 169.904443][ T6158] device syzkaller0 entered promiscuous mode [ 170.683098][ T6207] tap0: tun_chr_ioctl cmd 2147767506 [ 171.022690][ T6201] device syzkaller0 entered promiscuous mode [ 171.060459][ T6206] tap0: tun_chr_ioctl cmd 1074025673 [ 171.107672][ T6216] device syzkaller0 entered promiscuous mode [ 171.856035][ T6277] device syzkaller0 entered promiscuous mode [ 172.652730][ T6313] device syzkaller0 entered promiscuous mode [ 172.803766][ T6334] device syzkaller0 entered promiscuous mode [ 173.747369][ T6381] device syzkaller0 entered promiscuous mode [ 174.274400][ T6408] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.286420][ T6408] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.364746][ T6408] device bridge_slave_1 left promiscuous mode [ 174.380549][ T6408] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.411596][ T6408] device bridge_slave_0 left promiscuous mode [ 174.418563][ T6408] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.528775][ T6420] device syzkaller0 entered promiscuous mode [ 174.542808][ T6421] device syzkaller0 entered promiscuous mode [ 174.768614][ T6420] ±ÿ: renamed from bond_slave_0 [ 176.343716][ T6475] device syzkaller0 entered promiscuous mode [ 176.763856][ T6480] device syzkaller0 entered promiscuous mode [ 177.046479][ T6488] syz.2.1769 (6488) used greatest stack depth: 22000 bytes left [ 177.221977][ T6502] device syzkaller0 entered promiscuous mode [ 177.793148][ T6514] device syzkaller0 entered promiscuous mode [ 178.565247][ T6529] device syzkaller0 entered promiscuous mode [ 178.700318][ T6532] device syzkaller0 entered promiscuous mode [ 179.811961][ T6571] device syzkaller0 entered promiscuous mode [ 180.318540][ T6606] device syzkaller0 entered promiscuous mode [ 180.709806][ T6612] device syzkaller0 entered promiscuous mode [ 181.230692][ T6631] device syzkaller0 entered promiscuous mode [ 182.204407][ T6685] device syzkaller0 entered promiscuous mode [ 183.325821][ T6737] device wg2 left promiscuous mode [ 183.379572][ T6738] device wg2 entered promiscuous mode [ 184.183920][ T6762] tap0: tun_chr_ioctl cmd 1074025677 [ 184.234102][ T6762] tap0: linktype set to 804 [ 184.315500][ T6766] tap0: tun_chr_ioctl cmd 2147767517 [ 185.231258][ T6799] device syzkaller0 entered promiscuous mode [ 185.609517][ T6818] @0Ù: renamed from bond_slave_1 [ 185.751230][ T6823] 7B’ç÷ï: renamed from syzkaller0 [ 188.087915][ T6901] device syzkaller0 entered promiscuous mode [ 188.553660][ T6966] device macsec0 left promiscuous mode [ 188.678010][ T6966] device macsec0 entered promiscuous mode [ 188.784821][ T6974] Ÿë: port 1(syz_tun) entered blocking state [ 188.825446][ T6974] Ÿë: port 1(syz_tun) entered disabled state [ 188.831982][ T6974] device syz_tun entered promiscuous mode [ 188.891049][ T6986] device dummy0 entered promiscuous mode [ 188.945875][ T6986] IPv6: ADDRCONF(NETDEV_CHANGE): dummy0: link becomes ready [ 189.200079][ T7007] device pim6reg1 entered promiscuous mode [ 190.136764][ T30] audit: type=1400 audit(1770412014.586:156): avc: denied { create } for pid=7080 comm="syz.2.1956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 190.875293][ T7113] device syzkaller0 entered promiscuous mode [ 193.009825][ T7164] sock: sock_timestamping_bind_phc: sock not bind to device [ 194.514244][ T7233] nr0: port 1(macsec0) entered blocking state [ 194.520670][ T7233] nr0: port 1(macsec0) entered disabled state [ 196.696560][ T7347] device syzkaller0 entered promiscuous mode [ 198.253916][ T7407] sock: sock_timestamping_bind_phc: sock not bind to device [ 198.369945][ T7428] device syzkaller0 entered promiscuous mode [ 199.224147][ T7480] device syzkaller0 entered promiscuous mode [ 200.256323][ T7521] device syzkaller0 entered promiscuous mode [ 200.327187][ T283] syz-executor (283) used greatest stack depth: 21056 bytes left [ 200.560216][ T7542] cgroup: fork rejected by pids controller in /syz3 [ 200.716721][ T7564] device syzkaller0 entered promiscuous mode [ 200.802239][ T7554] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.809471][ T7554] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.817459][ T7554] device bridge_slave_0 entered promiscuous mode [ 200.826409][ T7554] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.834591][ T7554] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.842027][ T7554] device bridge_slave_1 entered promiscuous mode [ 200.917909][ T30] audit: type=1400 audit(1770412025.366:157): avc: denied { create } for pid=7554 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 200.939331][ T30] audit: type=1400 audit(1770412025.366:158): avc: denied { write } for pid=7554 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 200.960272][ T30] audit: type=1400 audit(1770412025.366:159): avc: denied { read } for pid=7554 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 200.993365][ T7554] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.000438][ T7554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.007748][ T7554] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.014811][ T7554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.030735][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.038251][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.092666][ T7580] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.099809][ T7580] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.107629][ T7580] device bridge_slave_0 entered promiscuous mode [ 201.126701][ T7580] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.133829][ T7580] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.141529][ T7580] device bridge_slave_1 entered promiscuous mode [ 201.150881][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.158713][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.195458][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.274764][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.283102][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.290182][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.297856][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.306251][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.314484][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.321558][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.346956][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.355143][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.363136][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.388405][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.416296][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 201.441959][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 201.587352][ T7554] device veth0_vlan entered promiscuous mode [ 201.595878][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 201.604131][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.687910][ T7600] device syzkaller0 entered promiscuous mode [ 201.739871][ T7554] device veth1_macvtap entered promiscuous mode [ 201.778662][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.786882][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.794394][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 201.802893][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.811398][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 201.867723][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 201.876470][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 201.885539][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 201.893935][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 202.284869][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.292370][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.361132][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.379792][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.407267][ T479] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.414363][ T479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.508217][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.519864][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.529265][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.537677][ T479] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.544749][ T479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.556044][ T45] device veth1_macvtap left promiscuous mode [ 202.562164][ T45] device veth0_vlan left promiscuous mode [ 202.568607][ T45] device veth0_vlan left promiscuous mode [ 202.735230][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.743829][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.753234][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.761522][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.877055][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.885605][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.960093][ T7580] device veth0_vlan entered promiscuous mode [ 202.971589][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 202.982453][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.995969][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.003492][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.031145][ T7618] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.038472][ T7618] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.046387][ T7618] device bridge_slave_0 entered promiscuous mode [ 203.053612][ T7618] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.060718][ T7618] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.069026][ T7618] device bridge_slave_1 entered promiscuous mode [ 203.212944][ T7580] device veth1_macvtap entered promiscuous mode [ 203.223552][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.233254][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.242514][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.330102][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.343204][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.359999][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.388334][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.781657][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.800392][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.907692][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.935236][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.968027][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.975148][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.984341][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.993491][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.002009][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.009093][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.017119][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.025162][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 204.050415][ T7618] device veth0_vlan entered promiscuous mode [ 204.104672][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 204.129796][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.138314][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.147940][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.155822][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.416938][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 204.435644][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.481199][ T7618] device veth1_macvtap entered promiscuous mode [ 204.514846][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 204.522873][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 204.531455][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 204.621697][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 204.735107][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 205.420348][ T7680] device syzkaller0 entered promiscuous mode [ 205.528864][ T7689] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.536037][ T7689] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.543506][ T7689] device bridge_slave_0 entered promiscuous mode [ 205.550819][ T7689] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.557933][ T7689] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.565450][ T7689] device bridge_slave_1 entered promiscuous mode [ 205.632271][ T45] device bridge_slave_1 left promiscuous mode [ 205.648954][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.677387][ T45] device bridge_slave_0 left promiscuous mode [ 205.765871][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.812812][ T45] device veth1_macvtap left promiscuous mode [ 205.825024][ T45] device veth0_vlan left promiscuous mode [ 205.981771][ T7708] device veth0_vlan left promiscuous mode [ 205.990506][ T7708] device veth0_vlan entered promiscuous mode [ 206.013219][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.026505][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 206.035404][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.157562][ T7719] device syzkaller0 entered promiscuous mode [ 206.291995][ T7689] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.299092][ T7689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.306390][ T7689] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.313428][ T7689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.347117][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.356221][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.363815][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.425770][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.439575][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.467127][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.474197][ T374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.532242][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.555183][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.562247][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.586071][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.594193][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.605392][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.613247][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.653604][ T7689] device veth0_vlan entered promiscuous mode [ 206.699891][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.717860][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.796786][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.827981][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.880880][ T7689] device veth1_macvtap entered promiscuous mode [ 206.924608][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.942628][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 207.012768][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 207.120996][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 207.245263][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 207.639754][ T7781] device syzkaller0 entered promiscuous mode [ 207.785096][ T7780] device syzkaller0 entered promiscuous mode [ 208.541511][ T7784] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.569043][ T7784] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.609230][ T7784] device bridge_slave_0 entered promiscuous mode [ 208.721991][ T7784] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.764542][ T7784] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.832957][ T7784] device bridge_slave_1 entered promiscuous mode [ 209.160046][ T45] device bridge_slave_1 left promiscuous mode [ 209.181576][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.192996][ T45] device bridge_slave_0 left promiscuous mode [ 209.199294][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.207562][ T45] device veth1_macvtap left promiscuous mode [ 209.213658][ T45] device veth0_vlan left promiscuous mode [ 209.403011][ T7827] device syzkaller0 entered promiscuous mode [ 209.435496][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.443485][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.492401][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.503794][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.512233][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.519293][ T374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.527738][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.536157][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.544420][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.551789][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.559844][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.568867][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.625821][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 209.670793][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 209.762589][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 209.771097][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.778584][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.787271][ T7784] device veth0_vlan entered promiscuous mode [ 210.058524][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 210.069106][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 210.128237][ T7784] device veth1_macvtap entered promiscuous mode [ 210.187084][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 210.213215][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 210.317117][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 210.417793][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 210.426346][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 210.590221][ T7866] device syzkaller0 entered promiscuous mode [ 211.348348][ T7876] device syzkaller0 entered promiscuous mode [ 211.357658][ T45] device bridge_slave_1 left promiscuous mode [ 211.363809][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.385231][ T45] device bridge_slave_0 left promiscuous mode [ 211.391407][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.409071][ T45] device veth1_macvtap left promiscuous mode [ 211.415173][ T45] device veth0_vlan left promiscuous mode [ 211.802108][ T7881] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.814229][ T7881] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.822228][ T7881] device bridge_slave_0 entered promiscuous mode [ 211.830077][ T7881] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.842759][ T7881] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.853164][ T7881] device bridge_slave_1 entered promiscuous mode [ 212.300708][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.312750][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.350261][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.397022][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.411756][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.418844][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.428946][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.437569][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.454003][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.461075][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.469698][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.496268][ T7940] tap0: tun_chr_ioctl cmd 2147767511 [ 212.531999][ T7942] device syzkaller0 entered promiscuous mode [ 212.543040][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.573459][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.660806][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 212.680659][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.688801][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.696513][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.713113][ T7881] device veth0_vlan entered promiscuous mode [ 212.748638][ T7881] device veth1_macvtap entered promiscuous mode [ 212.774757][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.811264][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 212.860745][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 212.943239][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 213.017083][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 213.376159][ T45] device bridge_slave_1 left promiscuous mode [ 213.382293][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.389876][ T45] device bridge_slave_0 left promiscuous mode [ 213.396166][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.403897][ T45] device veth1_macvtap left promiscuous mode [ 213.409954][ T45] device veth0_vlan left promiscuous mode [ 213.802755][ T7988] device syzkaller0 entered promiscuous mode [ 213.942270][ T7994] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.952172][ T7994] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.964286][ T7994] device bridge_slave_0 entered promiscuous mode [ 214.002000][ T8006] device syzkaller0 entered promiscuous mode [ 214.019613][ T8005] device sit0 left promiscuous mode [ 214.170731][ T7994] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.178148][ T7994] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.191189][ T7994] device bridge_slave_1 entered promiscuous mode [ 214.377234][ T8005] device syzkaller0 entered promiscuous mode [ 214.399395][ T8007] device sit0 entered promiscuous mode [ 214.673641][ T8046] device syzkaller0 entered promiscuous mode [ 214.697694][ T7994] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.704977][ T7994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.712246][ T7994] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.719298][ T7994] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.850994][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.865597][ T479] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.873319][ T479] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.898666][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.912614][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.921125][ T479] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.928184][ T479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.936479][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.946521][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.955067][ T479] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.962135][ T479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.973132][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.981639][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.020168][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.066136][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.108634][ T7994] device veth0_vlan entered promiscuous mode [ 215.124610][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 215.138860][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 215.177321][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 215.213574][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.274441][ T7994] device veth1_macvtap entered promiscuous mode [ 215.318631][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.328430][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.336197][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 215.344437][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 215.357362][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 215.403091][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 215.495054][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 215.503588][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 215.512152][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 215.861504][ T45] device bridge_slave_1 left promiscuous mode [ 215.867759][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.875673][ T45] device bridge_slave_0 left promiscuous mode [ 215.881806][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.890250][ T45] device veth1_macvtap left promiscuous mode [ 215.896327][ T45] device veth0_vlan left promiscuous mode [ 216.403025][ T8124] device syzkaller0 entered promiscuous mode [ 216.671383][ T8134] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.678678][ T8134] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.687076][ T8134] device bridge_slave_0 entered promiscuous mode [ 216.708364][ T8134] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.715632][ T8134] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.723139][ T8134] device bridge_slave_1 entered promiscuous mode [ 216.938705][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.948019][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.975437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.983755][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.997959][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.005034][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.125123][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.163748][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.176528][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.187214][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.194290][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.225391][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.242285][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.251073][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.266724][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.308553][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.340653][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.387685][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.400848][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.422674][ T8209] device syzkaller0 entered promiscuous mode [ 217.431692][ T8134] device veth0_vlan entered promiscuous mode [ 217.438485][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.448592][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.472154][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 217.488215][ T8134] device veth1_macvtap entered promiscuous mode [ 217.512576][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 217.521146][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 217.539384][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 217.547926][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.559507][ T8217] device veth0_vlan left promiscuous mode [ 217.569339][ T8217] device veth0_vlan entered promiscuous mode [ 217.750119][ T45] device bridge_slave_1 left promiscuous mode [ 217.756974][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.769977][ T45] device bridge_slave_0 left promiscuous mode [ 217.780297][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.793758][ T45] device veth1_macvtap left promiscuous mode [ 217.805376][ T45] device veth0_vlan left promiscuous mode [ 218.811973][ T8247] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.819087][ T8247] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.826520][ T8247] device bridge_slave_0 entered promiscuous mode [ 218.833514][ T8247] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.840816][ T8247] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.848258][ T8247] device bridge_slave_1 entered promiscuous mode [ 218.960578][ T8247] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.967670][ T8247] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.974991][ T8247] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.982045][ T8247] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.010392][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.019355][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.027118][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.055940][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.067995][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.075092][ T374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.101040][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.118056][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.125190][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.152235][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.160745][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.181287][ T8247] device veth0_vlan entered promiscuous mode [ 219.227812][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.244723][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.253386][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.286533][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.304990][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.312595][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.341432][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.349819][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.381640][ T8247] device veth1_macvtap entered promiscuous mode [ 219.406587][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.431004][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.476493][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.508742][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.517142][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.605590][ T45] device bridge_slave_1 left promiscuous mode [ 219.611896][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.660619][ T45] device bridge_slave_0 left promiscuous mode [ 219.669833][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.692034][ T8299] sock: sock_set_timeout: `syz.3.2291' (pid 8299) tries to set negative timeout [ 219.766536][ T45] device veth1_macvtap left promiscuous mode [ 219.772729][ T45] device veth0_vlan left promiscuous mode [ 220.919588][ T8340] device  entered promiscuous mode [ 221.053552][ T8346] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.115646][ T8346] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.126305][ T8346] device bridge_slave_0 entered promiscuous mode [ 221.146322][ T8362] device syzkaller0 entered promiscuous mode [ 221.157134][ T8346] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.164266][ T8346] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.172005][ T8346] device bridge_slave_1 entered promiscuous mode [ 221.362697][ T45] device bridge_slave_1 left promiscuous mode [ 221.369021][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.427246][ T45] device bridge_slave_0 left promiscuous mode [ 221.447875][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.465674][ T45] device veth1_macvtap left promiscuous mode [ 221.471712][ T45] device veth0_vlan left promiscuous mode [ 221.976542][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.985528][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.014446][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.023136][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.031395][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.038448][ T374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.053398][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.061827][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.070137][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.077208][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.112562][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.126965][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.333546][ T8414] device syzkaller0 entered promiscuous mode [ 222.367402][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.392580][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 222.401446][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 222.416859][ T8346] device veth0_vlan entered promiscuous mode [ 222.437117][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 222.447322][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.462072][ T8346] device veth1_macvtap entered promiscuous mode [ 222.471994][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.479797][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.487519][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.496914][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.505583][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 222.560045][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 222.584959][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.613675][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 222.622394][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 222.963224][ T8435] device syzkaller0 entered promiscuous mode [ 224.249495][ T8465] device syzkaller0 entered promiscuous mode [ 224.385871][ T8472] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.393076][ T8472] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.401517][ T8472] device bridge_slave_0 entered promiscuous mode [ 224.409049][ T8472] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.416639][ T8472] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.424164][ T8472] device bridge_slave_1 entered promiscuous mode [ 224.488449][ T45] device bridge_slave_1 left promiscuous mode [ 224.496883][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.540135][ T45] device bridge_slave_0 left promiscuous mode [ 224.550785][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.559044][ T45] device veth1_macvtap left promiscuous mode [ 224.565164][ T45] device veth0_vlan left promiscuous mode [ 224.740254][ T8497] device syzkaller0 entered promiscuous mode [ 224.837448][ T8501] device syzkaller0 entered promiscuous mode [ 225.285794][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.293343][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.354221][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.477601][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.505350][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.512441][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.561236][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.597210][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.624348][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.631466][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.672839][ T8530] device syzkaller0 entered promiscuous mode [ 225.716713][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.745817][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.753925][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.786782][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 225.814936][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 226.027928][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 226.036179][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.044334][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.051873][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.186841][ T8541] device syzkaller0 entered promiscuous mode [ 226.325457][ T8472] device veth0_vlan entered promiscuous mode [ 226.576674][ T8554] device syzkaller0 entered promiscuous mode [ 226.591750][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 226.604393][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 226.624190][ T8472] device veth1_macvtap entered promiscuous mode [ 226.688169][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 226.722531][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 226.741102][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 226.949419][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 227.042671][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 228.379233][ T8599] device syzkaller0 entered promiscuous mode [ 228.584171][ T45] device bridge_slave_1 left promiscuous mode [ 228.598447][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.665239][ T45] device bridge_slave_0 left promiscuous mode [ 228.671662][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.679976][ T45] device veth1_macvtap left promiscuous mode [ 228.698518][ T45] device veth0_vlan left promiscuous mode [ 228.947633][ T8606] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.955248][ T8606] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.962773][ T8606] device bridge_slave_0 entered promiscuous mode [ 229.003099][ T8606] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.024554][ T8606] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.032344][ T8606] device bridge_slave_1 entered promiscuous mode [ 229.335201][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.350942][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.377844][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.396549][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.415618][ T479] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.422719][ T479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.440501][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.454894][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.471664][ T479] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.478787][ T479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.517480][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.539220][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.560396][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.583356][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.606299][ T8606] device veth0_vlan entered promiscuous mode [ 229.646390][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.686903][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.694425][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.733646][ T8606] device veth1_macvtap entered promiscuous mode [ 229.752234][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.828054][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 229.906286][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 231.542518][ T45] device bridge_slave_1 left promiscuous mode [ 231.552220][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.612789][ T45] device bridge_slave_0 left promiscuous mode [ 231.666240][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.729002][ T45] device veth1_macvtap left promiscuous mode [ 231.738715][ T45] device veth0_vlan left promiscuous mode [ 231.874074][ T8735] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.881397][ T8735] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.889377][ T8735] device bridge_slave_0 entered promiscuous mode [ 231.896621][ T8735] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.903671][ T8735] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.911519][ T8735] device bridge_slave_1 entered promiscuous mode [ 232.101420][ T8776] device syzkaller0 entered promiscuous mode [ 232.170600][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.178775][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.214793][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.233367][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.248758][ T479] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.255860][ T479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.277753][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.294874][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.313288][ T479] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.320378][ T479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.342938][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.388466][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.446761][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.490152][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.505975][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.534257][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 232.542752][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.551440][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 232.559814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.052487][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.090020][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.116560][ T8735] device veth0_vlan entered promiscuous mode [ 233.182421][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.190693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.201077][ T8735] device veth1_macvtap entered promiscuous mode [ 233.215484][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 233.223921][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 233.544846][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 233.606123][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 235.434272][ T8874] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.441407][ T8874] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.448891][ T8874] device bridge_slave_0 entered promiscuous mode [ 235.456014][ T8874] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.463200][ T8874] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.470893][ T8874] device bridge_slave_1 entered promiscuous mode [ 235.541304][ T8874] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.548415][ T8874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.555740][ T8874] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.562791][ T8874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.648100][ T45] device bridge_slave_1 left promiscuous mode [ 235.659761][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.667870][ T45] device bridge_slave_0 left promiscuous mode [ 235.674886][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.688697][ T45] device veth1_macvtap left promiscuous mode [ 235.694760][ T45] device veth0_vlan left promiscuous mode [ 235.845818][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.853586][ T479] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.861250][ T479] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.887634][ T8906] device syzkaller0 entered promiscuous mode [ 235.895435][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.899021][ T30] audit: type=1400 audit(1770412060.346:160): avc: denied { create } for pid=8905 comm="syz.0.2437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 235.904416][ T479] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.930683][ T479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.938729][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.946977][ T479] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.954041][ T479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.967288][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.975256][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.999625][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 236.011579][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 236.019803][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 236.027378][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.037590][ T8874] device veth0_vlan entered promiscuous mode [ 236.050932][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 236.078449][ T8874] device veth1_macvtap entered promiscuous mode [ 236.093096][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.133911][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.167576][ T30] audit: type=1400 audit(1770412060.616:161): avc: denied { unmount } for pid=8874 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 236.197633][ T8908] -1: renamed from syzkaller0 [ 237.425531][ T45] device bridge_slave_1 left promiscuous mode [ 237.431654][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.439128][ T45] device bridge_slave_0 left promiscuous mode [ 237.445338][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.453085][ T45] device veth1_macvtap left promiscuous mode [ 237.459170][ T45] device veth0_vlan left promiscuous mode [ 237.653146][ T8936] device syzkaller0 entered promiscuous mode [ 237.741579][ T30] audit: type=1400 audit(1770412062.186:162): avc: denied { mounton } for pid=8958 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 238.123090][ T8956] device wg2 entered promiscuous mode [ 238.196237][ T8958] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.203310][ T8958] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.250997][ T8958] device bridge_slave_0 entered promiscuous mode [ 238.310001][ T8958] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.328163][ T8958] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.338077][ T8958] device bridge_slave_1 entered promiscuous mode [ 238.961004][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.968462][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.977874][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.987073][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.995722][ T479] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.002786][ T479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.010537][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.021045][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.029519][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.037875][ T479] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.044923][ T479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.062342][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.070699][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.102437][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.115992][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.124184][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.131847][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.143055][ T8958] device veth0_vlan entered promiscuous mode [ 239.162280][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 239.172661][ T8958] device veth1_macvtap entered promiscuous mode [ 239.184111][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 239.206856][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.425192][ T45] device bridge_slave_1 left promiscuous mode [ 240.431315][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.438799][ T45] device bridge_slave_0 left promiscuous mode [ 240.445015][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.452693][ T45] device veth1_macvtap left promiscuous mode [ 240.458932][ T45] device veth0_vlan left promiscuous mode [ 240.904876][ T9053] syz_tun: refused to change device tx_queue_len [ 241.149288][ T9051] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.208016][ T9051] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.216994][ T9051] device bridge_slave_0 entered promiscuous mode [ 241.229144][ T9051] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.268815][ T9051] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.276604][ T9051] device bridge_slave_1 entered promiscuous mode [ 241.394125][ T9065] ref_ctr_offset mismatch. inode: 0xb22 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 241.625600][ T9051] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.632722][ T9051] bridge0: port 2(bridge_slave_1) entered forwarding state [ 241.640042][ T9051] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.647098][ T9051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.693189][ T479] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.714738][ T479] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.819838][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 241.835108][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 241.872868][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.895265][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.919200][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.926314][ T374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 241.964159][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.986106][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.004819][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.011916][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.035520][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.059072][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.087452][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.111945][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.181851][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 242.203457][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 242.243208][ T9051] device veth0_vlan entered promiscuous mode [ 242.257283][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 242.265937][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 242.280784][ T9051] device veth1_macvtap entered promiscuous mode [ 242.305779][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 242.315773][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 242.333508][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 242.354908][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 242.363267][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 242.416957][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 242.466860][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 242.515299][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 242.555137][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 243.747019][ T45] device bridge_slave_1 left promiscuous mode [ 243.753141][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.760771][ T45] device bridge_slave_0 left promiscuous mode [ 243.766963][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.775043][ T45] device veth1_macvtap left promiscuous mode [ 243.781046][ T45] device veth0_vlan left promiscuous mode [ 244.380404][ T9149] sock: sock_timestamping_bind_phc: sock not bind to device [ 244.386661][ T9148] syz.3.2501[9148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.387788][ T9148] syz.3.2501[9148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.402911][ T9150] tap0: tun_chr_ioctl cmd 1074025677 [ 244.426774][ T9150] tap0: linktype set to 823 [ 244.432098][ T9150] tap0: tun_chr_ioctl cmd 1074025694 [ 244.444865][ T9155] syz.4.2503[9155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.444933][ T9155] syz.4.2503[9155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.551757][ T9156] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.570739][ T9156] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.578462][ T9156] device bridge_slave_0 entered promiscuous mode [ 244.586024][ T9156] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.593072][ T9156] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.600707][ T9156] device bridge_slave_1 entered promiscuous mode [ 244.687407][ T9165] device wg2 left promiscuous mode [ 245.131665][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.142596][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.196770][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 245.223702][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.234825][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.241933][ T374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.249694][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 245.261926][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.272031][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.279105][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.298141][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.306090][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 245.322416][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.340733][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 245.349614][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.362487][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 245.370949][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 245.384089][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.392457][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.400107][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 245.437053][ T9156] device veth0_vlan entered promiscuous mode [ 245.487049][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 245.518829][ T9156] device veth1_macvtap entered promiscuous mode [ 245.541277][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 245.549659][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 245.570648][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 245.581259][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 247.026128][ T479] device bridge_slave_1 left promiscuous mode [ 247.032271][ T479] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.039907][ T479] device bridge_slave_0 left promiscuous mode [ 247.046124][ T479] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.054017][ T479] device veth1_macvtap left promiscuous mode [ 247.060260][ T479] device veth0_vlan left promiscuous mode [ 247.587827][ T9256] device veth0_vlan left promiscuous mode [ 247.594151][ T9256] device veth0_vlan entered promiscuous mode [ 247.610444][ T9266] device sit0 entered promiscuous mode [ 247.644825][ T9263] device syzkaller0 entered promiscuous mode [ 247.764327][ T9265] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.774329][ T9265] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.783654][ T9265] device bridge_slave_0 entered promiscuous mode [ 247.786465][ T30] audit: type=1400 audit(1770412072.236:163): avc: denied { create } for pid=9287 comm="syz.2.2539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 247.792166][ T9265] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.816712][ T9265] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.839065][ T9265] device bridge_slave_1 entered promiscuous mode [ 247.953699][ T9265] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.960802][ T9265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.968104][ T9265] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.975155][ T9265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.989771][ T9310] device syzkaller0 entered promiscuous mode [ 248.005062][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.021798][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.066813][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.075814][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.195127][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.213669][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.232096][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.239219][ T374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.247041][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.262276][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.291090][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.298186][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.320732][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 248.332188][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 248.340527][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 248.357804][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 248.395502][ T9340] syz.2.2550[9340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.395590][ T9340] syz.2.2550[9340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.454920][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 248.515392][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 248.537929][ T9265] device veth0_vlan entered promiscuous mode [ 248.545593][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 248.556039][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.568608][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.581281][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 248.663610][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 248.679717][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 248.746088][ T9265] device veth1_macvtap entered promiscuous mode [ 248.784007][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 248.795986][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 248.829925][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 248.861274][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 248.895908][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 249.643091][ T479] device bridge_slave_1 left promiscuous mode [ 249.649347][ T479] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.657190][ T479] device bridge_slave_0 left promiscuous mode [ 249.663362][ T479] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.672367][ T479] device veth1_macvtap left promiscuous mode [ 249.678448][ T479] device veth0_vlan left promiscuous mode [ 250.883629][ T9375] device syzkaller0 entered promiscuous mode [ 251.195257][ T9379] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.207644][ T9379] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.220058][ T9379] device bridge_slave_0 entered promiscuous mode [ 251.238732][ T9393] device syzkaller0 entered promiscuous mode [ 251.256261][ T9379] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.263580][ T9379] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.271395][ T9379] device bridge_slave_1 entered promiscuous mode [ 251.388659][ T9379] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.395772][ T9379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.403060][ T9379] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.410128][ T9379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.440383][ T479] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.456784][ T479] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.475816][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.488388][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.559098][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.578257][ T479] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.585353][ T479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.701331][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.723912][ T479] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.731022][ T479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.814310][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.825913][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.854064][ T9379] device veth0_vlan entered promiscuous mode [ 251.864938][ T9429] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 251.870864][ T9429] syzkaller0: owner set to 1 [ 251.880167][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.892051][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.906640][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.919642][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.942407][ T9379] device veth1_macvtap entered promiscuous mode [ 251.953835][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 251.971472][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 251.996579][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.826427][ T374] device bridge_slave_1 left promiscuous mode [ 252.832656][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.840220][ T374] device bridge_slave_0 left promiscuous mode [ 252.846457][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.854213][ T374] device veth1_macvtap left promiscuous mode [ 252.860277][ T374] device veth0_vlan left promiscuous mode [ 254.029981][ T9443] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.037507][ T9443] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.045092][ T9443] device bridge_slave_0 entered promiscuous mode [ 254.052318][ T9443] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.059490][ T9443] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.067067][ T9443] device bridge_slave_1 entered promiscuous mode [ 254.128040][ T9443] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.135256][ T9443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.142548][ T9443] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.149621][ T9443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.174439][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.195638][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.234717][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.537564][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.546053][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.554271][ T374] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.561354][ T374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.583683][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.593788][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.602886][ T374] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.609974][ T374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.624708][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.633151][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.648637][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.667263][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.747566][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.804902][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.818183][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.826357][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.836193][ T9443] device veth0_vlan entered promiscuous mode [ 254.875854][ T9443] device veth1_macvtap entered promiscuous mode [ 254.895413][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.915046][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.926985][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.942008][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.961580][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.991855][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.002257][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.010881][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.020574][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.057141][ T9475] device syzkaller0 entered promiscuous mode [ 255.628084][ T374] device bridge_slave_1 left promiscuous mode [ 255.634233][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.641831][ T374] device bridge_slave_0 left promiscuous mode [ 255.648060][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.656247][ T374] device veth1_macvtap left promiscuous mode [ 255.662248][ T374] device veth0_vlan left promiscuous mode [ 257.245893][ T9493] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.253056][ T9493] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.266262][ T9493] device bridge_slave_0 entered promiscuous mode [ 257.277607][ T9493] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.309524][ T9493] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.318551][ T9493] device bridge_slave_1 entered promiscuous mode [ 257.520733][ T9493] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.527870][ T9493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.535200][ T9493] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.542250][ T9493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.637904][ T479] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.656921][ T479] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.722280][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.771846][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.849763][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.906018][ T479] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.913108][ T479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.921639][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.931106][ T479] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.938190][ T479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.950888][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.045986][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.096875][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 258.109266][ T9493] device veth0_vlan entered promiscuous mode [ 258.148960][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.181273][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.188924][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.280901][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 258.294890][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 258.304419][ T9493] device veth1_macvtap entered promiscuous mode [ 258.438031][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 258.446434][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 258.459877][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 258.510081][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 258.526781][ T479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 259.745934][ T374] device bridge_slave_1 left promiscuous mode [ 259.752075][ T374] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.759614][ T374] device bridge_slave_0 left promiscuous mode [ 259.765822][ T374] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.773672][ T374] device veth1_macvtap left promiscuous mode [ 259.779756][ T374] device veth0_vlan left promiscuous mode [ 260.875240][ T9575] tap0: tun_chr_ioctl cmd 1074025677 [ 260.884559][ T9575] tap0: linktype set to 768 [ 262.023704][ T9579] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.034716][ T9579] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.042481][ T9579] device bridge_slave_0 entered promiscuous mode [ 262.055879][ T9579] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.063086][ T9579] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.070634][ T9579] device bridge_slave_1 entered promiscuous mode [ 262.195440][ T9579] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.202536][ T9579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.209886][ T9579] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.216964][ T9579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.241609][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.253907][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.272621][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.280474][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.335055][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.395287][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.402383][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.467205][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.482063][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.489243][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.497141][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.505237][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.522627][ T9579] device veth0_vlan entered promiscuous mode [ 262.590056][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 262.599797][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.608121][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.615952][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.632216][ T9579] device veth1_macvtap entered promiscuous mode [ 262.662457][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 262.781180][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.802508][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=2096 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 263.087295][ T30] audit: type=1400 audit(1770412087.536:164): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[14602]" dev="pipefs" ino=14602 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 263.248433][ T282] device syz_tun left promiscuous mode [ 263.253939][ T282] Ÿë: port 1(syz_tun) entered disabled state [ 264.185093][ T10] device bridge_slave_1 left promiscuous mode [ 264.191225][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.198755][ T10] device bridge_slave_0 left promiscuous mode [ 264.205013][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.212782][ T10] device veth1_macvtap left promiscuous mode [ 264.218848][ T10] device veth0_vlan left promiscuous mode [ 264.636033][ T9618] device syz_tun left promiscuous mode [ 264.641539][ T9618] Ÿë: port 1(syz_tun) entered disabled state [ 265.665642][ T10] device bridge_slave_1 left promiscuous mode [ 265.671791][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.679523][ T10] device bridge_slave_0 left promiscuous mode [ 265.685783][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.693788][ T10] device macsec0 left promiscuous mode [ 265.699487][ T10] nr0: port 1(macsec0) entered disabled state [ 265.706813][ T10] device veth1_macvtap left promiscuous mode [ 265.713019][ T10] device veth0_vlan left promiscuous mode [ 265.719028][ T10] device veth1_macvtap left promiscuous mode [ 265.725126][ T10] device veth0_vlan left promiscuous mode [ 268.335042][ T10] device macsec0 left promiscuous mode [ 268.340751][ T10] nr0: port 1(macsec0) entered disabled state [ 268.348503][ T10] device veth0_vlan left promiscuous mode