last executing test programs: 22.282659623s ago: executing program 0 (id=2137): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000009000000000000000100000073011c000000000095"], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x4, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000}, [@ldst={0x1, 0x2, 0x3, 0x7, 0x1, 0x8, 0x1}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0xc}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@ifindex, 0xe, 0x1, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0}, 0x40) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcb, &(0x7f00000003c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xad, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x2d63}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) (async, rerun: 64) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r4, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async, rerun: 64) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (rerun: 64) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, 0x0, &(0x7f0000002300), 0x8001}, 0x38) setsockopt$sock_attach_bpf(r6, 0x1, 0x44, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r0, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0], 0x0, 0xea, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xf1, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@ifindex=r3, r1, 0x2b, 0x2e, r0, @void, @void, @void, @value=r8, r2}, 0x20) 19.121075482s ago: executing program 0 (id=2137): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000009000000000000000100000073011c000000000095"], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x4, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000}, [@ldst={0x1, 0x2, 0x3, 0x7, 0x1, 0x8, 0x1}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0xc}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@ifindex, 0xe, 0x1, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0}, 0x40) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcb, &(0x7f00000003c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xad, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x2d63}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) (async, rerun: 64) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r4, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async, rerun: 64) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (rerun: 64) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, 0x0, &(0x7f0000002300), 0x8001}, 0x38) setsockopt$sock_attach_bpf(r6, 0x1, 0x44, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r0, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0], 0x0, 0xea, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xf1, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@ifindex=r3, r1, 0x2b, 0x2e, r0, @void, @void, @void, @value=r8, r2}, 0x20) 15.36944274s ago: executing program 0 (id=2137): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000009000000000000000100000073011c000000000095"], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x4, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000}, [@ldst={0x1, 0x2, 0x3, 0x7, 0x1, 0x8, 0x1}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0xc}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@ifindex, 0xe, 0x1, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0}, 0x40) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcb, &(0x7f00000003c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xad, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x2d63}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) (async, rerun: 64) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r4, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async, rerun: 64) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (rerun: 64) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, 0x0, &(0x7f0000002300), 0x8001}, 0x38) setsockopt$sock_attach_bpf(r6, 0x1, 0x44, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r0, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0], 0x0, 0xea, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xf1, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@ifindex=r3, r1, 0x2b, 0x2e, r0, @void, @void, @void, @value=r8, r2}, 0x20) 11.307231369s ago: executing program 0 (id=2137): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000009000000000000000100000073011c000000000095"], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x4, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000}, [@ldst={0x1, 0x2, 0x3, 0x7, 0x1, 0x8, 0x1}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0xc}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@ifindex, 0xe, 0x1, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0}, 0x40) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcb, &(0x7f00000003c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xad, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x2d63}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) (async, rerun: 64) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r4, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async, rerun: 64) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (rerun: 64) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, 0x0, &(0x7f0000002300), 0x8001}, 0x38) setsockopt$sock_attach_bpf(r6, 0x1, 0x44, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r0, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0], 0x0, 0xea, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xf1, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@ifindex=r3, r1, 0x2b, 0x2e, r0, @void, @void, @void, @value=r8, r2}, 0x20) 7.820149182s ago: executing program 0 (id=2137): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000009000000000000000100000073011c000000000095"], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x4, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000}, [@ldst={0x1, 0x2, 0x3, 0x7, 0x1, 0x8, 0x1}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0xc}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@ifindex, 0xe, 0x1, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0}, 0x40) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcb, &(0x7f00000003c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xad, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x2d63}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) (async, rerun: 64) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r4, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async, rerun: 64) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (rerun: 64) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, 0x0, &(0x7f0000002300), 0x8001}, 0x38) setsockopt$sock_attach_bpf(r6, 0x1, 0x44, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r0, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0], 0x0, 0xea, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xf1, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@ifindex=r3, r1, 0x2b, 0x2e, r0, @void, @void, @void, @value=r8, r2}, 0x20) 3.177164999s ago: executing program 2 (id=2757): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000240)=""/102, 0x66}, {&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/219, 0xdb}], 0x5, &(0x7f0000000680)=""/46, 0x2e}, 0x10001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000040)={0x0, 0xfffffffffffffd51, &(0x7f00000003c0)=[{&(0x7f0000000080), 0x803e}, {&(0x7f0000000140)="ec", 0x1}, {0x0}], 0x308}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e00000004000000040000000200000000004000", @ANYRES32=0x1, @ANYBLOB="fcffffff00"/20, @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff], 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)=""/140, 0x42, 0x8c, 0x1}, 0x20) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x3, &(0x7f0000000700)=ANY=[@ANYRESHEX=r2, @ANYRESHEX=0x0, @ANYRESDEC=r2, @ANYRES16=r2, @ANYRES8=r0, @ANYRESHEX=r4, @ANYRES8, @ANYRES8=r4], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0xd0, &(0x7f0000000880)=""/208, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2e, r4}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000088000000b0000000010"], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0xd, &(0x7f0000000c00)=ANY=[@ANYBLOB="18000000080000000000000000000080850000000f00000018110000dc7458398003609ba7b4f067c0be868709bcc733dbdc1983d0dcce7cc85b4bf5b62c771f5ae78297217c037d020a57cd05688e695b6adf6e1b455a1f54e0c48add2ef2b5a737e1fd0cd878abe6fadc0862e65d464934829c3f517d38f893f7972d85f1e723fa4e9e1e6c22124c8292fbaabb", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000725e850000000100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000680)={r6}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYRES32=r3], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_netprio_ifpriomap(r8, &(0x7f0000000080)=ANY=[], 0x7) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12506, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000000001, 0x8}, 0x7602, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) r10 = openat$cgroup_type(r9, &(0x7f0000000140), 0x2, 0x0) write$cgroup_type(r10, &(0x7f0000000280), 0x9) bpf$TOKEN_CREATE(0x24, &(0x7f0000000780), 0x8) openat$cgroup_procs(r9, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) r13 = perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x80, 0x0, 0xfffffffffffffffa}, 0x0, 0xffffffffffffffff, r12, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r13, 0x40082406, &(0x7f0000000180)='(\x00') 3.073018436s ago: executing program 2 (id=2759): perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) socketpair(0x1, 0x800, 0xffffffff, &(0x7f0000000600)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00800000000000000000000080000000000000", @ANYRES32, @ANYBLOB=' \x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x10, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000005000000000000008000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003f80000850000008600000018010000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x11}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x832) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0100000006001a00080000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300)={0x0, r5}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r5, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000002180)=[0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x78, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000540), &(0x7f00000001c0), 0x8, 0x90, 0x8, 0xffd8, &(0x7f00000005c0)}}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r6, @ANYRES8=r6], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', r7, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r9}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) socketpair(0xb, 0x1, 0x749, &(0x7f0000000800)) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b80)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001bc0)={0x18, 0x5, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa73}, [@ldst={0x3, 0x3, 0x4094aa6106d991b9, 0x1, 0x4, 0x30, 0x10}, @generic={0xb, 0x4, 0x0, 0x0, 0x6}]}, &(0x7f0000000780)='syzkaller\x00', 0x1000, 0x1000, &(0x7f0000000b80)=""/4096, 0x41000, 0x40, '\x00', r7, 0x0, r10, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10001}, 0x94) r11 = openat$cgroup_ro(r2, &(0x7f00000007c0)='blkio.bfq.time\x00', 0x0, 0x0) r12 = openat$cgroup_ro(r2, &(0x7f0000000840)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x28}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000020c0)={0x18, 0x39, &(0x7f0000001c80)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180000000e000000000000000300000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000ff7fffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000184b0000f9ffffff0000000000000000184a0000feffffff00000000000000003426300008000000851000000500000018120000", @ANYRES32=r11, @ANYBLOB="0000000000000000b703000000058ba2cd80594b5a000000b700006c0000000018120000", @ANYRES32=r13, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000b7080000000000007b8af8ff00000000b7080000a10000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a5000000185900000c0000000000000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000001e80)='GPL\x00', 0xe, 0xfe, &(0x7f0000001ec0)=""/254, 0x60980, 0x42, '\x00', r7, 0x0, r0, 0x8, &(0x7f0000001fc0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000002000)={0x0, 0x1, 0x6c27, 0x101}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002040)=[{0x1, 0x1, 0x8c, 0xb}, {0x80000000, 0x4, 0x10, 0x3}, {0x3, 0x5, 0x1, 0xa}, {0x2, 0x1, 0x8, 0xc}, {0x5, 0x4, 0xf, 0xc}], 0x10, 0x6}, 0x94) 3.04625529s ago: executing program 2 (id=2760): bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000e29be76c707500"/34], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x15, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f00000021c0)={r0, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a0000000400000008"], 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNGETVNETLE(r1, 0x4010744d, &(0x7f0000000180)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0xfffffd26) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x401c5820, &(0x7f00000001c0)=0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@cgroup=r3, 0x22, 0x1, 0x1ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000711098000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) 3.027236624s ago: executing program 0 (id=2137): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000009000000000000000100000073011c000000000095"], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x4, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000}, [@ldst={0x1, 0x2, 0x3, 0x7, 0x1, 0x8, 0x1}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0xc}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@ifindex, 0xe, 0x1, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0}, 0x40) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xcb, &(0x7f00000003c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xad, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x2d63}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) (async, rerun: 64) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r4, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async, rerun: 64) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (rerun: 64) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, 0x0, &(0x7f0000002300), 0x8001}, 0x38) setsockopt$sock_attach_bpf(r6, 0x1, 0x44, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r0, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0], 0x0, 0xea, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0xf1, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@ifindex=r3, r1, 0x2b, 0x2e, r0, @void, @void, @void, @value=r8, r2}, 0x20) 948.267202ms ago: executing program 2 (id=2762): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xb0000}, 0x805, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0x1}, &(0x7f0000000080), &(0x7f0000000300)=r1}, 0x20) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000040000000000000000000000850000002c000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000380)="b9ff0300600d698cff9e14f092dd", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffff}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x3, 0x0, &(0x7f00000002c0)='\x00\x00\x00', 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x0, 0xff, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0xa}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x10000004}, 0x0, 0x8, 0xffffffffffffffff, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x401c5820, &(0x7f00000001c0)=0x8) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x5, 0x7, 0x8, 0x5, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x50) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r5, 0x2000012, 0x100e, 0x2, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 878.204943ms ago: executing program 3 (id=2765): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0b000000170000a2083f8ecf67c19d0f3d000200", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xb8}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r0, 0x58, &(0x7f0000000380)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000009c0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x8, [@func={0x5, 0x0, 0x0, 0xc, 0x5}, @func={0x10, 0x0, 0x0, 0xc, 0x2}, @const={0xe, 0x0, 0x0, 0xa, 0x1}, @func={0xb, 0x0, 0x0, 0xc, 0x3}, @struct={0x7, 0x8, 0x0, 0x4, 0x1, 0xd, [{0x9, 0x2, 0x37916f48}, {0xa, 0x0, 0x8001}, {0x8, 0x4}, {0x6, 0x1, 0x381e}, {0xf, 0x3, 0x4}, {0x9, 0x0, 0x67}, {0x1, 0x0, 0x7fffffff}, {0x7, 0x4, 0x9}]}]}, {0x0, [0x5f, 0x5f, 0x5f, 0x30, 0x5f, 0x61]}}, &(0x7f00000008c0)=""/254, 0xbc, 0xfe, 0x1, 0x20000, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{0x1}, 0x0, 0x0}, 0x20) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4329}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, 0x0}, 0x20) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0x11, &(0x7f0000001180)=ANY=[@ANYBLOB="18050000080000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7040000080000008500000095000000850000000500000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r4, 0xfffff000, 0xe, 0x0, &(0x7f0000000300)="882f1242a03c3f98722780b605a7", 0x0, 0x990d, 0x7000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1e, 0x1ffffffffffffdd1, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x91) 864.416406ms ago: executing program 2 (id=2767): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000050000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000006010000f8ffffffb702000005000000b7040000000000008500000072000000850000000e0000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000480)={r1}, 0xc) close(r1) socketpair(0x22, 0x5, 0x7, &(0x7f0000000400)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x20, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110d00000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0xfffffe54}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa1000000000000070100"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8000}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000078850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000680)={r3}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)="3715bc819c09a85ec96480d331e5c5a94855e1e832b02abc3868d8136210801f852a0089f55880dc02b56ac6a6ca7987e6dfbb43c46c1b147ea9efcb63e331fc2e98f03131eacace1e6d0bca7b770d40123c9429af0adcccfbd111102edda8fc7461f62bfd0a67acfb5848ba3625f6f7db56dbd2d9a785e79e79ea7d6f7d2cc103619d4a6f416b5cd662461bc6f3e3c5ef2116d1f4131ded2291ed758826631e3e4052d8333d72b3a8f4c985f79972fa16a8082a7f9d0ffdaa80f53ab8dd0e202a5741c5d8fbb5e46e3c319c4652209ee04eed071166d20073"}, 0x20) 759.655393ms ago: executing program 3 (id=2770): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000140)=ANY=[@ANYRES32=r0], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) 685.025956ms ago: executing program 1 (id=2772): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="160a0000000000006110ac000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x94) socketpair(0xa, 0x3, 0xff, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x17, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4000000b, 0x0, 0x0, 0x0, 0x6}, [@generic={0x73, 0x1, 0x1, 0x6}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000080)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="bf16000000000000b7070000000100004870000000000000280000000000000095000000000000002ba728041598fbd30cb599e83d24a3aa81d36bb3019c13bd23212fb56fa54f2641d8b02c3815e79c1414eb07eae6f0711e6bd917487960717142da7646c4fe02996b60cf81ebcd50fa9ea4308123f602000000000000de89e661168c1886d0d4d94f204e345c652fbc1626e3a2a2ad358061d0ae0209e62f51ee988e6ea604ce974a22a550d6f97080980400003e05df3ceb9f1feae5737ecaa80a666963c474c2a100c788b277beee1cbf9b0a4d3881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3431abe802f5ab3e89cf6c662ed4048d3b3e22278d00ce00000000d3a02762011052eac2951257b85802189d74005d2a1bcf9436e192e23fd275985bf31b714f000bcab6fcd610f25f5888000000003f11afc9bd08c6ebfbb89432fb465bc52f49129b9b6150e320c9901de2ebb9000000018e3095c4c5c7a156cec33a667dc8aff950ca1e5efdd4c968dacf81baa3a509b1041d06f6b0097c430481824a3f4fddd3c643f630ba175d876defd3541772f26e27c44cfdb2d85d6d29983e830a9cdd79837b3468e8c67a571d0a017c100344c52a6f387a1340a1c8889464f90cc4cd1f570dd39877dfb2ff1ae66e1ce917474b2e650ae630afd014a337ac5d58bcb5e51723257c872c5255f20100000000000000f041b665ab21372c8d8b7bac5b5c784d20a4a24d8dbd75062e1daef9dead619cc6e7baa72707157791c3d2a286ffb8d35452bb5d36c2a8682bf7ecbd53f950ef4709ec01e230d2f53594ef4839c6130c4c13a0cca84b9935f771fd49e4b9ec7a410ec42315255be1ed66d9051f22614d1f62734d679039a97d2b74f9e8e997ccd314000f747f4e8e7025123e783df8b8a17e3aa9fe1f662aef87a065b03cfb65b4dfe4f1b56e1f23128d743753a1de172d683d5892ce9414a1d98ea93e3d35dbb6c23b90cf36e83b8a434a97d09343d7f83079ccb02e69d384146056d125cfa788237874dd42dae334bda042819a2aa24dba1c25be2794448b4f63483026b5e34d44705b76ef29241adab0dd7d68bf975e02069f6f2425e1bc97a3d588085f16bef63a06578d4f5de7bfb6aaa75f16996d536256c02284cb1d3a6fb8cae87691fae365a70c3fc69e1565bba8dd8a8ca049f798ab20000000bebd69413afc9d8a5edd7aaa000000000000001e6c2f2a287c5278a218dbfaffffff00a14db5cfa6819eb1d39c48cfdc80d2000000000000000819363154cca4e2f89800d18c89d7f46f679df6c9e2952ae1ebfd0ca88368ee6ce139e8b5822c22cf2e9dde943d34c432e1001171792c65986146666a5490928441f47e0fe5eac41824ca1fd0eb71aa243c88d5480e5aee9c9e5f2e5a56a6d920335c8e8726fd8329d9a728995b1531bd20360d33d8f9ffffff5f912ac4e34bf6ea8a86da707b03bddb491ba0cc98f6be92c55969a2b50025419d1476c73132ca7ca26ce8a7e3ffb700f09e157f9b844051f1a642aca9ff98c9036471ccff0522903e7bcf62e18f7696bbc280b95e8e0d6fd5644b0ebde3a95b06548862de809d3dae3cccf109f7c78e8479a345e800000000000000000000009455bf417627ce723a5d9103706aba84279500bb82f6b5a3ddc0bd9856712945b70c75ce5b722578820820d010d7a3cffc99fc647d0b82ef26ab708c0b19ed144be51c3b398f0e6bb7a30006000000cba12953d58cff0f0378740fe6662f377b97d8e7cdb047050d7296cd3856476a60a49ad127ba6570bafc2bbcf9ee721fd9cb467ff071e5603a9d801300000000007d932d7a64de4c4aa433fc0840aff7c47da3a4c6966d0000000000000000f6bfbae29e8a6e2a889f6ef6869d82d6bd73eb76b65c7a35a54a4a6b8ad4600e3a972a0bb5971a5f16590b0a03dafa3fd1118765cc8ab9fccf3b51c41a339f200f2fa33006910a679a9ae0187b4d750c4bd244cb0cbfd23b265f4d4da448a7a0d19c5e43eae50a31609dfa2dde267551467eb6475293dd7012cc449009981f22820e57a0eff234ccfe21d7a2302e000669753d3c3432cc14ee1abe724adb6b5431befedd3e22971118f0e21aed03a6fe7860b3e13c3173a60a1823cb7dde8212a8531bd9060000006a370e9eb56b3d790b98f2bd0db1e5de6a146597b2cbb7103040d2a39d7965d34df524b760ab92efcce7dd1574052c735935bf6a752c015c7f5ffee9ff66e5dd2866b15b6e0d17618cb1f5c1ee4b05ebf1445ea110f499f840a5c965443d535556351ee25fe09f69494b053678dcadcf02e063dff2fa4bef1ac3bbbebe6c74d71ec3b23e29895eff1d1017024fe3e8cc759b05785adc346b7ffd05963f92c1d0d7d90ba878ad89e490f3e29ac51d30632869a534418f916bf6fe8167827a8e6c8f8b391c822805cb0adf1b8bd6947ff208753eb0d208ce14f7b206b2e02c21e963abc5ceb735c1b3c46b0a843de52a0000000000000001ee9c2b2705c1a81d9d3b9656b219c8cd99c9cafcd0d0540884d97aecb19983fc6af29ab44a82aff9cba921192c665b877af6539bdb1b567f481ba0790ee0d112f99e59ba82e7ad758f4e1eac69e7e88a63960975f490e161e371ec8534791e3b61c685d900a9c0839208356b53750e76fcc3c2d1bddcbd83897921414d0c02e8188f3df79ea2a5c5444004830e6cb227ca1bdafb977c00000000003a417193b8c5d793687335a930867094fd6a78218218e04b705ec62f1608cb569b81914e68f175b392af6bc4fd2121d7fd276af2c97a441b56e7a0687d98b8e76d8d0d231e4fe00be1de76bd19cc12e2bd938eb681ed6bc951c1b4f7c51af59eea4d40c6000000000200778a677b72786311153271a3313da02645e11761699e4d04ac86dd14ff7b9a10d3fa74696fe3953a5b7706bf5d1faba4b18808d9cb0e9db696dec4e0820ee4028d7225a2c9c427cf64cbde6fba056b2006b7a37c1181d530fb865e235cd302f3b4071ee52303da186b9e5e3144bf479f277f10656ad3744037ccc9c63685a6f1109d2ea73773d3635f61497f1fa1ea4a16f601800bf3e59141fbf05a96113320c44500f8ffff970d5254727e804fbd99ccefb7c09269dd2c5c25e56e169ac15980f3f85f7ca36dd5950ef5b64fd46f123311829534a82940994199b3cf7a8f09c1946e55289f668c423fcbb31ae91864c882313151741a67538c9689dc8ecc9903c7041e5c1b04e2fa55a756487517a7445cbd9e3f5175e41c00000000000000000000000000bf98efd587fffe326f474b0b089c017b16c0062cbce96f5adebec52a79f9363909842f79c50a1520be46d87003137e4c5031f00123e812a5e37cd52c9eb7336281cb8c6ce9934b157d7875a70eaf103cb3138e2361c51cd1eab8a26b232acf6bf0ab829c26dab637538b2eb1420d812d2b80c777710ba0f18e4661681aa218d9ba54023ab4305977eb15611ae2545835e9d30e9f6d4fb43a291c69545a1eea0f87204311327c18380fedf3d3dad8549f99bf6c5cb060fc37d2449f72de0cbea4bc1dc89c136cdbc504f849d5502d77a95c7bfff4cd9c03058d0d4d07ea64824f1acf2b39289f675f39d01719cdbab3f1ce1060f3e6806e774a5f079c8d7b3e37cb99b41da5e485a441b6a103549f55ab09dc98767763d1f2fafd45bb7d2b40050d1f8292f4d9ec6d0000000000003932062290f4996fdd55b06023437e9e2072daf7f5d82f6f1b5b89a41134f4dc2e65bb11272fdf8c8141f41d6160b3d8b6ecd16d14267f61b4881adee7f07f3d6af5ae794286b6c3e1f5a76b85ed6e1f0000c608b8262c807dd755e22b801162381aa9d1af2bbc9cfd497585337eac408b8475b47a392a10cae349160f128e5f873a58064eb400c36a90624f6aed398a215e9ce64522ab249f67c38a656d32ecff5cdb2b039c4abf349d2c0f88a42e9189bbfa7f5cf35b6e7ef8f9d33163b7ea87550fb1ba334c83e3aec4714c9c4ca3ecb04f2720237615a28bf310b58ffa2a103216fdcc8c2d8f5d55e5e7ebf147105272aaae56e86d856b3cf79a3f7306436762dd07cebc7892ec6f9f696da38feed3dc0001500e34adae1ba89a32bad2af9030f840f1ba4664f35547cdadd5cbacc59352c290f55d971b65953533668c25f21d8d62d849e9058eaa97c63491568887548f668cdbca2abf01a361a0b64d8b523e669da350e3ec7445dfbf366b0b3bc5e76824a1951393352bc756f3fcaad2c1c399a3e43eaaeca70db90f2fa395964434476719334482eb5424c81814079a24fe3681ad9ac361f71ac279a688f10a12105edebc5e3b8dad4c8305ab129ca2dfb9b7c5e9d097bd01b495cccefddce569117f7f5d6a6270ff0f0f4c371029ca8489571b55841bf3dd003bc81460eee57ceb3c33f4e9300b0144fe040cf5fcfcbb616c2070237881afdb314cecd1623f3e55ab8b7627fa1be349145a8d6313cbc790eefe2020138e82fbdd351be4ddcbcc9bc048dd3db5828d16baec6e07a007f0030f34ea3cfd524d6fa1d45da5641d6c94e1d3ae7fba1c85035d2a60ef1696e0d96aa1c60019f73ae0aa6113cd66ef26b5777337c26e1461405d86fdf091edd526f25cada439bb3609ed5c35ab60a539ade786bd6004d0ea3edbd6c4da0d8e8be8c771c8c8a0b07d9859e04adb18964dcce9bce546074c26dffbc2dff78ce9308c845d4257000000000000000000000000000000000000f29657697d9c2b132b2dc2f5ea5122836582a7e85fe2bc166f17aefd9d861de0191f5277d4a3b5afb6f200000000000000000089de7f8485d9507164a187220b36ddc7fa645d4bd0c1414c30a416f80ba17d21d53961471b2d2d459e4bb23230d676ca49633b25e26a322024beb7c3427da59f7daa70a5d44a0eb895f29245df6401295d3da939954e126a3be932f47fe61ef1bfe83086651af7e23c2a8fa702b9aaa65aa3edaaa6b3f5a0c7cdfd008c898d73bb97168ca390ef539800000000000077a5ad1e683aeff92bb0b66b33ed878df1e344b99450086c819bf174578705c049d2fb25a91ba04643cde1a3c391d8646e5249dbf28b13b1c4d5127f685ee0c0576bf74e17cd3b4df4eb7095e504e361689572b0f93ff1dc6f52e8728a03e5a4df80a32c6055df8f4f4152c0bf4d793b20ac2cfa907b5af80716118f82027d3e4cb096fe86de545008b85cb9b637bca30d765b0c3ad489db32955454dcfe000000002830e5e125322d2f5829040a91405bf2fe5bf14833fd7b1e72c775f267bc45"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xcc0, 0x0, &(0x7f0000000040)="2b1c52ac82e71ea05b0c5e43ede4", 0x0, 0xb20c, 0x0, 0x0, 0xe8, 0x0, &(0x7f0000000280)="dd"}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x14, 0x80000, 0xfffffff8, &(0x7f0000000000)) r3 = openat$cgroup_ro(r2, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) close(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x16, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18000071105200a0320dccb36653a37f8a02ff4acd05000000950000000000000032974aeb"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) write$cgroup_int(r3, &(0x7f0000000000)=0x1, 0x12) 640.994373ms ago: executing program 1 (id=2773): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000005000000760000000000000027000000ffff00009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x23) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x3, 0x0, 0x3}], {0x95, 0x0, 0xc00}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x2d) 635.999414ms ago: executing program 2 (id=2774): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="130000000800000008"], 0x50) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000005000000b70000000000000095"], &(0x7f0000001080)='syzkaller\x00'}, 0x83) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r1}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="ef1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x2}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r9 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r8}, 0x8) write$cgroup_int(r9, &(0x7f00000001c0)=0x8700, 0xfffffdef) r10 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x140, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="00000000fb000000000000000000000000000000f4ed52", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r12) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYRES32=r2], 0x20) 560.710267ms ago: executing program 3 (id=2775): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) (async) mkdirat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x1ff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x12, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xffffffff}, {}, {}, [@alu={0x4, 0x0, 0xb, 0x0, 0x5, 0x6, 0x4}, @map_idx={0x18, 0xbaeebb34c455c17f}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000001c0)='GPL\x00', 0x6, 0x1b, &(0x7f0000000200)=""/27, 0x41100, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x5, 0x4, 0x6}, 0x10, 0x0, 0x0, 0x8, &(0x7f00000002c0)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000300)=[{0x4, 0x3, 0x4, 0x4}, {0x1, 0x5, 0x2, 0x3}, {0x0, 0x5, 0x6, 0x5}, {0x5, 0x4, 0x2, 0x1}, {0x4, 0x1ff, 0xc, 0x8}, {0x2, 0x2, 0x0, 0xc}, {0x4, 0x5, 0x8, 0x1}, {0x5, 0x3, 0x6, 0x5}], 0x10, 0x200}, 0x94) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_lsm={0x1d, 0x36, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3bfa847, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1ff}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}}}, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0x1, 0x5, 0x179}, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000880)={@fallback=r0, 0x8, 0x1, 0x9, &(0x7f0000000780)=[0x0], 0x1, 0x0, &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0], 0x0}, 0x40) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0x1, 0x58, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000008c0)={@ifindex=r6, r2, 0x27, 0x4, r3, @void, @value=r7, @void, @void, r5}, 0x20) (async) recvmsg$unix(r4, &(0x7f0000001000)={&(0x7f0000000a40), 0x6e, &(0x7f0000000f40)=[{&(0x7f0000000ac0)=""/35, 0x23}, {&(0x7f0000000b00)=""/4, 0x4}, {&(0x7f0000000b40)=""/124, 0x7c}, {&(0x7f0000000bc0)=""/9, 0x9}, {&(0x7f0000000c00)=""/209, 0xd1}, {&(0x7f0000000d00)=""/157, 0x9d}, {&(0x7f0000000dc0)=""/179, 0xb3}, {&(0x7f0000000e80)=""/134, 0x86}], 0x8, &(0x7f0000000fc0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0x40}, 0x20) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000001040)=0x1, 0x4) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) (async) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)={0x1b, 0x0, 0x0, 0x9, 0x0, r4, 0x101, '\x00', r6, r4, 0x2, 0x3, 0x3}, 0x50) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001340)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000015c0)={r4, 0x20, &(0x7f0000001580)={&(0x7f0000001400)=""/82, 0x52, 0x0, &(0x7f0000001480)=""/204, 0xcc}}, 0x10) (async) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001600)={0x1b, 0x0, 0x0, 0x2, 0x0, r4, 0xffffffff, '\x00', r6, 0xffffffffffffffff, 0x1, 0x4, 0x5}, 0x50) (async) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001680)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xfffff19d, '\x00', r6, 0xffffffffffffffff, 0x4, 0x9, 0x2}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001780)=@bpf_lsm={0x1d, 0x19, &(0x7f0000001100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ldst={0x3, 0x1, 0x3, 0x3, 0x0, 0x4, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001200)='GPL\x00', 0x1ff, 0xcf, &(0x7f0000001240)=""/207, 0x41000, 0xc, '\x00', r6, 0x1b, r10, 0x8, &(0x7f0000001380)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000013c0)={0x1, 0xb, 0x6, 0x2}, 0x10, r11, 0x0, 0x3, &(0x7f0000001700)=[r12, r4, r4, r4, r13, r4], &(0x7f0000001740)=[{0x3, 0x2, 0x3, 0x6}, {0x0, 0x3, 0x3, 0x2}, {0x5, 0x5, 0x1, 0x2}], 0x10, 0xfffffffa}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001880)={r8, r4, 0x0, 0x1, &(0x7f0000001840)='\x00'}, 0x30) write$cgroup_int(0xffffffffffffffff, &(0x7f00000018c0)=0x5, 0x12) close(r3) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000001900)=r7) (async) r14 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)=@o_path={&(0x7f0000001940)='./file0\x00', 0x0, 0x4004, r3}, 0x18) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000001b00)={r14, 0x0, 0x60, 0x0, &(0x7f00000019c0)="8e4e7bb854d4da75ac3ccab138fd0c37d14003b6f9ab4b7f84b939a575f3c329963bbcca403d4d33d54264e6e2dcdfd9c05827991f1f9518792ad5d4e81c254fc87d0a9b05d9854f8288f803353db2c2a5711b078279b88d0f342342ee5697d1", 0x0, 0xfffff800, 0x0, 0xa9, 0x0, &(0x7f0000001a40)="7a9decdd7bf90865e07ade0401056235f301d159f3c13bc51b5a5be9ef416f9ad4b504badb1f50a96fcc94277c83452c87d0668c363d12cf3e2c3de63cfa3bf5a0922e2039de7a36cbd34c9680f65d8a52086f246a7e92693ce33afba3dba2066a76216091cf6f62ae50f1f4fb4c85a1a73503c61bda070d7fd9722590fd291f97ecbcc6f8de0e0bc4bbba2ca5717b12dcca85d9e0ac3e15ff4a2ea1f8e2df676b5f52382ac9b5d58a", 0x0, 0x2, 0x0, 0x80}, 0x50) socketpair(0x2, 0x3, 0x800, &(0x7f0000001b80)) (async) r15 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001bc0)={0x1b, 0x0, 0x0, 0x5, 0x0, r9, 0x1, '\x00', r6, r10, 0x3, 0x0, 0x2}, 0x50) (async) r16 = bpf$ITER_CREATE(0x21, &(0x7f0000001c40)={r4}, 0x8) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001ec0)={{r13, 0xffffffffffffffff}, &(0x7f0000001e40), &(0x7f0000001e80)='%pB \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001f80)=@bpf_tracing={0x1a, 0xc, &(0x7f0000001c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x12}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r16}}, @cb_func={0x18, 0xa, 0x4, 0x0, 0x5}]}, &(0x7f0000001d00)='GPL\x00', 0x8, 0xdf, &(0x7f0000001d40)=""/223, 0x41100, 0x9, '\x00', r6, 0x19, r10, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xbf2, 0xffffffffffffffff, 0x4, &(0x7f0000001f00)=[r15, 0xffffffffffffffff, r12, r9, r12, r13, r9, r12, r9, r17], &(0x7f0000001f40)=[{0x4, 0x3, 0x6, 0x6}, {0x0, 0x5, 0x0, 0xc}, {0x1, 0x2, 0xb, 0x3}, {0x4, 0x3, 0x4, 0x4}], 0x10, 0x8}, 0x94) 559.758257ms ago: executing program 1 (id=2776): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x0, r0}, 0x18) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000740)=r1) close(r0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="bc00"], 0x50) ioctl$TUNGETVNETLE(r0, 0x40047451, &(0x7f0000000180)) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x14, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x65, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_fd={0x18, 0x9, 0x1, 0x0, r2}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x8}, @generic={0x3, 0x7, 0x8, 0x0, 0xffff91bf}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x1}}}, &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x22, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x5, 0xb8f, 0x40}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000002c0)=[r2, r2], &(0x7f0000000300)=[{0x1, 0x3, 0xf, 0x6}, {0x3, 0x3, 0xb}, {0x4, 0x1, 0xf, 0x6}, {0x0, 0x4, 0x10, 0x1}, {0x2, 0x3, 0x0, 0x1}], 0x10, 0x4}, 0x94) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_tracing={0x1a, 0xc, &(0x7f0000000440)=@raw=[@cb_func={0x18, 0x8, 0x4, 0x0, 0x4001}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x10}, @jmp={0x5, 0x1, 0x5, 0x8, 0x3, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa2e9}], &(0x7f00000004c0)='GPL\x00', 0x2, 0x65, &(0x7f0000000500)=""/101, 0x41000, 0x2c, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x41, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x17a3c, 0xffffffffffffffff, 0x4, &(0x7f00000005c0)=[r2, r2, r2, r2, r2, r2], &(0x7f0000000600)=[{0x1, 0x2, 0xe}, {0x3, 0x3, 0x5, 0x7}, {0x3, 0x2, 0x1, 0x9}, {0x2, 0x1, 0x3}], 0x10, 0x1ff}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000700)={0xffffffffffffffff, r3, 0x4, r4}, 0x10) 559.248867ms ago: executing program 4 (id=2777): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}, @printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="00000076a00000ca0841cdd658c3c4c57b2f00000000000000000000000000349db4a7e64d1d420c9020384d3977b2aecc260adcbfd96fc75b6ee274c4df01cf164f6621001340c7f83610f735af506baa18f9d10e5718905188cd415cde671db448655618a1156497313fe4adf928aae25c6372009097d48677b7aa5f87a50c45e454d152276429f7a615379b2a930c5cd858d354f06c45c8280709cbd43ce24bcf75a8d69c1a2ae538e6ad8d978f11559c6610ee04cae14e719c26917ddcf575260cd06222d52c895f2d0db1c2f15abfc0ef4b95cad2b5645723067f8a4b0ae0b5e41d61", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x8e20, 0xa2a}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x82, &(0x7f0000000440)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x4b, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x1f}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x24}, 0x94) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x8) (async) r5 = openat$cgroup_int(r4, &(0x7f0000000380)='cpuset.cpus\x00', 0x2, 0x0) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r6, 0x0, 0x50, 0x0, 0x0, 0x0, 0x8, 0x0, 0x63, 0x0, &(0x7f00000000c0)='\x00', 0x0, 0x2}, 0x48) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB='N,N'], 0x6a) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0xa, 0x2, 0x11, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000040)=@framed={{0x18, 0x7, 0x0, 0x0, 0x400000}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8000000}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00'}, 0x94) 546.178799ms ago: executing program 3 (id=2778): syz_clone(0x2000000, &(0x7f0000000000)="85a8948ebcd89608f0728e8de70e1bd59371c372f01d0343455325d327451b6a1a8fa1ba64b13b2f4b27ba2a0c2b0332a138c3700ee683a54b26a47b7d66aadf8123c01b08dcc98091d98df30fa31466c900cb0ccd301e735ed1b7c6d8300cff3545343a96c0600d7f73074e0b91cf9b602804b85d92ff466b82820a7932793cbb", 0x81, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="f26d2520716f92cc93bed2a8b23c0f3efdf698aa2d4be5424971fb2baf4401af7b70b3d49bc4fb3dae3ebaafcfe31222ae0b15db0d1d3df13e117c1ce9f7540283439f54679da6d5312e47b00c391fef8f5bec8371a1c1dd54a2e0") (async) r0 = syz_clone(0x2000000, &(0x7f0000000000)="85a8948ebcd89608f0728e8de70e1bd59371c372f01d0343455325d327451b6a1a8fa1ba64b13b2f4b27ba2a0c2b0332a138c3700ee683a54b26a47b7d66aadf8123c01b08dcc98091d98df30fa31466c900cb0ccd301e735ed1b7c6d8300cff3545343a96c0600d7f73074e0b91cf9b602804b85d92ff466b82820a7932793cbb", 0x81, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="f26d2520716f92cc93bed2a8b23c0f3efdf698aa2d4be5424971fb2baf4401af7b70b3d49bc4fb3dae3ebaafcfe31222ae0b15db0d1d3df13e117c1ce9f7540283439f54679da6d5312e47b00c391fef8f5bec8371a1c1dd54a2e0") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0x9, [@float={0xf, 0x0, 0x0, 0x10, 0x2}, @datasec={0xa, 0x3, 0x0, 0xf, 0x2, [{0x3, 0x9}, {0x3, 0x88b, 0x8}, {0x5, 0x6, 0x101}], 'dC'}, @float={0x7, 0x0, 0x0, 0x10, 0x2}, @datasec={0x2, 0x5, 0x0, 0xf, 0x2, [{0x1, 0x3, 0x3}, {0x2, 0xfb0, 0x59bd}, {0x4, 0x4}, {0x5, 0x6d}, {0x2, 0x8, 0x8}], 'k\f'}, @union={0x5, 0x4, 0x0, 0x5, 0x0, 0x5, [{0x2, 0x2, 0x8}, {0x0, 0x4, 0x4872d9f1}, {0x3, 0x3, 0xffff8001}, {0x5, 0x5}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0x4, 0x4}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5, 0x74}}]}, {0x0, [0x0, 0x5f, 0x0, 0x383406c8bb3562cb, 0x5f, 0x0, 0x5f]}}, &(0x7f00000003c0)=""/71, 0x125, 0x47, 0x0, 0x800}, 0x28) (async) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0x9, [@float={0xf, 0x0, 0x0, 0x10, 0x2}, @datasec={0xa, 0x3, 0x0, 0xf, 0x2, [{0x3, 0x9}, {0x3, 0x88b, 0x8}, {0x5, 0x6, 0x101}], 'dC'}, @float={0x7, 0x0, 0x0, 0x10, 0x2}, @datasec={0x2, 0x5, 0x0, 0xf, 0x2, [{0x1, 0x3, 0x3}, {0x2, 0xfb0, 0x59bd}, {0x4, 0x4}, {0x5, 0x6d}, {0x2, 0x8, 0x8}], 'k\f'}, @union={0x5, 0x4, 0x0, 0x5, 0x0, 0x5, [{0x2, 0x2, 0x8}, {0x0, 0x4, 0x4872d9f1}, {0x3, 0x3, 0xffff8001}, {0x5, 0x5}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0x4, 0x4}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x5, 0x74}}]}, {0x0, [0x0, 0x5f, 0x0, 0x383406c8bb3562cb, 0x5f, 0x0, 0x5f]}}, &(0x7f00000003c0)=""/71, 0x125, 0x47, 0x0, 0x800}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x8, 0xfffffff7, 0x10000, 0x1000, 0x606c, 0x1, 0x7ff, '\x00', r2, r3, 0x2, 0x5, 0x2}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000500)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0x4) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000580)=r7, 0x4) perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0xc, 0xec, 0x9, 0x9, 0x0, 0x0, 0x6000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0xc}, 0x100843, 0x1, 0x0, 0x1, 0x8000000000000001, 0x5, 0x7, 0x0, 0x0, 0x0, 0x8}, r0, 0xb, 0xffffffffffffffff, 0x9) (async) r8 = perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0xc, 0xec, 0x9, 0x9, 0x0, 0x0, 0x6000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000640), 0xc}, 0x100843, 0x1, 0x0, 0x1, 0x8000000000000001, 0x5, 0x7, 0x0, 0x0, 0x0, 0x8}, r0, 0xb, 0xffffffffffffffff, 0x9) r9 = perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x40, 0x5, 0xa4, 0x7, 0x0, 0xfffffffffffffffb, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffff7, 0x1, @perf_config_ext={0xd, 0x7ff}, 0x100, 0x9, 0x3, 0x1, 0x7ff, 0x8001, 0xf, 0x0, 0x101, 0x0, 0x5}, r0, 0xe, r8, 0x2) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x80, 0x80, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x4}}, @typedef={0x6}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x4, 0x2}, {0x6, 0x4}]}, @decl_tag={0x5, 0x0, 0x0, 0x11, 0x4}, @typedef={0x9, 0x0, 0x0, 0x8, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x47, 0x0, 0xa}, @func={0xc, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x5f, 0x0, 0x30, 0x5f, 0x61, 0x0]}}, &(0x7f0000000900)=""/94, 0xa0, 0x5e, 0x1, 0x10001}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x19, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @ldst={0x3, 0x2, 0x4, 0x5, 0x1, 0x40, 0x8}]}, &(0x7f0000000800)='GPL\x00', 0xffff5005, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f00000009c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000a00)={0x3, 0xf, 0x7fffffff, 0x3}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000a40)=[r4], &(0x7f0000000a80)=[{0x4, 0x3, 0x5, 0x5}, {0x5, 0x2, 0xa, 0x9}, {0x4, 0x3, 0x8, 0x8}, {0x4, 0x5, 0x3, 0x3}, {0x4, 0x2, 0xe, 0x8}, {0x4, 0x3, 0x1, 0x7}, {0x0, 0x2, 0x7, 0x9}], 0x10, 0x54}, 0x94) (async) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x19, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @ldst={0x3, 0x2, 0x4, 0x5, 0x1, 0x40, 0x8}]}, &(0x7f0000000800)='GPL\x00', 0xffff5005, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x25, r10, 0x8, &(0x7f00000009c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000a00)={0x3, 0xf, 0x7fffffff, 0x3}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000a40)=[r4], &(0x7f0000000a80)=[{0x4, 0x3, 0x5, 0x5}, {0x5, 0x2, 0xa, 0x9}, {0x4, 0x3, 0x8, 0x8}, {0x4, 0x5, 0x3, 0x3}, {0x4, 0x2, 0xe, 0x8}, {0x4, 0x3, 0x1, 0x7}, {0x0, 0x2, 0x7, 0x9}], 0x10, 0x54}, 0x94) perf_event_open(&(0x7f0000000c80)={0x1, 0x80, 0x5, 0xec, 0x9, 0x6, 0x0, 0xa9, 0x20000, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x10, 0x5b8d}, 0x0, 0x0, 0x40, 0x6, 0xc624, 0xffffff01, 0x7, 0x0, 0x8, 0x0, 0x7}, r0, 0x6, r8, 0x2) (async) r12 = perf_event_open(&(0x7f0000000c80)={0x1, 0x80, 0x5, 0xec, 0x9, 0x6, 0x0, 0xa9, 0x20000, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x10, 0x5b8d}, 0x0, 0x0, 0x40, 0x6, 0xc624, 0xffffff01, 0x7, 0x0, 0x8, 0x0, 0x7}, r0, 0x6, r8, 0x2) r13 = perf_event_open(&(0x7f0000000c00)={0x2, 0x80, 0x9, 0x8, 0xff, 0x2, 0x0, 0x5, 0x40040, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000bc0)}, 0x4000, 0x4, 0xa22d, 0x5, 0x15e, 0x4, 0x163, 0x0, 0x4, 0x0, 0x3}, 0xffffffffffffffff, 0x4, r12, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000f40)={r7, 0x0, 0x32, 0xba, &(0x7f0000000d00)="2a54d93abda967a18e41ac58d9f816a00a1a07c04067d367a9b7d11c9e8a96d6f03b2a3553fedd54d6c0b568a88ed0bf350f", &(0x7f0000000d40)=""/186, 0x200, 0x0, 0xa1, 0x71, &(0x7f0000000e00)="afa4f3aff69c9163f74568e6a966f121eab41cb031d1c9d5420a62827e8efd09b5bfe618882249f940bd3879f7b2bfdf3b791b5e8cd2589a4b75f72ca9db573604e5811de69603a886c46401eff97ada3611624a74c8e5ef2081cf6d08cd3456e2a06b3df162cef996af7e1bc10f062fcf0617ea083939f8bfdafe18040c140828589287ca7d315e2639e243d3bcc7c07c005f8d994b2a39b8baae1cbdc6679043", &(0x7f0000000ec0)="f8858e45f4aebbb7697ceae29cdac61d1997db1495b84aec4e0015e9e7d9afc9f672629c424d9412bb732c0799eafb10e3742d68a6e154cd507a843460be7dce7097ad01187855dabc6046cc0ea34c7c80e8171f24b40ecd4232cfeb6b6a1b6cb6cf34081c7c67f046cb121844eb5d9149", 0x0, 0x0, 0x4}, 0x50) ioctl$PERF_EVENT_IOC_ID(r13, 0x80082407, &(0x7f0000000fc0)) r14 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000020c0), 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000003100)=@o_path={&(0x7f0000002100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x4000}, 0x18) (async) r15 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000003100)=@o_path={&(0x7f0000002100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003180)=@bpf_ext={0x1c, 0x1, &(0x7f0000001000)=@raw=[@generic={0x3, 0x8, 0x7, 0x8000, 0x2}], &(0x7f0000001040)='syzkaller\x00', 0x49, 0x1000, &(0x7f0000001080)=""/4096, 0x41000, 0x60, '\x00', r2, 0x0, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002080)={0x0, 0x3, 0x1, 0xfffff346}, 0x10, 0x1ca37, r14, 0x0, &(0x7f0000003140)=[r6, r4, r15, r4], 0x0, 0x10, 0x4}, 0x94) ioctl$TUNSETNOCSUM(r11, 0x400454c8, 0x1) r16 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000003240)={r1, 0xe, 0x8}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000003280)={r11, r16}, 0xc) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000003280)={r11, r16}, 0xc) r17 = bpf$MAP_CREATE(0x0, &(0x7f00000032c0)=@base={0x1c, 0x5446, 0x3, 0x7, 0x22000, 0x1, 0x8, '\x00', r2, r10, 0x5, 0x2}, 0x50) close(r6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003640)={0x18, 0x1e, &(0x7f0000003340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xf05a}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @call={0x85, 0x0, 0x0, 0x67}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r17}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10001}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @generic={0x6, 0x9, 0x2, 0xdced, 0x8}, @alu={0x4, 0x1, 0x7, 0x7, 0xa, 0x1, 0x10}, @tail_call, @jmp={0x5, 0x0, 0xa, 0x3, 0x4, 0x20, 0xfffffffffffffff6}]}, &(0x7f0000003440)='syzkaller\x00', 0x80000001, 0xd5, &(0x7f0000003480)=""/213, 0x41000, 0x3c, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000003580)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000035c0)={0x4, 0x1, 0x4, 0x80000000}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000003600)=[{0x1, 0x2, 0xf, 0x9}, {0x3, 0x3, 0x4, 0xc}, {0x1, 0x5, 0x5, 0xb}, {0x1, 0x5, 0xc, 0x1}], 0x10, 0xffffff00}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003640)={0x18, 0x1e, &(0x7f0000003340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xf05a}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @call={0x85, 0x0, 0x0, 0x67}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r17}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10001}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @generic={0x6, 0x9, 0x2, 0xdced, 0x8}, @alu={0x4, 0x1, 0x7, 0x7, 0xa, 0x1, 0x10}, @tail_call, @jmp={0x5, 0x0, 0xa, 0x3, 0x4, 0x20, 0xfffffffffffffff6}]}, &(0x7f0000003440)='syzkaller\x00', 0x80000001, 0xd5, &(0x7f0000003480)=""/213, 0x41000, 0x3c, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000003580)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000035c0)={0x4, 0x1, 0x4, 0x80000000}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000003600)=[{0x1, 0x2, 0xf, 0x9}, {0x3, 0x3, 0x4, 0xc}, {0x1, 0x5, 0x5, 0xb}, {0x1, 0x5, 0xc, 0x1}], 0x10, 0xffffff00}, 0x94) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003900), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003b80)=@bpf_ext={0x1c, 0x2, &(0x7f00000039c0)=@raw=[@map_fd={0x18, 0xa, 0x1, 0x0, r4}], &(0x7f0000003a00)='syzkaller\x00', 0xf, 0x2, &(0x7f0000003a40)=""/2, 0x40f00, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000003a80)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x2d39, 0xffffffffffffffff, 0x6, &(0x7f0000003ac0)=[r16, r4, r15, r9, r15, r15, r15, r15], &(0x7f0000003b00)=[{0x0, 0x3, 0xd, 0xc}, {0x0, 0x4, 0x2, 0xb}, {0x1, 0x4, 0x5, 0x5}, {0x1, 0x5, 0xb, 0x6}, {0x3, 0x1, 0x3, 0x4}, {0x0, 0x4, 0xa, 0x6}], 0x10, 0x9}, 0x94) (async) r19 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003b80)=@bpf_ext={0x1c, 0x2, &(0x7f00000039c0)=@raw=[@map_fd={0x18, 0xa, 0x1, 0x0, r4}], &(0x7f0000003a00)='syzkaller\x00', 0xf, 0x2, &(0x7f0000003a40)=""/2, 0x40f00, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000003a80)={0x5, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x2d39, 0xffffffffffffffff, 0x6, &(0x7f0000003ac0)=[r16, r4, r15, r9, r15, r15, r15, r15], &(0x7f0000003b00)=[{0x0, 0x3, 0xd, 0xc}, {0x0, 0x4, 0x2, 0xb}, {0x1, 0x4, 0x5, 0x5}, {0x1, 0x5, 0xb, 0x6}, {0x3, 0x1, 0x3, 0x4}, {0x0, 0x4, 0xa, 0x6}], 0x10, 0x9}, 0x94) r20 = bpf$ITER_CREATE(0x21, &(0x7f0000003c40), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000003d40)={0xe, 0x15, &(0x7f0000003700)=@raw=[@map_idx={0x18, 0x5}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @alu={0x4, 0x1, 0x4, 0x15d807aee6c3216f, 0xb, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x1, 0xa, 0x8, 0xffffffffffffffe0, 0x10}, @map_idx={0x18, 0xb}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r16}}], &(0x7f00000037c0)='syzkaller\x00', 0x1e, 0xdf, &(0x7f0000003800)=""/223, 0x40f00, 0xe, '\x00', r2, @fallback=0xd, r18, 0x8, &(0x7f0000003940)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000003980)={0x0, 0x1, 0x5, 0x8}, 0x10, 0x0, r19, 0x7, &(0x7f0000003c80)=[r17, r20, r17], &(0x7f0000003cc0)=[{0x2, 0x5, 0x9, 0x8}, {0x3, 0x5, 0x9, 0x7}, {0x1, 0x4, 0x3, 0xf}, {0x1, 0x5, 0xa, 0xc}, {0x3, 0x1, 0xb, 0x1}, {0x1, 0x3, 0x3, 0xa}, {0x2, 0x5, 0xc, 0xb}]}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000004000)={0x6, 0x14, &(0x7f0000003e00)=@raw=[@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x8000}, @map_val={0x18, 0x2, 0x2, 0x0, r20, 0x0, 0x0, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @ldst={0x2, 0x1, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r20}}], &(0x7f0000003ec0)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, 0x25, r18, 0x8, &(0x7f0000003f00)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000003f40)={0x1, 0x3, 0x6, 0x1b}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000003f80)=[{0x1, 0x1, 0xe, 0xf}, {0x2, 0x2, 0xe, 0xc}, {0x2, 0x4, 0x10, 0x3b892ccb476ff61c}, {0x3, 0x5, 0x7, 0x1}, {0x5, 0x5, 0xf, 0x5}, {0x3, 0x4, 0x2, 0xb}], 0x10, 0x8}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004240)={0x18, 0xd, &(0x7f00000040c0)=@raw=[@cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffff8}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @ldst={0x3, 0x2, 0x3, 0x2, 0x5, 0x0, 0x1}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x2}], &(0x7f0000004140)='GPL\x00', 0x400, 0x32, &(0x7f0000004180)=""/50, 0x40f00, 0x0, '\x00', r2, 0x0, r18, 0x8, &(0x7f00000041c0)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004200)=[r17], 0x0, 0x10, 0x8}, 0x94) 470.953071ms ago: executing program 1 (id=2779): close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1224, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1224, 0x0, 0x0, 0x1, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) (async) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1c, &(0x7f0000000100)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2, 0x20}, {0x3, 0x3, 0x6, 0xa, 0xa, 0xfff0, 0xf1}, {0x7, 0x1, 0x2, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r0, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000500), 0x8) (async) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000500), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r1, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x27, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0xc4, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x13, 0x9, &(0x7f0000000040)=@raw=[@generic={0x1, 0x9, 0x7, 0x4, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8833, 0x0, 0x0, 0x0, 0x9}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xb146, 0x0, 0x0, 0x0, 0xfffffff2}, @call={0x85, 0x0, 0x0, 0x42}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7b17, 0x0, 0x0, 0x0, 0xfffffeff}], &(0x7f0000000200)='GPL\x00', 0x8099, 0x7, &(0x7f0000000380)=""/7, 0x40f00, 0x4, '\x00', r7, @fallback=0x16, r8, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r9, r6, 0x6, &(0x7f0000000b00)=[r5], &(0x7f0000000b40)=[{0x0, 0x3, 0x6, 0xc}, {0x4, 0x5, 0xa, 0x1}, {0x2, 0x5, 0x4, 0x6}, {0x5, 0x5, 0x1, 0x3}, {0x1, 0x5, 0x4, 0x5}, {0x4, 0x5, 0x4, 0xa}], 0x10, 0xaf6}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 415.142891ms ago: executing program 4 (id=2780): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xe, &(0x7f0000001440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000240)=""/4096}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) (async) socketpair(0x1e, 0x1, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x9, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000001000000000000000000000071182b000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) close(0xffffffffffffffff) close(0xffffffffffffffff) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e0000000900000003", @ANYBLOB], 0x48) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x24}, 0x94) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xe5884, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x2}, 0x8020, 0x4, 0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x10000009, 0xffffffffffffffff, 0x7) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 352.976361ms ago: executing program 3 (id=2781): r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x9000, 0x5, 0x0, 0x4, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000011c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000000000000", @ANYRES32, @ANYBLOB="000000000000009aae9b040e023352", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f0000000040), &(0x7f0000000080)=r2}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x2000300, 0xe, 0x0, &(0x7f0000000000)="63eced8e46dc3f0adf3389f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001000)=r3, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8941, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001680)={{r5}, &(0x7f0000001600), &(0x7f0000001640)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000680)={r6}, 0xc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000440)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x6c, 0x76}, [@call={0x27, 0x0, 0x0, 0x40000000}]}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff6c, 0x10, 0x0, 0xfffffffffffffed8}, 0x23) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r7, 0xffffffffffffffff}, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r9, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000680)="76389e6a65585578f830e9000000", 0x0, 0x10001, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYRESOCT=r8, @ANYRES32=0x0, @ANYRESHEX=r0, @ANYBLOB="000000000000000000008100"/26], 0x50) 351.345192ms ago: executing program 4 (id=2782): r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_type(r1, &(0x7f0000000100), 0x2, 0x0) write$cgroup_type(r2, &(0x7f0000000280), 0x9) r3 = openat$cgroup_procs(r1, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000c40), 0x12) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000140), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000009d000000f9ff00000900000001"], 0x50) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x90412, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x34, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x8002, 0x2, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa8}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x80) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8946, &(0x7f0000000080)) (async) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000040)={0x1}, 0x8) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) 171.012522ms ago: executing program 4 (id=2783): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 136.306067ms ago: executing program 1 (id=2784): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000001d711873000000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x3, 0x18}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x58, &(0x7f0000000180)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000a70085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000400000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 41.073513ms ago: executing program 1 (id=2785): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xfe123, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0xd, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) syz_clone(0x410e6080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r8 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x40100, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb8, 0x5, 0x0, 0x0, 0x0, 0x5, 0x80420, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_config_ext={0x100000000040, 0x9}, 0x300, 0x103, 0x200000, 0x2, 0x29a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffc000000000, 0xffffffffffffffff, 0x2) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r7) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000001600)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf200000000000002600020007ffffffbd0310000000000095002000000000006916000000000000bf6700000000000004070000b964b01a4607feff00200000540700000ee61e00bf150000000000000f5700000000000065070000d23700002c030000000000001f75000000000000bf54000000000000070000000400f9ffad430100000000007c000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c4ed68ecf264e0f84f9f17d3c30e3c7bdd2d17f2f175455000078af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd390700000500000000f18c30907d7bee45a0100000fe9de56c9d05000000c6c60bef0d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cac3f1d5af65727546e7c955ccefa1f6ab689ffffff7f63ede202fa4e0a2127b8b83c71a51445dc8dfd13ff15f852a39e5b2ab7bcb8f512036a5ba6d04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916fcecc8158f0200000000c8fb735fd552bdc268694aeb0743e326c819b6cf5c8ac86f8a297dff0445a13d0045fb3cda30a673a6037ed8c85f21ec2c081bdce431e56723888fb126a19bc1172b84b3ebe174aba210d739a018f9bbec63222d20cecac4d03723f1c921b5bbf7949632cacfdd32b3a6aa57f1ad2e99e0e67a993716dbf580469f0f53acbb400001e3738270b315d362ed834f2af97787f696649a462e7e090000000000000045eac1f2014f720e83b7838e3eede14308d582685e1becd6f35154bcb4000000000000000000000000000000bc3af2b170ad3e2b26539cebca8f4ddc211bc3ccf0bd9d42ca019dd5d022cf74686e9fbe2562979eaed840a7afaab43176e65ec1118d46d1e827f3472f4445d353887a5ad103649afa1769080584f800031e03a651bb04000000ab04871bc47287cd31cc43ea0ffb567b4040c1458d0320ce7d0000413a0000000000000000005f37983f84e98a523d80bd56a57fa82b82f639601ae899a559944cb9a62a29ab028acfc1cb26a0f6a5480a55d624a0c544ba0dc828c22fe30000aa391598000000437d57fcf8295f63a70837f5cd4e5e77964522dc7ca3aa3476b7f2d851d27fd4de6eabb43e0799dc8d9fb7dc6c523ffbd74a6a40e4acb1ac872ade9d1f2ab779b8dbe843aeeda0426c767c00327b8c95b2bb6ddb55117669d9598c0f3598073f3a921c76beceff7e4fbf909a2cabf5b8ea5011db9020823b83abe54346c7af0a99fa077ffe7000feb9e44023a1749eb1d0d572b77d6e0d0fcd74031c8ef2629f5ecff4626746d6abe98a255e92c3c4f79bfcd0d91741380000cfeb73dec68ed56b5d3dfdf0cb8b71ad79000000000000000000000000000000dd434a25e95d0ec29d3adaccf89d0888031ecdfdb4dfbe444673be099ece7e4009c76c7108ef0a7e59fd6d906fbc3c9b412e0478cfee4485f423c63f49db43833c92eeeb647cebd4d7a93a17bcbb6bae5ff876375d4fe39cc2d292691672cc18ca372104ceb83a35ecedd97fc191d8f64d2b1d60c6d12911aada66c26aa4802c3514c3d92ec905000000b13f4a2575fbe943a6c40000000000000000000000000000028026b80c3899543223a6079ee96198b9a326db3be3a48af415ca28ca68c502550044ed8e29af8d763ef9b1f31befcad2ce5394601c7cdc233bff7f0000000000009fb3ad650f77e339768924dfdbeead13b88371154d743544a6091ec93e0d3fd5b4dc42911c1ba322fd4d6fbf19e617d51f964727bfd5cc5ba15370f6e1141d2271eded0b15e4316a1e4623272beb249a0928c417720be14c898f397411c88a7bcf3df46ab3efe7cd5e160c2afd3cc945f75011a102d952c7ad17a58d9be691c334ea35bae71e76e160cc2260bd028162917807ce89e11b5f261052ee0dde18efa1d802af2b7bcf6f8af41933cea0d0343261bccf64ca1c81045153eafbefdb91fbdff9ee3307d4a1837963b2dc2a3698d90e7915b098f19392e792adaea86052f4e948184001b6494e906925a092483adc7e9c8f7a29d226763c100aecae7f00619c36bceb9fb6dd7e55487d8485e498fdfc377fd3d266d21d46ab2f6b2ce22cd0aebba9b0ffbfe8ec3143c3734967c90b16ebbeeae1ce2baaae05aed6bf0f40c8a323f9235dc99698bd0b800067a901a79daada03cc77e74feb98b1586946b452764ff917a8ecc10e529c5bea49cad70e22df522c2803b6ef65df70223c6e22c3433e322d8dbd6e9b040065a9d6b3d5ae276cffe935d559bea88e1aa36b4e6c19e78457904297e77370e013b705a96548d47c609a93c45f4d1382b39c05dcc07d5b49ad75ddb3ce5b5b9416e03995da04647aa5e6fc1a6f5d663380967ccef9de49a90ced031335e3219ebd9d06c257a50497ec523f5ff7361261ccfe239d603364a42e2e81fc068fcbb9792b673827fe7018a988fbce55bb74cdb327ced4b77b8743fb3cb72cc280b9f62e4f92f46a19600b802cba88b7d0a938d9e0e6cfe5d66b874c9a0c6c04b96360d6f499d004179e5b6025c0e1050faec7ecd9de190a975db2f8c06a551236278c4766d7e22e3b85168c9851de6266c791252f919b4f8b257b5a786734e5142e4666c67aef5b7b2f88c6640995434aa8636993089c73f196c54ae829ad4307132655b075ae534fa7f1ea9a17e62357b0bd2bd1d62d34bfc1364640250136729ba4f763ff25c33e8acc806611792add8254e705fefd2a44d5b15e3b36f6b75c97c9c04c511d8cf9e24c61c8284a913a381cb1a5628878040000000000000017b68afd95d4abf7920de9ebe1c89661f4adc3d83d72b1b778e30c2bf2efbbcd054cf51f4205ebf9a98a0d9f18135cb1d8d567c3436fa697b72c3b0200000000000079c0b3339debc78352b2e65299223d7ef2bd540e78167b3ac92a4c4f826f6d0e5c4ebf4f7a70c03e2f5ddbebf168586360c3663531eb5995d228f011a10ffc8b17d716b0c528dab6d0c4fe2ee402348104bc5d4012babedee898c6d3e1017be2e9bc759d3ab4d615f5000000000000000000000000000000000000000000007fff0000000000e693e314adf7dc9f517d04f1e6ca367d30d31d3647c6059db6e1e9529eb1623ef99e2d9ac2ab4872f8e784b07a31110bef6d000000a6f9e89e6d50ee06ce716f94da60f1f22d9669560d296287c13c92070000ee7553eb2df17839542fa88d09f000e88a90cf4406b9000000000000000000000000f441d6a6f516c235c6f5863e7f454ee0e16b9aa2593eb31fa3836703e7765aaeb77a8770e518efaa6d3dd85e03b3b133eb749057cea9af75a0e6f633532f2891b8e263cb6eecea691842827bc7c8c0130187081c8d320642389f5f0c42dba0ff68e84d7b130906f17f6aa075a257310f2d92cb1d1e16468949f5675262ee318e735930b01d8f586e34537bcff7d6196f494cdcf3a712078d745db0f5687a78ee6d000b3d171a0f08299b52d207f32e9da311ca090000003a42732808515eec574f892622c5be497fc3d9ca122d7c18b9e54637812c8debc61f0e42d838e44a819b74bce1a56108bb0fde97a02475920532309c55b2c9ae9f281391ec5cc72a5e94cca1cbf1ff01000000000000bdb537a0c52bd45a9f966c25616cec30c3ea3246cb8e6aac7cf273638e6656a3e4ccadc348f0172028c99cc5f6d5c6d09ed65aa54549e73c28b7c8ad06ad3c5e3c27eec0eff1a6c84f1189919eefcee807fc081e004ffb7d3104af00ac92f1080211c4bee74381a0e31021918f27863fdbafb50f70857d52a1f7df51935a80b1980a4778d35f183ea517f55a98095305701ab3f3ae43f06e91bc7d85e3800b46926944fba9805a985e63e53a62232fcd3f01dbe1728f300e247a7ebe344f9749818ff3961b2a42664ccd680a90bbb6ab400e286acc8f9febef64594777f848ed1cf980a3da2f0f7745760a05887d0c28060d613dd6539d392fc21fee0b5131609664b821d7a994e6c5965a4fa1ec1790c54e54586907dcc5e8bac16e79da9c2444420900000000000000f888a94365b99b72796fca1b922fc9aefaf1546c17cbb1d2d2fd12cb1a49cad501a3ca218c595b667b634606c57987ebfb0783a4948e4561d5cda158fe74453ff4a837beeedba483842c57d6005b544b4f80003386edfd3d4a88a667bd41eefe0d808abed08a29e6bc370a80cc0366fb4080bfbaaa946fd47ab662c794846e403950bbc3a48bb276cbb08a8eab145c06221ef16a238e3d50ad18aea9a2cec97d3c2d0569caabe2bffe02506bc9cb7294c5d020536dd5e7a6351642112df3b55d0215aaec7e45598995e79699e47567e353e68b03f82be860b188554b734e1192f9c1a867b815ef52cdc3307c0cc9be05a40fde69c350e59f11f1d26a4d04d8c8b2c4a4d23ec931d14bc7807db773a614b670acf46f83f7c65a0f8d43c5f64705f0d27c46d4b686e867e9b0be76a7978a8f962bb5a070df97f2bf7612115cfe5ebdc7ad0bc5a5f3ace25347d0e5c347279d55aa67a967380000000000000000000000000000000000000000000000ed0942d980c754c6c69ef65c375ad018824f78b260d5f51bc3feba504408a8c8141d84f3f417603b5081680f346ff0ffbe4ae19e936511966965ce268b6345a0001c0f26a32e0a999fc869292e939dcf89b9bfd794f9c12d41959a00688cca43015a9eec58f647796adea520cd2abeb0b55c22949d10e5a05fee4543fdc1e02554a55b5fef2427a6e5708edc38fac53c2f961945a3f83cdf01979939b49bc6b1aef8c733401bbe473de8d64efbe0d123739f387d1c0d9e74f2175c174ada1678c7db79492e8dd0f34e2ccf419cf7f14ffa408b50a52685b36aed14aa22ad928191d5a2697646edc52a1c0c5d720ae690add2b34aed161f51cc1cb424f76098e1e1921e5a405f9d298a8461f2da30e47b7c6ed7c95c84c745f58723e4cddffae3b53b5b947f9435e589f9ae55b30ecd3827b2de5df31976870823da8058c2538c04e397f3d0ef90c11c74da984fa558697ecb57224ce8fa6f79aadbd7dbf3678e74d790bc2ee72769a3ada1dd504f8e4133ce1effd446bc9a2f139e65cc4bd83912af3122352506c7c2191b3705116b2f4fc20d4e93882bdd6ccea97f3a08d3565b0000000000000000000000000000d35fb97c2d7a9374294dcec3da3df9a13c4fc63b00426682534d894caee0b963a3"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe50}, 0x48) 40.480193ms ago: executing program 4 (id=2786): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611050000000000073586786a5644620019e000000000095"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85}, 0x52) 14.966218ms ago: executing program 3 (id=2787): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0xc8, 0x0, 0x3, 0x0, 0x0, 0x6341, 0x0, 0xfffffffe, 0x0, 0xffffffffffffffff}, 0x0, 0xa, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0xd040, 0x10000}, 0x0, 0x10000, 0x0, 0x5, 0x582, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f00000001c0)) perf_event_open$cgroup(&(0x7f0000000540)={0xc70ba5b4788642d3, 0x80, 0xf, 0x4, 0x0, 0x2, 0x0, 0x8, 0x12008, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x1, 0x5}, 0x11000, 0x6, 0x4, 0x7, 0x9, 0x7, 0x1, 0x0, 0xe, 0x0, 0x9}, r5, 0x0, r5, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x12, 0x4, &(0x7f0000000f80)=ANY=[@ANYBLOB="b40900000000000079100000000000000000000095000500000000000924a7106b1767f5e42e2ae91ca6428820486acb6d09286fd01429e4026c691cd2f207f94bd688588767ba25361f134c39ce999b3c7b86d6044bd6faf701cd3a52b4bffe5e4fae93a26428990e2de9a4719a4b90bf9b71f1a1", @ANYRESHEX], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x34, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000080)={0xfffffffe}, 0x10, 0x0, r5, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0xc8b, 0x88, &(0x7f00000004c0)=""/136, 0x41000, 0x20, '\x00', r6, 0x0, r7, 0x8, &(0x7f00000005c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x5, 0xffff, 0x5}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000100)=[{0x7, 0x3, 0xe, 0xf}, {0x2, 0x4, 0xd, 0x3}]}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x2e0, 0x12c, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) 0s ago: executing program 4 (id=2788): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8991, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5 [ 95.895290][ T2852] __dump_stack+0x21/0x24 [ 95.899677][ T2852] dump_stack_lvl+0x110/0x170 [ 95.904392][ T2852] ? __cfi_dump_stack_lvl+0x8/0x8 [ 95.909543][ T2852] dump_stack+0x15/0x24 [ 95.913741][ T2852] should_fail_ex+0x3d4/0x520 [ 95.918640][ T2852] __should_failslab+0xac/0xf0 [ 95.923614][ T2852] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 95.929469][ T2852] should_failslab+0x9/0x20 [ 95.934016][ T2852] __kmem_cache_alloc_node+0x3d/0x2c0 [ 95.939453][ T2852] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 95.945203][ T2852] kmalloc_trace+0x29/0xb0 [ 95.949652][ T2852] selinux_sk_alloc_security+0x7e/0x1a0 [ 95.955228][ T2852] security_sk_alloc+0x83/0xb0 [ 95.960026][ T2852] sk_prot_alloc+0x108/0x320 [ 95.964650][ T2852] sk_alloc+0x3b/0x460 [ 95.968744][ T2852] ? __kasan_check_write+0x14/0x20 [ 95.973869][ T2852] bpf_prog_test_run_skb+0x375/0x12c0 [ 95.979274][ T2852] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 95.985452][ T2852] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 95.991286][ T2852] bpf_prog_test_run+0x3e3/0x640 [ 95.996256][ T2852] ? bpf_prog_query+0x270/0x270 [ 96.001150][ T2852] ? selinux_bpf+0xce/0xf0 [ 96.005694][ T2852] ? security_bpf+0x93/0xb0 [ 96.010337][ T2852] __sys_bpf+0x5ee/0x850 [ 96.014617][ T2852] ? bpf_link_show_fdinfo+0x330/0x330 [ 96.020023][ T2852] ? mutex_lock+0x8/0x1b0 [ 96.024414][ T2852] ? irqentry_exit+0x37/0x40 [ 96.029197][ T2852] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 96.035016][ T2852] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 96.041181][ T2852] __x64_sys_bpf+0x7c/0x90 [ 96.045611][ T2852] x64_sys_call+0x488/0x9a0 [ 96.050116][ T2852] do_syscall_64+0x4c/0xa0 [ 96.054540][ T2852] ? clear_bhb_loop+0x30/0x80 [ 96.059218][ T2852] ? clear_bhb_loop+0x30/0x80 [ 96.063895][ T2852] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 96.069784][ T2852] RIP: 0033:0x7f018779c819 [ 96.074198][ T2852] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 96.094068][ T2852] RSP: 002b:00007f018859f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 96.102507][ T2852] RAX: ffffffffffffffda RBX: 00007f0187a15fa0 RCX: 00007f018779c819 [ 96.110485][ T2852] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 96.118454][ T2852] RBP: 00007f018859f090 R08: 0000000000000000 R09: 0000000000000000 [ 96.126424][ T2852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.134573][ T2852] R13: 00007f0187a16038 R14: 00007f0187a15fa0 R15: 00007ffd474c9928 [ 96.142555][ T2852] [ 96.338039][ T2477] syz.0.669 (2477) used greatest stack depth: 15712 bytes left [ 96.412253][ T2873] device syzkaller0 entered promiscuous mode [ 96.425132][ T2879] FAULT_INJECTION: forcing a failure. [ 96.425132][ T2879] name failslab, interval 1, probability 0, space 0, times 0 [ 96.523673][ T2879] CPU: 0 PID: 2879 Comm: syz.4.792 Not tainted syzkaller #0 [ 96.531026][ T2879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 96.541194][ T2879] Call Trace: [ 96.544495][ T2879] [ 96.547445][ T2879] __dump_stack+0x21/0x24 [ 96.551810][ T2879] dump_stack_lvl+0x110/0x170 [ 96.556529][ T2879] ? __cfi_dump_stack_lvl+0x8/0x8 [ 96.561675][ T2879] ? __kasan_check_write+0x14/0x20 [ 96.566825][ T2879] dump_stack+0x15/0x24 [ 96.571020][ T2879] should_fail_ex+0x3d4/0x520 [ 96.575717][ T2879] __should_failslab+0xac/0xf0 [ 96.580646][ T2879] should_failslab+0x9/0x20 [ 96.585183][ T2879] kmem_cache_alloc_node+0x42/0x340 [ 96.590410][ T2879] ? __alloc_skb+0xea/0x4b0 [ 96.594936][ T2879] __alloc_skb+0xea/0x4b0 [ 96.599439][ T2879] alloc_skb_with_frags+0xa8/0x620 [ 96.604823][ T2879] ? 0xffffffffa0003dec [ 96.609023][ T2879] sock_alloc_send_pskb+0x87f/0x9a0 [ 96.614259][ T2879] ? __cfi_sock_alloc_send_pskb+0x10/0x10 [ 96.620271][ T2879] ? stack_trace_save+0xa6/0xf0 [ 96.625165][ T2879] ? iov_iter_advance+0x98/0x1b0 [ 96.630136][ T2879] tun_get_user+0xa63/0x3470 [ 96.634746][ T2879] ? _parse_integer+0x2a/0x40 [ 96.639470][ T2879] ? tun_do_read+0x1cf0/0x1cf0 [ 96.644247][ T2879] ? __kasan_check_write+0x14/0x20 [ 96.649524][ T2879] ? ref_tracker_alloc+0x31d/0x4a0 [ 96.654673][ T2879] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 96.660178][ T2879] ? avc_policy_seqno+0x1b/0x70 [ 96.665198][ T2879] ? selinux_file_permission+0x2a5/0x510 [ 96.670866][ T2879] tun_chr_write_iter+0x1fb/0x300 [ 96.675918][ T2879] vfs_write+0x603/0xce0 [ 96.680183][ T2879] ? __cfi_vfs_write+0x10/0x10 [ 96.684960][ T2879] ? __fget_files+0x2d5/0x330 [ 96.689655][ T2879] ? __fdget_pos+0x1f2/0x380 [ 96.694424][ T2879] ? ksys_write+0x71/0x250 [ 96.698847][ T2879] ksys_write+0x149/0x250 [ 96.703187][ T2879] ? __cfi_ksys_write+0x10/0x10 [ 96.708045][ T2879] ? debug_smp_processor_id+0x17/0x20 [ 96.713434][ T2879] __x64_sys_write+0x7b/0x90 [ 96.718031][ T2879] x64_sys_call+0x27b/0x9a0 [ 96.722551][ T2879] do_syscall_64+0x4c/0xa0 [ 96.726997][ T2879] ? clear_bhb_loop+0x30/0x80 [ 96.731699][ T2879] ? clear_bhb_loop+0x30/0x80 [ 96.736394][ T2879] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 96.742325][ T2879] RIP: 0033:0x7f5d2779c819 [ 96.746765][ T2879] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 96.767277][ T2879] RSP: 002b:00007f5d285ce028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 96.775719][ T2879] RAX: ffffffffffffffda RBX: 00007f5d27a16090 RCX: 00007f5d2779c819 [ 96.783987][ T2879] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000007 [ 96.792146][ T2879] RBP: 00007f5d285ce090 R08: 0000000000000000 R09: 0000000000000000 [ 96.800127][ T2879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.808113][ T2879] R13: 00007f5d27a16128 R14: 00007f5d27a16090 R15: 00007ffe6b6a64c8 [ 96.816103][ T2879] [ 96.904355][ T2522] syz.0.681 (2522) used greatest stack depth: 15584 bytes left [ 98.276587][ T2504] syz.0.669 (2504) used greatest stack depth: 14624 bytes left [ 98.499124][ T2916] FAULT_INJECTION: forcing a failure. [ 98.499124][ T2916] name failslab, interval 1, probability 0, space 0, times 0 [ 98.575059][ T2916] CPU: 1 PID: 2916 Comm: syz.3.803 Not tainted syzkaller #0 [ 98.582589][ T2916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 98.592758][ T2916] Call Trace: [ 98.596146][ T2916] [ 98.599110][ T2916] __dump_stack+0x21/0x24 [ 98.603483][ T2916] dump_stack_lvl+0x110/0x170 [ 98.608193][ T2916] ? __cfi_dump_stack_lvl+0x8/0x8 [ 98.613284][ T2916] dump_stack+0x15/0x24 [ 98.617471][ T2916] should_fail_ex+0x3d4/0x520 [ 98.622179][ T2916] ? build_skb+0x2a/0x220 [ 98.626539][ T2916] __should_failslab+0xac/0xf0 [ 98.631330][ T2916] should_failslab+0x9/0x20 [ 98.635848][ T2916] kmem_cache_alloc+0x3b/0x330 [ 98.640797][ T2916] build_skb+0x2a/0x220 [ 98.644973][ T2916] bpf_prog_test_run_skb+0x39b/0x12c0 [ 98.650454][ T2916] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 98.656799][ T2916] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 98.662704][ T2916] bpf_prog_test_run+0x3e3/0x640 [ 98.667665][ T2916] ? bpf_prog_query+0x270/0x270 [ 98.672603][ T2916] ? selinux_bpf+0xce/0xf0 [ 98.677108][ T2916] ? security_bpf+0x93/0xb0 [ 98.681624][ T2916] __sys_bpf+0x5ee/0x850 [ 98.685873][ T2916] ? bpf_link_show_fdinfo+0x330/0x330 [ 98.691249][ T2916] ? __cfi_sched_clock_cpu+0x10/0x10 [ 98.696587][ T2916] __x64_sys_bpf+0x7c/0x90 [ 98.701036][ T2916] x64_sys_call+0x488/0x9a0 [ 98.705652][ T2916] do_syscall_64+0x4c/0xa0 [ 98.710175][ T2916] ? clear_bhb_loop+0x30/0x80 [ 98.714952][ T2916] ? clear_bhb_loop+0x30/0x80 [ 98.719647][ T2916] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 98.725553][ T2916] RIP: 0033:0x7f018779c819 [ 98.729966][ T2916] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 98.749767][ T2916] RSP: 002b:00007f018859f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 98.758322][ T2916] RAX: ffffffffffffffda RBX: 00007f0187a15fa0 RCX: 00007f018779c819 [ 98.766430][ T2916] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 98.774601][ T2916] RBP: 00007f018859f090 R08: 0000000000000000 R09: 0000000000000000 [ 98.782751][ T2916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.790737][ T2916] R13: 00007f0187a16038 R14: 00007f0187a15fa0 R15: 00007ffd474c9928 [ 98.798902][ T2916] [ 99.001409][ T2939] À: port 1(macsec0) entered blocking state [ 99.043013][ T2939] À: port 1(macsec0) entered disabled state [ 99.699264][ T2977] device syzkaller0 entered promiscuous mode [ 100.501476][ T3006] device syzkaller0 entered promiscuous mode [ 101.091039][ T3041] device syzkaller0 entered promiscuous mode [ 101.173794][ T3045] device syzkaller0 entered promiscuous mode [ 102.357550][ T3097] device syzkaller0 entered promiscuous mode [ 102.426768][ T3094] device syzkaller0 entered promiscuous mode [ 103.199583][ T3131] syz_tun: refused to change device tx_queue_len [ 103.675360][ T3171] device syzkaller0 entered promiscuous mode [ 104.026553][ T3193] device syzkaller0 entered promiscuous mode [ 106.024063][ T3294] device syzkaller0 entered promiscuous mode [ 106.852734][ T3327] device syzkaller0 entered promiscuous mode [ 107.217432][ T3345] FAULT_INJECTION: forcing a failure. [ 107.217432][ T3345] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 107.293527][ T3345] CPU: 1 PID: 3345 Comm: syz.3.939 Not tainted syzkaller #0 [ 107.300892][ T3345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 107.311152][ T3345] Call Trace: [ 107.314456][ T3345] [ 107.317412][ T3345] __dump_stack+0x21/0x24 [ 107.321783][ T3345] dump_stack_lvl+0x110/0x170 [ 107.326496][ T3345] ? __cfi_dump_stack_lvl+0x8/0x8 [ 107.331560][ T3345] dump_stack+0x15/0x24 [ 107.335760][ T3345] should_fail_ex+0x3d4/0x520 [ 107.340523][ T3345] should_fail+0xb/0x10 [ 107.344800][ T3345] should_fail_usercopy+0x1a/0x20 [ 107.349860][ T3345] _copy_from_user+0x1e/0xc0 [ 107.354463][ T3345] __sys_bpf+0x2a0/0x850 [ 107.358708][ T3345] ? bpf_link_show_fdinfo+0x330/0x330 [ 107.364105][ T3345] ? __cfi_ksys_write+0x10/0x10 [ 107.368967][ T3345] ? debug_smp_processor_id+0x17/0x20 [ 107.374527][ T3345] __x64_sys_bpf+0x7c/0x90 [ 107.378985][ T3345] x64_sys_call+0x488/0x9a0 [ 107.383541][ T3345] do_syscall_64+0x4c/0xa0 [ 107.388080][ T3345] ? clear_bhb_loop+0x30/0x80 [ 107.392781][ T3345] ? clear_bhb_loop+0x30/0x80 [ 107.397468][ T3345] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 107.403365][ T3345] RIP: 0033:0x7f018779c819 [ 107.407792][ T3345] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 107.427400][ T3345] RSP: 002b:00007f018859f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 107.435819][ T3345] RAX: ffffffffffffffda RBX: 00007f0187a15fa0 RCX: 00007f018779c819 [ 107.443788][ T3345] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 107.451761][ T3345] RBP: 00007f018859f090 R08: 0000000000000000 R09: 0000000000000000 [ 107.459833][ T3345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.467819][ T3345] R13: 00007f0187a16038 R14: 00007f0187a15fa0 R15: 00007ffd474c9928 [ 107.476290][ T3345] [ 107.799396][ T3354] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.812013][ T3354] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.177042][ T3472] device syzkaller0 entered promiscuous mode [ 112.658585][ T3503] device syzkaller0 entered promiscuous mode [ 112.951663][ T3519] FAULT_INJECTION: forcing a failure. [ 112.951663][ T3519] name failslab, interval 1, probability 0, space 0, times 0 [ 113.001341][ T3519] CPU: 0 PID: 3519 Comm: syz.1.993 Not tainted syzkaller #0 [ 113.008706][ T3519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 113.018960][ T3519] Call Trace: [ 113.022315][ T3519] [ 113.025319][ T3519] __dump_stack+0x21/0x24 [ 113.029681][ T3519] dump_stack_lvl+0x110/0x170 [ 113.034387][ T3519] ? __cfi_dump_stack_lvl+0x8/0x8 [ 113.039445][ T3519] dump_stack+0x15/0x24 [ 113.043743][ T3519] should_fail_ex+0x3d4/0x520 [ 113.048463][ T3519] __should_failslab+0xac/0xf0 [ 113.053253][ T3519] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 113.059081][ T3519] should_failslab+0x9/0x20 [ 113.063788][ T3519] __kmem_cache_alloc_node+0x3d/0x2c0 [ 113.069303][ T3519] ? selinux_sk_alloc_security+0x7e/0x1a0 [ 113.075060][ T3519] kmalloc_trace+0x29/0xb0 [ 113.079509][ T3519] selinux_sk_alloc_security+0x7e/0x1a0 [ 113.085226][ T3519] security_sk_alloc+0x83/0xb0 [ 113.090020][ T3519] sk_prot_alloc+0x108/0x320 [ 113.094725][ T3519] sk_alloc+0x3b/0x460 [ 113.098814][ T3519] ? __kasan_check_write+0x14/0x20 [ 113.103935][ T3519] bpf_prog_test_run_skb+0x375/0x12c0 [ 113.109309][ T3519] ? __fget_files+0x2d5/0x330 [ 113.113986][ T3519] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 113.119796][ T3519] bpf_prog_test_run+0x3e3/0x640 [ 113.124745][ T3519] ? bpf_prog_query+0x270/0x270 [ 113.129598][ T3519] ? selinux_bpf+0xce/0xf0 [ 113.134114][ T3519] ? security_bpf+0x93/0xb0 [ 113.138627][ T3519] __sys_bpf+0x5ee/0x850 [ 113.142870][ T3519] ? bpf_link_show_fdinfo+0x330/0x330 [ 113.148244][ T3519] ? __cfi_ksys_write+0x10/0x10 [ 113.153095][ T3519] ? debug_smp_processor_id+0x17/0x20 [ 113.158472][ T3519] __x64_sys_bpf+0x7c/0x90 [ 113.162895][ T3519] x64_sys_call+0x488/0x9a0 [ 113.167403][ T3519] do_syscall_64+0x4c/0xa0 [ 113.171910][ T3519] ? clear_bhb_loop+0x30/0x80 [ 113.176675][ T3519] ? clear_bhb_loop+0x30/0x80 [ 113.181374][ T3519] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 113.187270][ T3519] RIP: 0033:0x7fa37e99c819 [ 113.191684][ T3519] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 113.211302][ T3519] RSP: 002b:00007fa37f868028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 113.219805][ T3519] RAX: ffffffffffffffda RBX: 00007fa37ec15fa0 RCX: 00007fa37e99c819 [ 113.227781][ T3519] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 113.235765][ T3519] RBP: 00007fa37f868090 R08: 0000000000000000 R09: 0000000000000000 [ 113.243756][ T3519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.252084][ T3519] R13: 00007fa37ec16038 R14: 00007fa37ec15fa0 R15: 00007ffe567f3438 [ 113.260173][ T3519] [ 114.565201][ T3593] device syzkaller0 entered promiscuous mode [ 114.611619][ T3594] cgroup: fork rejected by pids controller in /syz4 [ 115.493690][ T307] device veth0_vlan left promiscuous mode [ 115.839490][ T3720] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.891150][ T3720] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.898886][ T3720] device bridge_slave_0 entered promiscuous mode [ 115.920725][ T3720] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.941221][ T3720] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.948861][ T3720] device bridge_slave_1 entered promiscuous mode [ 116.001326][ T3727] device wg2 left promiscuous mode [ 116.022984][ T3727] device wg2 entered promiscuous mode [ 116.318401][ T3720] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.325510][ T3720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.332835][ T3720] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.340925][ T3720] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.415658][ T3751] device syzkaller0 entered promiscuous mode [ 116.449260][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 116.457030][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.464857][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.484461][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 116.492810][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.499856][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.509353][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 116.518479][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.525731][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.558106][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 116.574027][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.621552][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 116.635121][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.649319][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 116.657386][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 116.666120][ T3720] device veth0_vlan entered promiscuous mode [ 116.679686][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.697522][ T3720] device veth1_macvtap entered promiscuous mode [ 116.766663][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.792411][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.876186][ T3783] FAULT_INJECTION: forcing a failure. [ 116.876186][ T3783] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.890282][ T3783] CPU: 0 PID: 3783 Comm: syz.1.1046 Not tainted syzkaller #0 [ 116.897706][ T3783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 116.907960][ T3783] Call Trace: [ 116.911263][ T3783] [ 116.914402][ T3783] __dump_stack+0x21/0x24 [ 116.918853][ T3783] dump_stack_lvl+0x110/0x170 [ 116.923619][ T3783] ? __cfi_dump_stack_lvl+0x8/0x8 [ 116.928688][ T3783] ? migrate_enable+0x1af/0x2a0 [ 116.933598][ T3783] ? __cfi_migrate_enable+0x10/0x10 [ 116.938831][ T3783] dump_stack+0x15/0x24 [ 116.943019][ T3783] should_fail_ex+0x3d4/0x520 [ 116.947726][ T3783] should_fail+0xb/0x10 [ 116.951948][ T3783] should_fail_usercopy+0x1a/0x20 [ 116.957322][ T3783] _copy_to_user+0x1e/0x90 [ 116.961765][ T3783] bpf_test_finish+0x497/0x6c0 [ 116.966615][ T3783] ? convert_skb_to___skb+0x430/0x430 [ 116.972002][ T3783] bpf_prog_test_run_skb+0xce6/0x12c0 [ 116.977407][ T3783] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 116.983242][ T3783] bpf_prog_test_run+0x3e3/0x640 [ 116.988271][ T3783] ? bpf_prog_query+0x270/0x270 [ 116.993138][ T3783] ? selinux_bpf+0xce/0xf0 [ 116.997565][ T3783] ? security_bpf+0x93/0xb0 [ 117.002090][ T3783] __sys_bpf+0x5ee/0x850 [ 117.006348][ T3783] ? bpf_link_show_fdinfo+0x330/0x330 [ 117.011734][ T3783] ? __cfi_ksys_write+0x10/0x10 [ 117.016682][ T3783] ? debug_smp_processor_id+0x17/0x20 [ 117.022151][ T3783] __x64_sys_bpf+0x7c/0x90 [ 117.026584][ T3783] x64_sys_call+0x488/0x9a0 [ 117.031095][ T3783] do_syscall_64+0x4c/0xa0 [ 117.035618][ T3783] ? clear_bhb_loop+0x30/0x80 [ 117.040397][ T3783] ? clear_bhb_loop+0x30/0x80 [ 117.045224][ T3783] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 117.051213][ T3783] RIP: 0033:0x7fa37e99c819 [ 117.055672][ T3783] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 117.075638][ T3783] RSP: 002b:00007fa37f868028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 117.084103][ T3783] RAX: ffffffffffffffda RBX: 00007fa37ec15fa0 RCX: 00007fa37e99c819 [ 117.092172][ T3783] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 000000000000000a [ 117.100419][ T3783] RBP: 00007fa37f868090 R08: 0000000000000000 R09: 0000000000000000 [ 117.108555][ T3783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.116626][ T3783] R13: 00007fa37ec16038 R14: 00007fa37ec15fa0 R15: 00007ffe567f3438 [ 117.124706][ T3783] [ 117.188652][ T3794] device syzkaller0 entered promiscuous mode [ 117.195947][ T3789] device sit0 entered promiscuous mode [ 117.540913][ T3805] syz.1.1053[3805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.540977][ T3805] syz.1.1053[3805] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.705755][ T3815] device syzkaller0 entered promiscuous mode [ 117.936821][ T3837] device syzkaller0 entered promiscuous mode [ 118.025625][ T3843] device syzkaller0 entered promiscuous mode [ 119.996225][ T3945] device syzkaller0 entered promiscuous mode [ 120.063682][ T3948] device syzkaller0 entered promiscuous mode [ 120.669287][ T3984] device syzkaller0 entered promiscuous mode [ 121.157453][ T3996] device sit0 left promiscuous mode [ 121.216817][ T28] audit: type=1400 audit(1776379551.624:144): avc: denied { create } for pid=3995 comm="syz.2.1115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 121.247366][ T3998] device sit0 entered promiscuous mode [ 122.985909][ T4046] device syzkaller0 entered promiscuous mode [ 123.294813][ T4068] device wg2 left promiscuous mode [ 123.338094][ T4068] device wg2 entered promiscuous mode [ 123.470303][ T28] audit: type=1400 audit(1776379553.874:145): avc: denied { read } for pid=4071 comm="syz.2.1139" dev="nsfs" ino=4026532472 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 123.549504][ T28] audit: type=1400 audit(1776379553.874:146): avc: denied { open } for pid=4071 comm="syz.2.1139" path="net:[4026532472]" dev="nsfs" ino=4026532472 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 123.883892][ T4084] device syzkaller0 entered promiscuous mode [ 124.533291][ T4120] device syzkaller0 entered promiscuous mode [ 125.114884][ T4146] b‹¡Y­4`Ò˜: renamed from lo [ 125.195650][ T4154] bridge0: port 3(veth1_macvtap) entered blocking state [ 125.208169][ T4154] bridge0: port 3(veth1_macvtap) entered disabled state [ 125.287891][ T4160] device syzkaller0 entered promiscuous mode [ 125.826721][ T4184] device syzkaller0 entered promiscuous mode [ 126.910886][ T4239] bpf setsockopt: ignoring program buffer with optlen=65463 (max_optlen=4096) [ 127.184834][ T4243] device wg2 entered promiscuous mode [ 127.890149][ T4276] sock: sock_set_timeout: `syz.0.1203' (pid 4276) tries to set negative timeout [ 130.076603][ T4360] À: port 1(macsec0) entered blocking state [ 130.085005][ T4360] À: port 1(macsec0) entered disabled state [ 130.137399][ T4359] device wg2 left promiscuous mode [ 130.180380][ T4361] device wg2 entered promiscuous mode [ 130.477224][ T4375] device syzkaller0 entered promiscuous mode [ 131.570112][ T4411] device syzkaller0 entered promiscuous mode [ 137.883749][ T4551] pimreg: tun_chr_ioctl cmd 2147767506 [ 140.736435][ T4647] device syzkaller0 entered promiscuous mode [ 142.311872][ T28] audit: type=1400 audit(1776379572.724:147): avc: denied { associate } for pid=4687 comm="syz.0.1337" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 143.289499][ T4744] device syzkaller0 entered promiscuous mode [ 145.445129][ T4857] dú0Ù: renamed from bond_slave_1 [ 149.230385][ T4999] device syzkaller0 entered promiscuous mode [ 149.421001][ T28] audit: type=1400 audit(1776379579.824:148): avc: denied { create } for pid=5016 comm="syz.3.1446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 149.493311][ T5006] tun0: tun_chr_ioctl cmd 1074025675 [ 149.498853][ T5006] tun0: persist enabled [ 149.504943][ T5006] tun0: tun_chr_ioctl cmd 1074025675 [ 149.510523][ T5006] tun0: persist disabled [ 150.597875][ T5055] device syzkaller0 entered promiscuous mode [ 151.208428][ T5096] device syzkaller0 entered promiscuous mode [ 152.157366][ T5163] device veth0_vlan left promiscuous mode [ 152.217836][ T5163] device veth0_vlan entered promiscuous mode [ 152.258846][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.288079][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.336750][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.543479][ T5172] device syzkaller0 entered promiscuous mode [ 152.656719][ T5189] device syzkaller0 entered promiscuous mode [ 153.211833][ T5226] FAULT_INJECTION: forcing a failure. [ 153.211833][ T5226] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.295100][ T5226] CPU: 1 PID: 5226 Comm: syz.0.1509 Not tainted syzkaller #0 [ 153.302544][ T5226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 153.312976][ T5226] Call Trace: [ 153.316289][ T5226] [ 153.319256][ T5226] __dump_stack+0x21/0x24 [ 153.323893][ T5226] dump_stack_lvl+0x110/0x170 [ 153.328685][ T5226] ? __cfi_dump_stack_lvl+0x8/0x8 [ 153.333883][ T5226] ? _parse_integer+0x2a/0x40 [ 153.338602][ T5226] dump_stack+0x15/0x24 [ 153.342802][ T5226] should_fail_ex+0x3d4/0x520 [ 153.347516][ T5226] should_fail+0xb/0x10 [ 153.351702][ T5226] should_fail_usercopy+0x1a/0x20 [ 153.356857][ T5226] _copy_from_user+0x1e/0xc0 [ 153.361493][ T5226] ___sys_sendmsg+0x1c3/0x360 [ 153.366198][ T5226] ? __sys_sendmsg+0x290/0x290 [ 153.370977][ T5226] ? __kasan_check_write+0x14/0x20 [ 153.376188][ T5226] ? proc_fail_nth_write+0x180/0x200 [ 153.381574][ T5226] ? vfs_write+0xa2c/0xce0 [ 153.385997][ T5226] ? __fdget+0x19c/0x220 [ 153.390251][ T5226] __x64_sys_sendmsg+0x205/0x2d0 [ 153.395195][ T5226] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 153.400760][ T5226] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 153.406919][ T5226] x64_sys_call+0x171/0x9a0 [ 153.411428][ T5226] do_syscall_64+0x4c/0xa0 [ 153.415859][ T5226] ? clear_bhb_loop+0x30/0x80 [ 153.420543][ T5226] ? clear_bhb_loop+0x30/0x80 [ 153.425314][ T5226] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 153.431295][ T5226] RIP: 0033:0x7f071839c819 [ 153.435800][ T5226] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 153.455982][ T5226] RSP: 002b:00007f071927a028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 153.464489][ T5226] RAX: ffffffffffffffda RBX: 00007f0718616090 RCX: 00007f071839c819 [ 153.472468][ T5226] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000009 [ 153.480455][ T5226] RBP: 00007f071927a090 R08: 0000000000000000 R09: 0000000000000000 [ 153.488452][ T5226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.496532][ T5226] R13: 00007f0718616128 R14: 00007f0718616090 R15: 00007fff3f475d18 [ 153.504507][ T5226] [ 154.379111][ T5269] syz.4.1521[5269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.379188][ T5269] syz.4.1521[5269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.504235][ T5274] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.524192][ T5274] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.758164][ T5287] FAULT_INJECTION: forcing a failure. [ 154.758164][ T5287] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 154.851329][ T5287] CPU: 1 PID: 5287 Comm: syz.3.1525 Not tainted syzkaller #0 [ 154.859206][ T5287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 154.869285][ T5287] Call Trace: [ 154.872594][ T5287] [ 154.875557][ T5287] __dump_stack+0x21/0x24 [ 154.879993][ T5287] dump_stack_lvl+0x110/0x170 [ 154.884897][ T5287] ? __cfi_dump_stack_lvl+0x8/0x8 [ 154.889961][ T5287] ? avc_has_perm+0x163/0x250 [ 154.894765][ T5287] dump_stack+0x15/0x24 [ 154.899206][ T5287] should_fail_ex+0x3d4/0x520 [ 154.904194][ T5287] should_fail_alloc_page+0x61/0x90 [ 154.909521][ T5287] prepare_alloc_pages+0x148/0x600 [ 154.914671][ T5287] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 154.920186][ T5287] __alloc_pages+0x15b/0x610 [ 154.924802][ T5287] ? __cfi___alloc_pages+0x10/0x10 [ 154.929937][ T5287] ? unwind_get_return_address+0x4d/0x90 [ 154.935603][ T5287] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 154.942053][ T5287] ? stack_trace_save+0xa6/0xf0 [ 154.946922][ T5287] __kmalloc_large_node+0xa1/0x1c0 [ 154.952047][ T5287] ? iovec_from_user+0x86/0x2e0 [ 154.957007][ T5287] __kmalloc+0xe0/0x1e0 [ 154.961367][ T5287] iovec_from_user+0x86/0x2e0 [ 154.966438][ T5287] __import_iovec+0x71/0x470 [ 154.971053][ T5287] ? kstrtoull+0x137/0x1d0 [ 154.976210][ T5287] import_iovec+0x7c/0xb0 [ 154.980856][ T5287] ___sys_sendmsg+0x252/0x360 [ 154.985552][ T5287] ? __sys_sendmsg+0x290/0x290 [ 154.990433][ T5287] ? __kasan_check_write+0x14/0x20 [ 154.995656][ T5287] ? proc_fail_nth_write+0x180/0x200 [ 155.000992][ T5287] ? vfs_write+0xa2c/0xce0 [ 155.005427][ T5287] ? __fdget+0x19c/0x220 [ 155.009764][ T5287] __x64_sys_sendmsg+0x205/0x2d0 [ 155.014956][ T5287] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 155.020450][ T5287] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 155.026609][ T5287] x64_sys_call+0x171/0x9a0 [ 155.031209][ T5287] do_syscall_64+0x4c/0xa0 [ 155.035634][ T5287] ? clear_bhb_loop+0x30/0x80 [ 155.040310][ T5287] ? clear_bhb_loop+0x30/0x80 [ 155.045082][ T5287] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 155.050975][ T5287] RIP: 0033:0x7f018779c819 [ 155.055491][ T5287] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 155.075458][ T5287] RSP: 002b:00007f018857e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 155.083873][ T5287] RAX: ffffffffffffffda RBX: 00007f0187a16090 RCX: 00007f018779c819 [ 155.091843][ T5287] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000008 [ 155.100073][ T5287] RBP: 00007f018857e090 R08: 0000000000000000 R09: 0000000000000000 [ 155.108130][ T5287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.116108][ T5287] R13: 00007f0187a16128 R14: 00007f0187a16090 R15: 00007ffd474c9928 [ 155.124109][ T5287] [ 155.267073][ T5300] ÿ: renamed from bond_slave_0 [ 155.360313][ T5302] device syzkaller0 entered promiscuous mode [ 156.113916][ T5333] FAULT_INJECTION: forcing a failure. [ 156.113916][ T5333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.165639][ T5333] CPU: 1 PID: 5333 Comm: syz.3.1540 Not tainted syzkaller #0 [ 156.173270][ T5333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 156.183614][ T5333] Call Trace: [ 156.186995][ T5333] [ 156.189938][ T5333] __dump_stack+0x21/0x24 [ 156.194291][ T5333] dump_stack_lvl+0x110/0x170 [ 156.199149][ T5333] ? __cfi_dump_stack_lvl+0x8/0x8 [ 156.204184][ T5333] ? iovec_from_user+0x86/0x2e0 [ 156.209133][ T5333] dump_stack+0x15/0x24 [ 156.213488][ T5333] should_fail_ex+0x3d4/0x520 [ 156.218184][ T5333] should_fail+0xb/0x10 [ 156.222351][ T5333] should_fail_usercopy+0x1a/0x20 [ 156.227472][ T5333] _copy_from_user+0x1e/0xc0 [ 156.232093][ T5333] iovec_from_user+0x1aa/0x2e0 [ 156.237298][ T5333] __import_iovec+0x71/0x470 [ 156.241983][ T5333] import_iovec+0x7c/0xb0 [ 156.246413][ T5333] ___sys_sendmsg+0x252/0x360 [ 156.251537][ T5333] ? __sys_sendmsg+0x290/0x290 [ 156.256352][ T5333] ? timerqueue_add+0x20e/0x230 [ 156.261247][ T5333] ? __fdget+0x19c/0x220 [ 156.265626][ T5333] __x64_sys_sendmsg+0x205/0x2d0 [ 156.270573][ T5333] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 156.276142][ T5333] ? sched_clock_cpu+0x6e/0x260 [ 156.281101][ T5333] ? debug_smp_processor_id+0x17/0x20 [ 156.286480][ T5333] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 156.292726][ T5333] x64_sys_call+0x171/0x9a0 [ 156.297237][ T5333] do_syscall_64+0x4c/0xa0 [ 156.301656][ T5333] ? clear_bhb_loop+0x30/0x80 [ 156.306345][ T5333] ? clear_bhb_loop+0x30/0x80 [ 156.311215][ T5333] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 156.317113][ T5333] RIP: 0033:0x7f018779c819 [ 156.321528][ T5333] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 156.341317][ T5333] RSP: 002b:00007f018859f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 156.349754][ T5333] RAX: ffffffffffffffda RBX: 00007f0187a15fa0 RCX: 00007f018779c819 [ 156.357755][ T5333] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000009 [ 156.365753][ T5333] RBP: 00007f018859f090 R08: 0000000000000000 R09: 0000000000000000 [ 156.373834][ T5333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.381894][ T5333] R13: 00007f0187a16038 R14: 00007f0187a15fa0 R15: 00007ffd474c9928 [ 156.389878][ T5333] [ 156.482089][ T5340] device syzkaller0 entered promiscuous mode [ 157.271043][ T5391] device syzkaller0 entered promiscuous mode [ 157.941109][ T28] audit: type=1400 audit(1776379588.344:149): avc: denied { create } for pid=5435 comm="syz.3.1569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 158.015663][ T28] audit: type=1400 audit(1776379588.374:150): avc: denied { ioctl } for pid=5438 comm="syz.0.1571" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 158.530325][ T5481] device syzkaller0 entered promiscuous mode [ 158.666842][ T5483] device syzkaller0 entered promiscuous mode [ 158.839758][ T5499] device sit0 left promiscuous mode [ 158.866189][ T5499] device sit0 entered promiscuous mode [ 158.947729][ T5507] device syzkaller0 entered promiscuous mode [ 159.036799][ T5511] ref_ctr_offset mismatch. inode: 0x274 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 159.056096][ T5518] device wg2 left promiscuous mode [ 159.097910][ T5518] device wg2 entered promiscuous mode [ 159.134977][ T5511] GPL: port 1(erspan0) entered blocking state [ 159.148619][ T5511] GPL: port 1(erspan0) entered disabled state [ 159.170195][ T5511] device erspan0 entered promiscuous mode [ 159.200593][ T5534] device syzkaller0 entered promiscuous mode [ 159.221159][ T5533] GPL: port 1(erspan0) entered blocking state [ 159.227286][ T5533] GPL: port 1(erspan0) entered forwarding state [ 159.737469][ T5567] device syzkaller0 entered promiscuous mode [ 161.373797][ T5626] device syzkaller0 entered promiscuous mode [ 162.213839][ T5649] device syzkaller0 entered promiscuous mode [ 162.802335][ T5671] device syzkaller0 entered promiscuous mode [ 162.958034][ T5677] device veth0_vlan left promiscuous mode [ 163.064668][ T5677] device veth0_vlan entered promiscuous mode [ 163.446754][ T5689] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.454126][ T5689] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.038152][ T5722] device syzkaller0 entered promiscuous mode [ 164.114420][ T5726] device veth0_vlan left promiscuous mode [ 164.145549][ T5726] device veth0_vlan entered promiscuous mode [ 165.165132][ T5779] device syzkaller0 entered promiscuous mode [ 165.368572][ T5815] device syzkaller0 entered promiscuous mode [ 165.423410][ T5816] device veth1_macvtap left promiscuous mode [ 165.896352][ T5839] device veth0_vlan left promiscuous mode [ 165.902906][ T5839] device veth0_vlan entered promiscuous mode [ 165.943011][ T5834] device sit0 left promiscuous mode [ 166.143054][ T5840] device sit0 entered promiscuous mode [ 166.259117][ T28] audit: type=1400 audit(1776379596.664:151): avc: denied { create } for pid=5847 comm="syz.3.1690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 166.555212][ T28] audit: type=1400 audit(1776379596.964:152): avc: denied { create } for pid=5867 comm="syz.3.1695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 169.200011][ T5973] pimreg1: tun_chr_ioctl cmd 1074025694 [ 169.452634][ T5978] device syzkaller0 entered promiscuous mode [ 169.519103][ T5987] syz_tun: refused to change device tx_queue_len [ 169.663221][ T5996] syz_tun: refused to change device tx_queue_len [ 169.672880][ T6000] tun0: tun_chr_ioctl cmd 2147767517 [ 169.894008][ T6000] device syzkaller0 entered promiscuous mode [ 169.937257][ T6009] device veth1_macvtap left promiscuous mode [ 169.945521][ T6009] device macsec0 entered promiscuous mode [ 170.755280][ T6024] device veth0_vlan left promiscuous mode [ 170.992966][ T6024] device veth0_vlan entered promiscuous mode [ 171.306161][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.314107][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.321529][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.330706][ T6023] device sit0 left promiscuous mode [ 171.506640][ T6030] device sit0 entered promiscuous mode [ 171.516586][ T6032] device sit0 left promiscuous mode [ 171.739327][ T6034] device sit0 entered promiscuous mode [ 171.962631][ T6046] device syzkaller0 entered promiscuous mode [ 173.876737][ T6115] device syzkaller0 entered promiscuous mode [ 174.614562][ T6167] device syzkaller0 entered promiscuous mode [ 175.185684][ T6218] device syzkaller0 entered promiscuous mode [ 175.770395][ T6285] device sit0 entered promiscuous mode [ 175.939821][ T6294] device syzkaller0 entered promiscuous mode [ 177.317147][ T6375] FAULT_INJECTION: forcing a failure. [ 177.317147][ T6375] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 177.531463][ T6375] CPU: 1 PID: 6375 Comm: syz.2.1842 Not tainted syzkaller #0 [ 177.538898][ T6375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 177.549154][ T6375] Call Trace: [ 177.552471][ T6375] [ 177.555617][ T6375] __dump_stack+0x21/0x24 [ 177.560076][ T6375] dump_stack_lvl+0x110/0x170 [ 177.564871][ T6375] ? __cfi_dump_stack_lvl+0x8/0x8 [ 177.569929][ T6375] dump_stack+0x15/0x24 [ 177.574115][ T6375] should_fail_ex+0x3d4/0x520 [ 177.578824][ T6375] should_fail+0xb/0x10 [ 177.583094][ T6375] should_fail_usercopy+0x1a/0x20 [ 177.588232][ T6375] _copy_from_user+0x1e/0xc0 [ 177.592931][ T6375] __sys_bpf+0x2a0/0x850 [ 177.597266][ T6375] ? bpf_link_show_fdinfo+0x330/0x330 [ 177.602738][ T6375] ? __cfi_ksys_write+0x10/0x10 [ 177.607615][ T6375] ? debug_smp_processor_id+0x17/0x20 [ 177.613007][ T6375] __x64_sys_bpf+0x7c/0x90 [ 177.617441][ T6375] x64_sys_call+0x488/0x9a0 [ 177.621956][ T6375] do_syscall_64+0x4c/0xa0 [ 177.626384][ T6375] ? clear_bhb_loop+0x30/0x80 [ 177.631098][ T6375] ? clear_bhb_loop+0x30/0x80 [ 177.635897][ T6375] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 177.641821][ T6375] RIP: 0033:0x7f703599c819 [ 177.646281][ T6375] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 177.666181][ T6375] RSP: 002b:00007f70343d6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 177.674614][ T6375] RAX: ffffffffffffffda RBX: 00007f7035c16090 RCX: 00007f703599c819 [ 177.682592][ T6375] RDX: 0000000000000091 RSI: 00002000000002c0 RDI: 0000000000000005 [ 177.690651][ T6375] RBP: 00007f70343d6090 R08: 0000000000000000 R09: 0000000000000000 [ 177.698620][ T6375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.706676][ T6375] R13: 00007f7035c16128 R14: 00007f7035c16090 R15: 00007ffdc0f35868 [ 177.714842][ T6375] [ 181.222605][ T28] audit: type=1400 audit(1776379611.634:153): avc: denied { create } for pid=6549 comm="syz.4.1897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 181.247154][ T6522] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.270448][ T6522] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.292949][ T6522] device bridge_slave_0 entered promiscuous mode [ 181.342970][ T6522] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.364475][ T6522] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.378144][ T6522] device bridge_slave_1 entered promiscuous mode [ 181.922214][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 181.932096][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.971599][ T307] device bridge_slave_1 left promiscuous mode [ 181.977798][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.998866][ T307] device bridge_slave_0 left promiscuous mode [ 182.006172][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.014831][ T307] device veth0_vlan left promiscuous mode [ 182.425466][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.444193][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.466780][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.474099][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.514281][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.532493][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.548516][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.555838][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.563802][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.572326][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.580863][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.649506][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.687507][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.708013][ T6608] syz.2.1916[6608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.708117][ T6608] syz.2.1916[6608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.713465][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.790985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.814629][ T6522] device veth0_vlan entered promiscuous mode [ 182.838381][ T6609] device syzkaller0 entered promiscuous mode [ 182.858867][ T6608] ±ÿ: renamed from team_slave_1 [ 182.882606][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 182.900884][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 182.920018][ T6522] device veth1_macvtap entered promiscuous mode [ 182.955261][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 182.964961][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 182.977778][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.013970][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 183.057985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.237654][ T6630] : renamed from team_slave_1 [ 183.439174][ T6648] device syzkaller0 entered promiscuous mode [ 183.693864][ T6681] device syzkaller0 entered promiscuous mode [ 184.316105][ T28] audit: type=1400 audit(1776379614.704:154): avc: denied { getattr } for pid=6722 comm="syz.2.1947" path="net:[4026532472]" dev="nsfs" ino=4026532472 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 184.424564][ T6729] device syzkaller0 entered promiscuous mode [ 188.470907][ T6819] device sit0 left promiscuous mode [ 188.621371][ T6826] device sit0 entered promiscuous mode [ 188.663236][ T6825] device wg2 left promiscuous mode [ 188.706134][ T6834] device wg2 entered promiscuous mode [ 188.882483][ T6856] Q±6ã×\b‹¡Y­4: renamed from lo [ 188.969914][ T6864] device syzkaller0 entered promiscuous mode [ 190.446603][ T6960] device pim6reg1 entered promiscuous mode [ 191.053848][ T6994] device veth1_macvtap left promiscuous mode [ 191.223954][ T7003] device pim6reg1 left promiscuous mode [ 191.541720][ T7025] syz.4.2038[7025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.541827][ T7025] syz.4.2038[7025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.331908][ T28] audit: type=1400 audit(1776379629.744:155): avc: denied { attach_queue } for pid=7095 comm="syz.0.2058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 200.266640][ T7143] device syzkaller0 entered promiscuous mode [ 200.497724][ T28] audit: type=1400 audit(1776379630.904:156): avc: denied { setattr } for pid=7178 comm="syz.2.2083" path="/net/tun" dev="devtmpfs" ino=156 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 200.800839][ T7215] -1: renamed from syzkaller0 [ 201.251236][ T28] audit: type=1400 audit(1776379631.664:157): avc: denied { create } for pid=7224 comm="syz.3.2099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 201.677185][ T7232] syz_tun: refused to change device tx_queue_len [ 202.327698][ T7247] device syzkaller0 entered promiscuous mode [ 202.510901][ T7269] ref_ctr_offset mismatch. inode: 0x90a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 202.733844][ T7275] GPL: port 1(erspan0) entered blocking state [ 202.806336][ T7275] GPL: port 1(erspan0) entered disabled state [ 202.871751][ T7275] device erspan0 entered promiscuous mode [ 202.945178][ T7289] GPL: port 1(erspan0) entered blocking state [ 202.951425][ T7289] GPL: port 1(erspan0) entered forwarding state [ 203.688507][ T7342] -1: renamed from syzkaller0 [ 203.758848][ T7348] syzkaller0: tun_chr_ioctl cmd 35108 [ 203.792652][ T7348] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 203.821678][ T7348] syzkaller0: tun_net_xmit 1280 [ 203.829847][ T7353] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 204.149074][ T7358] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.160847][ T7358] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.171876][ T7358] device bridge_slave_0 entered promiscuous mode [ 204.512776][ T7358] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.526671][ T7358] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.538914][ T7358] device bridge_slave_1 entered promiscuous mode [ 204.688122][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.697858][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.746834][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.757104][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.765873][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.772970][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.781405][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.790013][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.798843][ T2684] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.806210][ T2684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.831736][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.839749][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.848248][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 204.879847][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 204.902703][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.915356][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.932065][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.939774][ T7358] device veth0_vlan entered promiscuous mode [ 204.989968][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 205.012646][ T7358] device veth1_macvtap entered promiscuous mode [ 205.045458][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 205.112780][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 205.364544][ T10] device bridge_slave_1 left promiscuous mode [ 205.371391][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.401097][ T10] device bridge_slave_0 left promiscuous mode [ 205.407830][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.419693][ T10] device veth0_vlan left promiscuous mode [ 205.677668][ T7420] device syzkaller0 entered promiscuous mode [ 205.817969][ T7422] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.825336][ T7422] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.848352][ T7422] device bridge_slave_0 entered promiscuous mode [ 205.869845][ T7422] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.877584][ T7422] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.892114][ T7422] device bridge_slave_1 entered promiscuous mode [ 205.972963][ T7422] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.980190][ T7422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.987541][ T7422] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.994611][ T7422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.043147][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.062287][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.072193][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.094579][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.103394][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.150901][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.238431][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.267891][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.304101][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.319419][ T7422] device veth0_vlan entered promiscuous mode [ 206.353419][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.365701][ T7422] device veth1_macvtap entered promiscuous mode [ 206.379760][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.406022][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 207.222995][ T10] device bridge_slave_1 left promiscuous mode [ 207.233101][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.242588][ T10] device bridge_slave_0 left promiscuous mode [ 207.248944][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.263434][ T10] device veth1_macvtap left promiscuous mode [ 207.269902][ T7466] FAULT_INJECTION: forcing a failure. [ 207.269902][ T7466] name failslab, interval 1, probability 0, space 0, times 0 [ 207.271413][ T10] device veth0_vlan left promiscuous mode [ 207.288467][ T7466] CPU: 1 PID: 7466 Comm: syz.1.2171 Not tainted syzkaller #0 [ 207.295847][ T7466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 207.305976][ T7466] Call Trace: [ 207.309253][ T7466] [ 207.312182][ T7466] __dump_stack+0x21/0x24 [ 207.316531][ T7466] dump_stack_lvl+0x110/0x170 [ 207.321209][ T7466] ? __cfi_dump_stack_lvl+0x8/0x8 [ 207.326316][ T7466] ? stack_trace_save+0xa6/0xf0 [ 207.331166][ T7466] dump_stack+0x15/0x24 [ 207.335334][ T7466] should_fail_ex+0x3d4/0x520 [ 207.340011][ T7466] __should_failslab+0xac/0xf0 [ 207.344770][ T7466] should_failslab+0x9/0x20 [ 207.349275][ T7466] kmem_cache_alloc_node+0x42/0x340 [ 207.354648][ T7466] ? dup_task_struct+0x5a/0x790 [ 207.359582][ T7466] dup_task_struct+0x5a/0x790 [ 207.364254][ T7466] ? __kasan_check_write+0x14/0x20 [ 207.369377][ T7466] copy_process+0x5d6/0x3510 [ 207.373973][ T7466] ? __kasan_check_write+0x14/0x20 [ 207.379259][ T7466] ? idle_dummy+0x10/0x10 [ 207.383602][ T7466] kernel_clone+0x22f/0x820 [ 207.388108][ T7466] ? __cfi_kernel_clone+0x10/0x10 [ 207.393139][ T7466] ? __kasan_check_write+0x14/0x20 [ 207.398283][ T7466] ? mutex_unlock+0x8f/0x230 [ 207.402875][ T7466] __x64_sys_clone+0x193/0x200 [ 207.407726][ T7466] ? __cfi___x64_sys_clone+0x10/0x10 [ 207.413150][ T7466] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 207.419231][ T7466] x64_sys_call+0x990/0x9a0 [ 207.423726][ T7466] do_syscall_64+0x4c/0xa0 [ 207.428134][ T7466] ? clear_bhb_loop+0x30/0x80 [ 207.432923][ T7466] ? clear_bhb_loop+0x30/0x80 [ 207.437617][ T7466] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 207.443592][ T7466] RIP: 0033:0x7fa37e99c819 [ 207.448000][ T7466] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 207.467697][ T7466] RSP: 002b:00007fa37f867fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 207.476213][ T7466] RAX: ffffffffffffffda RBX: 00007fa37ec15fa0 RCX: 00007fa37e99c819 [ 207.484283][ T7466] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000005000000 [ 207.492349][ T7466] RBP: 00007fa37f868090 R08: 0000000000000000 R09: 0000000000000000 [ 207.500326][ T7466] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 207.508382][ T7466] R13: 00007fa37ec16038 R14: 00007fa37ec15fa0 R15: 00007ffe567f3438 [ 207.516368][ T7466] [ 207.767069][ T7456] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.779872][ T7456] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.787644][ T7456] device bridge_slave_0 entered promiscuous mode [ 207.799082][ T7456] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.806240][ T7456] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.814119][ T7456] device bridge_slave_1 entered promiscuous mode [ 207.887159][ T7477] device syzkaller0 entered promiscuous mode [ 208.302782][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.329569][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.337491][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.346705][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.358432][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.365516][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.373808][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.477296][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.486151][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.494925][ T2684] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.502236][ T2684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.815049][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.824997][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.940134][ T7456] device veth0_vlan entered promiscuous mode [ 208.951253][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.965433][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.981602][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 209.000873][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.069685][ T7456] device veth1_macvtap entered promiscuous mode [ 209.079788][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 209.103195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 209.114922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 209.178579][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 209.189264][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 209.198069][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 209.207166][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.621779][ T10] device bridge_slave_1 left promiscuous mode [ 209.627939][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.639313][ T10] device bridge_slave_0 left promiscuous mode [ 209.645547][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.653529][ T10] device veth1_macvtap left promiscuous mode [ 209.659609][ T10] device veth0_vlan left promiscuous mode [ 209.954107][ T7509] FAULT_INJECTION: forcing a failure. [ 209.954107][ T7509] name failslab, interval 1, probability 0, space 0, times 0 [ 209.992070][ T7509] CPU: 0 PID: 7509 Comm: syz.1.2182 Not tainted syzkaller #0 [ 209.999510][ T7509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 210.009582][ T7509] Call Trace: [ 210.012871][ T7509] [ 210.015811][ T7509] __dump_stack+0x21/0x24 [ 210.020170][ T7509] dump_stack_lvl+0x110/0x170 [ 210.024886][ T7509] ? __cfi_dump_stack_lvl+0x8/0x8 [ 210.029941][ T7509] ? stack_trace_save+0xa6/0xf0 [ 210.034820][ T7509] dump_stack+0x15/0x24 [ 210.039199][ T7509] should_fail_ex+0x3d4/0x520 [ 210.043897][ T7509] __should_failslab+0xac/0xf0 [ 210.048676][ T7509] ? __get_vm_area_node+0x12c/0x360 [ 210.053890][ T7509] should_failslab+0x9/0x20 [ 210.058428][ T7509] __kmem_cache_alloc_node+0x3d/0x2c0 [ 210.064026][ T7509] ? __x64_sys_clone+0x193/0x200 [ 210.069074][ T7509] ? x64_sys_call+0x990/0x9a0 [ 210.073774][ T7509] ? do_syscall_64+0x4c/0xa0 [ 210.078385][ T7509] ? __get_vm_area_node+0x12c/0x360 [ 210.083604][ T7509] kmalloc_node_trace+0x26/0xb0 [ 210.088465][ T7509] __get_vm_area_node+0x12c/0x360 [ 210.093515][ T7509] __vmalloc_node_range+0x326/0x1430 [ 210.098817][ T7509] ? copy_process+0x5d6/0x3510 [ 210.103598][ T7509] ? __stack_depot_save+0x36/0x480 [ 210.108727][ T7509] ? kasan_save_alloc_info+0x25/0x30 [ 210.114041][ T7509] ? __cfi___vmalloc_node_range+0x10/0x10 [ 210.119779][ T7509] ? arch_dup_task_struct+0x42/0xc0 [ 210.124993][ T7509] ? memcpy+0x56/0x70 [ 210.129075][ T7509] dup_task_struct+0x3ae/0x790 [ 210.133850][ T7509] ? copy_process+0x5d6/0x3510 [ 210.138633][ T7509] ? __kasan_check_write+0x14/0x20 [ 210.143771][ T7509] copy_process+0x5d6/0x3510 [ 210.148384][ T7509] ? __kasan_check_write+0x14/0x20 [ 210.153503][ T7509] ? idle_dummy+0x10/0x10 [ 210.157853][ T7509] kernel_clone+0x22f/0x820 [ 210.162375][ T7509] ? __cfi_kernel_clone+0x10/0x10 [ 210.167428][ T7509] ? __kasan_check_write+0x14/0x20 [ 210.172581][ T7509] ? mutex_unlock+0x8f/0x230 [ 210.177290][ T7509] __x64_sys_clone+0x193/0x200 [ 210.182169][ T7509] ? __cfi___x64_sys_clone+0x10/0x10 [ 210.187485][ T7509] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 210.193646][ T7509] x64_sys_call+0x990/0x9a0 [ 210.198166][ T7509] do_syscall_64+0x4c/0xa0 [ 210.202611][ T7509] ? clear_bhb_loop+0x30/0x80 [ 210.207302][ T7509] ? clear_bhb_loop+0x30/0x80 [ 210.211991][ T7509] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 210.217982][ T7509] RIP: 0033:0x7fa37e99c819 [ 210.222405][ T7509] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 210.242032][ T7509] RSP: 002b:00007fa37f867fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 210.250560][ T7509] RAX: ffffffffffffffda RBX: 00007fa37ec15fa0 RCX: 00007fa37e99c819 [ 210.258639][ T7509] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000005000000 [ 210.266623][ T7509] RBP: 00007fa37f868090 R08: 0000000000000000 R09: 0000000000000000 [ 210.274610][ T7509] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 210.282678][ T7509] R13: 00007fa37ec16038 R14: 00007fa37ec15fa0 R15: 00007ffe567f3438 [ 210.290675][ T7509] [ 210.313563][ T7509] syz.1.2182: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 210.352848][ T7509] CPU: 1 PID: 7509 Comm: syz.1.2182 Not tainted syzkaller #0 [ 210.360278][ T7509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 210.370351][ T7509] Call Trace: [ 210.373735][ T7509] [ 210.376676][ T7509] __dump_stack+0x21/0x24 [ 210.381023][ T7509] dump_stack_lvl+0x110/0x170 [ 210.385729][ T7509] ? __cfi_dump_stack_lvl+0x8/0x8 [ 210.390883][ T7509] ? pr_cont_kernfs_name+0x133/0x160 [ 210.396263][ T7509] dump_stack+0x15/0x24 [ 210.400437][ T7509] warn_alloc+0x1dc/0x200 [ 210.404774][ T7509] ? should_failslab+0x9/0x20 [ 210.409451][ T7509] ? __cfi_warn_alloc+0x10/0x10 [ 210.414417][ T7509] ? kmalloc_node_trace+0x3d/0xb0 [ 210.419442][ T7509] ? __get_vm_area_node+0x353/0x360 [ 210.424652][ T7509] __vmalloc_node_range+0x34b/0x1430 [ 210.429941][ T7509] ? __stack_depot_save+0x36/0x480 [ 210.435141][ T7509] ? kasan_save_alloc_info+0x25/0x30 [ 210.440538][ T7509] ? __cfi___vmalloc_node_range+0x10/0x10 [ 210.446344][ T7509] ? arch_dup_task_struct+0x42/0xc0 [ 210.451643][ T7509] ? memcpy+0x56/0x70 [ 210.455625][ T7509] dup_task_struct+0x3ae/0x790 [ 210.460476][ T7509] ? copy_process+0x5d6/0x3510 [ 210.465257][ T7509] ? __kasan_check_write+0x14/0x20 [ 210.470373][ T7509] copy_process+0x5d6/0x3510 [ 210.474971][ T7509] ? __kasan_check_write+0x14/0x20 [ 210.480085][ T7509] ? idle_dummy+0x10/0x10 [ 210.484446][ T7509] kernel_clone+0x22f/0x820 [ 210.489018][ T7509] ? __cfi_kernel_clone+0x10/0x10 [ 210.494107][ T7509] ? __kasan_check_write+0x14/0x20 [ 210.499233][ T7509] ? mutex_unlock+0x8f/0x230 [ 210.503833][ T7509] __x64_sys_clone+0x193/0x200 [ 210.508611][ T7509] ? __cfi___x64_sys_clone+0x10/0x10 [ 210.513906][ T7509] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 210.520327][ T7509] x64_sys_call+0x990/0x9a0 [ 210.524832][ T7509] do_syscall_64+0x4c/0xa0 [ 210.529259][ T7509] ? clear_bhb_loop+0x30/0x80 [ 210.533936][ T7509] ? clear_bhb_loop+0x30/0x80 [ 210.538617][ T7509] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 210.544553][ T7509] RIP: 0033:0x7fa37e99c819 [ 210.549598][ T7509] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 210.570038][ T7509] RSP: 002b:00007fa37f867fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 210.578652][ T7509] RAX: ffffffffffffffda RBX: 00007fa37ec15fa0 RCX: 00007fa37e99c819 [ 210.586718][ T7509] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000005000000 [ 210.594689][ T7509] RBP: 00007fa37f868090 R08: 0000000000000000 R09: 0000000000000000 [ 210.602842][ T7509] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 210.610817][ T7509] R13: 00007fa37ec16038 R14: 00007fa37ec15fa0 R15: 00007ffe567f3438 [ 210.618883][ T7509] [ 210.703394][ T7509] Mem-Info: [ 210.706964][ T7509] active_anon:15448 inactive_anon:0 isolated_anon:0 [ 210.706964][ T7509] active_file:26468 inactive_file:2371 isolated_file:0 [ 210.706964][ T7509] unevictable:0 dirty:116 writeback:0 [ 210.706964][ T7509] slab_reclaimable:8096 slab_unreclaimable:76677 [ 210.706964][ T7509] mapped:32187 shmem:3063 pagetables:646 [ 210.706964][ T7509] sec_pagetables:0 bounce:0 [ 210.706964][ T7509] kernel_misc_reclaimable:0 [ 210.706964][ T7509] free:1505377 free_pcp:5287 free_cma:0 [ 210.898481][ T7519] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.906002][ T7519] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.915316][ T7519] device bridge_slave_0 entered promiscuous mode [ 210.923297][ T7519] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.930359][ T7519] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.938541][ T7519] device bridge_slave_1 entered promiscuous mode [ 211.010388][ T7519] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.017547][ T7519] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.025033][ T7519] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.032443][ T7519] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.039920][ T7509] Node 0 active_anon:85948kB inactive_anon:0kB active_file:105872kB inactive_file:9484kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:148656kB dirty:520kB writeback:0kB shmem:32080kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4624kB pagetables:2648kB sec_pagetables:0kB all_unreclaimable? no [ 211.074798][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.081741][ T7509] DMA32 free:2966484kB boost:0kB min:31276kB low:39092kB high:46908kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971912kB mlocked:0kB bounce:0kB free_pcp:5428kB local_pcp:5428kB free_cma:0kB [ 211.110426][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.139833][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.147867][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.166499][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.179574][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.188118][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.195198][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.204318][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.212839][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.221422][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.228470][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.232685][ T7509] lowmem_reserve[]: 0 3932 3932 3932 [ 211.270366][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.279349][ T7509] Normal free:3004808kB boost:0kB min:42448kB low:53060kB high:63672kB reserved_highatomic:0KB active_anon:102948kB inactive_anon:0kB active_file:105872kB inactive_file:9484kB unevictable:0kB writepending:520kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:24116kB local_pcp:13812kB free_cma:0kB [ 211.312590][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.321436][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.329763][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.349053][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 211.362185][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.381354][ T7519] device veth0_vlan entered promiscuous mode [ 211.424853][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 211.445007][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.461970][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.471636][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.479180][ T7509] lowmem_reserve[]: 0 0 0 0 [ 211.484034][ T7509] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (M) 722*4096kB (M) = 2966484kB [ 211.488914][ T7519] device veth1_macvtap entered promiscuous mode [ 211.507051][ T7509] Normal: 9*4kB (E) 13*8kB (UE) 1*16kB (E) 430*32kB (M) 810*64kB (UME) 503*128kB (UM) 176*256kB (UME) 53*512kB (UME) 36*1024kB (UME) 17*2048kB (UME) 664*4096kB (M) = 2993756kB [ 211.525162][ T7509] 44709 total pagecache pages [ 211.529951][ T7509] 0 pages in swap cache [ 211.539434][ T7509] Free swap = 124512kB [ 211.543841][ T7509] Total swap = 124996kB [ 211.548007][ T7509] 2097051 pages RAM [ 211.552729][ T7509] 0 pages HighMem/MovableOnly [ 211.557532][ T7509] 347473 pages reserved [ 211.693099][ T7509] 0 pages cma reserved [ 211.699299][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 211.714505][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 211.750395][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 211.771925][ T10] device bridge_slave_1 left promiscuous mode [ 211.778122][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.800308][ T10] device bridge_slave_0 left promiscuous mode [ 211.818414][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.842162][ T10] device veth1_macvtap left promiscuous mode [ 211.848308][ T10] device veth0_vlan left promiscuous mode [ 211.973719][ T7564] device veth0_to_team entered promiscuous mode [ 211.989300][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 211.998755][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 212.047752][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 212.074569][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 212.088447][ T7593] syzkaller0: tun_chr_ioctl cmd 2147767521 [ 213.273641][ T10] device bridge_slave_1 left promiscuous mode [ 213.294476][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.586378][ T10] device bridge_slave_0 left promiscuous mode [ 217.598758][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.611413][ T10] device veth1_macvtap left promiscuous mode [ 217.617615][ T10] device veth0_vlan left promiscuous mode [ 217.933115][ T7623] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.970457][ T7623] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.982737][ T7623] device bridge_slave_0 entered promiscuous mode [ 218.040659][ T7623] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.048112][ T7623] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.056177][ T7623] device bridge_slave_1 entered promiscuous mode [ 218.298014][ T7623] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.305141][ T7623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.312579][ T7623] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.319635][ T7623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.356819][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.380455][ T2684] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.453525][ T2684] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.492237][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.510944][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.518065][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.552230][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.590784][ T2684] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.597902][ T2684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.618934][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.654206][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.716629][ T7696] device syzkaller0 entered promiscuous mode [ 218.750004][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.789751][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.803887][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.880416][ T7623] device veth0_vlan entered promiscuous mode [ 218.891226][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.906897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.098349][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.119660][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.242240][ T7623] device veth1_macvtap entered promiscuous mode [ 219.289293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.301407][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.351686][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.374239][ T7717] dvmrp1: tun_chr_ioctl cmd 1074812118 [ 219.400087][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.421508][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.971667][ T7743] device sit0 left promiscuous mode [ 220.127357][ T7745] device sit0 entered promiscuous mode [ 221.331768][ T8] device bridge_slave_1 left promiscuous mode [ 221.338063][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.362000][ T8] device bridge_slave_0 left promiscuous mode [ 221.368793][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.431880][ T8] device veth1_macvtap left promiscuous mode [ 221.438361][ T8] device veth0_vlan left promiscuous mode [ 221.820550][ T7815] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 221.828151][ T7815] syzkaller0: linktype set to 768 [ 221.834530][ T7816] ªªªªªª: renamed from vlan0 [ 221.844998][ T7776] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.854275][ T7776] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.870043][ T7776] device bridge_slave_0 entered promiscuous mode [ 221.916901][ T7776] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.925529][ T7776] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.940823][ T7776] device bridge_slave_1 entered promiscuous mode [ 222.361148][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.376118][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.456327][ T7844] device syzkaller0 entered promiscuous mode [ 222.482699][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.497637][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.513074][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.520193][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.528003][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.536529][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.544958][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.552031][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.559559][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.568392][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.579654][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.616447][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 222.627017][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.635629][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.645003][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.676198][ T7776] device veth0_vlan entered promiscuous mode [ 222.715085][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.724952][ T7776] device veth1_macvtap entered promiscuous mode [ 222.908208][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.926991][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.701817][ T311] device bridge_slave_1 left promiscuous mode [ 223.708020][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.715995][ T311] device bridge_slave_0 left promiscuous mode [ 223.722362][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.730672][ T311] device veth1_macvtap left promiscuous mode [ 223.737110][ T311] device veth0_vlan left promiscuous mode [ 224.107846][ T7940] device syzkaller0 entered promiscuous mode [ 224.412697][ T7946] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.478790][ T7946] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.544661][ T7946] device bridge_slave_0 entered promiscuous mode [ 224.628070][ T7946] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.701181][ T7946] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.800288][ T7946] device bridge_slave_1 entered promiscuous mode [ 225.192914][ T7988] syz_tun: refused to change device tx_queue_len [ 225.242226][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.255752][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.295341][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.331522][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.369324][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.376484][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.407440][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.425888][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.440865][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.447984][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.488013][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.509514][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.532455][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.540712][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.549333][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.575428][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 225.592969][ T8000] syzkaller0: tun_net_xmit 1280 [ 225.607600][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 225.634616][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 225.677595][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.686163][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 225.701693][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 225.732183][ T7946] device veth0_vlan entered promiscuous mode [ 225.784517][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 225.817684][ T7946] device veth1_macvtap entered promiscuous mode [ 225.850552][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 225.873052][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 225.988246][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 226.010319][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 226.941195][ T28] audit: type=1400 audit(1776379657.354:158): avc: denied { create } for pid=8025 comm="syz.3.2340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 227.095697][ T8035] device syzkaller0 entered promiscuous mode [ 227.114104][ T8] device bridge_slave_1 left promiscuous mode [ 227.133372][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.144795][ T8] device bridge_slave_0 left promiscuous mode [ 227.151874][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.170453][ T8] device veth1_macvtap left promiscuous mode [ 227.177706][ T8] device veth0_vlan left promiscuous mode [ 227.345116][ T8043] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.359047][ T8043] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.373772][ T8043] device bridge_slave_0 entered promiscuous mode [ 227.386025][ T8043] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.415974][ T8043] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.439317][ T8043] device bridge_slave_1 entered promiscuous mode [ 227.690090][ T8043] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.697273][ T8043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.704916][ T8043] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.711992][ T8043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.838427][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.857051][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.915331][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.968516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.989168][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.996416][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.045988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.073959][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.081085][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.144047][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.185725][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.221330][ T8119] device syzkaller0 left promiscuous mode [ 228.248093][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 228.276830][ T1858] syzkaller0: tun_net_xmit 76 [ 228.282516][ T1858] syzkaller0: tun_net_xmit 48 [ 228.305050][ T8043] device veth0_vlan entered promiscuous mode [ 228.311596][ T1858] syzkaller0: tun_net_xmit 76 [ 228.339221][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.368089][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.396766][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.441972][ T8043] device veth1_macvtap entered promiscuous mode [ 228.455984][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 228.475637][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 228.501628][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 228.610678][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 228.619234][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 228.639531][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 228.651780][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 228.983644][ T8250] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.990817][ T8250] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.998819][ T8250] device bridge_slave_0 entered promiscuous mode [ 229.006613][ T8250] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.013859][ T8250] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.021639][ T8250] device bridge_slave_1 entered promiscuous mode [ 229.097437][ T8250] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.104572][ T8250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.112106][ T8250] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.119259][ T8250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.149372][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.168593][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.175918][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.196201][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.211357][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.218425][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.227270][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.235732][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.242826][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.270033][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.278145][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.294135][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.304222][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.312586][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.320104][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.328851][ T8250] device veth0_vlan entered promiscuous mode [ 229.340806][ T8] GPL: port 1(erspan0) entered disabled state [ 229.350414][ T8] device erspan0 left promiscuous mode [ 229.356104][ T8] GPL: port 1(erspan0) entered disabled state [ 229.369366][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 229.377835][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.387191][ T8250] device veth1_macvtap entered promiscuous mode [ 229.396310][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 229.404240][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 229.412758][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 229.426755][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 229.435589][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 229.562564][ T8] device bridge_slave_1 left promiscuous mode [ 229.568731][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.576403][ T8] device bridge_slave_0 left promiscuous mode [ 229.582554][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.590627][ T8] device veth1_macvtap left promiscuous mode [ 229.596776][ T8] device veth0_vlan left promiscuous mode [ 230.283494][ T8290] device wg2 left promiscuous mode [ 230.335760][ T8290] device wg2 entered promiscuous mode [ 230.528518][ T8274] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.542876][ T8274] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.558193][ T8274] device bridge_slave_0 entered promiscuous mode [ 230.621847][ T8274] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.643805][ T8274] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.659168][ T8274] device bridge_slave_1 entered promiscuous mode [ 231.020231][ T8274] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.027450][ T8274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.118400][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.142063][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.162684][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.196399][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.207907][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.217695][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.224975][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.266249][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.281847][ T2684] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.288948][ T2684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.309864][ T8] device bridge_slave_1 left promiscuous mode [ 231.316606][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.331685][ T8] device bridge_slave_0 left promiscuous mode [ 231.337931][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.389418][ T8] device veth1_macvtap left promiscuous mode [ 231.395825][ T8] device veth0_vlan left promiscuous mode [ 231.606729][ T8337] device syzkaller0 entered promiscuous mode [ 231.643653][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.676070][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.713840][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.725114][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.776809][ T8347] device syzkaller0 entered promiscuous mode [ 231.802625][ T8352] device syzkaller0 left promiscuous mode [ 231.863320][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.881462][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.891745][ T8347] device syzkaller0 entered promiscuous mode [ 231.914136][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.923702][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.931961][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.949464][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.971951][ T8274] device veth0_vlan entered promiscuous mode [ 232.016796][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 232.041549][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.057292][ T8274] device veth1_macvtap entered promiscuous mode [ 232.123863][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.134689][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.150482][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.198185][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.260312][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.461763][ T8] device bridge_slave_1 left promiscuous mode [ 233.468015][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.475682][ T8] device bridge_slave_0 left promiscuous mode [ 233.481896][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.489846][ T8] device veth1_macvtap left promiscuous mode [ 233.504362][ T8] device veth0_vlan left promiscuous mode [ 233.800546][ T8414] device syzkaller0 entered promiscuous mode [ 234.004386][ T8441] device syzkaller0 entered promiscuous mode [ 234.011589][ T8413] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.018673][ T8413] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.029601][ T8413] device bridge_slave_0 entered promiscuous mode [ 234.062341][ T8413] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.069687][ T8413] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.077615][ T8413] device bridge_slave_1 entered promiscuous mode [ 234.123754][ T8429] device syzkaller0 entered promiscuous mode [ 234.177255][ T8413] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.184393][ T8413] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.191723][ T8413] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.198861][ T8413] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.280284][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.288804][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.304770][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.368931][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.381703][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.389002][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.397635][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.406585][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.413820][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.437652][ T8460] device syzkaller0 entered promiscuous mode [ 234.461443][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.469894][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.507035][ T8413] device veth0_vlan entered promiscuous mode [ 234.514715][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.528867][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.555761][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.599135][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.643768][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 234.688747][ T8413] device veth1_macvtap entered promiscuous mode [ 234.733302][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.805558][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 235.631734][ T8] device bridge_slave_1 left promiscuous mode [ 235.637890][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.645657][ T8] device bridge_slave_0 left promiscuous mode [ 235.651946][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.659865][ T8] device veth1_macvtap left promiscuous mode [ 235.666076][ T8] device veth0_vlan left promiscuous mode [ 236.737032][ T8537] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.755860][ T8537] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.781959][ T8537] device bridge_slave_0 entered promiscuous mode [ 236.818667][ T8537] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.826888][ T8537] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.836029][ T8537] device bridge_slave_1 entered promiscuous mode [ 236.860543][ T8563] device sit0 left promiscuous mode [ 237.007437][ T8572] device sit0 entered promiscuous mode [ 237.205716][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.224452][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.250539][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.261428][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.269758][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.276828][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.285943][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.294475][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.303025][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.310081][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.317724][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.340211][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.364902][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.470827][ T8600] device syzkaller0 entered promiscuous mode [ 237.528318][ T8537] device veth0_vlan entered promiscuous mode [ 237.567432][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.577617][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.586703][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.603895][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.619416][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 237.657961][ T8537] device veth1_macvtap entered promiscuous mode [ 237.704834][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.804395][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.792499][ T311] device bridge_slave_1 left promiscuous mode [ 238.798687][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.806478][ T311] device bridge_slave_0 left promiscuous mode [ 238.812719][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.820568][ T311] device veth1_macvtap left promiscuous mode [ 238.826907][ T311] device veth0_vlan left promiscuous mode [ 239.513179][ T8635] device syzkaller0 entered promiscuous mode [ 239.948674][ T8640] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.966318][ T8640] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.000491][ T8640] device bridge_slave_0 entered promiscuous mode [ 240.023609][ T8640] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.031136][ T8640] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.038708][ T8640] device bridge_slave_1 entered promiscuous mode [ 240.315888][ T8640] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.323118][ T8640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.330434][ T8640] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.337501][ T8640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.381977][ T8701] device syzkaller0 entered promiscuous mode [ 240.436735][ T798] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.445635][ T798] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.454446][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.462315][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.492013][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.549939][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.557108][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.586048][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.601396][ T2684] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.608565][ T2684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.617911][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.644475][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.773614][ T8735] device syzkaller0 entered promiscuous mode [ 240.941332][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.992466][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.004702][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.019356][ T8640] device veth0_vlan entered promiscuous mode [ 241.031517][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.075653][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.106007][ T8640] device veth1_macvtap entered promiscuous mode [ 241.170922][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 241.185895][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 241.227189][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 241.573851][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 241.582932][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 241.619402][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 241.638668][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.593454][ T307] device bridge_slave_1 left promiscuous mode [ 245.601185][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.609625][ T307] device bridge_slave_0 left promiscuous mode [ 245.615996][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.624493][ T307] device veth1_macvtap left promiscuous mode [ 245.630661][ T307] device veth0_vlan left promiscuous mode [ 245.772220][ T8812] device wg2 left promiscuous mode [ 245.807504][ T8830] device wg2 entered promiscuous mode [ 245.822590][ T8791] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.831693][ T8791] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.839099][ T8791] device bridge_slave_0 entered promiscuous mode [ 245.893579][ T8791] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.901651][ T8791] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.917433][ T8791] device bridge_slave_1 entered promiscuous mode [ 246.200813][ T8791] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.207938][ T8791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.215285][ T8791] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.222455][ T8791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.318164][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.342088][ T798] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.375529][ T798] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.434506][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.475532][ T798] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.482640][ T798] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.541372][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.582126][ T798] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.589421][ T798] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.676527][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 246.741428][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.780611][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.858422][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.892368][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.925554][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.040787][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 247.067233][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.108016][ T8791] device veth0_vlan entered promiscuous mode [ 247.126033][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.147307][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.187643][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 247.201397][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.236798][ T8791] device veth1_macvtap entered promiscuous mode [ 247.267378][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.277597][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 247.301554][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.338359][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 247.375443][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.232239][ T307] device bridge_slave_1 left promiscuous mode [ 248.238423][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.261512][ T307] device bridge_slave_0 left promiscuous mode [ 248.267689][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.292243][ T307] device veth1_macvtap left promiscuous mode [ 248.298337][ T307] device veth0_vlan left promiscuous mode [ 249.304587][ T8918] device bridge_slave_1 left promiscuous mode [ 249.322109][ T8918] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.343446][ T8918] device bridge_slave_0 left promiscuous mode [ 249.350544][ T8918] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.650289][ T8923] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.658095][ T8923] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.665701][ T8923] device bridge_slave_0 entered promiscuous mode [ 249.722386][ T8923] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.742781][ T8923] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.750334][ T8923] device bridge_slave_1 entered promiscuous mode [ 249.973152][ T8923] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.980436][ T8923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.987767][ T8923] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.994908][ T8923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.087612][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.125397][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.139993][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.166349][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.175569][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.182671][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.222856][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.249432][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.256643][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.281521][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.292590][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.323507][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.334241][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.342489][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.350187][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.375267][ T8923] device veth0_vlan entered promiscuous mode [ 250.390405][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.518707][ T8923] device veth1_macvtap entered promiscuous mode [ 250.540872][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 250.558836][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.723044][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 250.742376][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.351734][ T8] device bridge_slave_1 left promiscuous mode [ 252.358230][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.365902][ T8] device bridge_slave_0 left promiscuous mode [ 252.372403][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.380265][ T8] device veth1_macvtap left promiscuous mode [ 252.386345][ T8] device veth0_vlan left promiscuous mode [ 253.242066][ T9017] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.263624][ T9017] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.299058][ T9017] device bridge_slave_0 entered promiscuous mode [ 253.327562][ T9017] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.373268][ T9017] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.381176][ T9017] device bridge_slave_1 entered promiscuous mode [ 253.585164][ T9017] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.592375][ T9017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.599723][ T9017] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.606779][ T9017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.652528][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.661673][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.695470][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.707581][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.736546][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.749471][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.759294][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.766402][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.774575][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.791581][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.816582][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.823797][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.873610][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.909225][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.937983][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.965532][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.039615][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.051636][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.075818][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.114558][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.169951][ T9017] device veth0_vlan entered promiscuous mode [ 254.181859][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.189829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.208730][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.217532][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.228006][ T9017] device veth1_macvtap entered promiscuous mode [ 254.239398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.247522][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 254.275626][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.305764][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.323751][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.471823][ T307] device bridge_slave_1 left promiscuous mode [ 255.477957][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.485585][ T307] device bridge_slave_0 left promiscuous mode [ 255.491867][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.499578][ T307] device veth1_macvtap left promiscuous mode [ 255.505637][ T307] device veth0_vlan left promiscuous mode [ 256.703614][ T9102] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.763008][ T9102] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.786534][ T9102] device bridge_slave_0 entered promiscuous mode [ 256.827514][ T9122] device sit0 entered promiscuous mode [ 256.989930][ T9123] device syzkaller0 entered promiscuous mode [ 257.027889][ T9102] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.038358][ T9102] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.146680][ T9102] device bridge_slave_1 entered promiscuous mode [ 257.232949][ T9132] device veth1_macvtap entered promiscuous mode [ 257.245913][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.582008][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 257.595528][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.639005][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.654910][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.671401][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.678508][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.686156][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.701791][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.715583][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.722678][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.770861][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.779787][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 257.796595][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.809380][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.838828][ T9102] device veth0_vlan entered promiscuous mode [ 257.859930][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.872689][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.887322][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.933402][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.942862][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.957066][ T9102] device veth1_macvtap entered promiscuous mode [ 257.986721][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.998114][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 258.014277][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 258.063838][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 258.093870][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 259.131582][ T8] device bridge_slave_1 left promiscuous mode [ 259.137717][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.145178][ T8] device bridge_slave_0 left promiscuous mode [ 259.151507][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.159163][ T8] device veth1_macvtap left promiscuous mode [ 259.165259][ T8] device veth0_vlan left promiscuous mode [ 260.617008][ T9243] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.715117][ T9243] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.815134][ T9243] device bridge_slave_0 entered promiscuous mode [ 260.912461][ T9243] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.999280][ T9243] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.073652][ T9243] device bridge_slave_1 entered promiscuous mode [ 261.498492][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.506322][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 261.527303][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 261.552831][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.580206][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.587342][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.630102][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.638466][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 261.647144][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 261.666010][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.673122][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.708084][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 261.716593][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 261.740942][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.781290][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.789904][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.797921][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.820182][ T9243] device veth0_vlan entered promiscuous mode [ 261.844801][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.869131][ T9243] device veth1_macvtap entered promiscuous mode [ 261.913940][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.041241][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.121873][ T9306] device syzkaller0 entered promiscuous mode [ 262.262353][ T9315] syz_tun: refused to change device tx_queue_len [ 263.181658][ T2684] device bridge_slave_1 left promiscuous mode [ 263.187887][ T2684] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.195520][ T2684] device bridge_slave_0 left promiscuous mode [ 263.201829][ T2684] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.209734][ T2684] device veth1_macvtap left promiscuous mode [ 263.215839][ T2684] device veth0_vlan left promiscuous mode [ 264.410597][ T9336] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.451154][ T9336] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.498192][ T9336] device bridge_slave_0 entered promiscuous mode [ 264.540760][ T9336] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.592327][ T9336] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.600038][ T9336] device bridge_slave_1 entered promiscuous mode [ 264.841711][ T9336] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.849008][ T9336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.856518][ T9336] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.863593][ T9336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.939021][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.962474][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.980420][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.010324][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.046920][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.091659][ T9381] device syzkaller0 entered promiscuous mode [ 265.099855][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.158903][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 265.261370][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.272882][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.288206][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.322794][ T9336] device veth0_vlan entered promiscuous mode [ 265.355078][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 265.366822][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.385357][ T9336] device veth1_macvtap entered promiscuous mode [ 265.443443][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.453396][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.469528][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.485144][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 265.501774][ T798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 266.482209][ T2684] device bridge_slave_1 left promiscuous mode [ 266.488459][ T2684] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.496082][ T2684] device bridge_slave_0 left promiscuous mode [ 266.502309][ T2684] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.510044][ T2684] device veth1_macvtap left promiscuous mode [ 266.516101][ T2684] device veth0_vlan left promiscuous mode [ 267.826563][ T9455] ref_ctr_offset mismatch. inode: 0xbf8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 267.881655][ T9455] GPL: port 1(erspan0) entered blocking state [ 267.888059][ T9455] GPL: port 1(erspan0) entered disabled state [ 267.934674][ T9455] device erspan0 entered promiscuous mode [ 267.949121][ T9476] GPL: port 1(erspan0) entered blocking state [ 267.955244][ T9476] GPL: port 1(erspan0) entered forwarding state [ 268.142957][ T9475] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.151711][ T9475] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.159517][ T9475] device bridge_slave_0 entered promiscuous mode [ 268.175900][ T9475] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.201218][ T9475] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.209059][ T9475] device bridge_slave_1 entered promiscuous mode [ 268.225057][ T9496] device veth1_macvtap left promiscuous mode [ 268.306245][ T9496] device veth1_macvtap entered promiscuous mode [ 268.317664][ T9496] device macsec0 entered promiscuous mode [ 269.007854][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.024780][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.902754][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.911249][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.919466][ T307] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.926533][ T307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.961300][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.001228][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.020390][ T307] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.027599][ T307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.046553][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.105159][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.121805][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 270.140113][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.203111][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 270.211881][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.225492][ T9475] device veth0_vlan entered promiscuous mode [ 270.234382][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 270.246751][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.267867][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.281264][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.292252][ T9475] device veth1_macvtap entered promiscuous mode [ 270.302260][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.310663][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.320748][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.335673][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.344162][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.377930][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.402005][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.341730][ T311] device bridge_slave_1 left promiscuous mode [ 271.347887][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.356098][ T311] device bridge_slave_0 left promiscuous mode [ 271.362594][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.370854][ T311] device veth1_macvtap left promiscuous mode [ 271.377108][ T311] device veth0_vlan left promiscuous mode [ 272.649593][ T9557] device sit0 left promiscuous mode [ 272.695990][ T9556] device sit0 entered promiscuous mode [ 272.870421][ T28] audit: type=1400 audit(1776379703.274:159): avc: denied { create } for pid=9581 comm="syz.1.2772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 273.055281][ T9570] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.062390][ T9570] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.069942][ T9570] device bridge_slave_0 entered promiscuous mode [ 273.077231][ T9570] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.086004][ T9570] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.093640][ T9570] device bridge_slave_1 entered promiscuous mode [ 273.165601][ T9570] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.172706][ T9570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.180031][ T9570] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.187114][ T9570] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.213891][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.226847][ T2684] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.241508][ T2684] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.262539][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 273.282085][ T2684] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.289189][ T2684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.309550][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 273.319198][ T2684] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.326293][ T2684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.378765][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 273.431608][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 273.631188][ C1] ================================================================== [ 273.639669][ C1] BUG: KASAN: slab-out-of-bounds in __bpf_get_stackid+0x6fa/0x960 [ 273.643184][ T9570] device veth0_vlan entered promiscuous mode [ 273.647678][ C1] Write of size 80 at addr ffff888133288a10 by task syz.1.2785/9637 [ 273.647700][ C1] [ 273.647705][ C1] CPU: 1 PID: 9637 Comm: syz.1.2785 Not tainted syzkaller #0 [ 273.672701][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 273.682792][ C1] Call Trace: [ 273.686366][ C1] [ 273.689237][ C1] __dump_stack+0x21/0x24 [ 273.691410][ T9570] device veth1_macvtap entered promiscuous mode [ 273.693600][ C1] dump_stack_lvl+0x110/0x170 [ 273.704603][ C1] ? __cfi_dump_stack_lvl+0x8/0x8 [ 273.709679][ C1] ? __bpf_get_stackid+0x6fa/0x960 [ 273.714868][ C1] print_address_description+0x71/0x200 [ 273.720454][ C1] print_report+0x4a/0x60 [ 273.724840][ C1] kasan_report+0x122/0x150 [ 273.729393][ C1] ? __bpf_get_stackid+0x6fa/0x960 [ 273.734631][ C1] kasan_check_range+0x249/0x2a0 [ 273.739785][ C1] ? __bpf_get_stackid+0x6fa/0x960 [ 273.744932][ C1] memcpy+0x44/0x70 [ 273.748860][ C1] __bpf_get_stackid+0x6fa/0x960 [ 273.753830][ C1] bpf_get_stackid_pe+0x2ee/0x400 [ 273.758895][ C1] bpf_prog_a448e89f4c9ad9d1+0x28/0x42 [ 273.764946][ C1] bpf_overflow_handler+0x3d0/0x5e0 [ 273.770194][ C1] ? __cfi_bpf_overflow_handler+0x10/0x10 [ 273.776052][ C1] ? kvm_sched_clock_read+0x18/0x40 [ 273.781377][ C1] ? __this_cpu_preempt_check+0x13/0x20 [ 273.786958][ C1] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 273.793424][ C1] __perf_event_overflow+0x437/0x620 [ 273.798749][ C1] perf_swevent_hrtimer+0x400/0x5b0 [ 273.804002][ C1] ? __cfi_perf_swevent_hrtimer+0x10/0x10 [ 273.809782][ C1] ? timerqueue_add+0x20e/0x230 [ 273.814784][ C1] ? timerqueue_del+0xd3/0x120 [ 273.819670][ C1] ? __cfi_perf_swevent_hrtimer+0x10/0x10 [ 273.825419][ C1] __hrtimer_run_queues+0x3bb/0x8e0 [ 273.830658][ C1] ? hrtimer_interrupt+0x8c0/0x8c0 [ 273.835812][ C1] ? ktime_get_update_offsets_now+0x30c/0x320 [ 273.841902][ C1] hrtimer_interrupt+0x3c7/0x8c0 [ 273.846871][ C1] __sysvec_apic_timer_interrupt+0x11e/0x440 [ 273.852889][ C1] sysvec_apic_timer_interrupt+0xa4/0xc0 [ 273.858559][ C1] [ 273.861624][ C1] [ 273.864722][ C1] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 273.870734][ C1] RIP: 0010:kasan_check_range+0x67/0x2a0 [ 273.876579][ C1] Code: 00 00 fc ff df 49 89 fe 49 c1 ee 03 49 ba 00 00 00 00 00 fc ff df 4f 8d 1c 16 4c 8d 44 3e ff 4d 89 c1 49 c1 e9 03 4b 8d 1c 29 <49> 89 dc 4d 29 dc 49 83 fc 10 7f 29 4d 85 e4 0f 84 45 01 00 00 4c [ 273.896310][ C1] RSP: 0018:ffffc90000e47af8 EFLAGS: 00000a03 [ 273.902414][ C1] RAX: f3f3f3f8f1f1f101 RBX: ffffed1026808b03 RCX: ffffffff84ffeb62 [ 273.910417][ C1] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff888134045810 [ 273.918420][ C1] RBP: ffffc90000e47b20 R08: ffff888134045817 R09: 1ffff11026808b02 [ 273.926426][ C1] R10: dffffc0000000000 R11: ffffed1026808b02 R12: dffffc0000000000 [ 273.934806][ C1] R13: dffffc0000000001 R14: 1ffff11026808b02 R15: ffffc90000e47b60 [ 273.942809][ C1] ? mutex_unlock+0x82/0x230 [ 273.947439][ C1] __kasan_check_write+0x14/0x20 [ 273.952486][ C1] mutex_unlock+0x82/0x230 [ 273.956988][ C1] ? __cfi_mutex_unlock+0x10/0x10 [ 273.962154][ C1] ? __perf_event_set_bpf_prog+0x301/0x720 [ 273.968021][ C1] perf_ioctl+0x1406/0x1e70 [ 273.972556][ C1] ? ioctl_has_perm+0x40f/0x4f0 [ 273.977440][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 273.983629][ C1] ? has_cap_mac_admin+0x370/0x370 [ 273.988801][ C1] ? __cfi_perf_ioctl+0x10/0x10 [ 273.993682][ C1] ? do_futex+0x2bf/0x430 [ 273.998043][ C1] ? selinux_file_ioctl+0x3a0/0x4d0 [ 274.003270][ C1] ? __cfi_do_futex+0x10/0x10 [ 274.007971][ C1] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 274.013553][ C1] ? __fget_files+0x2d5/0x330 [ 274.018269][ C1] ? security_file_ioctl+0x95/0xc0 [ 274.023502][ C1] ? __cfi_perf_ioctl+0x10/0x10 [ 274.028386][ C1] __se_sys_ioctl+0x12f/0x1b0 [ 274.033088][ C1] __x64_sys_ioctl+0x7b/0x90 [ 274.037720][ C1] x64_sys_call+0x58b/0x9a0 [ 274.042255][ C1] do_syscall_64+0x4c/0xa0 [ 274.046701][ C1] ? clear_bhb_loop+0x30/0x80 [ 274.051418][ C1] ? clear_bhb_loop+0x30/0x80 [ 274.056219][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 274.062402][ C1] RIP: 0033:0x7fa37e99c819 [ 274.066850][ C1] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 274.086572][ C1] RSP: 002b:00007fa37f847028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 274.095134][ C1] RAX: ffffffffffffffda RBX: 00007fa37ec16090 RCX: 00007fa37e99c819 [ 274.103198][ C1] RDX: 000000000000000a RSI: 0000000040042408 RDI: 000000000000000b [ 274.111805][ C1] RBP: 00007fa37ea32c91 R08: 0000000000000000 R09: 0000000000000000 [ 274.119968][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 274.127953][ C1] R13: 00007fa37ec16128 R14: 00007fa37ec16090 R15: 00007ffe567f3438 [ 274.136052][ C1] [ 274.139134][ C1] [ 274.141517][ C1] Allocated by task 9632: [ 274.146033][ C1] kasan_set_track+0x4b/0x70 [ 274.150651][ C1] kasan_save_alloc_info+0x25/0x30 [ 274.155879][ C1] __kasan_kmalloc+0x95/0xb0 [ 274.160564][ C1] __kmalloc_node+0xb2/0x1e0 [ 274.165160][ C1] bpf_map_area_alloc+0x4b/0xe0 [ 274.170024][ C1] prealloc_elems_and_freelist+0x8a/0x1e0 [ 274.175945][ C1] stack_map_alloc+0x3a7/0x530 [ 274.180800][ C1] map_create+0x49c/0xd80 [ 274.185143][ C1] __sys_bpf+0x34e/0x850 [ 274.189405][ C1] __x64_sys_bpf+0x7c/0x90 [ 274.193835][ C1] x64_sys_call+0x488/0x9a0 [ 274.198380][ C1] do_syscall_64+0x4c/0xa0 [ 274.202895][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 274.208791][ C1] [ 274.211139][ C1] The buggy address belongs to the object at ffff888133288a00 [ 274.211139][ C1] which belongs to the cache kmalloc-64 of size 64 [ 274.225131][ C1] The buggy address is located 16 bytes inside of [ 274.225131][ C1] 64-byte region [ffff888133288a00, ffff888133288a40) [ 274.238512][ C1] [ 274.240852][ C1] The buggy address belongs to the physical page: [ 274.247435][ C1] page:ffffea0004cca200 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888133288900 pfn:0x133288 [ 274.258974][ C1] flags: 0x4000000000000200(slab|zone=1) [ 274.264608][ C1] raw: 4000000000000200 ffffea0004e85888 ffffea0004ce1548 ffff888100042780 [ 274.273190][ C1] raw: ffff888133288900 000000000020001a 00000001ffffffff 0000000000000000 [ 274.281766][ C1] page dumped because: kasan: bad access detected [ 274.288171][ C1] page_owner tracks the page as allocated [ 274.293886][ C1] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 282, tgid 282 (syz-executor), ts 30479907168, free_ts 30479842620 [ 274.312139][ C1] post_alloc_hook+0x1f5/0x210 [ 274.317027][ C1] prep_new_page+0x1c/0x110 [ 274.321640][ C1] get_page_from_freelist+0x2d12/0x2d80 [ 274.327197][ C1] __alloc_pages+0x1fa/0x610 [ 274.331888][ C1] alloc_slab_page+0x6e/0xf0 [ 274.336500][ C1] new_slab+0x98/0x3d0 [ 274.340586][ C1] ___slab_alloc+0x6bd/0xb20 [ 274.345180][ C1] __slab_alloc+0x5e/0xa0 [ 274.349526][ C1] __kmem_cache_alloc_node+0x203/0x2c0 [ 274.355013][ C1] kmalloc_node_trace+0x26/0xb0 [ 274.359882][ C1] __get_vm_area_node+0x12c/0x360 [ 274.364994][ C1] __vmalloc_node_range+0x326/0x1430 [ 274.370283][ C1] vzalloc+0x78/0x90 [ 274.374183][ C1] xt_counters_alloc+0x44/0x50 [ 274.378966][ C1] __do_replace+0xb0/0x960 [ 274.383473][ C1] do_ip6t_set_ctl+0xb33/0xe00 [ 274.388240][ C1] page last free stack trace: [ 274.392906][ C1] free_unref_page_prepare+0x742/0x750 [ 274.398367][ C1] free_unref_page+0x95/0x540 [ 274.403099][ C1] __free_pages+0x67/0x100 [ 274.407514][ C1] __vunmap+0x9c0/0xb80 [ 274.411670][ C1] vfree+0x61/0x90 [ 274.415401][ C1] do_ip6t_get_ctl+0xeaf/0x1190 [ 274.420256][ C1] nf_getsockopt+0x27f/0x2a0 [ 274.425054][ C1] ipv6_getsockopt+0x223/0x2d0 [ 274.429849][ C1] tcp_getsockopt+0xff/0x130 [ 274.434443][ C1] sock_common_getsockopt+0xaa/0xc0 [ 274.439748][ C1] __sys_getsockopt+0x215/0x4a0 [ 274.444702][ C1] __x64_sys_getsockopt+0xbf/0xd0 [ 274.449842][ C1] x64_sys_call+0x3d/0x9a0 [ 274.454353][ C1] do_syscall_64+0x4c/0xa0 [ 274.458774][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 274.464764][ C1] [ 274.467110][ C1] Memory state around the buggy address: [ 274.472771][ C1] ffff888133288900: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 274.480848][ C1] ffff888133288980: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 274.489042][ C1] >ffff888133288a00: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 274.497363][ C1] ^ [ 274.502728][ C1] ffff888133288a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 274.510793][ C1] ffff888133288b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 274.518939][ C1] ================================================================== [ 274.527079][ C1] Disabling lock debugging due to kernel taint [ 274.571104][ T28] audit: type=1400 audit(1776379704.944:160): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 274.666272][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 274.710578][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 274.721813][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.736704][ T28] audit: type=1400 audit(1776379704.944:161): avc: denied { search } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 274.763279][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.780336][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 274.801648][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 274.811316][ T28] audit: type=1400 audit(1776379704.944:162): avc: denied { write } for pid=84 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 274.841581][ T2684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.961093][ T28] audit: type=1400 audit(1776379704.944:163): avc: denied { add_name } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 275.002063][ T28] audit: type=1400 audit(1776379704.944:164): avc: denied { create } for pid=84 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 275.022806][ T28] audit: type=1400 audit(1776379704.944:165): avc: denied { append open } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 275.051566][ T28] audit: type=1400 audit(1776379704.944:166): avc: denied { getattr } for pid=84 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 275.074571][ T28] audit: type=1400 audit(1776379705.274:167): avc: denied { unmount } for pid=9570 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 275.681952][ T307] device bridge_slave_1 left promiscuous mode [ 275.688242][ T307] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.695972][ T307] device bridge_slave_0 left promiscuous mode [ 275.702195][ T307] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.710402][ T307] device veth1_macvtap left promiscuous mode [ 275.716495][ T307] device veth0_vlan left promiscuous mode