last executing test programs: 21.242264499s ago: executing program 4 (id=1210): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1900000004000000040000000f"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x0, 0x9, 0x2, 0x1, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb91, 0x63, &(0x7f00000001c0)=""/99, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xe, 0x9, 0x9e000000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0x8, 0x8}, {0x5, 0x2, 0x7, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x5, 0x4, 0xa, 0xb}, {0x2, 0x1, 0xc, 0x8}, {0x3, 0x5, 0x3, 0x8}, {0x3, 0x5, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x6}, {0x2, 0x5, 0x8, 0xb}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000071180d000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x82100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1900000004000000040000000f"], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x0, 0x9, 0x2, 0x1, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb91, 0x63, &(0x7f00000001c0)=""/99, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xe, 0x9, 0x9e000000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0x8, 0x8}, {0x5, 0x2, 0x7, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x5, 0x4, 0xa, 0xb}, {0x2, 0x1, 0xc, 0x8}, {0x3, 0x5, 0x3, 0x8}, {0x3, 0x5, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x6}, {0x2, 0x5, 0x8, 0xb}], 0x10, 0x2}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000071180d000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x82100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) 18.609034457s ago: executing program 4 (id=1210): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1900000004000000040000000f"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x0, 0x9, 0x2, 0x1, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb91, 0x63, &(0x7f00000001c0)=""/99, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xe, 0x9, 0x9e000000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0x8, 0x8}, {0x5, 0x2, 0x7, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x5, 0x4, 0xa, 0xb}, {0x2, 0x1, 0xc, 0x8}, {0x3, 0x5, 0x3, 0x8}, {0x3, 0x5, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x6}, {0x2, 0x5, 0x8, 0xb}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000071180d000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x82100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1900000004000000040000000f"], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x0, 0x9, 0x2, 0x1, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb91, 0x63, &(0x7f00000001c0)=""/99, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xe, 0x9, 0x9e000000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0x8, 0x8}, {0x5, 0x2, 0x7, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x5, 0x4, 0xa, 0xb}, {0x2, 0x1, 0xc, 0x8}, {0x3, 0x5, 0x3, 0x8}, {0x3, 0x5, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x6}, {0x2, 0x5, 0x8, 0xb}], 0x10, 0x2}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000071180d000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x82100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) 15.33579773s ago: executing program 4 (id=1210): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1900000004000000040000000f"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x0, 0x9, 0x2, 0x1, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb91, 0x63, &(0x7f00000001c0)=""/99, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xe, 0x9, 0x9e000000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0x8, 0x8}, {0x5, 0x2, 0x7, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x5, 0x4, 0xa, 0xb}, {0x2, 0x1, 0xc, 0x8}, {0x3, 0x5, 0x3, 0x8}, {0x3, 0x5, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x6}, {0x2, 0x5, 0x8, 0xb}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000071180d000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x82100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1900000004000000040000000f"], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x0, 0x9, 0x2, 0x1, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb91, 0x63, &(0x7f00000001c0)=""/99, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xe, 0x9, 0x9e000000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0x8, 0x8}, {0x5, 0x2, 0x7, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x5, 0x4, 0xa, 0xb}, {0x2, 0x1, 0xc, 0x8}, {0x3, 0x5, 0x3, 0x8}, {0x3, 0x5, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x6}, {0x2, 0x5, 0x8, 0xb}], 0x10, 0x2}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000071180d000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x82100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) 12.478463428s ago: executing program 0 (id=1651): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="09000000040000000c0000000b"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x3, 0x5, &(0x7f00000006c0)=ANY=[@ANYBLOB="180200008000000000000000000000008500000027000000c5000000070000009500000000000000"], &(0x7f0000000680)='GPL\x00'}, 0x5d) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b4000000000000006911420000000000c3000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000600000018010000202070250000000000202020db1af8ffa1000000bfa1000000ee7f9ca78a00000007010000f8ffff7fb702000008000000b70300000000000085000000060000009500"/152], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0x3) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1e0000000800000007000000387e000011240800", @ANYRES32=r2, @ANYBLOB="c38200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 12.329695231s ago: executing program 0 (id=1655): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0x8}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x8}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0xc0000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x40000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x4, 0x5, 0x2, 0x5, 0x0, 0xb5, 0x8, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x467b5ee9, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x5040, 0x5, 0x1ed, 0x1, 0x7, 0x4, 0x1ff, 0x0, 0x0, 0x0, 0x2a}, r3, 0x7, 0xffffffffffffffff, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001ac0)={&(0x7f0000000480)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000001a00)=[{&(0x7f0000000540)="05ef546e7e71cd4eab532ca3031fdc6a0ec076ee79052774e919bda33d3a91c6899044b339b15378cb48d26b08ab2d6f6c34ed28f1b873cef0523772ac3d3639d12327530e36845178390e2bb4e430cb3dae203aca57e827daabfa61b0dc2fe3fd39", 0xa682e06dbfde70a2}, {0x0}, {&(0x7f0000000380)="b1755865af5cc302aaf33335f49614e6d1fb66a4b8d359207572c48a2cf0f5e8f1427a7f612b2f41da6e4cb3b1bae6e6147e2a26c9a6cec47830d0d8328804f4b4a2f7f9145e4af4d7190dd7ea85bc4145ea14a2a9983bce80ffd56eedd09fd52ddf220a74536726c002fbe36e96855ff782559e040ca2eac839e7869f9fcecdb74f5ca91a2661cf39684b8a2bcfb38b29332c13f26203814ff1f83f89ecc7eed0f793df8c780bfecb5b78516c0dc19ea38335fdbaf4ea0e5a3af741974d32d683abcd5548393b04ebc2f2c89a698d2e327f", 0xd2}, {&(0x7f0000000800)="a9c9c4d11b4e37022b2c22e8781367f169ae3457f01cc87c31f6971b1ec79d353e2c6d27e2ae3f623207bdf9a5ab0f3a38ef0c2d2134200b5dc7fd0b07467ccbca39d4f476a24adb5b35a786a6884f790c91595abb4c9785c67a051623cdcb858a27ed77aefe94a5eb6598d5ef468474b1e228b503956d6813501a07565943b6829a0effa48f50ececdc64fe6ec65f77cc19240353c88cc2964cead7fe7dc5cc83bff82f1bf76a07e6afaef3eb056235e0a6da2ac717a78f54d6d664ff19075707877122491f7e92440b49de319889bfe8580bf216b40142c21490d5ce119ea966f4ff483ddf67f82ee222b76c94", 0xee}, {0x0}], 0x5, &(0x7f0000001a80)}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000000080000000000000000000850000006100000085000000a00000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc7, &(0x7f0000000140)=""/199}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0xe, 0x0, &(0x7f0000000340)="7a7fa22c2aff88df53ef2a2d88a8", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x100020, 0x1, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x10000, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, r4, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_int(r7, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r8, &(0x7f0000000100)=0x7ff, 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x0) 11.212606087s ago: executing program 4 (id=1210): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1900000004000000040000000f"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x0, 0x9, 0x2, 0x1, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb91, 0x63, &(0x7f00000001c0)=""/99, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xe, 0x9, 0x9e000000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0x8, 0x8}, {0x5, 0x2, 0x7, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x5, 0x4, 0xa, 0xb}, {0x2, 0x1, 0xc, 0x8}, {0x3, 0x5, 0x3, 0x8}, {0x3, 0x5, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x6}, {0x2, 0x5, 0x8, 0xb}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000071180d000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x82100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1900000004000000040000000f"], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x0, 0x9, 0x2, 0x1, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb91, 0x63, &(0x7f00000001c0)=""/99, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xe, 0x9, 0x9e000000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0x8, 0x8}, {0x5, 0x2, 0x7, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x5, 0x4, 0xa, 0xb}, {0x2, 0x1, 0xc, 0x8}, {0x3, 0x5, 0x3, 0x8}, {0x3, 0x5, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x6}, {0x2, 0x5, 0x8, 0xb}], 0x10, 0x2}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000071180d000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x82100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) 9.126334826s ago: executing program 0 (id=1668): r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x40, 0x7, 0x0, 0x0, 0xd299, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x100882, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1}, 0x48) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000112020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020782500000000f01f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x15, &(0x7f0000001480)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x4}, {0x6, 0x0, 0xa}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x33}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x20c0d0d193e1c74f}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r2}, 0xc) (async, rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x65a) (rerun: 32) 9.043433411s ago: executing program 0 (id=1674): r0 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f0000000140)=ANY=[@ANYBLOB="180000007f000000000000000400000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000200009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r4}, &(0x7f00000003c0), &(0x7f0000000600)=r3}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xe62}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x10, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907"], 0xfdef) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 7.307779564s ago: executing program 2 (id=1684): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b}, [@call={0x85, 0x0, 0x0, 0x7d}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000400)='GPL\x00') r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[], &(0x7f0000000480)=""/200, 0x63, 0xc8, 0xfffffffe, 0x1}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x806, 0x3, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, r2, 0x0, 0x3}, 0x50) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x4, 0x1, 0x13}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x94) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r4, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@generic={&(0x7f0000000940)='./file0\x00', 0x0, 0x20}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_tracing={0x1a, 0x1e, 0x0, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', r6, 0x19, r7, 0x8, &(0x7f0000000880)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x4, 0xd, 0xff, 0x8}, 0x10, 0x11d, r9, 0x0, &(0x7f00000009c0)=[r3, r3, r10, r1, r1], 0x0, 0x10, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @fallback, r5}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001ec0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8002, 0x3}]}, @func_proto, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3}}]}}, 0x0, 0x52, 0x0, 0x3}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000105000000100000000000000001000085000000000000000001"], 0x0, 0x42}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xb0}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x5, 0x8}], {0x95, 0x0, 0x9}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/14], 0x22) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe6ea, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_query, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000006"], 0x0, 0x26}, 0x28) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r11, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r0}, 0xc) 6.987795616s ago: executing program 2 (id=1686): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000040000800200e1000000000f0200000004000000000000000100000005000000b50000000900000025ff000000000000000f02000000b8b300000ac0"], &(0x7f00000004c0)=""/158, 0x50, 0x9e, 0x1}, 0x28) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sk_msg}, 0x48) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000180000003d030100000000009500f000000000007126000000000000bf67000000000000360602000fff07006706000020000000170200000ee60000bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad03000000000000720400000000000014000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800ea6553f304000000815dcf00c3eebc52267b042d19"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x2d}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x1}], &(0x7f0000000480)='syzkaller\x00', 0x97, 0xb5, &(0x7f0000000140)=""/181, 0x100, 0x2b, '\x00', r1, 0x25, r0, 0x8, &(0x7f00000002c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x2, 0xf96, 0x9}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000580)=[{0x2, 0x3, 0xe, 0x2}, {0x0, 0x5, 0xa, 0x2}, {0x1, 0x3, 0x9, 0x4}, {0x0, 0x2, 0xb, 0x7}, {0x2, 0x1, 0x4, 0x2}, {0x4, 0x1, 0x7, 0x3}, {0x1, 0x3, 0xc, 0xa}, {0x1, 0x5, 0x10, 0x2}, {0x3, 0x1, 0x0, 0xb}, {0x5, 0x3, 0x0, 0xa}], 0x10, 0xb42d}, 0x94) 6.946065228s ago: executing program 2 (id=1687): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x800}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0xffffffffffffff3c, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed5de7e91cd360a136ce6203c23c00fe82000000000400875a65969f7e750701810000000000000029"], 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050040000000000063110c00000000000002000000850000000500000095000000000000009500a5"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000940)=ANY=[@ANYRES16, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x23}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f3, &(0x7f0000000080)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x3, 0x0, 0x3, 0x0, 0x10000000000, 0x8800, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x3, 0x0, 0x6, 0x7, 0xffffffff, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0xffffffffffffffd8}, 0x40000020) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000680)={0xffffffffffffffff, 0x7fff, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r5, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r6}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000900000000000000230000001839000002000000000000000000000018490000fdffffff0000000000000000057e05000700000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200000000000085000000860000002a4bf0cf00000000"], &(0x7f0000000200)='syzkaller\x00', 0x400, 0x69, &(0x7f0000000500)=""/105, 0x41000, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x5, 0x0, 0x50, 0xa}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, r5, 0xffffffffffffffff, r9, r10], &(0x7f0000000900)=[{0x1, 0xb55, 0xa, 0xb}, {0x2, 0x3, 0x9, 0x7}], 0x10, 0x93}, 0x94) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r11) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) 6.375917014s ago: executing program 2 (id=1691): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x25, 0x4, 0x0, 0x0, 0x0, 0x7fef, 0x850c6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0xc}, 0x14185, 0x30, 0xfffffc02, 0x7, 0x6, 0x2, 0x7, 0x0, 0x0, 0x0, 0x2007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2002f00, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10000000}, 0x10}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='&\x00'], 0x50) ioctl$SIOCSIFHWADDR(r4, 0x8946, &(0x7f0000000040)={'veth0_vlan\x00', @random='\x00\x00\x00\x00\x00 '}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') 6.275635016s ago: executing program 4 (id=1210): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1900000004000000040000000f"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x0, 0x9, 0x2, 0x1, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb91, 0x63, &(0x7f00000001c0)=""/99, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xe, 0x9, 0x9e000000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0x8, 0x8}, {0x5, 0x2, 0x7, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x5, 0x4, 0xa, 0xb}, {0x2, 0x1, 0xc, 0x8}, {0x3, 0x5, 0x3, 0x8}, {0x3, 0x5, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x6}, {0x2, 0x5, 0x8, 0xb}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000071180d000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x82100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1900000004000000040000000f"], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x0, 0x9, 0x2, 0x1, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb91, 0x63, &(0x7f00000001c0)=""/99, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xe, 0x9, 0x9e000000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0x8, 0x8}, {0x5, 0x2, 0x7, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x5, 0x4, 0xa, 0xb}, {0x2, 0x1, 0xc, 0x8}, {0x3, 0x5, 0x3, 0x8}, {0x3, 0x5, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x6}, {0x2, 0x5, 0x8, 0xb}], 0x10, 0x2}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000071180d000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x82100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) 4.232358493s ago: executing program 0 (id=1694): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b}, [@call={0x85, 0x0, 0x0, 0x7d}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000400)='GPL\x00') r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[], &(0x7f0000000480)=""/200, 0x63, 0xc8, 0xfffffffe, 0x1}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x806, 0x3, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, r2, 0x0, 0x3}, 0x50) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x4, 0x1, 0x13}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x94) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r4, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@generic={&(0x7f0000000940)='./file0\x00', 0x0, 0x20}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_tracing={0x1a, 0x1e, 0x0, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', r6, 0x19, r7, 0x8, &(0x7f0000000880)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x4, 0xd, 0xff, 0x8}, 0x10, 0x11d, r9, 0x0, &(0x7f00000009c0)=[r3, r3, r10, r1, r1], 0x0, 0x10, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @fallback, r5}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001ec0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8002, 0x3}]}, @func_proto, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3}}]}}, 0x0, 0x52, 0x0, 0x3}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000105000000100000000000000001000085000000000000000001"], 0x0, 0x42}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xb0}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x5, 0x8}], {0x95, 0x0, 0x9}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/14], 0x22) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe6ea, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_query, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000006"], 0x0, 0x26}, 0x28) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r11, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r0}, 0xc) 4.231112762s ago: executing program 2 (id=1696): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) close(0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000340)="a8", 0x1}], 0x1}, 0x4040001) recvmsg$unix(r1, &(0x7f00000038c0)={0x0, 0x0, 0x0}, 0x1) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000140)={r3, 0x0, 0xe6, 0x0, &(0x7f0000000240)="29193572b37a20f1fd5fed7fa30b42afd084842788a23f08bdbe4aca606e6a334df1026feccc5b7607868f5db89000bc4bfc53580428915a2e7a077a6d52e0333a6b2cd86434a5c985ad3221d9439c6829f8e25b7160c3e51e8bd852173f2044197d0369a8cb4c1cae7ece41ce771ee6b815162558266ba745b2959dea3d3655fb035c9a4b048b1f16695dddabd31709bbda19b8ea0bac1973e1b5396c011e541e3bb0bf74c54e6d537bf83abcf5dfc0c503fd8d49ed8403f08085160d56501795945752a8308de3524f30bf167cbdad6fd4f3857e55cb80480539a24707eb9fdec168423366", 0x0, 0x7, 0x0, 0xd4, 0x0, &(0x7f00000003c0)="ee4b6b64815f1a6537825b47e01d5fa19c3392fe0057f503e4bb7fab583092f5c8b662fcbbbb7adcb0fc662422a64d792fd0a9c1764c7c32e05b05001dae0112e8ead5907c2de4610b116fce11284d9dee7faa971bbd9bdc9e8a5aed67c9f7ba9dd926031282ae2ff5a44080f0bf95692262ff3c2ec9529c2ba12e7103e553aebe6dfad98b746a6fb331c3979e1af11a29ff6b8c97d99801ca7f662d3186a7682f2c85958f3271c99869068ff9406e91a74d0251cc6bc5db7218fd6f13aca454e86c4fe70c915e8b123cba2c67d4139c1fbe1dab", 0x0, 0x2, 0x0, 0x7}, 0x50) recvmsg$unix(r1, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="05000000e4ef1f00810000007f00000001"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000001000008500000095000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4093}, 0x21) 3.851475243s ago: executing program 0 (id=1699): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0xae}, @printk={@llu, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000001000000000000000000008500000075"], 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x42}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000001"], &(0x7f0000000180)=""/222, 0x26, 0xde, 0x1}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10038, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x395}, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000000000000, 0x2}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b8100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.406020742s ago: executing program 1 (id=1705): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x60004, 0x0) (rerun: 32) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETLINK(r2, 0x400454cd, 0x7) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) close(r3) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007000000180100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1d, 0xc, &(0x7f0000000680)=ANY=[@ANYRESHEX=r1, @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x41000}, 0x94) (async) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x9, 0x9, 0x2, 0x9, 0x42}, 0x50) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) (async) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x3fc}, 0x50) bpf$OBJ_PIN_MAP(0x9, &(0x7f0000000040)=@generic={0x0, r5}, 0x18) (async, rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00004405000000020000000700000002000000", @ANYRES32=0x1, @ANYBLOB="00000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r7}, &(0x7f0000000840), &(0x7f0000000880)=r8}, 0x20) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r8, r7}, 0xc) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6) (async, rerun: 64) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) 3.343190621s ago: executing program 2 (id=1706): r0 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f0000000140)=ANY=[@ANYBLOB="180000007f000000000000000400000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000200009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r4}, &(0x7f00000003c0), &(0x7f0000000600)=r3}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0xe62}, 0x0, 0xc8, 0x0, 0x6, 0x0, 0x0, 0xfffa, 0x0, 0x0, 0x0, 0x69}, 0x0, 0x10, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907"], 0xfdef) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x66, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x6, 0x5, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.153646066s ago: executing program 1 (id=1707): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b}, [@call={0x85, 0x0, 0x0, 0x7d}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000400)='GPL\x00') r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[], &(0x7f0000000480)=""/200, 0x63, 0xc8, 0xfffffffe, 0x1}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x806, 0x3, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, r2, 0x0, 0x3}, 0x50) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x4, 0x1, 0x13}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x94) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r4, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, 0x0, 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@generic={&(0x7f0000000940)='./file0\x00', 0x0, 0x20}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_tracing={0x1a, 0x1e, &(0x7f0000000600)=ANY=[@ANYBLOB="18110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000ffffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000181b0000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000d4290000f0000bffbf22feff01000000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', r6, 0x19, r7, 0x8, &(0x7f0000000880)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x4, 0xd, 0xff, 0x8}, 0x10, 0x11d, r9, 0x0, &(0x7f00000009c0)=[r3, r3, r10, r1, r1], 0x0, 0x10, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @fallback, r5}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001ec0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8002, 0x3}]}, @func_proto, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3}}]}}, 0x0, 0x52, 0x0, 0x3}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000105000000100000000000000001000085000000000000000001"], 0x0, 0x42}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xb0}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x5, 0x8}], {0x95, 0x0, 0x9}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/14], 0x22) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe6ea, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_query, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000006"], 0x0, 0x26}, 0x28) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r11, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r0}, 0xc) 2.528435662s ago: executing program 1 (id=1710): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b}, [@call={0x85, 0x0, 0x0, 0x7d}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000400)='GPL\x00') r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[], &(0x7f0000000480)=""/200, 0x63, 0xc8, 0xfffffffe, 0x1}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x806, 0x3, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, r2, 0x0, 0x3}, 0x50) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x4, 0x1, 0x13}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x94) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r4, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840), 0x4) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)=@generic={&(0x7f0000000940)='./file0\x00', 0x0, 0x20}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_tracing={0x1a, 0x1e, 0x0, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', r6, 0x19, r7, 0x8, &(0x7f0000000880)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x4, 0xd, 0xff, 0x8}, 0x10, 0x11d, r9, 0x0, &(0x7f00000009c0)=[r3, r3, r10, r1, r1], 0x0, 0x10, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @fallback, r5}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001ec0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x8002, 0x3}]}, @func_proto, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3}}]}}, 0x0, 0x52, 0x0, 0x3}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000002000000000000000000000105000000100000000000000001000085000000000000000001"], 0x0, 0x42}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xb0}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x5, 0x8}], {0x95, 0x0, 0x9}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/14], 0x22) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe6ea, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_query, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000006"], 0x0, 0x26}, 0x28) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r11, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r0}, 0xc) 2.504114137s ago: executing program 3 (id=1711): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r0}, 0xc) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x200, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x25, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@generic={0x6, 0x0, 0x5, 0x3, 0xa3e8}, @map_fd={0x18, 0x3, 0x1, 0x0, r0}, @jmp={0x5, 0x1, 0x4, 0x6, 0x0, 0x100, 0xfffffffffffffff0}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0xb, 0x1, 0x0, r0}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x40}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='GPL\x00', 0x4, 0xc7, &(0x7f00000002c0)=""/199, 0x41100, 0x60, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000480)=[r0, r0], &(0x7f00000004c0)=[{0x4, 0x5, 0xf, 0x4}, {0x4, 0x2, 0xf, 0xb}, {0x5, 0x3, 0x8, 0xa}, {0x0, 0x5, 0xc, 0xc}], 0x10, 0x2}, 0x94) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x4010, r4}, 0x18) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000780), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0x20, &(0x7f0000000980)={&(0x7f0000000840)=""/185, 0xb9, 0x0, &(0x7f0000000900)=""/89, 0x59}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x1c, 0x18, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x3}, @ldst={0x2, 0x2, 0x2, 0x6, 0xa, 0x8, 0xfffffffffffffffc}, @map_fd={0x18, 0x1, 0x1, 0x0, r5}, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @alu={0x7, 0x0, 0x5, 0x1, 0x7, 0xffffffffffffffc0}, @alu={0x3, 0x0, 0x4, 0x2, 0x8, 0x1, 0xffffffffffffffff}, @ldst={0x0, 0x1, 0x1, 0x5, 0x2, 0xfffffffffffffff0, 0x10}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000700)='GPL\x00', 0x0, 0xe, &(0x7f0000000740)=""/14, 0x41000, 0x28, '\x00', r3, @fallback=0x2, r6, 0x8, &(0x7f00000007c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0x10, 0x1000, 0xdcb0}, 0x10, r7, r4, 0x5, 0x0, &(0x7f0000000a00)=[{0x0, 0x4, 0x10, 0x1}, {0xeb04, 0x4, 0x6, 0xb}, {0x0, 0x3, 0xe, 0x7}, {0x1, 0x2, 0x7, 0x8}, {0x2, 0x4, 0xf, 0x3}], 0x10, 0xfffffe00}, 0x94) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b80)=@o_path={&(0x7f0000000b40)='./file0/file0\x00', 0x0, 0x8, r8}, 0x18) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x5) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0xd, 0xa, &(0x7f0000000bc0)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1ad}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000c40)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x30, '\x00', r3, @sock_ops=0x3, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c80)={0x4, 0x1, 0xe9, 0x8}, 0x10, r7, r9, 0x6, 0x0, &(0x7f0000000cc0)=[{0x5, 0x5, 0x1, 0x9}, {0x5, 0x1, 0x9, 0x7}, {0x5, 0x2, 0xc}, {0x1, 0x5, 0x10, 0x5}, {0x1, 0x5, 0x6}, {0x3, 0x2, 0x10, 0x9}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001100)={r10, 0x0, 0xe4, 0x56, &(0x7f0000000e00)="a62937f1400a212ce3e32513977dbecaa535479a7abdffcdf5715c69050b601736623e25db8fab043da2d394413dda41774933782abb4c3d15892a3b7df5659eb069ef7ebcde8f00e5746922fb2523d24a7c33e32ebe76e5457ad3812ad09f4f384fdd653b7615d702dbfd64b1758dce021044a7db8101bdf48dff53d9c1bb3c01f3952fc89e58dfe64293afe2be5c51719eb8540ee3b39e03399e4ec9026750b9332cd8b33df669f193693b7d6090be8946d92380ae2e4238d15c8c94ba66fe807ad946ee8d285e256f2181ff06bd38a79e2b44e78454e8404f84fddae726fc27c4108e", &(0x7f0000000f00)=""/86, 0x175c, 0x0, 0xd3, 0x5f, &(0x7f0000000f80)="2e66714cb6dae2bdab6d1c74ebf535bb768c1c1ee9ab8396d97b2532b25033c0474c8e087e8da73c975117b5c9f03b2e48f4ea8ae9319fb9ebf67c82fc7402bcc123bfd4af2c9898b8f1d88af00e4275768a13a5d52aac9dac45068a3bb2b780e382c8d59c57fe1b47985aaf063e98c06a16fe2c9f2e9055a4314ed3f578ca2b37dfd5e5f43ad1db1169e7a6164880873af278b570d08febb57ec33b273db715c17603217f310fee6ebd877ef4bd761e0557b8cca738c60286fa0c1c6de47165d85116b739c4f58c04249027298f6706a429a7", &(0x7f0000001080)="86fb26f3f03898e16f851f5dfa7d797be31cf67cf4bd1587644e03aca420b390e32d161655a9bfcb29fa1154595f7838da9e8246f0d5d45adc5b6137fab1ffb31d1bbd66d5b2ffa38c217700a6c9d6bd7aba64cdf3e1d86c9c4c844f192182", 0x0, 0x0, 0xf9a}, 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001280)={r0, &(0x7f0000001180)="33220e74ff3166c9bff92e35713c9a39e07d84372c5f3a2dfcb0488f340f6ee1dcef72238de9017f3a232fde15197aab74df5ae4d4fdfa949fedbfa93dafeb2bdb0950126e81ea31dca46f53a6c1e78d92b40065aec4f28659b927337428d9d7a7a6937e54932264a5781069e2aa513e39a90133152fb1ecb29983b0caab6ca6344fcb14c82c8e3ba0f3f0b5991ef62b9facae7faaa99c5ced864fffb4ab759ad505b5e7fb525d60be76ccd83b500e87261da3129058bfb7ca817bdf18bdf979fe55d3c4924fc969cc44d900a781945ea0b67fe1e629f438857aa751213bb0801e6567658dce27fb2d9c3c64d3b01980"}, 0x20) r11 = openat$tun(0xffffffffffffff9c, &(0x7f00000012c0), 0x24000, 0x0) ioctl$TUNSETNOCSUM(r11, 0x400454c8, 0x0) ioctl$TUNSETTXFILTER(r11, 0x400454d1, &(0x7f0000001300)={0x1, 0x3, [@remote, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1f}, @broadcast]}) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001340)={0x93b}, 0x8) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f00000027c0)={&(0x7f00000013c0)={0x2, 0x4e23, @rand_addr=0x64010102}, 0x10, &(0x7f0000002700)=[{&(0x7f0000001400)="2080ed116b19e9e9e9ffa4bfff60b55d424256cbd284bf2436d16b2ea0fabc665f16b15cd85cb06677b3da9e26351b792b48a305123bdce92caf967bb9097a846c4e2c345357300e84a52b745cde389085b9507b88fb86a16bdfd7a7ea7bcb14bff5d0686a28d010fc6445e026c04e887b33ab6d9889b91c20063dc361e3064a0b1823193021e9387ece0e75348c87feedf04e1133e23bcfa3fe3af3e7dad8776b3b80f1d7e4e3a4542d25998330c069296444d23cfdaa00bdf16b57af6a2bd3847827a31f4e9a53fbef26735522aff4ed8a1b6553c4704397b53267bd444593812025b4a64dc82a570f", 0xea}, {&(0x7f0000001500)="404ce76d7cf9cb078478d0b1a787406b7346b1ec506c95333c2c91b780caaeb74655702543b0cb268593955d", 0x2c}, {&(0x7f0000001540)="93fd5a49fd2f01ff08816febff40217e9d22e4ee43048605029a443df92bb3404dea28a2d3e56fd6793a14b491d34314d04c2cdf29e55e9517fea86e482ea75f8a8b8f25421e3d014634672cd6baaaeb6f160a07b4b2e68602881ffcafa812c58bd05cab760282ab2244ff53f125bc25beb340660882e5fc54812f715e9b7220068c4b3ec86f6c2d2a", 0x89}, {&(0x7f0000001600)="cef9d1fe8636a34244af158199587942450bad0780ac25f9eea30c95f377ae2b1f2358d1e57e92270020b48b77d0671b5ec47f9247c32c722ce96855e1573e746c3543adc6fcd5e2912c0634c4f1c59aefb99875d2e24c966ed9e3457664b548c408b02795807d0474c27cd9561a9bcf34dabdccdbc3bdfe2cf7b8f75f058f496f1a9d9ff8502cf39788143d2c42a55dd49c6e3064bacf66b9d999cee3996b6e40016ac74bd1dac7c6d9e49d942915a50c1cfd9f", 0xb4}, {0x0}, {&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000026c0)="ee58885d8f7dd18bf5f2b4bb19efc436207bb9514ab6957cf413abb868c4", 0x1e}], 0x7, &(0x7f0000002780)}, 0x4000) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000029c0)={r2, 0xe, 0x8}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002a40)=@bpf_ext={0x1c, 0x1c, &(0x7f0000002800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xc00}, [@cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xdb}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ldst={0x3, 0x0, 0x4, 0x2, 0x9, 0x30, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x1f}]}, &(0x7f0000002900)='GPL\x00', 0x40, 0x0, 0x0, 0x0, 0x48, '\x00', r3, 0x0, r6, 0x8, &(0x7f0000002940)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000002980)={0x4, 0x7, 0x3, 0x8}, 0x10, 0x2bb54, 0xffffffffffffffff, 0x0, &(0x7f0000002a00)=[r14, r0, r1], 0x0, 0x10, 0xd50}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002b00)={0xffffffffffffffff}) r16 = openat$tun(0xffffffffffffff9c, &(0x7f0000002b40), 0x381080, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002d40)={0x6, 0x4, &(0x7f0000002b80)=@raw=[@ldst={0x1, 0x1, 0x2, 0xa, 0x0, 0xfffffffffffffff4}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, @alu={0x3, 0x1, 0x9, 0x3, 0xda9c71cfa9f4796b, 0xffffffffffffffff, 0x1}], &(0x7f0000002bc0)='syzkaller\x00', 0x4528e483, 0x56, &(0x7f0000002c00)=""/86, 0x40f00, 0x20, '\x00', r3, 0x25, r15, 0x8, &(0x7f0000002c80)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000002cc0)={0x4, 0x9, 0x1, 0x1}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002d00)=[{0x4, 0x3, 0x7, 0x1}], 0x10, 0xa}, 0x94) close(r4) ioctl$TUNSETFILTEREBPF(r16, 0x800454e1, &(0x7f0000002e00)=r4) sendmsg$inet(r13, &(0x7f0000003340)={&(0x7f0000002e40)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10, &(0x7f0000003240)=[{&(0x7f0000002e80)="2ba011ea22904aa88d71f47edffa7f5cf2efdfc0d156df7e79e13c3d9769526d20173d5dfcac5cffa245ee22ac4edce8bf93dfc875654d75a7c733f4d9a7c2a3d89f94cbd6da9ff9927e7a194269a2e9f35ba758e763e05abd2fe904fe19c35d4dc1fe6cc4c85d9fac5c43d649c7f99b3605b740c9826ed3ed04c69618eff1a180b2cf0fb4d23bdd623c60c23a5f44826bc0b5577652ef2c17190c975cc53ad070ae73dc7f79bdbaa6e26bc8841a02fb70da6c729c90acc5c17855c62f3276e464f53f67af826491b83769b9a4f986a364a7fd1115c2479e8cd29799db92352ede8e28fd7e3430977af8fc0f55bf955995a8b596", 0xf4}, {&(0x7f0000002f80)="9e7bf0f3293abd6dc67ad451ef1bb3a2fe3ee7c48f023797129e371cc8a3eefcad827e285e0aa477081f5ade33c5a87ac4d9b915fac50ff73c3f867f2619fac276222d870a2fee6848c018b4f4330687cd088e4b4d54b609e0e6", 0x5a}, {&(0x7f0000003000)="eedca2324881996e8351051a0c7dba3a65320100b44333357d4aa992a467eb6cfe02557f05d6d074a20c27470514e39217ba37084a4425ee03f26d40f97625792d06c064a38fa624597b4985433c41f842a291bdcc6401d25362919178af02dff865134a8205be44c3d747980f5baab8dabdc832f537fc77c38e934e2d7dcd306b7c6b69fc4f7c12e3d64fdaf338a3aa5dc174c6678e4ca74f12c0d51a9030c572c5bbcf799c446bab7c44288bdf5a043dca1dc2bac29e554838", 0xba}, {&(0x7f00000030c0)="1dabc4e418dc9d965166486cf1931630045d884393dce4c9aeb9955d135e073c9b2c915e77d809973c2c06e00c5c146317e9d35d6a3fe776a63e777ce5d8dfc69a552df5238e7e8b8e2c1c58fcaa3480f702a14b388530a43cff786903aef70aec3e8c9044b17be1f181cb9fcfb8caaae2c5e7185a01f7c5f4f87dc27ff5e6dae5dc58f76430dfcf7e38fe96c59646e08d42fb53cdff52e31ea9e88efc643ce0ea94285b23fc4eecb56800eb16c0de52761bc6a85604bfa6c5dc080bbd737d9dc79b733b4990b636bccd1567b52f1301fc8c8203a759cea55d11b7722859bb9ba9901afc4ced8cdf7326a86d8ae330848e6cb03f", 0xf4}, {&(0x7f00000031c0)="b2e564c986ae78b403f751f794e990df3b1089ce88bf1c78fe33845a4749a995d4000a0a42f295f8bd2d16724b8b3169b76147942892413d966598aac58f0e5301944c82c57666f2bc19ad1632b809bbd86acf7934eaab52b3178970e09722cc66", 0x61}], 0x5, &(0x7f00000032c0)=[@ip_retopts={{0x30, 0x0, 0x7, {[@timestamp_addr={0x44, 0xc, 0xe8, 0x1, 0x9, [{@rand_addr=0x64010100, 0x10000}]}, @lsrr={0x83, 0x13, 0x4d, [@multicast2, @local, @dev={0xac, 0x14, 0x14, 0x1a}, @dev={0xac, 0x14, 0x14, 0x33}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xd}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x60}, 0x800) r17 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000034c0)={0x3, 0x4, 0x4, 0xa, 0x0, r14, 0x200, '\x00', r3, r6, 0x0, 0x2, 0x3}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000003480)={@map=r17, 0xe, 0x0, 0x0, &(0x7f0000003380)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000033c0)=[0x0, 0x0], &(0x7f0000003400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000003440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) 2.279956987s ago: executing program 1 (id=1712): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000340)='%d\x00\x00\x00\x00j\xfef;q1\x95\xf4\xe4\x13\x95k#Jz.F\xce\xfb\x9c\x0f\xf3v\x88\x91\xbct\xb0\x1bLq\x15\x00\xad\t\x13\xf5U\x02\xc9d6q\xc3\xa5\xcf\x01t\r%\xad-\x13\xb0 E\xaaC\xc388\x13\xc6H\x0f \x03\x86\xb5\xbfq\'\xab!\x9e\xa98\xa1\xc3\xe9\x06C\xd4\xb5\x18}4\xa9yA8\x1fQ\xdf\xde\x91\xfd\xf1B*j\n\xef\xff\xddR\xec~c\xcb\x93\x84\x7f\\x6\xedZ\x82\xa0\x1by\x17\x1a\xc8\x98\x99\x0f') close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xa, 0x4, 0x8, 0x10, 0x0, 0x1}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000007c0)=ANY=[@ANYRES32=r9, @ANYRES32=r8, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r9}, &(0x7f0000000000), &(0x7f00000002c0)=r5}, 0x20) sendmsg$inet(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x22fe0}], 0x1}, 0x0) recvmsg$unix(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000400)=""/33, 0x21}], 0x2}, 0x10040) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0x1, 0x1100}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1c, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2f}, @map_fd, @exit={0x95, 0x0, 0xc00}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x18}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000300000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r0, r4}, 0xfffffe24) r10 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000e34b71e87fec30ff5fec00"/38], 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r11, @ANYRES32=r10, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r11}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, [@generic={0x73, 0x1, 0x1, 0x29}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) recvmsg$unix(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f00000006c0)=""/184, 0xb8}, {&(0x7f0000001780)=""/4096, 0x1000}], 0x2}, 0x0) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) 2.223750856s ago: executing program 3 (id=1713): syz_open_procfs$namespace(0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000006c0)='ns/uts\x00') perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000600)={@fallback=r0, 0xc, 0x1, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000640)={@map=r1, r0, 0x1e, 0x24, 0x0, @void, @void, @void, @value=0xffffffffffffffff, r2}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, 0x4}, 0x80) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f00000000c0)=0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) r7 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x3}, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000200)='((+)') bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.799000538s ago: executing program 1 (id=1714): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000900000018380000040000000000000000000000186000000e0000000500000009000000181100", @ANYRES32], 0x0, 0x2, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000006"], 0x0, 0x1e, 0x0, 0x1, 0x7}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000220000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000000700000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r2, 0x0, 0xcc0, 0x0, &(0x7f0000000000)="c1188e19b95d02ff4284860186dd", 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000880), 0x12) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r5, 0x0, 0x4) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 1.303357748s ago: executing program 3 (id=1715): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000010850000000a000000850000000700000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.221822483s ago: executing program 3 (id=1716): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6b}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.09466304s ago: executing program 1 (id=1717): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000140)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="00000000000000006608000000000101180010000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa102000000000007010000f8ffffffb702000e52f25c00b50a0083198236e585045e000600000095000000000000009bc3965e65db569ead5c6da31fba5b74d9283f7b0c8ceca58993e997d857f77e7055cf0000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x4, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18020000000000000000000000000000c3220000f10000009500000000000000417c730500a4b8a18b16329d4ec4e6daad70"], &(0x7f0000000200)='syzkaller\x00', 0x3, 0xd5, &(0x7f0000000240)=""/130}, 0x80) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x11, 0x4, 0x0, 0x0, 0x0, 0x64, 0x20460, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x100020, 0x1, 0x0, 0x0, 0x8000000000000007, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000631177fbac14fe16e000030a07070403fe80a0014d9c0000845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000680)={0x2, &(0x7f0000000400)=[{0x30, 0x3, 0xfd, 0xfffff03c}, {0x16, 0x1, 0xfe, 0x2}]}) 917.392528ms ago: executing program 3 (id=1718): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x6, 0x8}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x14, &(0x7f0000000180)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x15}}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) (rerun: 32) perf_event_open(&(0x7f0000000800)={0x2, 0xa6, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xd}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x1, 0xffffffffffffffff, 0x2}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x4, @perf_bp={0x0}, 0x2010, 0x0, 0x0, 0xf, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x80, 0x4}, 0x0, 0x3, 0xffdffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x102}, 0x0, 0x4, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22"], 0xfdef) (async) r5 = getpid() r6 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r5, r6, 0x0, 0x0, 0x0}, 0x30) (async) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000040)=0x1, 0x12) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x9, 0x43, 0x2, 0x0, 0x762eb3ea, 0x4000, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x401, 0x2, @perf_bp={&(0x7f0000000100), 0x5}, 0x82000, 0x10001, 0x1, 0x9, 0x8000000000000000, 0x5, 0x9, 0x0, 0x7fee, 0x0, 0x3}, 0x0, 0xd3e00000000, r8, 0x0) (async, rerun: 32) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000280)={'wg2\x00'}) (rerun: 32) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={0x0, 0x0, 0x10}, 0x18) (async) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0xfeff, &(0x7f0000000100)="e0857f9f582f0300000000000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 841.110864ms ago: executing program 3 (id=1719): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)={0x5}, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x3, 0x8, 0x40, 0x42, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r0, &(0x7f0000000340), 0x0}, 0x20) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x0, 0x0, &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100), 0x10}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0x59, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x702, 0xe, 0x700, &(0x7f0000000540)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 0s ago: executing program 4 (id=1210): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1900000004000000040000000f"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x0, 0x9, 0x2, 0x1, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb91, 0x63, &(0x7f00000001c0)=""/99, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xe, 0x9, 0x9e000000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0x8, 0x8}, {0x5, 0x2, 0x7, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x5, 0x4, 0xa, 0xb}, {0x2, 0x1, 0xc, 0x8}, {0x3, 0x5, 0x3, 0x8}, {0x3, 0x5, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x6}, {0x2, 0x5, 0x8, 0xb}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000071180d000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x82100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1900000004000000040000000f"], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1}, 0xc) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@ldst={0x3, 0x3, 0x6, 0x7, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @exit, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x0, 0x9, 0x2, 0x1, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb91, 0x63, &(0x7f00000001c0)=""/99, 0x41100, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xe, 0x9, 0x9e000000}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0x8, 0x8}, {0x5, 0x2, 0x7, 0xb}, {0x2, 0x2, 0x7, 0xb}, {0x5, 0x4, 0xa, 0xb}, {0x2, 0x1, 0xc, 0x8}, {0x3, 0x5, 0x3, 0x8}, {0x3, 0x5, 0x0, 0x5}, {0x2, 0x5, 0x9, 0x6}, {0x2, 0x5, 0x8, 0xb}], 0x10, 0x2}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x2, &(0x7f00000001c0)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x2, 0xe5, &(0x7f0000000000)=""/229, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc9}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x8, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000071180d000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x82100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) kernel console output (not intermixed with test programs): r_slave_0: link becomes ready [ 21.560839][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.568713][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.576930][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.583958][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.591339][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.618965][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.626638][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.634654][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.642979][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.650008][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.657636][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.665924][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.672967][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.680287][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.688277][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.696216][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.704371][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.711382][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.736388][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.744771][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.752900][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.760491][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.768257][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.776307][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.784337][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.792305][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.800153][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.808410][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.815427][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.823169][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.832255][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.840586][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.848888][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.855934][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.864856][ T283] device veth0_vlan entered promiscuous mode [ 21.875606][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.884366][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.899911][ T284] device veth0_vlan entered promiscuous mode [ 21.912194][ T283] device veth1_macvtap entered promiscuous mode [ 21.918971][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.927417][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.936301][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.944520][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.952512][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.960273][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.968308][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.976415][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.984356][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.992763][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.001196][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.009254][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.017494][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.025237][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.032788][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.043944][ T282] device veth0_vlan entered promiscuous mode [ 22.059741][ T281] device veth0_vlan entered promiscuous mode [ 22.066250][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.074186][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.082322][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.090463][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.099480][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.107682][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.116048][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.124347][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.132522][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.140374][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.148675][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.156180][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.163616][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.171162][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.178675][ T284] device veth1_macvtap entered promiscuous mode [ 22.197007][ T281] device veth1_macvtap entered promiscuous mode [ 22.209349][ T282] device veth1_macvtap entered promiscuous mode [ 22.216160][ T283] request_module fs-gadgetfs succeeded, but still no fs? [ 22.216348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.232441][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.240579][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.248743][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.256349][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.264723][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.273418][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.281608][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.289667][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.300949][ T285] device veth0_vlan entered promiscuous mode [ 22.327165][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.336540][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.344864][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.354417][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.363048][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.371592][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.379916][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.388627][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.398963][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.407597][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.416183][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.424668][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.457435][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.470401][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.478032][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.487147][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.501079][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.509502][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.544078][ T285] device veth1_macvtap entered promiscuous mode [ 22.605100][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.614679][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.624030][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.658865][ T316] device syzkaller0 entered promiscuous mode [ 22.741607][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.784542][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.800735][ C0] hrtimer: interrupt took 26166 ns [ 24.762287][ T354] device syzkaller0 entered promiscuous mode [ 24.805563][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 24.805577][ T30] audit: type=1400 audit(1773325985.541:109): avc: denied { read } for pid=373 comm="syz.3.21" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 24.995020][ T30] audit: type=1400 audit(1773325985.541:110): avc: denied { open } for pid=373 comm="syz.3.21" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.019168][ T30] audit: type=1400 audit(1773325985.541:111): avc: denied { ioctl } for pid=373 comm="syz.3.21" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.058088][ T354] PF_CAN: dropped non conform CAN skbuff: dev type 280, len 65487 [ 25.254702][ T30] audit: type=1400 audit(1773325985.991:112): avc: denied { write } for pid=381 comm="syz.0.24" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.745912][ T30] audit: type=1400 audit(1773325986.481:113): avc: denied { tracepoint } for pid=394 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.985732][ T411] device wg2 entered promiscuous mode [ 29.267369][ T454] device wg2 entered promiscuous mode [ 30.389964][ T488] device syzkaller0 entered promiscuous mode [ 30.859385][ T30] audit: type=1400 audit(1773325991.591:114): avc: denied { create } for pid=498 comm="syz.4.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.573520][ T378] syz.2.20 (378) used greatest stack depth: 22688 bytes left [ 32.629625][ T549] device wg2 left promiscuous mode [ 34.206810][ T569] device wg2 entered promiscuous mode [ 34.803957][ T30] audit: type=1400 audit(1773325995.541:115): avc: denied { write } for pid=615 comm="syz.2.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.251210][ T621] device wg2 entered promiscuous mode [ 35.753959][ T641] device wg2 left promiscuous mode [ 36.427229][ T30] audit: type=1400 audit(1773325997.161:116): avc: denied { create } for pid=666 comm="syz.3.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 36.692580][ T30] audit: type=1400 audit(1773325997.421:117): avc: denied { create } for pid=671 comm="syz.1.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 37.053110][ T690] device sit0 entered promiscuous mode [ 37.786466][ T706] device wg2 left promiscuous mode [ 38.001805][ T720] device syzkaller0 entered promiscuous mode [ 39.479679][ T766] device syzkaller0 entered promiscuous mode [ 39.499548][ T30] audit: type=1400 audit(1773326000.231:118): avc: denied { relabelfrom } for pid=765 comm="syz.4.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 39.545053][ T768] device wg2 left promiscuous mode [ 39.666785][ T776] bridge0: port 3(gretap0) entered blocking state [ 39.685933][ T778] FAULT_INJECTION: forcing a failure. [ 39.685933][ T778] name failslab, interval 1, probability 0, space 0, times 1 [ 39.703904][ T30] audit: type=1400 audit(1773326000.231:119): avc: denied { relabelto } for pid=765 comm="syz.4.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 39.727250][ T776] bridge0: port 3(gretap0) entered disabled state [ 39.740805][ T778] CPU: 1 PID: 778 Comm: syz.0.152 Not tainted syzkaller #0 [ 39.748109][ T778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 39.758869][ T778] Call Trace: [ 39.762156][ T778] [ 39.765090][ T778] __dump_stack+0x21/0x30 [ 39.769433][ T778] dump_stack_lvl+0x110/0x170 [ 39.774114][ T778] ? show_regs_print_info+0x20/0x20 [ 39.779310][ T778] dump_stack+0x15/0x20 [ 39.783467][ T778] should_fail+0x3c1/0x510 [ 39.787887][ T778] __should_failslab+0xa4/0xe0 [ 39.792651][ T778] should_failslab+0x9/0x20 [ 39.797152][ T778] slab_pre_alloc_hook+0x3b/0xe0 [ 39.802088][ T778] __kmalloc+0x6d/0x2c0 [ 39.806240][ T778] ? sk_prot_alloc+0xed/0x320 [ 39.810911][ T778] sk_prot_alloc+0xed/0x320 [ 39.815406][ T778] sk_alloc+0x38/0x430 [ 39.819466][ T778] bpf_prog_test_run_skb+0x24b/0x1150 [ 39.824851][ T778] ? __kasan_check_write+0x14/0x20 [ 39.829958][ T778] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 39.835843][ T778] bpf_prog_test_run+0x3d5/0x630 [ 39.840774][ T778] ? bpf_prog_query+0x230/0x230 [ 39.845615][ T778] ? selinux_bpf+0xce/0xf0 [ 39.850022][ T778] ? security_bpf+0x82/0xa0 [ 39.854518][ T778] __sys_bpf+0x590/0x7d0 [ 39.858753][ T778] ? bpf_link_show_fdinfo+0x330/0x330 [ 39.864117][ T778] ? debug_smp_processor_id+0x17/0x20 [ 39.869480][ T778] __x64_sys_bpf+0x7c/0x90 [ 39.873888][ T778] x64_sys_call+0x4b9/0x9a0 [ 39.878382][ T778] do_syscall_64+0x4c/0xa0 [ 39.882793][ T778] ? clear_bhb_loop+0x50/0xa0 [ 39.887463][ T778] ? clear_bhb_loop+0x50/0xa0 [ 39.892137][ T778] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 39.898117][ T778] RIP: 0033:0x7f69267f7799 [ 39.902612][ T778] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 39.922728][ T778] RSP: 002b:00007f6925252028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 39.931239][ T778] RAX: ffffffffffffffda RBX: 00007f6926a70fa0 RCX: 00007f69267f7799 [ 39.939207][ T778] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 39.947173][ T778] RBP: 00007f6925252090 R08: 0000000000000000 R09: 0000000000000000 [ 39.955137][ T778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.963100][ T778] R13: 00007f6926a71038 R14: 00007f6926a70fa0 R15: 00007ffe31c648e8 [ 39.971069][ T778] [ 39.978948][ T776] device gretap0 entered promiscuous mode [ 40.010896][ T776] bridge0: port 3(gretap0) entered blocking state [ 40.017621][ T776] bridge0: port 3(gretap0) entered forwarding state [ 40.101135][ T779] bridge0: port 3(gretap0) entered disabled state [ 40.107735][ T779] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.114949][ T779] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.285105][ T814] device syzkaller0 entered promiscuous mode [ 41.355404][ T824] FAULT_INJECTION: forcing a failure. [ 41.355404][ T824] name failslab, interval 1, probability 0, space 0, times 0 [ 41.441756][ T30] audit: type=1400 audit(1773326002.171:120): avc: denied { create } for pid=821 comm="syz.4.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 41.488813][ T824] CPU: 0 PID: 824 Comm: syz.2.157 Not tainted syzkaller #0 [ 41.496120][ T824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 41.506169][ T824] Call Trace: [ 41.509446][ T824] [ 41.512400][ T824] __dump_stack+0x21/0x30 [ 41.516731][ T824] dump_stack_lvl+0x110/0x170 [ 41.521403][ T824] ? show_regs_print_info+0x20/0x20 [ 41.526607][ T824] dump_stack+0x15/0x20 [ 41.530771][ T824] should_fail+0x3c1/0x510 [ 41.535180][ T824] __should_failslab+0xa4/0xe0 [ 41.539942][ T824] should_failslab+0x9/0x20 [ 41.544435][ T824] slab_pre_alloc_hook+0x3b/0xe0 [ 41.549372][ T824] ? __build_skb+0x2d/0x310 [ 41.553972][ T824] kmem_cache_alloc+0x44/0x260 [ 41.558736][ T824] __build_skb+0x2d/0x310 [ 41.563062][ T824] ? __kasan_check_write+0x14/0x20 [ 41.568171][ T824] build_skb+0x24/0x200 [ 41.572322][ T824] bpf_prog_test_run_skb+0x279/0x1150 [ 41.577695][ T824] ? __kasan_check_write+0x14/0x20 [ 41.582800][ T824] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 41.588686][ T824] bpf_prog_test_run+0x3d5/0x630 [ 41.593623][ T824] ? bpf_prog_query+0x230/0x230 [ 41.598475][ T824] ? selinux_bpf+0xce/0xf0 [ 41.602894][ T824] ? security_bpf+0x82/0xa0 [ 41.607404][ T824] __sys_bpf+0x590/0x7d0 [ 41.611649][ T824] ? bpf_link_show_fdinfo+0x330/0x330 [ 41.617135][ T824] ? debug_smp_processor_id+0x17/0x20 [ 41.622510][ T824] __x64_sys_bpf+0x7c/0x90 [ 41.626921][ T824] x64_sys_call+0x4b9/0x9a0 [ 41.631427][ T824] do_syscall_64+0x4c/0xa0 [ 41.635906][ T824] ? clear_bhb_loop+0x50/0xa0 [ 41.640666][ T824] ? clear_bhb_loop+0x50/0xa0 [ 41.645334][ T824] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 41.651219][ T824] RIP: 0033:0x7f869ff67799 [ 41.655625][ T824] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 41.675225][ T824] RSP: 002b:00007f869e9c2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 41.683635][ T824] RAX: ffffffffffffffda RBX: 00007f86a01e0fa0 RCX: 00007f869ff67799 [ 41.691600][ T824] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 41.699560][ T824] RBP: 00007f869e9c2090 R08: 0000000000000000 R09: 0000000000000000 [ 41.707517][ T824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.715486][ T824] R13: 00007f86a01e1038 R14: 00007f86a01e0fa0 R15: 00007ffd1f3598b8 [ 41.723449][ T824] [ 41.841197][ T833] pim6reg: tun_chr_ioctl cmd 1074025692 [ 41.987251][ T842] device lo entered promiscuous mode [ 43.019784][ T876] FAULT_INJECTION: forcing a failure. [ 43.019784][ T876] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 43.260695][ T876] CPU: 1 PID: 876 Comm: syz.0.173 Not tainted syzkaller #0 [ 43.267919][ T876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 43.277975][ T876] Call Trace: [ 43.281250][ T876] [ 43.284173][ T876] __dump_stack+0x21/0x30 [ 43.288592][ T876] dump_stack_lvl+0x110/0x170 [ 43.293298][ T876] ? show_regs_print_info+0x20/0x20 [ 43.298503][ T876] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 43.303962][ T876] dump_stack+0x15/0x20 [ 43.308112][ T876] should_fail+0x3c1/0x510 [ 43.312524][ T876] should_fail_usercopy+0x1a/0x20 [ 43.317556][ T876] _copy_to_user+0x20/0x90 [ 43.321961][ T876] bpf_test_finish+0x1b9/0x3c0 [ 43.326724][ T876] ? convert_skb_to___skb+0x360/0x360 [ 43.332095][ T876] ? convert_skb_to___skb+0x203/0x360 [ 43.337461][ T876] bpf_prog_test_run_skb+0xbba/0x1150 [ 43.342833][ T876] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 43.348983][ T876] bpf_prog_test_run+0x3d5/0x630 [ 43.353918][ T876] ? bpf_prog_query+0x230/0x230 [ 43.358772][ T876] ? selinux_bpf+0xce/0xf0 [ 43.363178][ T876] ? security_bpf+0x82/0xa0 [ 43.367678][ T876] __sys_bpf+0x590/0x7d0 [ 43.371916][ T876] ? bpf_link_show_fdinfo+0x330/0x330 [ 43.377280][ T876] ? debug_smp_processor_id+0x17/0x20 [ 43.382643][ T876] __x64_sys_bpf+0x7c/0x90 [ 43.387051][ T876] x64_sys_call+0x4b9/0x9a0 [ 43.391554][ T876] do_syscall_64+0x4c/0xa0 [ 43.395965][ T876] ? clear_bhb_loop+0x50/0xa0 [ 43.400637][ T876] ? clear_bhb_loop+0x50/0xa0 [ 43.405307][ T876] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 43.411203][ T876] RIP: 0033:0x7f69267f7799 [ 43.415610][ T876] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 43.435208][ T876] RSP: 002b:00007f6925252028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 43.443801][ T876] RAX: ffffffffffffffda RBX: 00007f6926a70fa0 RCX: 00007f69267f7799 [ 43.451861][ T876] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 43.459824][ T876] RBP: 00007f6925252090 R08: 0000000000000000 R09: 0000000000000000 [ 43.467788][ T876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.475749][ T876] R13: 00007f6926a71038 R14: 00007f6926a70fa0 R15: 00007ffe31c648e8 [ 43.483721][ T876] [ 43.568180][ T30] audit: type=1400 audit(1773326004.301:121): avc: denied { create } for pid=901 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 43.710430][ T917] FAULT_INJECTION: forcing a failure. [ 43.710430][ T917] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 43.750832][ T917] CPU: 1 PID: 917 Comm: syz.3.187 Not tainted syzkaller #0 [ 43.758054][ T917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 43.768108][ T917] Call Trace: [ 43.771390][ T917] [ 43.774316][ T917] __dump_stack+0x21/0x30 [ 43.778645][ T917] dump_stack_lvl+0x110/0x170 [ 43.783329][ T917] ? show_regs_print_info+0x20/0x20 [ 43.788540][ T917] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 43.794015][ T917] dump_stack+0x15/0x20 [ 43.798179][ T917] should_fail+0x3c1/0x510 [ 43.802605][ T917] should_fail_usercopy+0x1a/0x20 [ 43.807742][ T917] _copy_to_user+0x20/0x90 [ 43.812159][ T917] bpf_test_finish+0x1e8/0x3c0 [ 43.816929][ T917] ? convert_skb_to___skb+0x360/0x360 [ 43.822313][ T917] ? convert_skb_to___skb+0x203/0x360 [ 43.827701][ T917] bpf_prog_test_run_skb+0xbba/0x1150 [ 43.833082][ T917] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 43.838972][ T917] bpf_prog_test_run+0x3d5/0x630 [ 43.843909][ T917] ? bpf_prog_query+0x230/0x230 [ 43.848750][ T917] ? selinux_bpf+0xce/0xf0 [ 43.853171][ T917] ? security_bpf+0x82/0xa0 [ 43.857668][ T917] __sys_bpf+0x590/0x7d0 [ 43.861902][ T917] ? bpf_link_show_fdinfo+0x330/0x330 [ 43.867269][ T917] ? debug_smp_processor_id+0x17/0x20 [ 43.872631][ T917] __x64_sys_bpf+0x7c/0x90 [ 43.877038][ T917] x64_sys_call+0x4b9/0x9a0 [ 43.881540][ T917] do_syscall_64+0x4c/0xa0 [ 43.885950][ T917] ? clear_bhb_loop+0x50/0xa0 [ 43.890634][ T917] ? clear_bhb_loop+0x50/0xa0 [ 43.895400][ T917] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 43.901292][ T917] RIP: 0033:0x7f945a28d799 [ 43.905699][ T917] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 43.925299][ T917] RSP: 002b:00007f9458cc7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 43.933718][ T917] RAX: ffffffffffffffda RBX: 00007f945a507090 RCX: 00007f945a28d799 [ 43.941678][ T917] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 43.949650][ T917] RBP: 00007f9458cc7090 R08: 0000000000000000 R09: 0000000000000000 [ 43.957618][ T917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.965582][ T917] R13: 00007f945a507128 R14: 00007f945a507090 R15: 00007fff13fc4428 [ 43.973558][ T917] [ 44.619484][ T956] device syzkaller0 entered promiscuous mode [ 44.643409][ T961] FAULT_INJECTION: forcing a failure. [ 44.643409][ T961] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 44.675845][ T961] CPU: 1 PID: 961 Comm: syz.1.202 Not tainted syzkaller #0 [ 44.683068][ T961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 44.693123][ T961] Call Trace: [ 44.696394][ T961] [ 44.699320][ T961] __dump_stack+0x21/0x30 [ 44.703669][ T961] dump_stack_lvl+0x110/0x170 [ 44.708340][ T961] ? show_regs_print_info+0x20/0x20 [ 44.713535][ T961] ? bpf_cgroup_storage_free+0x8f/0xb0 [ 44.718986][ T961] dump_stack+0x15/0x20 [ 44.723142][ T961] should_fail+0x3c1/0x510 [ 44.727552][ T961] should_fail_usercopy+0x1a/0x20 [ 44.732571][ T961] _copy_to_user+0x20/0x90 [ 44.736977][ T961] bpf_test_finish+0x217/0x3c0 [ 44.741748][ T961] ? convert_skb_to___skb+0x360/0x360 [ 44.747203][ T961] ? convert_skb_to___skb+0x203/0x360 [ 44.752594][ T961] bpf_prog_test_run_skb+0xbba/0x1150 [ 44.758068][ T961] ? __bpf_prog_test_run_raw_tp+0x2c0/0x2c0 [ 44.763985][ T961] bpf_prog_test_run+0x3d5/0x630 [ 44.768955][ T961] ? bpf_prog_query+0x230/0x230 [ 44.774067][ T961] ? selinux_bpf+0xce/0xf0 [ 44.778596][ T961] ? security_bpf+0x82/0xa0 [ 44.783196][ T961] __sys_bpf+0x590/0x7d0 [ 44.787561][ T961] ? bpf_link_show_fdinfo+0x330/0x330 [ 44.792947][ T961] ? debug_smp_processor_id+0x17/0x20 [ 44.798413][ T961] __x64_sys_bpf+0x7c/0x90 [ 44.802829][ T961] x64_sys_call+0x4b9/0x9a0 [ 44.807330][ T961] do_syscall_64+0x4c/0xa0 [ 44.811840][ T961] ? clear_bhb_loop+0x50/0xa0 [ 44.816532][ T961] ? clear_bhb_loop+0x50/0xa0 [ 44.821212][ T961] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 44.827197][ T961] RIP: 0033:0x7f23155a2799 [ 44.831616][ T961] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 44.851390][ T961] RSP: 002b:00007f2313ffd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 44.860065][ T961] RAX: ffffffffffffffda RBX: 00007f231581bfa0 RCX: 00007f23155a2799 [ 44.868134][ T961] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 44.876322][ T961] RBP: 00007f2313ffd090 R08: 0000000000000000 R09: 0000000000000000 [ 44.884276][ T961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.892403][ T961] R13: 00007f231581c038 R14: 00007f231581bfa0 R15: 00007fff6ecb0ae8 [ 44.900358][ T961] [ 45.184376][ T990] ip6gretap0: refused to change device tx_queue_len [ 45.694254][ T1012] device pim6reg1 entered promiscuous mode [ 45.779294][ T1016] FAULT_INJECTION: forcing a failure. [ 45.779294][ T1016] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 45.792740][ T1016] CPU: 0 PID: 1016 Comm: syz.3.220 Not tainted syzkaller #0 [ 45.800122][ T1016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 45.810173][ T1016] Call Trace: [ 45.813443][ T1016] [ 45.816357][ T1016] __dump_stack+0x21/0x30 [ 45.820672][ T1016] dump_stack_lvl+0x110/0x170 [ 45.825335][ T1016] ? show_regs_print_info+0x20/0x20 [ 45.830527][ T1016] dump_stack+0x15/0x20 [ 45.834686][ T1016] should_fail+0x3c1/0x510 [ 45.839175][ T1016] should_fail_usercopy+0x1a/0x20 [ 45.844281][ T1016] _copy_to_user+0x20/0x90 [ 45.848679][ T1016] simple_read_from_buffer+0xe9/0x160 [ 45.854564][ T1016] proc_fail_nth_read+0x1a6/0x220 [ 45.859663][ T1016] ? proc_fault_inject_write+0x310/0x310 [ 45.865461][ T1016] ? security_file_permission+0x83/0xa0 [ 45.871625][ T1016] ? proc_fault_inject_write+0x310/0x310 [ 45.877255][ T1016] vfs_read+0x28d/0xc40 [ 45.882062][ T1016] ? __kasan_check_write+0x14/0x20 [ 45.887432][ T1016] ? kernel_read+0x1f0/0x1f0 [ 45.892106][ T1016] ? __kasan_check_write+0x14/0x20 [ 45.897206][ T1016] ? mutex_lock+0x9b/0x1c0 [ 45.902355][ T1016] ? wait_for_completion_killable_timeout+0x10/0x10 [ 45.909393][ T1016] ? __fget_files+0x2c4/0x320 [ 45.914525][ T1016] ? __fdget_pos+0x2d2/0x380 [ 45.919749][ T1016] ? ksys_read+0x71/0x250 [ 45.924677][ T1016] ksys_read+0x149/0x250 [ 45.928911][ T1016] ? vfs_write+0xfd0/0xfd0 [ 45.933328][ T1016] ? __kasan_check_write+0x14/0x20 [ 45.938432][ T1016] ? switch_fpu_return+0x15d/0x2c0 [ 45.943549][ T1016] __x64_sys_read+0x7b/0x90 [ 45.948034][ T1016] x64_sys_call+0x96d/0x9a0 [ 45.952519][ T1016] do_syscall_64+0x4c/0xa0 [ 45.956929][ T1016] ? clear_bhb_loop+0x50/0xa0 [ 45.961584][ T1016] ? clear_bhb_loop+0x50/0xa0 [ 45.966237][ T1016] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 45.972109][ T1016] RIP: 0033:0x7f945a24dfce [ 45.976593][ T1016] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 45.996263][ T1016] RSP: 002b:00007f9458ce7fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 46.004659][ T1016] RAX: ffffffffffffffda RBX: 00007f9458ce86c0 RCX: 00007f945a24dfce [ 46.012701][ T1016] RDX: 000000000000000f RSI: 00007f9458ce80a0 RDI: 0000000000000005 [ 46.020649][ T1016] RBP: 00007f9458ce8090 R08: 0000000000000000 R09: 0000000000000000 [ 46.028599][ T1016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 46.036546][ T1016] R13: 00007f945a507038 R14: 00007f945a506fa0 R15: 00007fff13fc4428 [ 46.044499][ T1016] [ 46.298169][ T1027] device syzkaller0 entered promiscuous mode [ 46.358067][ T1046] tun0: tun_chr_ioctl cmd 1074025677 [ 46.434208][ T1046] tun0: linktype set to 1 [ 46.742756][ T30] audit: type=1400 audit(1773326007.481:122): avc: denied { create } for pid=1060 comm="syz.2.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 46.743997][ T1061] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 47.310972][ T30] audit: type=1400 audit(1773326008.031:123): avc: denied { create } for pid=1071 comm="syz.0.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 47.547532][ T30] audit: type=1400 audit(1773326008.211:124): avc: denied { setattr } for pid=1081 comm="syz.0.239" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 47.852576][ T30] audit: type=1400 audit(1773326008.591:125): avc: denied { cpu } for pid=1090 comm="syz.2.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 48.301709][ T1091] device syzkaller0 entered promiscuous mode [ 48.402580][ T30] audit: type=1400 audit(1773326009.141:126): avc: denied { create } for pid=1105 comm="syz.4.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 48.728122][ T30] audit: type=1400 audit(1773326009.461:127): avc: denied { ioctl } for pid=1124 comm="syz.3.252" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.805535][ T1118] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.813203][ T1118] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.826709][ T1131] device bridge_slave_1 left promiscuous mode [ 48.832975][ T1131] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.840924][ T1131] device bridge_slave_0 left promiscuous mode [ 48.847220][ T1131] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.708458][ T30] audit: type=1400 audit(1773326010.441:128): avc: denied { create } for pid=1167 comm="syz.2.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 49.786783][ T30] audit: type=1400 audit(1773326010.521:129): avc: denied { create } for pid=1172 comm="syz.1.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 51.651943][ T30] audit: type=1400 audit(1773326012.391:130): avc: denied { create } for pid=1247 comm="syz.2.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 51.809814][ T1250] device syzkaller0 entered promiscuous mode [ 52.480454][ T30] audit: type=1400 audit(1773326013.211:131): avc: denied { read } for pid=1278 comm="syz.2.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 53.857457][ T1341] -1: renamed from syzkaller0 [ 54.854508][ T1375] device syzkaller0 entered promiscuous mode [ 55.938012][ T1392] FAULT_INJECTION: forcing a failure. [ 55.938012][ T1392] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 56.006723][ T1392] CPU: 1 PID: 1392 Comm: syz.1.329 Not tainted syzkaller #0 [ 56.014038][ T1392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 56.024089][ T1392] Call Trace: [ 56.027448][ T1392] [ 56.030368][ T1392] __dump_stack+0x21/0x30 [ 56.034684][ T1392] dump_stack_lvl+0x110/0x170 [ 56.039343][ T1392] ? show_regs_print_info+0x20/0x20 [ 56.045168][ T1392] dump_stack+0x15/0x20 [ 56.049412][ T1392] should_fail+0x3c1/0x510 [ 56.053824][ T1392] should_fail_usercopy+0x1a/0x20 [ 56.058847][ T1392] _copy_from_user+0x20/0xd0 [ 56.063428][ T1392] dev_ifconf+0xd8/0x2f0 [ 56.067660][ T1392] ? sock_diag_rcv_msg+0x420/0x420 [ 56.072757][ T1392] ? selinux_file_ioctl+0x3a0/0x4d0 [ 56.077937][ T1392] sock_ioctl+0x2bf/0x6e0 [ 56.082693][ T1392] ? sock_poll+0x3f0/0x3f0 [ 56.087473][ T1392] ? __fget_files+0x2c4/0x320 [ 56.092536][ T1392] ? security_file_ioctl+0x84/0xa0 [ 56.098984][ T1392] ? sock_poll+0x3f0/0x3f0 [ 56.103396][ T1392] __se_sys_ioctl+0x121/0x1a0 [ 56.108068][ T1392] __x64_sys_ioctl+0x7b/0x90 [ 56.112653][ T1392] x64_sys_call+0x2f/0x9a0 [ 56.117067][ T1392] do_syscall_64+0x4c/0xa0 [ 56.121471][ T1392] ? clear_bhb_loop+0x50/0xa0 [ 56.126144][ T1392] ? clear_bhb_loop+0x50/0xa0 [ 56.130903][ T1392] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 56.137056][ T1392] RIP: 0033:0x7f23155a2799 [ 56.141463][ T1392] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 56.161136][ T1392] RSP: 002b:00007f2313fdc028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 56.169538][ T1392] RAX: ffffffffffffffda RBX: 00007f231581c090 RCX: 00007f23155a2799 [ 56.177503][ T1392] RDX: 0000200000000080 RSI: 0000000000008912 RDI: 0000000000000006 [ 56.185597][ T1392] RBP: 00007f2313fdc090 R08: 0000000000000000 R09: 0000000000000000 [ 56.193564][ T1392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 56.202679][ T1392] R13: 00007f231581c128 R14: 00007f231581c090 R15: 00007fff6ecb0ae8 [ 56.212057][ T1392] [ 56.667106][ T30] audit: type=1400 audit(1773326017.401:132): avc: denied { create } for pid=1442 comm="syz.1.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 57.695892][ T1464] FAULT_INJECTION: forcing a failure. [ 57.695892][ T1464] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 57.760856][ T1464] CPU: 1 PID: 1464 Comm: syz.4.352 Not tainted syzkaller #0 [ 57.768370][ T1464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 57.778430][ T1464] Call Trace: [ 57.781794][ T1464] [ 57.784729][ T1464] __dump_stack+0x21/0x30 [ 57.789072][ T1464] dump_stack_lvl+0x110/0x170 [ 57.793770][ T1464] ? show_regs_print_info+0x20/0x20 [ 57.798991][ T1464] ? format_decode+0x1bb/0x1520 [ 57.803856][ T1464] dump_stack+0x15/0x20 [ 57.808030][ T1464] should_fail+0x3c1/0x510 [ 57.812451][ T1464] should_fail_usercopy+0x1a/0x20 [ 57.817469][ T1464] _copy_from_user+0x20/0xd0 [ 57.822053][ T1464] kstrtouint_from_user+0xd3/0x220 [ 57.827160][ T1464] ? kstrtol_from_user+0x2a0/0x2a0 [ 57.832275][ T1464] ? 0xffffffff81000000 [ 57.836425][ T1464] ? _copy_to_user+0x78/0x90 [ 57.841006][ T1464] ? simple_read_from_buffer+0x10f/0x160 [ 57.846642][ T1464] proc_fail_nth_write+0x8b/0x200 [ 57.851660][ T1464] ? proc_fail_nth_read+0x220/0x220 [ 57.856849][ T1464] ? security_file_permission+0x79/0xa0 [ 57.862388][ T1464] ? security_file_permission+0x83/0xa0 [ 57.867926][ T1464] ? proc_fail_nth_read+0x220/0x220 [ 57.873117][ T1464] vfs_write+0x3f9/0xfd0 [ 57.877371][ T1464] ? file_end_write+0x1b0/0x1b0 [ 57.882210][ T1464] ? __kasan_check_write+0x14/0x20 [ 57.887315][ T1464] ? mutex_lock+0x9b/0x1c0 [ 57.891719][ T1464] ? wait_for_completion_killable_timeout+0x10/0x10 [ 57.898294][ T1464] ? __fget_files+0x2c4/0x320 [ 57.902964][ T1464] ? __fdget_pos+0x2d2/0x380 [ 57.907540][ T1464] ? ksys_write+0x71/0x250 [ 57.911943][ T1464] ksys_write+0x149/0x250 [ 57.916271][ T1464] ? __ia32_sys_read+0x90/0x90 [ 57.921023][ T1464] ? debug_smp_processor_id+0x17/0x20 [ 57.926387][ T1464] __x64_sys_write+0x7b/0x90 [ 57.930970][ T1464] x64_sys_call+0x8ef/0x9a0 [ 57.935553][ T1464] do_syscall_64+0x4c/0xa0 [ 57.939960][ T1464] ? clear_bhb_loop+0x50/0xa0 [ 57.944627][ T1464] ? clear_bhb_loop+0x50/0xa0 [ 57.949640][ T1464] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 57.955527][ T1464] RIP: 0033:0x7f37570fafce [ 57.959939][ T1464] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 57.979621][ T1464] RSP: 002b:00007f3755b73fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 57.988036][ T1464] RAX: ffffffffffffffda RBX: 00007f3755b746c0 RCX: 00007f37570fafce [ 57.996003][ T1464] RDX: 0000000000000001 RSI: 00007f3755b740a0 RDI: 0000000000000007 [ 58.003971][ T1464] RBP: 00007f3755b74090 R08: 0000000000000000 R09: 0000000000000000 [ 58.012382][ T1464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 58.020345][ T1464] R13: 00007f37573b4128 R14: 00007f37573b4090 R15: 00007ffd307e9258 [ 58.028316][ T1464] [ 58.904687][ T30] audit: type=1400 audit(1773326019.641:133): avc: denied { create } for pid=1511 comm="syz.3.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 59.370141][ T1552] device syzkaller0 entered promiscuous mode [ 59.965966][ T1587] device syzkaller0 entered promiscuous mode [ 60.057303][ T30] audit: type=1400 audit(1773326020.791:134): avc: denied { create } for pid=1598 comm="syz.2.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 61.126699][ T30] audit: type=1400 audit(1773326021.861:135): avc: denied { create } for pid=1652 comm="syz.3.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 61.805236][ T1714] bridge0: port 3(veth1) entered blocking state [ 61.822558][ T1714] bridge0: port 3(veth1) entered disabled state [ 61.840332][ T1714] device veth1 entered promiscuous mode [ 61.871130][ T1714] bridge0: port 3(veth1) entered blocking state [ 61.877413][ T1714] bridge0: port 3(veth1) entered forwarding state [ 61.913832][ T1718] device veth1 left promiscuous mode [ 61.937658][ T1718] bridge0: port 3(veth1) entered disabled state [ 63.065756][ T1790] device veth1_macvtap left promiscuous mode [ 63.108717][ T1790] device macsec0 entered promiscuous mode [ 64.055627][ T30] audit: type=1400 audit(1773326024.791:136): avc: denied { create } for pid=1829 comm="syz.0.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 65.028766][ T1890] device syzkaller0 entered promiscuous mode [ 65.907973][ T1929] device syzkaller0 entered promiscuous mode [ 66.581951][ T1947] syz.3.495 (1947) used greatest stack depth: 22536 bytes left [ 68.761753][ T2012] bridge0: port 4(veth1) entered blocking state [ 68.779636][ T2012] bridge0: port 4(veth1) entered disabled state [ 68.809380][ T2012] device veth1 entered promiscuous mode [ 68.885551][ T2014] ±ÿ: renamed from team_slave_1 [ 68.930680][ T2012] device veth1 left promiscuous mode [ 68.971654][ T2012] bridge0: port 4(veth1) entered disabled state [ 70.254396][ T30] audit: type=1400 audit(1773326030.991:137): avc: denied { create } for pid=2032 comm="syz.3.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 70.659301][ T2071] bridge0: port 3(veth1) entered blocking state [ 70.675425][ T2071] bridge0: port 3(veth1) entered disabled state [ 70.737982][ T2071] device veth1 entered promiscuous mode [ 70.754355][ T2071] bridge0: port 3(veth1) entered blocking state [ 70.760630][ T2071] bridge0: port 3(veth1) entered forwarding state [ 70.785947][ T2078] device veth1 left promiscuous mode [ 70.801899][ T2078] bridge0: port 3(veth1) entered disabled state [ 71.237008][ T2110] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.244270][ T2110] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.130448][ T2137] : port 1(ip6gretap0) entered blocking state [ 72.153054][ T2137] : port 1(ip6gretap0) entered disabled state [ 72.168871][ T2137] device ip6gretap0 entered promiscuous mode [ 72.219655][ T30] audit: type=1400 audit(1773326032.951:138): avc: denied { create } for pid=2138 comm="syz.2.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 72.233479][ T2137] device ip6gretap0 left promiscuous mode [ 72.256930][ T2137] : port 1(ip6gretap0) entered disabled state [ 73.880692][ C1] sched: RT throttling activated [ 74.581933][ T30] audit: type=1400 audit(1773326035.321:139): avc: denied { create } for pid=2188 comm="syz.1.573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 75.257661][ T2196] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.268893][ T2196] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.907601][ T2272] device syzkaller0 entered promiscuous mode [ 79.417500][ T2290] device syzkaller0 entered promiscuous mode [ 79.740236][ T2265] syz.0.593 (2265) used greatest stack depth: 22456 bytes left [ 79.970517][ T30] audit: type=1400 audit(1773326040.701:140): avc: denied { append } for pid=2334 comm="syz.1.619" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 80.804367][ T2358] device syzkaller0 entered promiscuous mode [ 80.823904][ T2359] device syzkaller0 entered promiscuous mode [ 86.309072][ T2510] tap0: tun_chr_ioctl cmd 21731 [ 86.386004][ T2510] device syzkaller0 entered promiscuous mode [ 88.626668][ T2592] device veth1_macvtap left promiscuous mode [ 88.633999][ T2592] device macsec0 entered promiscuous mode [ 89.972331][ T2751] device syzkaller0 entered promiscuous mode [ 91.408748][ T30] audit: type=1400 audit(1773326052.141:141): avc: denied { create } for pid=2770 comm="syz.4.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 91.514133][ T2781] device syzkaller0 entered promiscuous mode [ 92.488199][ T2830] device syzkaller0 entered promiscuous mode [ 94.958759][ T2893] device syzkaller0 entered promiscuous mode [ 96.837841][ T30] audit: type=1400 audit(1773326057.571:142): avc: denied { create } for pid=2983 comm="syz.3.817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 96.900527][ T2985] ------------[ cut here ]------------ [ 96.947291][ T2985] trace type BPF program uses run-time allocation [ 96.955761][ T2985] WARNING: CPU: 0 PID: 2985 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 96.966765][ T2985] Modules linked in: [ 96.970984][ T2985] CPU: 0 PID: 2985 Comm: syz.1.818 Not tainted syzkaller #0 [ 96.980093][ T2985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 96.990822][ T2985] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 97.014409][ T2985] Code: ee ff 48 c7 c6 20 46 48 85 4c 8b 65 d0 e9 fd fc ff ff e8 96 1c ee ff c6 05 b4 7d 6a 05 01 48 c7 c7 80 42 48 85 e8 a3 33 2f 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 97.053610][ T2998] tun0: tun_chr_ioctl cmd 1074025677 [ 97.059042][ T2998] tun0: linktype set to 1 [ 97.072979][ T2985] RSP: 0018:ffffc900010a7428 EFLAGS: 00010246 [ 97.116747][ T2985] RAX: 1b0ae1fb3e3ab300 RBX: 0000000000000001 RCX: 0000000000080000 [ 97.173696][ T2985] RDX: ffffc9000138b000 RSI: 0000000000003b04 RDI: 0000000000003b05 [ 97.182261][ T2985] RBP: ffffc900010a7470 R08: ffff8881f7032f3f R09: 1ffff1103ee065e7 [ 97.190321][ T2985] R10: dffffc0000000000 R11: ffffed103ee065e8 R12: ffff88810f950000 [ 97.201004][ T2985] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888110f89000 [ 97.214210][ T2985] FS: 00007f2313ffd6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 97.228522][ T2985] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 97.236536][ T2985] CR2: 0000000100000000 CR3: 0000000128a33000 CR4: 00000000003506b0 [ 97.248993][ T2985] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 97.257145][ T2985] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 97.271452][ T2985] Call Trace: [ 97.274812][ T2985] [ 97.279016][ T2985] resolve_pseudo_ldimm64+0x656/0x1180 [ 97.285614][ T2985] ? check_attach_btf_id+0xd70/0xd70 [ 97.292701][ T2985] ? __mark_reg_known+0x1b0/0x1b0 [ 97.299222][ T2985] ? security_capable+0x87/0xb0 [ 97.314346][ T3003] device syzkaller0 entered promiscuous mode [ 97.320421][ T2985] bpf_check+0x32c7/0xf370 [ 97.325103][ T2985] ? is_bpf_text_address+0x177/0x190 [ 97.330447][ T2985] ? bpf_get_btf_vmlinux+0x60/0x60 [ 97.339497][ T2985] ? unwind_get_return_address+0x4d/0x90 [ 97.345904][ T3003] device syzkaller0 left promiscuous mode [ 97.351734][ T2985] ? stack_trace_save+0xf0/0xf0 [ 97.359127][ T3003] device syzkaller0 entered promiscuous mode [ 97.365490][ T2985] ? arch_stack_walk+0xee/0x140 [ 97.370414][ T2985] ? stack_trace_save+0xa6/0xf0 [ 97.381964][ T2985] ? __stack_depot_save+0x34/0x480 [ 97.387367][ T2985] ? __kasan_slab_alloc+0x69/0xf0 [ 97.410838][ T2985] ? __kasan_kmalloc+0xec/0x110 [ 97.417555][ T2985] ? __kasan_kmalloc+0xda/0x110 [ 97.423945][ T2985] ? kmem_cache_alloc_trace+0x119/0x270 [ 97.429609][ T2985] ? selinux_bpf_prog_alloc+0x51/0x140 [ 97.499092][ T2985] ? security_bpf_prog_alloc+0x62/0x90 [ 97.786304][ T2985] ? bpf_prog_load+0x9f4/0x1640 [ 97.796000][ T2985] ? __sys_bpf+0x51d/0x7d0 [ 97.800627][ T2985] ? __x64_sys_bpf+0x7c/0x90 [ 97.805283][ T2985] ? x64_sys_call+0x4b9/0x9a0 [ 97.810019][ T2985] ? do_syscall_64+0x4c/0xa0 [ 97.814662][ T2985] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 97.957007][ T2985] ? check_stack_object+0x81/0x140 [ 98.061168][ T2985] ? memset+0x35/0x40 [ 98.120850][ T2985] ? bpf_obj_name_cpy+0x193/0x1e0 [ 98.126042][ T2985] bpf_prog_load+0x10c4/0x1640 [ 98.150807][ T2985] ? __anon_inode_getfd+0x35c/0x3d0 [ 98.320755][ T2985] ? map_freeze+0x360/0x360 [ 98.325308][ T2985] ? selinux_bpf+0xc7/0xf0 [ 98.329727][ T2985] ? security_bpf+0x82/0xa0 [ 98.411802][ T2985] __sys_bpf+0x51d/0x7d0 [ 98.416090][ T2985] ? bpf_link_show_fdinfo+0x330/0x330 [ 98.558388][ T2985] ? __kasan_check_write+0x14/0x20 [ 98.571960][ T2985] ? switch_fpu_return+0x15d/0x2c0 [ 98.580953][ T2985] __x64_sys_bpf+0x7c/0x90 [ 98.585387][ T2985] x64_sys_call+0x4b9/0x9a0 [ 98.589886][ T2985] do_syscall_64+0x4c/0xa0 [ 98.610907][ T2985] ? clear_bhb_loop+0x50/0xa0 [ 98.615758][ T2985] ? clear_bhb_loop+0x50/0xa0 [ 98.718437][ T2985] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 98.810723][ T2985] RIP: 0033:0x7f23155a2799 [ 98.815199][ T2985] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 99.012278][ T2985] RSP: 002b:00007f2313ffd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 99.133983][ T2985] RAX: ffffffffffffffda RBX: 00007f231581bfa0 RCX: 00007f23155a2799 [ 99.252323][ T2985] RDX: 0000000000000094 RSI: 00002000000004c0 RDI: 0000000000000005 [ 99.272705][ T2985] RBP: 00007f2315638c99 R08: 0000000000000000 R09: 0000000000000000 [ 99.433985][ T2985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 99.550956][ T2985] R13: 00007f231581c038 R14: 00007f231581bfa0 R15: 00007fff6ecb0ae8 [ 99.585686][ T2985] [ 99.595710][ T2985] ---[ end trace 5eb92bd84fd25dc1 ]--- [ 99.903290][ T3044] -1: renamed from syzkaller0 [ 100.486020][ T3072] device syzkaller0 entered promiscuous mode [ 101.763373][ T3110] device syzkaller0 entered promiscuous mode [ 101.866960][ T3133] FAULT_INJECTION: forcing a failure. [ 101.866960][ T3133] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 101.939813][ T3133] CPU: 1 PID: 3133 Comm: syz.2.865 Tainted: G W syzkaller #0 [ 101.948611][ T3133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 101.958841][ T3133] Call Trace: [ 101.962120][ T3133] [ 101.965058][ T3133] __dump_stack+0x21/0x30 [ 101.969391][ T3133] dump_stack_lvl+0x110/0x170 [ 101.974065][ T3133] ? show_regs_print_info+0x20/0x20 [ 101.979265][ T3133] ? vfs_write+0xc72/0xfd0 [ 101.983679][ T3133] dump_stack+0x15/0x20 [ 101.987832][ T3133] should_fail+0x3c1/0x510 [ 101.992245][ T3133] should_fail_usercopy+0x1a/0x20 [ 101.997265][ T3133] _copy_from_user+0x20/0xd0 [ 102.001854][ T3133] __sys_bpf+0x258/0x7d0 [ 102.006098][ T3133] ? bpf_link_show_fdinfo+0x330/0x330 [ 102.011470][ T3133] ? debug_smp_processor_id+0x17/0x20 [ 102.016839][ T3133] __x64_sys_bpf+0x7c/0x90 [ 102.021254][ T3133] x64_sys_call+0x4b9/0x9a0 [ 102.025752][ T3133] do_syscall_64+0x4c/0xa0 [ 102.030163][ T3133] ? clear_bhb_loop+0x50/0xa0 [ 102.034828][ T3133] ? clear_bhb_loop+0x50/0xa0 [ 102.039503][ T3133] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 102.045409][ T3133] RIP: 0033:0x7f869ff67799 [ 102.049815][ T3133] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 102.069412][ T3133] RSP: 002b:00007f869e9c2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 102.077912][ T3133] RAX: ffffffffffffffda RBX: 00007f86a01e0fa0 RCX: 00007f869ff67799 [ 102.085884][ T3133] RDX: 000000000000000c RSI: 00002000000003c0 RDI: 000000000000000a [ 102.093856][ T3133] RBP: 00007f869e9c2090 R08: 0000000000000000 R09: 0000000000000000 [ 102.101821][ T3133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.109783][ T3133] R13: 00007f86a01e1038 R14: 00007f86a01e0fa0 R15: 00007ffd1f3598b8 [ 102.117753][ T3133] [ 102.816143][ T3158] syz.1.872 (3158) used greatest stack depth: 22192 bytes left [ 102.945243][ T3187] FAULT_INJECTION: forcing a failure. [ 102.945243][ T3187] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.005833][ T3179] device syzkaller0 entered promiscuous mode [ 103.026854][ T3187] CPU: 0 PID: 3187 Comm: syz.3.884 Tainted: G W syzkaller #0 [ 103.035567][ T3187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 103.045632][ T3187] Call Trace: [ 103.048909][ T3187] [ 103.051851][ T3187] __dump_stack+0x21/0x30 [ 103.056178][ T3187] dump_stack_lvl+0x110/0x170 [ 103.061114][ T3187] ? show_regs_print_info+0x20/0x20 [ 103.066315][ T3187] dump_stack+0x15/0x20 [ 103.070470][ T3187] should_fail+0x3c1/0x510 [ 103.074888][ T3187] should_fail_usercopy+0x1a/0x20 [ 103.079909][ T3187] _copy_to_user+0x20/0x90 [ 103.084325][ T3187] bpf_prog_test_run_raw_tp+0x500/0x680 [ 103.089872][ T3187] ? bpf_prog_test_run_tracing+0x500/0x500 [ 103.095677][ T3187] ? fput_many+0x15a/0x1a0 [ 103.100087][ T3187] ? bpf_prog_test_run_tracing+0x500/0x500 [ 103.105893][ T3187] bpf_prog_test_run+0x3d5/0x630 [ 103.110821][ T3187] ? bpf_prog_query+0x230/0x230 [ 103.115661][ T3187] ? selinux_bpf+0xce/0xf0 [ 103.120070][ T3187] ? security_bpf+0x82/0xa0 [ 103.124568][ T3187] __sys_bpf+0x590/0x7d0 [ 103.128811][ T3187] ? bpf_link_show_fdinfo+0x330/0x330 [ 103.134182][ T3187] ? debug_smp_processor_id+0x17/0x20 [ 103.139555][ T3187] __x64_sys_bpf+0x7c/0x90 [ 103.143970][ T3187] x64_sys_call+0x4b9/0x9a0 [ 103.148463][ T3187] do_syscall_64+0x4c/0xa0 [ 103.152964][ T3187] ? clear_bhb_loop+0x50/0xa0 [ 103.157640][ T3187] ? clear_bhb_loop+0x50/0xa0 [ 103.162317][ T3187] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 103.168226][ T3187] RIP: 0033:0x7f945a28d799 [ 103.172645][ T3187] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 103.192337][ T3187] RSP: 002b:00007f9458ce8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 103.201187][ T3187] RAX: ffffffffffffffda RBX: 00007f945a506fa0 RCX: 00007f945a28d799 [ 103.209248][ T3187] RDX: 000000000000000c RSI: 00002000000003c0 RDI: 000000000000000a [ 103.217207][ T3187] RBP: 00007f9458ce8090 R08: 0000000000000000 R09: 0000000000000000 [ 103.225172][ T3187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.233147][ T3187] R13: 00007f945a507038 R14: 00007f945a506fa0 R15: 00007fff13fc4428 [ 103.241136][ T3187] [ 104.233279][ T30] audit: type=1400 audit(1773326064.971:143): avc: denied { create } for pid=3240 comm="syz.1.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 104.385624][ T3247] tap0: tun_chr_ioctl cmd 1074025677 [ 104.391172][ T3247] tap0: linktype set to 24 [ 105.296726][ T3305] device wg2 entered promiscuous mode [ 107.565245][ T3385] device syzkaller0 entered promiscuous mode [ 107.579438][ T3386] device syzkaller0 left promiscuous mode [ 107.702897][ T3385] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 107.789226][ T3384] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 107.801799][ T3384] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 107.819258][ T3384] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 107.979830][ T3410] device syzkaller0 entered promiscuous mode [ 108.297379][ T30] audit: type=1400 audit(1773326069.031:144): avc: denied { create } for pid=3421 comm="syz.0.956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 108.723993][ T3450] device syzkaller0 entered promiscuous mode [ 109.524073][ T3461] device syzkaller0 entered promiscuous mode [ 109.950178][ T3473] device syzkaller0 entered promiscuous mode [ 112.066207][ T3584] device syzkaller0 entered promiscuous mode [ 112.536876][ T3627] device wg2 left promiscuous mode [ 114.959709][ T3733] device syzkaller0 entered promiscuous mode [ 115.801886][ T30] audit: type=1400 audit(1773326076.541:145): avc: denied { create } for pid=3794 comm="syz.0.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 117.649344][ T3837] device syzkaller0 entered promiscuous mode [ 118.468968][ T3874] device syzkaller0 entered promiscuous mode [ 119.123803][ T30] audit: type=1400 audit(1773326079.861:146): avc: denied { read } for pid=3912 comm="syz.0.1102" dev="nsfs" ino=4026532447 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 119.146633][ T3911] device syzkaller0 entered promiscuous mode [ 119.230617][ T30] audit: type=1400 audit(1773326079.901:147): avc: denied { open } for pid=3912 comm="syz.0.1102" path="pid:[4026532447]" dev="nsfs" ino=4026532447 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 119.268356][ T30] audit: type=1400 audit(1773326079.901:148): avc: denied { ioctl } for pid=3912 comm="syz.0.1102" path="pid:[4026532447]" dev="nsfs" ino=4026532447 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 119.433309][ T3922] device syzkaller0 entered promiscuous mode [ 121.446050][ T4014] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 121.551740][ T4014] syzkaller0: linktype set to 778 [ 121.988029][ T4051] device dummy0 entered promiscuous mode [ 122.402210][ T30] audit: type=1400 audit(1773326083.141:149): avc: denied { create } for pid=4072 comm="syz.4.1147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 122.914533][ T4097] device syzkaller0 entered promiscuous mode [ 122.928984][ T4098] device syzkaller0 entered promiscuous mode [ 124.303360][ T4158] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 124.397517][ T30] audit: type=1400 audit(1773326085.131:150): avc: denied { create } for pid=4163 comm="syz.1.1176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 124.454616][ T4156] device syzkaller0 entered promiscuous mode [ 125.694999][ T4199] device wg2 entered promiscuous mode [ 126.060783][ T4204] device syzkaller0 entered promiscuous mode [ 127.181299][ T284] syz-executor (284) used greatest stack depth: 22048 bytes left [ 127.403322][ T4303] device syzkaller0 entered promiscuous mode [ 127.535692][ T4317] tun0: tun_chr_ioctl cmd 1074025677 [ 127.545926][ T4317] tun0: linktype set to 6 [ 127.561347][ T4317] tun0: tun_chr_ioctl cmd 1074025680 [ 127.596058][ T4301] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.610031][ T4301] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.618506][ T4301] device bridge_slave_0 entered promiscuous mode [ 127.626385][ T4301] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.633927][ T4301] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.641692][ T4301] device bridge_slave_1 entered promiscuous mode [ 127.798236][ T30] audit: type=1400 audit(1773326088.531:151): avc: denied { create } for pid=4301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 127.837830][ T4301] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.845213][ T4301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.852658][ T4301] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.859687][ T4301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.871503][ T30] audit: type=1400 audit(1773326088.571:152): avc: denied { write } for pid=4301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 127.945925][ T30] audit: type=1400 audit(1773326088.571:153): avc: denied { read } for pid=4301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 128.137714][ T736] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.217520][ T736] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.436682][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 128.452212][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.468275][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.577192][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.610953][ T736] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.618132][ T736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.689345][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 128.738652][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.772498][ T736] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.779566][ T736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.787175][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 128.795365][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.840488][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 128.848892][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.903118][ T4301] device veth0_vlan entered promiscuous mode [ 128.920078][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 128.930124][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 128.970195][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 129.024776][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.126845][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.230356][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.293750][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 129.331399][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 129.331728][ T30] audit: type=1400 audit(1773326090.071:154): avc: denied { create } for pid=4358 comm="syz.3.1234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 129.371780][ T4301] device veth1_macvtap entered promiscuous mode [ 129.709933][ T4368] device syzkaller0 entered promiscuous mode [ 129.768905][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 129.840603][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 129.871434][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 129.904494][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 130.317815][ T4380] device syzkaller0 entered promiscuous mode [ 130.421249][ T8] device veth1_macvtap left promiscuous mode [ 130.427294][ T8] device veth0_vlan left promiscuous mode [ 131.007388][ T4389] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.022469][ T4389] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.030060][ T4389] device bridge_slave_0 entered promiscuous mode [ 131.048001][ T4404] device syzkaller0 entered promiscuous mode [ 131.065163][ T4389] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.072345][ T4389] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.079852][ T4389] device bridge_slave_1 entered promiscuous mode [ 131.140250][ T4389] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.147296][ T4389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.154585][ T4389] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.161613][ T4389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.185989][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.193947][ T736] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.202631][ T736] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.241652][ T4389] device veth0_vlan entered promiscuous mode [ 131.257434][ T4389] device veth1_macvtap entered promiscuous mode [ 131.268800][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.277906][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.286627][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.295048][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.303107][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.311790][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.320136][ T736] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.327210][ T736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.335443][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.344299][ T736] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.351370][ T736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.359125][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.367535][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.391054][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.412040][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.524634][ T4389] syz-executor (4389) used greatest stack depth: 21728 bytes left [ 131.647484][ T4423] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.654704][ T4423] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.662565][ T4423] device bridge_slave_0 entered promiscuous mode [ 131.669842][ T4423] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.681602][ T4423] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.689130][ T4423] device bridge_slave_1 entered promiscuous mode [ 131.736058][ T30] audit: type=1400 audit(1773326092.471:155): avc: denied { write } for pid=4429 comm="syz.2.1252" name="cgroup.subtree_control" dev="cgroup2" ino=372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 131.776443][ T30] audit: type=1400 audit(1773326092.501:156): avc: denied { open } for pid=4429 comm="syz.2.1252" path="" dev="cgroup2" ino=372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 131.843821][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.852716][ T30] audit: type=1400 audit(1773326092.501:157): avc: denied { ioctl } for pid=4429 comm="syz.2.1252" path="" dev="cgroup2" ino=372 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 131.887725][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.911102][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.921284][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.929466][ T736] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.936531][ T736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.945682][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.954447][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.962901][ T736] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.969971][ T736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.977696][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.040611][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.051218][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.086055][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.201578][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.269579][ T4423] device veth0_vlan entered promiscuous mode [ 132.285229][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 132.294386][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.318681][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 132.328293][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.336888][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.345369][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.424254][ T4423] device veth1_macvtap entered promiscuous mode [ 132.678112][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.689086][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.842970][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.853056][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.864065][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.873455][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.248827][ T8] device bridge_slave_1 left promiscuous mode [ 133.256464][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.264587][ T8] device bridge_slave_0 left promiscuous mode [ 133.271681][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.281251][ T8] device veth1_macvtap left promiscuous mode [ 133.287350][ T8] device veth0_vlan left promiscuous mode [ 134.150406][ T4503] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.168423][ T4503] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.176636][ T4503] device bridge_slave_0 entered promiscuous mode [ 134.184149][ T4503] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.191381][ T4503] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.199261][ T4503] device bridge_slave_1 entered promiscuous mode [ 134.362884][ T4503] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.369933][ T4503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.377224][ T4503] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.384533][ T4503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.670869][ T4537] syz.3.1281 (4537) used obsolete PPPIOCDETACH ioctl [ 134.706223][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.718403][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.740806][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.750552][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.760891][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.767937][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.791485][ T8] device bridge_slave_1 left promiscuous mode [ 134.798452][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.806427][ T8] device bridge_slave_0 left promiscuous mode [ 134.813199][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.822116][ T8] device bridge_slave_1 left promiscuous mode [ 134.828475][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.837352][ T8] device bridge_slave_0 left promiscuous mode [ 134.843791][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.872565][ T8] device veth1_macvtap left promiscuous mode [ 134.879948][ T8] device veth0_vlan left promiscuous mode [ 134.887961][ T8] device veth1_macvtap left promiscuous mode [ 134.895025][ T8] device veth0_vlan left promiscuous mode [ 135.101663][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.110276][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.117350][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.144023][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.159602][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.170247][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.181988][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.196295][ T4503] device veth0_vlan entered promiscuous mode [ 135.205524][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 135.214313][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.223588][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 135.232076][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.240103][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.248284][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.279794][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.293484][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.305056][ T4503] device veth1_macvtap entered promiscuous mode [ 135.311789][ T4570] device pim6reg1 entered promiscuous mode [ 135.328160][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.336044][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.344643][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.353973][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.362185][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.593727][ T4503] syz-executor (4503) used greatest stack depth: 21256 bytes left [ 135.702936][ T4589] device syzkaller0 entered promiscuous mode [ 136.283747][ T4597] device syzkaller0 entered promiscuous mode [ 136.382843][ T4605] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.390130][ T4605] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.398168][ T4605] device bridge_slave_0 entered promiscuous mode [ 136.405565][ T4605] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.412980][ T4605] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.420525][ T4605] device bridge_slave_1 entered promiscuous mode [ 136.544854][ T4614] device gretap0 left promiscuous mode [ 136.556768][ T4614] bridge0: port 3(gretap0) entered disabled state [ 136.628269][ T4614] device bridge_slave_1 left promiscuous mode [ 136.656829][ T4614] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.715490][ T4614] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.878504][ T4605] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.885597][ T4605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.892926][ T4605] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.899947][ T4605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.972761][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.984101][ T302] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.992731][ T302] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.015209][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.028197][ T302] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.035288][ T302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.042956][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.052171][ T302] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.059223][ T302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.067861][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.076077][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.095348][ T4605] device veth0_vlan entered promiscuous mode [ 137.229650][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 137.244609][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.252975][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 137.260540][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.271900][ T4605] device veth1_macvtap entered promiscuous mode [ 137.310739][ T30] audit: type=1400 audit(1773326098.031:158): avc: denied { create } for pid=4637 comm="syz.3.1319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 137.331353][ T8] device bridge_slave_1 left promiscuous mode [ 137.337481][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.379686][ T8] device bridge_slave_0 left promiscuous mode [ 137.385919][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.394675][ T8] device veth1_macvtap left promiscuous mode [ 137.400781][ T8] device veth0_vlan left promiscuous mode [ 137.503592][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 137.512951][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 137.521541][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 137.811960][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 137.833777][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 137.862800][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 137.891411][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.785935][ T8] device bridge_slave_1 left promiscuous mode [ 138.795256][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.803127][ T8] device bridge_slave_0 left promiscuous mode [ 138.809268][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.844524][ T8] device veth1_macvtap left promiscuous mode [ 138.850838][ T8] device veth0_vlan left promiscuous mode [ 138.929424][ T4698] device syzkaller0 entered promiscuous mode [ 138.969720][ T4691] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.977332][ T4691] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.985184][ T4691] device bridge_slave_0 entered promiscuous mode [ 138.993946][ T4691] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.002065][ T4691] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.009423][ T4691] device bridge_slave_1 entered promiscuous mode [ 139.299640][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.324810][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.352123][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.361053][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.369238][ T736] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.376324][ T736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.385065][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.393541][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.404189][ T736] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.411363][ T736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.465653][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.477489][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.487578][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.496332][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.518550][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.526748][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.534588][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.556681][ T4691] device veth0_vlan entered promiscuous mode [ 139.587216][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.607034][ T4691] device veth1_macvtap entered promiscuous mode [ 139.624780][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 139.647195][ T302] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.723351][ T4729] @ÿ: renamed from bond_slave_0 [ 139.825473][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 139.837131][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 139.885805][ T30] audit: type=1400 audit(1773326100.621:159): avc: denied { create } for pid=4736 comm="syz.0.1349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 142.181320][ T4768] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.188681][ T4768] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.196542][ T4768] device bridge_slave_0 entered promiscuous mode [ 142.203704][ T4768] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.211007][ T4768] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.218766][ T4768] device bridge_slave_1 entered promiscuous mode [ 142.541315][ T8] device bridge_slave_1 left promiscuous mode [ 142.547556][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.583277][ T8] device bridge_slave_0 left promiscuous mode [ 142.650434][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.663919][ T8] device veth1_macvtap left promiscuous mode [ 142.670086][ T8] device veth0_vlan left promiscuous mode [ 142.893686][ T4768] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.901632][ T4768] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.909332][ T4768] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.917559][ T4768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.064016][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 143.076963][ T736] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.084430][ T736] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.374294][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 143.382618][ T736] bridge0: port 1(bridge_slave_0) entered blocking state [ 143.389667][ T736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 143.397188][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 143.405427][ T736] bridge0: port 2(bridge_slave_1) entered blocking state [ 143.412470][ T736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 143.439116][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 143.448080][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 143.456492][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 143.474981][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 143.493596][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 143.516351][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 143.586741][ T4768] device veth0_vlan entered promiscuous mode [ 143.594392][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 143.613812][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.642749][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 143.652295][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 143.659806][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 143.669009][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.678854][ T4768] device veth1_macvtap entered promiscuous mode [ 143.770151][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 143.813860][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 143.846237][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.896462][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 143.905285][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 144.007952][ T30] audit: type=1400 audit(1773326104.741:160): avc: denied { create } for pid=4830 comm="syz.1.1374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 145.039329][ T8] device bridge_slave_1 left promiscuous mode [ 145.133243][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.192234][ T8] device bridge_slave_0 left promiscuous mode [ 145.269221][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.357911][ T8] device veth1_macvtap left promiscuous mode [ 145.418945][ T8] device veth0_vlan left promiscuous mode [ 145.826253][ T4877] #ÿ: renamed from bond_slave_0 [ 145.960005][ T4876] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.023685][ T4876] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.074632][ T4876] device bridge_slave_0 entered promiscuous mode [ 146.117369][ T4876] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.195568][ T4876] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.203175][ T4876] device bridge_slave_1 entered promiscuous mode [ 146.742684][ T4876] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.749782][ T4876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.757179][ T4876] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.764229][ T4876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.970027][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.983039][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.101598][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.119308][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.205922][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.242998][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.252875][ T430] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.259915][ T430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.267394][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.275933][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.284229][ T430] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.291281][ T430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.298663][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.306912][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.324554][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.333180][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.354186][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 147.362834][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 147.371415][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 147.386259][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.395086][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.402725][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.419292][ T4876] device veth0_vlan entered promiscuous mode [ 147.461316][ T4876] device veth1_macvtap entered promiscuous mode [ 147.514797][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 147.544695][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 147.646200][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 147.797540][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 147.854263][ T4963] syz.3.1411 uses obsolete (PF_INET,SOCK_PACKET) [ 147.884425][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 147.903165][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 147.919314][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 148.688724][ T45] device bridge_slave_1 left promiscuous mode [ 148.694898][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.702327][ T45] device bridge_slave_0 left promiscuous mode [ 148.708424][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.716180][ T45] device veth1_macvtap left promiscuous mode [ 148.722195][ T45] device veth0_vlan left promiscuous mode [ 149.578572][ T5012] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.600684][ T5012] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.616442][ T5012] device bridge_slave_0 entered promiscuous mode [ 149.623583][ T5012] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.634987][ T5012] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.644292][ T5012] device bridge_slave_1 entered promiscuous mode [ 150.184524][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.215753][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.335228][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 150.432660][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.484683][ T736] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.491779][ T736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.524906][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.556397][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.565030][ T736] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.572084][ T736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.579560][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.607735][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.618440][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.631532][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.642103][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.670844][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 150.694221][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 150.716960][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 150.786619][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.795391][ T5012] device veth0_vlan entered promiscuous mode [ 150.844036][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.853346][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 150.867057][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 150.875472][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 150.886723][ T5012] device veth1_macvtap entered promiscuous mode [ 150.898608][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 150.906840][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 150.915190][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 150.929105][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 150.981622][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 151.612069][ T430] device bridge_slave_1 left promiscuous mode [ 151.618306][ T430] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.626124][ T430] device bridge_slave_0 left promiscuous mode [ 151.632369][ T430] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.640079][ T430] device veth1_macvtap left promiscuous mode [ 151.646126][ T430] device veth0_vlan left promiscuous mode [ 152.154158][ T5112] ref_ctr_offset mismatch. inode: 0x5ec offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 152.190781][ T5109] device syzkaller0 entered promiscuous mode [ 152.258115][ T5113] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.265259][ T5113] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.305528][ T5113] device bridge_slave_0 entered promiscuous mode [ 152.375819][ T5113] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.429549][ T5113] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.497313][ T5113] device bridge_slave_1 entered promiscuous mode [ 152.877871][ T5124] device syzkaller0 entered promiscuous mode [ 153.005760][ T5113] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.012846][ T5113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.020377][ T5113] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.027423][ T5113] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.096962][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.106295][ T736] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.234955][ T736] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.330753][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 153.340251][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.352257][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.359651][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.369633][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 153.380016][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.389512][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.397309][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.436304][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 153.445824][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 153.454006][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 153.463110][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 153.479877][ T5113] device veth0_vlan entered promiscuous mode [ 153.498218][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 153.511259][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 153.529838][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 153.572056][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.631251][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.648967][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 153.703434][ T5113] device veth1_macvtap entered promiscuous mode [ 153.737501][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 153.763249][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 153.771980][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 153.802722][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 153.816747][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 153.861242][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 153.910114][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 154.971362][ T736] device bridge_slave_1 left promiscuous mode [ 154.977476][ T736] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.984971][ T736] device bridge_slave_0 left promiscuous mode [ 154.991141][ T736] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.998835][ T736] device veth1_macvtap left promiscuous mode [ 155.004890][ T736] device veth0_vlan left promiscuous mode [ 155.320181][ T5172] IPv6: pim6reg1: Disabled Multicast RS [ 155.476669][ T5178] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.483830][ T5178] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.492371][ T5178] device bridge_slave_0 entered promiscuous mode [ 155.499515][ T5178] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.506949][ T5178] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.514640][ T5178] device bridge_slave_1 entered promiscuous mode [ 155.554111][ T5205] device syzkaller0 entered promiscuous mode [ 155.641434][ T5178] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.648610][ T5178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.655911][ T5178] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.663108][ T5178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.813105][ T5219] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.826384][ T5219] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.876046][ T5228] device bridge_slave_1 left promiscuous mode [ 155.882240][ T5228] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.889584][ T5228] device bridge_slave_0 left promiscuous mode [ 155.895754][ T5228] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.964897][ T5231] device syzkaller0 entered promiscuous mode [ 156.018651][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.028686][ T430] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.039541][ T430] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.058068][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.096909][ T430] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.104014][ T430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.112950][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.122000][ T430] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.129306][ T430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.158184][ T5178] device veth0_vlan entered promiscuous mode [ 156.173670][ T5178] device veth1_macvtap entered promiscuous mode [ 156.222454][ T5239] device syzkaller0 entered promiscuous mode [ 156.229872][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 156.238629][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 156.247678][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 156.279903][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 156.288605][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 156.298151][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 156.306102][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 156.315106][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.325204][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.860786][ T5265] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.891625][ T5265] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.921950][ T5265] device bridge_slave_0 entered promiscuous mode [ 157.929120][ T5265] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.939793][ T5265] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.972882][ T5265] device bridge_slave_1 entered promiscuous mode [ 158.005596][ T5272] device syzkaller0 entered promiscuous mode [ 158.066243][ T736] device bridge_slave_1 left promiscuous mode [ 158.085828][ T736] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.095138][ T736] device bridge_slave_0 left promiscuous mode [ 158.114572][ T736] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.129397][ T736] device veth1_macvtap left promiscuous mode [ 158.140464][ T736] device veth0_vlan left promiscuous mode [ 158.260274][ T5297] device sit0 left promiscuous mode [ 158.279267][ T5265] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.286347][ T5265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.293681][ T5265] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.300723][ T5265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.315874][ T5297] device sit0 entered promiscuous mode [ 158.385702][ T430] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.393273][ T430] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.420477][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.429396][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.458009][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.581001][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.649965][ T2767] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.657152][ T2767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.677946][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.720172][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.779909][ T2767] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.787283][ T2767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.884779][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.893448][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.902250][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.910468][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.926433][ T5265] device veth0_vlan entered promiscuous mode [ 158.968041][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 159.008816][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 159.017965][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 159.027306][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.045172][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.053139][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 159.110282][ T5357] device syzkaller0 entered promiscuous mode [ 159.119198][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 159.134026][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 159.149287][ T5308] device syzkaller0 entered promiscuous mode [ 159.235577][ T5265] device veth1_macvtap entered promiscuous mode [ 159.250131][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 159.258742][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 159.270168][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.318031][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 159.339428][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 160.873488][ T736] device bridge_slave_1 left promiscuous mode [ 160.879643][ T736] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.977050][ T736] device bridge_slave_0 left promiscuous mode [ 161.039253][ T736] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.065760][ T736] device veth1_macvtap left promiscuous mode [ 161.116714][ T736] device veth0_vlan left promiscuous mode [ 161.644862][ T5403] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.652084][ T5403] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.659684][ T5403] device bridge_slave_0 entered promiscuous mode [ 161.668989][ T5403] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.678987][ T5403] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.686700][ T5403] device bridge_slave_1 entered promiscuous mode [ 161.881984][ T5403] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.889084][ T5403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.896393][ T5403] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.903425][ T5403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.686234][ T430] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.733338][ T430] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.801097][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.842386][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.961137][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.021330][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.045602][ T430] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.052689][ T430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.072056][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.087778][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.114459][ T430] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.121546][ T430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.136872][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.151301][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.170473][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.179505][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.203237][ T5467] device syzkaller0 entered promiscuous mode [ 163.224335][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.243196][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.252179][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.260116][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.280145][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.293297][ T430] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.306140][ T5403] device veth0_vlan entered promiscuous mode [ 163.319113][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.352562][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.584960][ T5403] device veth1_macvtap entered promiscuous mode [ 163.619741][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 163.652437][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.695376][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.767255][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.820479][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 164.971942][ T736] device bridge_slave_1 left promiscuous mode [ 164.978087][ T736] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.985562][ T736] device bridge_slave_0 left promiscuous mode [ 164.991726][ T736] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.999416][ T736] device veth1_macvtap left promiscuous mode [ 165.005430][ T736] device veth0_vlan left promiscuous mode [ 165.760085][ T5536] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.767163][ T5536] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.774884][ T5536] device bridge_slave_0 entered promiscuous mode [ 165.781979][ T5536] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.789054][ T5536] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.796478][ T5536] device bridge_slave_1 entered promiscuous mode [ 165.891889][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.899622][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.912030][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.920473][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.928912][ T2767] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.935990][ T2767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.950952][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.967707][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.976403][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.985107][ T2767] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.992171][ T2767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.000060][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.008686][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.017005][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.025292][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.041327][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.050034][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.062324][ T5536] device veth0_vlan entered promiscuous mode [ 166.068594][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 166.079026][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.097689][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.105244][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.112814][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 166.121266][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 166.131451][ T5536] device veth1_macvtap entered promiscuous mode [ 166.142449][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 166.150355][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 166.159325][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 166.169602][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 166.178115][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.892094][ T736] device bridge_slave_1 left promiscuous mode [ 166.898200][ T736] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.905667][ T736] device bridge_slave_0 left promiscuous mode [ 166.911831][ T736] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.919549][ T736] device veth1_macvtap left promiscuous mode [ 166.925636][ T736] device veth0_vlan left promiscuous mode [ 167.847405][ T5580] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.854912][ T5580] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.862357][ T5580] device bridge_slave_0 entered promiscuous mode [ 167.862594][ T30] audit: type=1400 audit(1773326128.601:161): avc: denied { create } for pid=5581 comm="syz.3.1585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 167.869476][ T5580] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.895428][ T5580] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.903179][ T5580] device bridge_slave_1 entered promiscuous mode [ 168.071386][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.079122][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.110606][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.119305][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.128217][ T736] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.135280][ T736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.143344][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.152821][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.161709][ T736] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.168744][ T736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.176553][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.199061][ T5580] device veth0_vlan entered promiscuous mode [ 168.215195][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 168.225783][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.235771][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.246784][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.254944][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 168.263731][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.272641][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.282821][ T5580] device veth1_macvtap entered promiscuous mode [ 168.310452][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 168.319871][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.208963][ T736] device bridge_slave_1 left promiscuous mode [ 170.217337][ T736] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.224909][ T736] device bridge_slave_0 left promiscuous mode [ 170.231091][ T736] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.238837][ T736] device veth1_macvtap left promiscuous mode [ 170.245100][ T736] device veth0_vlan left promiscuous mode [ 170.387850][ T5658] device syzkaller0 entered promiscuous mode [ 170.568953][ T5669] device syzkaller0 entered promiscuous mode [ 170.591349][ T5645] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.598402][ T5645] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.606191][ T5645] device bridge_slave_0 entered promiscuous mode [ 170.657524][ T5645] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.664632][ T5645] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.672031][ T5645] device bridge_slave_1 entered promiscuous mode [ 170.749613][ T5645] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.756821][ T5645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.764131][ T5645] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.771163][ T5645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.816966][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.824801][ T2767] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.832143][ T2767] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.844348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.854127][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.861194][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.875223][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.883866][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.890925][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.905080][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.917207][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.928989][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.940171][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.948232][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.956008][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.964385][ T5645] device veth0_vlan entered promiscuous mode [ 170.976924][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.988322][ T5645] device veth1_macvtap entered promiscuous mode [ 170.997691][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 171.009173][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.571754][ T736] device bridge_slave_1 left promiscuous mode [ 172.578002][ T736] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.585583][ T736] device bridge_slave_0 left promiscuous mode [ 172.592110][ T736] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.599723][ T736] device veth1_macvtap left promiscuous mode [ 172.605778][ T736] device veth0_vlan left promiscuous mode [ 173.420326][ T5714] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.427788][ T5714] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.451082][ T5714] device bridge_slave_0 entered promiscuous mode [ 173.462509][ T5714] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.469863][ T5714] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.479649][ T5714] device bridge_slave_1 entered promiscuous mode [ 173.519922][ T5733] device syzkaller0 entered promiscuous mode [ 173.712859][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.728686][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.759125][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.774209][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.790265][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.797384][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.818010][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.832991][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.850065][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.857313][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.888240][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.903840][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.921459][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.952510][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 173.967740][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.985154][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.000371][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.017774][ T5714] device veth0_vlan entered promiscuous mode [ 174.089734][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 174.114266][ T5714] device veth1_macvtap entered promiscuous mode [ 174.208871][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.234390][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 175.291923][ T430] device bridge_slave_1 left promiscuous mode [ 175.298036][ T430] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.305521][ T430] device bridge_slave_0 left promiscuous mode [ 175.311817][ T430] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.319588][ T430] device veth1_macvtap left promiscuous mode [ 175.325610][ T430] device veth0_vlan left promiscuous mode [ 176.623603][ T5782] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.688831][ T5782] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.811797][ T5782] device bridge_slave_0 entered promiscuous mode [ 176.937436][ T5782] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.980986][ T5782] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.988498][ T5782] device bridge_slave_1 entered promiscuous mode [ 177.144199][ T5782] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.151286][ T5782] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.268997][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.291866][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 177.368088][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.485523][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.582664][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.693154][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.700221][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.769967][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.815515][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.822606][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.942642][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.954030][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.977653][ T5782] device veth0_vlan entered promiscuous mode [ 178.026124][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 178.038623][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 178.057000][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 178.074923][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.091825][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.107922][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.124690][ T5835] device sit0 entered promiscuous mode [ 178.147619][ T5782] device veth1_macvtap entered promiscuous mode [ 178.168173][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 178.181116][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 178.253269][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 178.375479][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 178.414285][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 178.422819][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 178.431155][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 179.001475][ T45] device bridge_slave_1 left promiscuous mode [ 179.007587][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.015248][ T45] device bridge_slave_0 left promiscuous mode [ 179.021425][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.029186][ T45] device veth1_macvtap left promiscuous mode [ 179.035211][ T45] device veth0_vlan left promiscuous mode [ 180.785325][ T5880] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.799058][ T5880] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.813181][ T5880] device bridge_slave_0 entered promiscuous mode [ 180.852104][ T5880] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.870938][ T5880] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.921134][ T5880] device bridge_slave_1 entered promiscuous mode [ 182.060907][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.068735][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.290853][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.299454][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.308220][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.315306][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.338370][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.357384][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.366035][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.373116][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.401427][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.430859][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.438938][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.451023][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.470095][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.558476][ T5880] device veth0_vlan entered promiscuous mode [ 182.592971][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 182.607951][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.625693][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 182.641196][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.806817][ T5880] device veth1_macvtap entered promiscuous mode [ 182.850715][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.875478][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.891051][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 182.909610][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 182.928601][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 183.045529][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 183.064726][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.086167][ T5946] device syzkaller0 entered promiscuous mode [ 183.157218][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 183.165599][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.239781][ T5950] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.247003][ T5950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.258002][ T5950] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.265853][ T5950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.282417][ T5950] device bridge0 entered promiscuous mode [ 184.102759][ T736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.351544][ T430] device bridge_slave_1 left promiscuous mode [ 184.357652][ T430] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.365149][ T430] device bridge_slave_0 left promiscuous mode [ 184.371303][ T430] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.379013][ T430] device veth1_macvtap left promiscuous mode [ 184.385055][ T430] device veth0_vlan left promiscuous mode [ 185.813098][ T5976] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.844508][ T5976] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.862319][ T5976] device bridge_slave_0 entered promiscuous mode [ 185.900707][ T5976] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.909684][ T5976] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.925873][ T5976] device bridge_slave_1 entered promiscuous mode [ 188.380059][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.389916][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.660701][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.673363][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.681817][ T2767] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.688872][ T2767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.696507][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.713910][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.731155][ T2767] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.738231][ T2767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.838303][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.846085][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.854208][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.862436][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.874093][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.882285][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 188.890617][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.899241][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 188.907142][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.915563][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.923345][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.941623][ T5976] device veth0_vlan entered promiscuous mode [ 189.106742][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 189.118556][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.128491][ T5976] device veth1_macvtap entered promiscuous mode [ 189.474295][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.482103][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 189.493141][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.501535][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.510023][ T2767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=1210 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 189.860681][ T30] audit: type=1400 audit(1773326150.581:162): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[459]" dev="pipefs" ino=459 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 190.111300][ T282] syz-executor (282) used greatest stack depth: 20512 bytes left [ 191.972222][ T430] device bridge_slave_1 left promiscuous mode [ 191.978478][ T430] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.985881][ T430] device bridge_slave_0 left promiscuous mode [ 191.992127][ T430] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.000091][ T430] device bridge_slave_1 left promiscuous mode [ 192.006273][ T430] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.013951][ T430] device bridge_slave_0 left promiscuous mode [ 192.020135][ T430] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.028521][ T430] device veth1_macvtap left promiscuous mode [ 192.034561][ T430] device veth0_vlan left promiscuous mode [ 192.040600][ T430] device veth1_macvtap left promiscuous mode [ 192.046630][ T430] device veth0_vlan left promiscuous mode [ 192.052628][ T430] device veth1_macvtap left promiscuous mode [ 192.058688][ T430] device veth0_vlan left promiscuous mode [ 194.651763][ T430] device bridge_slave_1 left promiscuous mode [ 194.657922][ T430] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.665372][ T430] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.673412][ T430] device veth0_vlan left promiscuous mode [ 194.679302][ T430] device veth0_vlan left promiscuous mode