last executing test programs: 1m15.993381689s ago: executing program 0 (id=10035): r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000780)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x9d, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x69, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc0189436, 0x2000141a) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000600000000000000ffffff7fb7080000000000007b8af8ff00000000b7080000524700007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500003857800000000000a50000009500000000000000e4f413c9cc5402c9ab8e8b0d31ab1fdf227f0d9dc47e7f0d35bf"], &(0x7f0000000140)='GPL\x00', 0x43, 0x0, 0x0, 0x41000, 0x8, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000540)={0x1, 0x1}, 0xffffffffffffffac, 0x10, &(0x7f0000000580)={0x1, 0xd, 0x0, 0x800}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[r1], &(0x7f0000000980)=[{0x0, 0x4, 0x3, 0x3}, {0x0, 0x4, 0xc, 0x7}, {0x1, 0x4, 0xe, 0xa}], 0x10, 0x2}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r5 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x1, 0xe, 0x4, 0xe, 0x0, 0x100, 0x8020, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, @perf_bp={&(0x7f00000000c0), 0x10}, 0x10000, 0x8, 0x1, 0x7, 0x0, 0x9, 0xc, 0x0, 0x1, 0x0, 0x5}, r5, 0x3, 0xffffffffffffffff, 0x8) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) r7 = openat$cgroup_procs(r6, 0x0, 0x2, 0x0) write$cgroup_pid(r7, &(0x7f00000005c0)=r5, 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000100)=r8, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x100000000000000, 0xffffffffffffffff, 0xb) syz_clone(0x2a801400, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) syz_clone(0x2040480, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0x3) r11 = openat$cgroup_procs(r10, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r11, &(0x7f00000001c0)=r9, 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x12) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 1m15.812741549s ago: executing program 0 (id=10038): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000005020000f8ffffffb703000008000000b70400000200000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r0}, 0x38) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000010000000000000000000000711217000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) sendmsg$inet(r3, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) r4 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000001000)='))&!*)\x00') 1m15.809807249s ago: executing program 0 (id=10039): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x45, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) mkdir(&(0x7f0000000080)='./file0\x00', 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000680)='syzkaller\x00'}, 0x6b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001300)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x143}, 0x48) 1m15.437640751s ago: executing program 0 (id=10044): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0xc8, 0x2, 0x7, 0x0, 0x10001, 0xa}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xe) openat$cgroup_subtree(r5, &(0x7f0000000180), 0x2, 0x0) 1m15.376931425s ago: executing program 0 (id=10045): r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000002c0)={&(0x7f0000000000)='-@', &(0x7f0000000040)=""/92, &(0x7f00000000c0)="dcde39960f5f728a61029434ab0722c094ea1b584d3b2319193eccf4efeb173fd83917eb61f51f87e811ba2615849bbfaf2eb0bc40772da0d397d2b4578548fe86939aaf0d88ed40e2925de9cdf550bb643c6993b3d7e34a4ea94237a5077e941df4bf7dd4bd5090265e87eeebfd351f460e24916403a9af96ed44a4f445523cdeec14d663eaa8dd51a17b04004c554d03d140e7e3063a543ef21c0a5af3da515e", &(0x7f0000000180)="6597c51da6bde9e6fd41fe6de3210216ce6e8ccf030f4233833b139e5305358e7bcdcdd77c8489429389b7f5c5be55e31eb151a5835a43edf6edfc1603b3448c2d4a6ca3cbcfbd62d15b3143de380e5f3de9aebda474536904f598f8c562c22c1cd6e0164276365cded64635ba71387c1f9160f65e72906f8f972b8e67096c915a88ad9493742d8f46917adaa93e903bb424822bb6ce906ffe20995771", 0x0, r0, 0x4}, 0x38) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x4, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffff001, 0x0, 0x0, 0x0, 0x200}, [@alu={0x4, 0x0, 0x4, 0xb, 0x9, 0x80, 0xfffffffffffffffc}]}, &(0x7f0000000340)='syzkaller\x00', 0x9, 0x6d, &(0x7f0000000380)=""/109, 0x40f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xa, 0x5, 0x40}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000480)=[r0, r0, r0, r0, r0, r0], &(0x7f00000004c0)=[{0x3, 0x5, 0x2, 0xb}, {0x27, 0x3, 0x1, 0x1}, {0x5, 0x4, 0x3, 0x6}, {0x4, 0x3, 0x3, 0xb}, {0x2, 0x4, 0xf, 0x2}, {0x1, 0x1, 0x1, 0x7}, {0x1, 0x2, 0x3, 0xb}, {0x4, 0x1, 0xa, 0x1}, {0x0, 0x1, 0x5, 0x3}, {0x3, 0x3, 0x7, 0x4}], 0x10, 0x9}, 0x94) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000640)={0xffffffffffffffff}, 0x4) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000700)={0x9, 0x0}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000680)={@cgroup=r3, r1, 0x35, 0x24, r2, @void, @void, @void, @value=r4}, 0x20) mkdirat$cgroup(r3, &(0x7f0000000740)='syz1\x00', 0x1ff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={@fallback=r1, r2, 0x10, 0x10, r1, @void, @value=r1}, 0x20) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000800)=@o_path={&(0x7f00000007c0)='./file0\x00', 0x0, 0x0, r1}, 0x18) r6 = openat$cgroup_ro(r3, &(0x7f0000000840)='cpuacct.usage_all\x00', 0x0, 0x0) sendmsg$unix(r6, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000880)="41e7816d1b861138f791d9e66e79301edf74801cf36559019fa3f231cabe49243c1bf09cd4e4ee64c1e1e62a5399b31101b653f1e5ceb41630a16c508b3f2832eb664183c5772c544984391e93f7957e592893e80f4e1cc50de19d4ebdb38b155948075fa8f60a22b8aff0d545d75b8cfd71eba7ad55f42c475845e8d54c065f60909d959d28523a59bb920692fadaa0c03cf686feaba129da50296ce0b2b3f92013819a6f8af3caab01ff23cc8ef7aa6a994c34d548b325df43c06c464a", 0xbe}, {&(0x7f0000000940)="cbf66f27", 0x4}, {&(0x7f0000000980)="af8cc820e78aacdee46466fe06b2a6737ecf6773714f167a95b5db9044a386e64cc8045c463a93fc7f81b6ce6f9267e028cc374cbf394229bbf451ae159dd43a56a1e694d30fa7cbbe3d357a2ff812b85eed92629584de29b6de3a65e22dd0b4ae1793a93d47e23b0a422d9da5f9388f2c0d8fc41b90ab8db056780ee62677f151bd8512233ea449a4a85e61035d147d55ae8d0a959104e4ed48b3413de9bfce86c7c9e7b484d8d43c8056817b39bbf88f2e2e0a628f679972a35849c591764711baf09dc453ca05a8c146645cee42ede90f760fb1a40f261c40b678e44751d65baf5b8f12b98dcad804a6b7b6712270a4c53c2f25791fd677e77e89310ff8c471c1972bdaf50ed94a9101eb25f4be13c52b0ec37e7a563e551b5ca0ee38c9898a4a0ccd8a57586e4398ac119abeec407c2b3ee493d579ec8f10603d66368c6d39d9a84b625c1e7af5450b2cb7420120e6510304ec246bd19d42643a4282449e801d39043c1df8b312b3e0f20f0ae1599345070c0439967ccab47b368dc39bb71b6d9e7528026f1d96ca6d42db06fc9063ccd1734241fce53126167ae715950c0f2e94fc84c6afe4596e64a7a697ea5f7279f993a6fda815ef2d1d2a666a9d7dd9765882a316a0684fc5953d1879a8a7e87e0b7cdcec86b56be9450bdc88438c71222e0a064723694eaf29c6c6010c5eb7f9fe19439dcfe712e0644eaec093da1f949b820680061c48628f2cde263c401cb7aa6d77e1556f69e8279f14782f18cf5732a1be581b177b4ca15a4b8f62a3d9b4b6ec7f3d507882c4331b9b8e8898417b4e0b728a7fe385db443686195c6bb1f945ee96422a2345ebb532485d0db0acae71ea8f9802503603416aece8f5c36de891aa5352978e68ee44259695f12d2197a14d47983615fe8083ebc8f4a4c38452b95eaf6a2c2a12e77982dfaf4052314960a482e90cbb2367a04672facef4f9a2912a8163ef66c294d446d4774b9977062336db8939b3571ccac2239ffaca8a693b74124fa450bfc8d37b648f6af9656e902ebb80352a5eca4b4868f006983aff2dc39b0b2b10b101f167af86d0932580e0b29d1b710b676862e0876ab922084e9efe126e1a78c0a1ac54be556d4efa0d546ec042e7fd31af4c838e576519284567e446cd7f375731c486a19d66be533543c8a60d08297d297ce98dbdfe2d5d7eaa73859161f6ca046576467edecd2d482520e4a41b75b547d6db270771d2dcbb72ef65e6d7586c92a330a3b571800d7ab51c02acc1da2614ffdfe383d66d59607c3423c084c5265fbee9225461dd9d2c9d1cbacee521701e1430c4e1d026a4344e4cc8eebba9fe87a1e3c8b7984e1233a6cd477a160119a386e350b6d0dfde7f12276f71050367d3525886bf56153728df6477826c3a1b2c0aaf826120cec636e2d36fb76667507544325efefd15c7cffcb28a4bf0847f16a997fe99e5420c1e1386b0453160388593c84a25e7939961d14215b2d6693d56dfc4ce66fd56cd0689305a47f852e776bb280bd1e3d73b564f6d2c6937cde781f78b88aefb1db7514e876675f51b0ae1772baa20981ec2f901b1f48baeaa595a30449c82befa85d7b59d013913855ddce7eb535720402a0f5d304880fd52a40decefc005594b35c36735595325449f59309a6e6c1b18e8a86beebfa2a30aa16b9544037ec013d7e21b335fe4f22b0c25515d8ed1917dd5151fdee5cb3ef1ad3ff18ecbbe7a0637a3def920df087ef05ec81c7941e4f2777fcd59bfa6870484eabf1b4c2a83db67f1878ecea3ad7f2294aeea5fc2b4511727da64bd7b7389cff1bcb62d2cf3f7b758f97d1579b1b218535c7d0f4a335c482f55ef0fe9f9887d0347b76745ef72fcd4d6e491b903963111d24354396062c45d3444b19072561d32bf2419116a1dd6691aeb79587ae9cfd8e8a6115841219e9704eba3d7815c836cc2ff966443a16d60f7131f0f036f4b06afee9a0ad1b908d94676dfe8364535aa5f7542b970498691f3a3fec7b7558369948e8c26c3ac80788c0d43627da26d1c43bd586d997896931cf08020996e0e06e1dbc2e14ced5bfc03ffd87b5aa772e2007864ffa46e39470584c4bc24aa84517095433d3f8880edbfe1a5e2ba2f93ef3eab9f4fae3e53f3b4f019446cad6442d4e170ae072007050d415db4c41d9d36c573cb30e958866673a3537825721170d5846ec57a052b5e2641f72c7bcb569f36ad34e02911db5b57c46015ed605cd05bce77be5a269bdb384d66fef41ec23cc154a474072698a631a4fc18f8c2cc61651d22172731edd21ba43669dcf9ff7870e640f69b4e40b21eb431d438b9e217350c257df7dc023ea30dc5f67841c52aca7d5597609ebf9109a1bed73b1dbbf1d36b472590ac9fd5ff200c35959ed67bf41c3c88447bfece00f283387d8784e448eeddf18b5b729745117b2fcbf3c83f4b7d5e81dcd1c5119a0539ec00b78359ce54cf8540ce7d96774d04c20fc8b87140309a9c88744ce7221934cb265989c48aac17bb6797e6bee27392bc4e0d18fa87d85f30c1df0322386c264fdfd142ee9453455dadbe6ea544596f926ad2b203fea043e9cbb2a90957472100ab6b2a1ebcb0ef18d3a091a8b4176be81a714b1beba7f8fa99c218226a07f1137d16b27126201758c61f4d730bee1f70a1c7b488189249160fdf8ae750311ee81cf54c5cf67f317353e47e95a12e9e2a5db6bd2ace9c5214eff4b0d82234c6c98caa53976e1fb7b5f925fcf4d6bb31302e584f7a15ec7db1436715bac07878871f6477be2205747ea9e21302baa3ca049501f346e4de532192f9bc6aaa64207f9e16f9782de5882f3be4aa0b8879ee6f313661e2cf100d40cec660713a7615bc1892314cffcd565e4909edd8f5657cb16d9376cc81e319b134fe2b02af62942c2b5d14fad54abaab1e1ddb062211e780f652b44267f953e9cbe705732a0915933cef23229842de82714c9f69eafd29db2f3e5b68c95cff9e5626944598ce5bd7957eb420fc5c56001aa1c72563c7bbb6301a4d77e4f25000b14c85c1175f6745e2b338890d8657c41b3a3db028485d99b37295830a2a605a852e3fd55902438b8bb98618f8455bac3b8bcfe9268832bae84ee614ec1393bedc92cb2d98d3d32af3fabab5973804a4e2303a315ef7e255801edde7a563fc0fcce99431b7eb7702be77182953095b4afd95375f77705b99c16441c4f5827ce8cdfb76b4ac4751298dec27344d16359eec6e9c5f9146acaa5bee0e26693c559bd947d8edca789df938f278bebb5fd4a50ca69670132b915f1ff39c5f7834cb967de32f760b5bfde83779ab8297377e93b8487e7dc12ecc245cf560635233df67f6bd33c1831fc84f35b802e515e11767363de476b82b8baae4ae783bf95c8c17df1ec4009189179b877209e1cb294ffebe1ff2ca1a86f1d21795b6372a50702376c54495f749480805dd905133fa4333fb17d7f4ecc4ea5dfdd7d572c0f140f56e53ad39f0179cb0d19ac00d34036c59de2905d71cb84475f1a783d247e14e13846c178a637ddffe4acd7bd367d6d74ff44b7e365f5516d5b97ba1e7c6a51e4b3eae6e5a943d3ae74314fcb0e3ad38760dc9f04d70de777f82dd673d21cbc7790602285dd709cdcb0fd2ad302bdebbff7ded499291947d32fa2c395c9c0e80679ec91041d533aa3076186bc9450064077b27efb7f0f9cb2f1e995c7b92a4774d5a18bab8f3d6ebe4b78d425f31a9922970e4952827ffd036e2ab8584c92e934b66613f94d84c58b607f9a84e85b308ab34bb24e711790a0ded3bb570db1e131ae6c4931cd4301a2ec13ab74e7908d3e16f162e2e932024784760465aad33989a5a8f5c6fc3479b80dcb1f7d1ce16f25a9636791001accecccb1f12a4ff85031da663eb1c3684fd2728293190599ea66a4dc11d40d3c1169371e05086fec7315c7e3320d838a3e1a18e40939a2c215259d70e9795e3c6f822362a28e8c3776b1408d9f7892143086a7a3c92ff752570a9a940348754ba5e4eeaecba539428ee87e8121e017e09973baa12558c65f8597efdd62887b230cc6b95b8dc614cc2e83202f2dc9cfe4123581c46ceaa91c84364bbf6774bff9f8146d3c6b3ab9c87446c7049d160a0c5f809285a6a41e39dd49ff1fdd253bf6aac77aaa4582083514a858f633130430f61428799bd4ca759b2cb636442544aa1557623219e0982596fca9fa3d8b14e5c7059304a465b3cc59bcfd73f05159b4ef2802f55edf02e5b2dd1785a370b9a1847553fd401dece4f83c13c982e06a3275615bcde605be1c9c21c2f915714891cca1c710231848042fb2c7355270c9d2301de7864b2548b6c17c1ad844888ad7f76c9bdf6385ceb30d1493e0eb0134265b8fa12fd0fd9e0c439f416c1cb970434b8a91b65c0212a6b78e2d367497e5694de50b74bf91b328344982c6c30bcc5ec1710809168c00e8438f5fbf3404c7b76c0a6368384ef7558414a66e4534f55cd6b901880f7df895786c159badc63f41df8f23662b7074f64057269023fa7866a9b2290166e9e21e758c5ac7f1b212a0e3f80dbe31450f11fa70ce31e1d362b35850d036581cfb21482e0ae35cbffb11f925205b6ce0f8acf10013117d3de62f305fa79d7a372a33607628d9d424884a5253590f544dcfce16a6a86cfb40337bd55184f732dda64b4ab31325ec0ea35ae94117db75cdfb719dc55bcd0c5eb5439a3dd907035816a7ec7adf7279549347b4c42e8cf9b38e1ee4d77ad2a2ae7983f8ce123448d6978862e86b633019e581bc72a8a6cebbee95bc7f615f33f812137366d914be6263d85dd1ba6c3011483bd0e4e3ba87a2c377a9941cff37c618f83e03ae2c882f915e502eb8a9a6ba709b41b557dd2d38b0877df6ed478bb5a6c8c59a2058bef1cffa9e20349918af1d853d630da6c78ba6009195bb8891b1a634e675bc7a98da518358363025a6a1cd5ac7c58d4b7111d56f781f32980956cc5a928bbad6ff7b2ad5e6f02ff036a92480e6ab09ed2f826c4eebb96c5bfce8558e6e7adce4e42ec36aeadcecec824ffa48d33793aee7daf33d37e4ad50b100e46a508c55cc31399a552e8b494c1e6603947b9d2337d6064dd974f40082e3230627cd08c16eaae698765b08a10dc30cd0fee5548bf849f6e333aa35e180d488bba2237392cbbf06c01e4883b4c3d00dda52316aed1449f729354468ba0ee4cae94fa87cc447304655c08c4d74f7f07bec6487df338f2a163bd4ed919ad553270dcc25e37bb3df4fef68059b2d61df612ef4add10eefea721a044410e6f7a4e50def06356c2422d873f99ff154ef8d5969023f49dde4b9902fe5a7fe94756aabfe9413d95d9cb979a75ddb8daad05e38a8abd9c5e1d64774716b3d1d8053eabf1fde430fac60c70190e1cb36815e1e1f8939766c390e29e340bddbb90ecebfe4f35299b37dfbbbd30c4b6b42d80a00ac12ed9f80e7b2ad39e68b55419cb689f48533f4133aad6ef049ae4faddde4a77b6d588b161825bc6aa4bf1cf375ac5df688b6507a4bbed5e0422de6cd6bdd8f87d394e34b5f1889ba785dd3a440c112855164801a61f07c609f05b023eb23538812ae03c709bdfabe654aa8071017a679ffe5329a137c55c19eaecd48f4caff48b8ba4ece8a3a7fcdd59be776fa6159f184a26b76e5bd525e4a77e60e8d2718ed10eed3e9ffe3c6f6401d8dace08ca5a651a715ed6656145aee701460a84b3feb3730596ba67ad569f12544b8d5269604f16e460a1ea0c8177f0f8b61a6a8f", 0x1000}, {&(0x7f0000001980)="d3150b673fc6d12327786cf131fb4446fbf22e6d1e88b6698f41bdeb5608d4fbb2826feef0d9142745a9ddad150dcf6b5694a67e72dd81fdd7b8541d36fae857beefdf06", 0x44}], 0x4, 0x0, 0x0, 0x4c001}, 0x20004004) unlink(&(0x7f0000001a80)='./file0\x00') bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001ac0)={0x4}, 0x8) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001b00)={r6, 0x1}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001b80)={r0, 0xffffffffffffffff}, 0x4) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001bc0)=@o_path={&(0x7f0000001b40)='./file0\x00', 0x0, 0x4010, r7}, 0x18) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c00)={r4}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001d40)={@fallback=r5, 0x26, 0x1, 0x6, &(0x7f0000001c40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000001c80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001cc0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001d00)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001d80)={@cgroup=r6, r9, 0x26, 0x1, r8, @void, @value=r5, @void, @void, r11}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e00)=@generic={&(0x7f0000001dc0)='./file0\x00', r6}, 0x18) ioctl$PERF_EVENT_IOC_REFRESH(r10, 0x2402, 0x6) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000001e40)={'veth0_to_batadv\x00', @multicast}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001f80)={@cgroup=r6, 0x15, 0x0, 0x9, &(0x7f0000001e80)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001ec0)=[0x0, 0x0], &(0x7f0000001f00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r13 = bpf$ITER_CREATE(0x21, &(0x7f0000002000)={r10}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001fc0)={@fallback=r0, r2, 0x14, 0x18, 0x0, @void, @value=r13, @void, @void, r12}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002080)=@generic={&(0x7f0000002040)='./file0\x00', r13}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000020c0)={r13, 0xffffffffffffffff}, 0x4) r15 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002440)={&(0x7f00000022c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x80000001}}, @var={0x7, 0x0, 0x0, 0xe, 0x1}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @ptr={0x4}, @type_tag={0x10, 0x0, 0x0, 0x12, 0x1}, @ptr={0x0, 0x0, 0x0, 0x2, 0x3}, @var={0x10, 0x0, 0x0, 0xe, 0x5, 0x2}]}, {0x0, [0x6e4a28bab34df747, 0x30, 0x2e, 0x61]}}, &(0x7f0000002380)=""/152, 0x86, 0x98, 0x1, 0x4}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000024c0)={0x6, 0x18, &(0x7f0000002100)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x6}, @map_fd={0x18, 0x3, 0x1, 0x0, r14}, @map_val={0x18, 0x5, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0, 0x3}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f00000021c0)='GPL\x00', 0x3, 0x92, &(0x7f0000002200)=""/146, 0x41100, 0x0, '\x00', 0x0, 0x25, r15, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000002480)=[{0x5, 0x3, 0x4, 0xc}, {0x0, 0x4, 0x9, 0x1}], 0x10, 0x9}, 0x94) 1m15.318751868s ago: executing program 0 (id=10047): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB="0b00000005000000010001000a00000001000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2000000}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007a000000850000009e00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={r2, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3d, &(0x7f0000000740)=[{}, {}], 0x10, 0x10, &(0x7f0000000780), &(0x7f0000000940), 0x8, 0xc5, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x10020) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, r5}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={r2, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000bc0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000c00)=[0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2e, &(0x7f0000000c80)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x83, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0xd, 0xa, &(0x7f0000000300)=ANY=[@ANYBLOB="18120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018420000fdffffff000000000000000018180000", @ANYRES32=r0, @ANYBLOB="0b000000000000000297d200ff070000"], &(0x7f0000000380)='syzkaller\x00', 0xfff, 0xd2, &(0x7f0000000500)=""/202, 0x41000, 0x39, '\x00', r3, @sock_ops=0x3, r5, 0x8, &(0x7f0000000b40)={0x2, 0x5}, 0x4, 0x10, &(0x7f0000000b80)={0x5, 0xd, 0xe, 0x5}, 0x10, r6, r2, 0x6, &(0x7f0000000f00)=[r0], &(0x7f0000000f40)=[{0x4, 0x5, 0x9, 0x1}, {0x5, 0x4, 0x80000f, 0xb}, {0x0, 0x3, 0x5, 0x5}, {0x5, 0x5, 0x1, 0x2}, {0x1, 0x4, 0xd, 0x5}, {0x2, 0x5, 0x2, 0x4}], 0x10, 0xd}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xc, [@struct={0x4, 0x2, 0x0, 0x4, 0x1, 0xfffff7fd, [{0xa, 0x2}, {0x5, 0x2, 0x4}]}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x20}]}, {0x0, [0x61, 0x0, 0x30, 0x2e, 0x61, 0x5f, 0x5f, 0x61, 0x0, 0x61]}}, 0x0, 0x58}, 0x28) r8 = openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r8, &(0x7f0000000a00)=ANY=[@ANYBLOB='-cpu'], 0x5) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0xb, 0x2, 0x6, 0x0, 0x0, 0x0, 0x80040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x945, 0x0, 0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x769043, 0x0) write$cgroup_subtree(r9, 0x0, 0x3e) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x8, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r10}}, {{0x6, 0x0, 0xb}, {0x65, 0x0, 0xc}}, [@printk={@lld, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0x2, 0xa, 0x9}, {0x7, 0x0, 0x3, 0x9}, {}, {}, {0x15}}], {{0x5, 0x1, 0x3, 0x3}, {0x5, 0x0, 0xb, 0x3}}}, &(0x7f00000009c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) write$cgroup_int(r12, &(0x7f0000000200)=0x1, 0x12) write$cgroup_pid(r12, &(0x7f0000000140), 0x12) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32, @ANYBLOB="0000000000000000b7030000001b0000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r12, 0x0, 0xe, 0xffffffffffffff73, &(0x7f0000000900)="c1000000009b9e54a57590af6e8d", 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1m0.326903654s ago: executing program 32 (id=10047): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB="0b00000005000000010001000a00000001000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2000000}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007a000000850000009e00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b00)={r2, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3d, &(0x7f0000000740)=[{}, {}], 0x10, 0x10, &(0x7f0000000780), &(0x7f0000000940), 0x8, 0xc5, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x10020) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, r5}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={r2, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000bc0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000c00)=[0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2e, &(0x7f0000000c80)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x83, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0xd, 0xa, &(0x7f0000000300)=ANY=[@ANYBLOB="18120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018420000fdffffff000000000000000018180000", @ANYRES32=r0, @ANYBLOB="0b000000000000000297d200ff070000"], &(0x7f0000000380)='syzkaller\x00', 0xfff, 0xd2, &(0x7f0000000500)=""/202, 0x41000, 0x39, '\x00', r3, @sock_ops=0x3, r5, 0x8, &(0x7f0000000b40)={0x2, 0x5}, 0x4, 0x10, &(0x7f0000000b80)={0x5, 0xd, 0xe, 0x5}, 0x10, r6, r2, 0x6, &(0x7f0000000f00)=[r0], &(0x7f0000000f40)=[{0x4, 0x5, 0x9, 0x1}, {0x5, 0x4, 0x80000f, 0xb}, {0x0, 0x3, 0x5, 0x5}, {0x5, 0x5, 0x1, 0x2}, {0x1, 0x4, 0xd, 0x5}, {0x2, 0x5, 0x2, 0x4}], 0x10, 0xd}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0xc, [@struct={0x4, 0x2, 0x0, 0x4, 0x1, 0xfffff7fd, [{0xa, 0x2}, {0x5, 0x2, 0x4}]}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x20}]}, {0x0, [0x61, 0x0, 0x30, 0x2e, 0x61, 0x5f, 0x5f, 0x61, 0x0, 0x61]}}, 0x0, 0x58}, 0x28) r8 = openat$cgroup_subtree(r7, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) write$cgroup_subtree(r8, &(0x7f0000000a00)=ANY=[@ANYBLOB='-cpu'], 0x5) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0xb, 0x2, 0x6, 0x0, 0x0, 0x0, 0x80040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x945, 0x0, 0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x769043, 0x0) write$cgroup_subtree(r9, 0x0, 0x3e) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x8, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r10}}, {{0x6, 0x0, 0xb}, {0x65, 0x0, 0xc}}, [@printk={@lld, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0x2, 0xa, 0x9}, {0x7, 0x0, 0x3, 0x9}, {}, {}, {0x15}}], {{0x5, 0x1, 0x3, 0x3}, {0x5, 0x0, 0xb, 0x3}}}, &(0x7f00000009c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) write$cgroup_int(r12, &(0x7f0000000200)=0x1, 0x12) write$cgroup_pid(r12, &(0x7f0000000140), 0x12) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32, @ANYBLOB="0000000000000000b7030000001b0000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r12, 0x0, 0xe, 0xffffffffffffff73, &(0x7f0000000900)="c1000000009b9e54a57590af6e8d", 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.937914656s ago: executing program 1 (id=11053): r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101801, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00', 0x2}) ioctl$TUNSETDEBUG(r1, 0x400454c9, 0xffffffffffffffff) ioctl$TUNSETLINK(r1, 0x400454cd, 0x306) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYRES8=r0], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) r4 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r3, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r4, r2, 0x4, r2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0xc884}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 3.339124932s ago: executing program 1 (id=11065): bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b000000b9000000010001000900000001000000", @ANYRES32=0x1, @ANYBLOB="00f013f50bfd0e9132"], 0x50) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={0xffffffffffffffff, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000015c0)="7c533121ba56b5b10006000081001a", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x7, 0x80, 0x2, 0x1, 0x0, 0x7fffffff, 0x192, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x4, 0x80}, 0x4, 0x6, 0x80000001, 0x6, 0x7, 0x7, 0xe745, 0x0, 0x7254, 0x0, 0x80000001}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101042, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x30, 0x9, 0x0, 0xfffff028}, {0x6, 0x0, 0x8}]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000000)) 1.887609968s ago: executing program 5 (id=11078): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0faf519632019167a5dc00"/20, @ANYRES64, @ANYRES16, @ANYRES32, @ANYRESHEX=0x0, @ANYRESOCT=0x0], 0x50) (async) close(0x3) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x15, 0x10, 0x2}, 0x48) socketpair(0x1, 0x80000, 0x9, &(0x7f0000001280)) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)='%pK \x00', 0x1000000}, 0x20) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000081140000bfa30000000000000703000000feffff720af0fff8ffffff71a4f0ff0000000071105e00000000001d300500000000004704000001ed00000f030000000000001d44020000000000620a00fe040400007203000000000000b500f7ff000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a8641aa05a1336b3b4c4becea710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fe51bef7af9aa0d7d600c095199fe3380d28e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51bf900000000000000d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343cccc953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93020000000000000080e69db384ac7eeedcf2ba3a9508f9d6aba582a896a9f1e096df6ecea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00e10000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d490cba8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e1461173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b583cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e80dc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6032399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c00000000000000f59dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ed1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67cf0216e2d81e6127bd9d7fab28800eaab2355992f8ce4cd38add4b272c0bee4076ca4847ffa691cf78fb7ec212bad3bef29f577ea7159b7f3025b3d977ff7c9102"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001240), 0x2, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001400)={&(0x7f0000001380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x10, 0x5}, {0x6, 0x3}, {0xf}, {0x2, 0x1}]}, @float={0x8, 0x0, 0x0, 0x10, 0x2}, @decl_tag={0x6, 0x0, 0x0, 0x11, 0x4, 0x8}, @volatile={0xa, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000001480)=""/192, 0x77, 0xc0, 0x1, 0x3, 0x10000}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x11, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES8=r0], &(0x7f0000000200)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000000240)=""/4096, 0x41100, 0x0, '\x00', 0x0, 0x0, r2}, 0x94) 1.692497699s ago: executing program 5 (id=11080): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e0000000400000004000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="49e47882e15424bc931bcd7640187836d008312b9e0c08bd1f21fbf6dc98cb30c84820378cee07535f510d84ec", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x4, &(0x7f0000000180)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802"], 0x0, 0x7ff}, 0x94) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r7 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f00000000c0)={'lo\x00', 0x400}) 1.69034591s ago: executing program 2 (id=11081): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_netprio_ifpriomap(r1, 0x0, 0x2, 0x0) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYRESDEC], 0x52) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000003000000000000000600000018110000", @ANYRES32, @ANYBLOB="0000000008000000b7080000000000007b8af8ff00000000bfa200756f10000000000000f8ffffffb703000008000000b704000000000000850000000300009400009500000000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000580)="847fb062b0ea0b2334518e1a60a65d12a561e27894f01891b5be5afa99d554d86096963ce9ac589e965a93ffcb1c60761e09bbfd925129a375612d4380aa51d63878af67dcf3af9efe5a2b8973c287bdda504dd923671449378e5d8e6fdb855c49dfd433e2a91156a1c5a5c4422a2cbc40ce8a955c1c6234cb706b33c18f2b57ec48df1881af8505d5511ed1cbaabb0665b0b1e9346e1d9a86470a930f", &(0x7f0000000640)=""/162}, 0x20) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@ifindex, 0xffffffffffffffff, 0x11}, 0xa) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[], 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0x1000, 0x5, 0x2, 0x100, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0x4}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r3, &(0x7f0000000240)="b1061bac581496d853f80bae2f6273a5704ac72179d71cd79dfc1d947bd6f1e661b31b8bce12b4", &(0x7f0000000900)=""/77}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, 0x0, &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x94) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) 1.68961809s ago: executing program 1 (id=11082): socketpair(0x9, 0x6, 0x0, &(0x7f0000000080)) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000880)={'wg2\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x142}, 0x4c001) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x2, @multicast2}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)="511999f75ecd4d74a386f25d2515fbef7538e5015d31734882c45a13f5eaa4ade31146eae2112b4ee10a191debd6e149136ff0dc179e3455405c4c64a3a84407bc45134150c592194cfe5ab8c76207a83bf3a23779d46e42e69cc222cc25f620134a46e9f097efd26434d4b7dacf58ebb3c72133f554fff7dc3d05081061926f82f0dd7a7d9386dc7c4e888c0938e4f677efe883fc1465fc2ef21499c528bacbfa66532416eaad31ff510b", 0xab}, {&(0x7f0000000200)="4a484575028ec9ff14894b86c2b0632d8b83de3876b71c79b4955ab5e5eb5fa8bd38c177b7e5ef22b30eb9b899f373e4c09a78e3f5b13eb51e52c198fe51cde83611060c2ff5886da1a85cced98b984c94f5914d24b0b0cd41a0b794b9cdf4aa37c93511f92e6f7ff83c1a16c37ff875509071acb51dd47f6ed3812ebfe89229ef6d5553002569c2e4b75ad7d7f9ecc45b3ed0127d2818e0b3851a0d9848a06ebbaab2e1bdbbd0a0086876534ab6415d3a5cc0f89143a5b862851b018102212fabedc92cc3d62502b8885082a8ad362854acff1b2280b2f4342aa3956c3871c883b2f1c23ed29d03970f0580898e", 0xee}], 0x2, &(0x7f0000000340)=[@mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x3c2e}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}], 0x78}, 0x2) sendmsg(r0, &(0x7f00000006c0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x3, @multicast, 'bond0\x00'}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000540)="b1833d9ebc40b7c2f684eb9a6278fa74d372744488b6d58aabe86509cc2c00b8e285ec71c68d1f59a205e60f06ac88f84d012b9144d470d092b14401a324c88eb965caa75649baf9faf7c92743ed16b40fd7dc8c349817b7d69d39674795045d5c3e5fb8600b6bb2", 0x68}, {&(0x7f0000000740)="33a476d31c41e805d0d2d21a0cc44cd81c881e15acee69b070cc3d4cb094a6f9ef741801e44a751577edc5dd8fff1017a6e75051999369a094831772681ceff73a1fe64a7487effa0fe1b6cf3ff705048f982f1ce40e5f3851f1655faa52ea0907b4552290fe70b0c16ee37d09c60f9b4788ad65c634d51868911339f07497b0448a6b980e31a3f82588cb", 0x8b}, {&(0x7f0000000800)="a61042bb4073d89d156e1e956fcf54d1f5d3073f5e85405bc51c03c7770cb12849a901850faafac5defa7e33d3ff1bffad772e09e0b64c3fa436509f5210fe9218bc0289ba41e3ad32ed8b3a020c3147499733235632824652593d8c16e332dcefa907dd6140d84d0d29a9746aaa1dc40692c1d5e93e602b35c9f705", 0x7c}], 0x3, &(0x7f0000000e40)=[{0x110, 0x11, 0x8001, "7b099b4f1ebd7b479c805b2fc2b2e9a9e51ccdbe5c49c4ce6fe3eb8313095ea8a0dd3233e3ff358068cb08ac706a638d58df56427a9917101bd26b648220389a7d9d618221b5c0d42fa1989338581679af2cc21fa2e42daec017db3d928073d1f11ad046368ae5c14a4135b549dd824e90e6c0380c97176239bf963ba39edc6aee0c7d9463ba78ad46534f785827a3ccd504cf16255fd6bae7eac033cf500e0960bdf2d563803a6694e70faa5b52a0b5cc708075984ee4e4cf3ad4543c54cc6e83bdddd993573f769ae409cec5c28e786416e41a8052738fbd35bfe30584f1167e43d8dab7c88a0b7fd7d6134bc252b25f4af4550629105fee"}, {0x60, 0x108, 0x2, "a302e6b400e98ade648cdc8cf9ceebda2e0162bf1e6b650f14958c5a3ff29f15c8b6267107bc8698fb5aef959241b79509d01c677d166c2965ead022c498c491d78c05cdbb86eeeead4d87f00a6d"}, {0x110, 0x115, 0x71, "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"}, {0xd8, 0x104, 0x3, "e34a406eca4e740f39e692affe84ba39a08a6a4486b2450f2f1250973dc9018ccf8cce98981a484b328277cae5bd46c8763e13ee09b5e8b63e62372b5b82406d295a3c78b175f570b6ee0a27c1f45451062edd27a2ea470e3f17510498bd24fd43cac0110449aff82102c34c17883d6d8c24abcb2ee6a2eca4d49f6861b6bbc214f851e04d068614cd8701b528b74a9115e60d429dad75456bb82ce776806058815ec85ef82bd42dee92fa0df606d4fe41e862275415f95d36928aeb04bf6fb737fa368322c5f9"}], 0x358}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x63}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x100) 1.488570631s ago: executing program 1 (id=11085): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="660a00000000df0061114c000000000085000000540000009500e400000000000313133bb9bfcc40e24cfa10c5df11b4c4b418de246f1ebed76df30c0011e1c3d19d86658dc73eaed31cec8f412698643d46fbd5f1c6890000f7fdc04a0ee1d7fdc3df546d7f94ff38e95f73c49e33011ed1354ee592f4ad15"], &(0x7f0000000000)='GPL\x00'}, 0x94) (async) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f0000001000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x769043, 0x0) write$cgroup_subtree(r2, 0x0, 0x3e) (async) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$TUNGETVNETLE(0xffffffffffffffff, 0x800454dd, &(0x7f0000000040)) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, 0x0, 0x2a}, 0x28) (async) openat$cgroup_subtree(r3, &(0x7f0000003000), 0x201, 0x0) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40305828, 0x20000012) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000001080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) 1.486849552s ago: executing program 3 (id=11086): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNGETVNETLE(r1, 0x8004745a, &(0x7f0000000180)) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x91206, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x7, 0x7}, 0x104042, 0x0, 0x0, 0x0, 0xfffffefffff7bbfe, 0xffffffff, 0x0, 0x0, 0x5ff, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 1.453361523s ago: executing program 2 (id=11088): r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000080)) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESOCT=r1, @ANYBLOB="0000000002000000b705000008200000850000007000000095"], &(0x7f0000000300)='GPL\x00', 0x4, 0x1002, &(0x7f00000014c0)=""/4098}, 0x94) 1.398643757s ago: executing program 2 (id=11090): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x6, 0x4, 0x8, 0xc}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000b40)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0, 0x0, 0x0], 0x0, 0x7f, &(0x7f0000000c00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x9a, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', r1, 0x0, 0x0, 0x4}, 0x50) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x3, &(0x7f0000000480)=@framed, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r4, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x41, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000200), &(0x7f00000002c0), 0x8, 0x4e, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x12, 0x0, 0x9}, 0x50) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x36}, 0x41fe) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfd, 0xfd, 0x4, [@type_tag={0x1, 0x0, 0x0, 0x12, 0x2}, @enum={0x5, 0x4, 0x0, 0x6, 0x4, [{0x5, 0xffffff01}, {0x8, 0x8}, {0x8, 0x3}, {0x1, 0x1}]}, @fwd={0x2}, @datasec={0x7, 0x1, 0x0, 0xf, 0x1, [{0x4, 0x7, 0x8000}], "ef"}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x3c, 0x0, 0x30, 0x2}, @type_tag={0x2, 0x0, 0x0, 0x12, 0x1}, @const={0x6, 0x0, 0x0, 0xa, 0x1}, @enum64={0x6, 0x9, 0x0, 0x13, 0x0, 0xc, [{0xe, 0x1, 0x9}, {0x1, 0xa8}, {0x3, 0xffffffff, 0x8}, {0x1, 0x9, 0x7}, {0xe, 0xffe, 0x10001}, {0xb, 0x3, 0xa6}, {0xe, 0x10001, 0x1}, {0xc, 0x479, 0x9}, {0x5, 0xc130, 0x8}]}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000a00)=""/179, 0x11c, 0xb3, 0x1, 0x5, 0x10000}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x4, '\x00', r5, r7, 0x1, 0x3}, 0x50) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000ac0)={r4, r8}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r4, r3}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r4, r2}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000280)={r4, r0}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="b4050000fdff7f006110a30000000000c60000000000000095000000000000009f33ef60916e6e713f1e6b0b725ad99b817fd98cd824498949714e32f21dcc4ae5437aca55f21f3ca9e822d182054d54d53cd2b6da714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed00000000000000000000000000000000000000006c63b40e0c00000000000000b347abe6352a080f8140e5fd10747b6ecdb3540546bf636e3d6e700e5b0500000000000000eb9e1403e6c8f79829c90bd2114252581567acae715cbe1b57d5cda432c5b9443999f7d24195405f2e76ba88454cc9227069ccb7b37b41215c000000003be991e5e897284cdd6043058cec00000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x4, &(0x7f0000002240)=ANY=[@ANYBLOB="1800000000000000000000000000000071180f000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.396801147s ago: executing program 2 (id=11091): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x43200, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffaf, 0x10, &(0x7f0000000040)}, 0x3c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c40)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'batadv_slave_0\x00'}) (async) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'batadv_slave_0\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller0\x00', 0x1}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000700)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x13}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb5, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r3, @ANYBLOB="000000000000000079f96f00000000001800000000000000000000000000000095833e3ba9bc78dec30a00000000000095000000000000001b21ea44c125fe2a2615aa3e7e9b758f93501d9f9e2700e7626988408968ee656cfde91ca8f1be69b36dce90f3d27070f7ea71e0b3dd78a7b4d6e0403c13906c1df2579f3253c0e082f5c3b2ca203bb449ae1cf377108da8790d73fdc2aaedb6487082998691c47feb0a9f73f7a86d0073c775decb336c28b234efa07fc6e7260b9573fdf762f95770af19a177526d8014a52f4c568dca13717b8d3a98f79b7958c709d25e20835d84f8919a31e31b5945111663e16ab0e5bc28894e88"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000300)=""/238}, 0x94) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) (async) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001b40)={&(0x7f0000001980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@datasec={0x1, 0x2, 0x0, 0xf, 0x39, [{0x5, 0x37, 0x39}, {0x2, 0x2, 0x39}], 'M6U'}, @datasec={0x10, 0x0, 0x0, 0xf, 0x1, [], "b5"}]}, {0x0, [0x5f]}}, 0x0, 0x4f, 0x0, 0x1, 0x5}, 0x18) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001b40)={&(0x7f0000001980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@datasec={0x1, 0x2, 0x0, 0xf, 0x39, [{0x5, 0x37, 0x39}, {0x2, 0x2, 0x39}], 'M6U'}, @datasec={0x10, 0x0, 0x0, 0xf, 0x1, [], "b5"}]}, {0x0, [0x5f]}}, 0x0, 0x4f, 0x0, 0x1, 0x5}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454da, &(0x7f0000000080)={'bridge_slave_1\x00'}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'pim6reg\x00', 0x1811}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x404801, 0x0) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x404801, 0x0) ioctl$TUNSETCARRIER(r6, 0x400454e2, &(0x7f00000002c0)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xe, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe50}, 0x48) 1.396479947s ago: executing program 1 (id=11092): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)=[{0x0, 0x4}], 0x10, 0x2}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x100, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETTXFILTER(r1, 0x400454d1, 0x0) (async) ioctl$TUNSETTXFILTER(r1, 0x400454d1, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f0000000640)=""/204, 0x5c, 0xcc, 0x1}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, &(0x7f0000000580)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0xd, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, &(0x7f0000000580)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0xd, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="53180071fcff23d30029800056b16918e8ab0fb2d44e19e0380100000005", @ANYRES32=r0, @ANYBLOB='n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000040000000200"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x50) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="53180071fcff23d30029800056b16918e8ab0fb2d44e19e0380100000005", @ANYRES32=r0, @ANYBLOB='n\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000040000000200"/20, @ANYRES32=r4, @ANYBLOB='\x00\x00\x00\x00'], 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x2, '\x00', r5, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x50) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x2, '\x00', r5, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x50) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d80)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x6, 0x1b, &(0x7f0000000b00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb06, 0x0, 0x0, 0x0, 0xc}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@jmp={0x5, 0x1, 0x7, 0x3, 0xa, 0xfffffffffffffff8, 0x10}, @call={0x85, 0x0, 0x0, 0xa9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000c00)='syzkaller\x00', 0x8, 0xbb, &(0x7f0000000c40)=""/187, 0x40f00, 0x20, '\x00', r5, 0x25, r4, 0x8, &(0x7f0000000d00)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000d40)={0x0, 0xa, 0x0, 0xe331}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000dc0)=[r7], &(0x7f0000000e00)=[{0x1, 0x4, 0x1, 0x2}, {0x2, 0x3, 0xe, 0x6}, {0x3, 0x2, 0xe, 0x4}, {0x0, 0x1, 0xb, 0xc}, {0x3, 0x1, 0xa, 0xa}, {0x4, 0x2, 0x10, 0x4}], 0x10, 0x80000000}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x6, 0x1b, &(0x7f0000000b00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb06, 0x0, 0x0, 0x0, 0xc}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@jmp={0x5, 0x1, 0x7, 0x3, 0xa, 0xfffffffffffffff8, 0x10}, @call={0x85, 0x0, 0x0, 0xa9}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000c00)='syzkaller\x00', 0x8, 0xbb, &(0x7f0000000c40)=""/187, 0x40f00, 0x20, '\x00', r5, 0x25, r4, 0x8, &(0x7f0000000d00)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000d40)={0x0, 0xa, 0x0, 0xe331}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000dc0)=[r7], &(0x7f0000000e00)=[{0x1, 0x4, 0x1, 0x2}, {0x2, 0x3, 0xe, 0x6}, {0x3, 0x2, 0xe, 0x4}, {0x0, 0x1, 0xb, 0xc}, {0x3, 0x1, 0xa, 0xa}, {0x4, 0x2, 0x10, 0x4}], 0x10, 0x80000000}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x81}, [@exit, @alu={0x7, 0x0, 0x8, 0xa, 0xa, 0xfffffffffffffff4, 0xfffffffffffffff0}]}, &(0x7f0000000180)='GPL\x00', 0x1, 0xbf, &(0x7f0000000200)=""/191, 0x41100, 0x7a, '\x00', r5, 0x25, r4, 0x8, &(0x7f00000008c0)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x3, 0x7, 0x7fe}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000009c0)=[r0, r3, r6], &(0x7f0000000a00)=[{0x2, 0x3, 0x10, 0x4}, {0x5, 0x1, 0x6, 0x9}], 0x10, 0xffff}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r10, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffec00000", @ANYRESDEC], 0xffdd) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x45fe, '\x00', r5, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8681, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f1, &(0x7f0000000080)) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) write$cgroup_pressure(r12, &(0x7f0000000100)={'some', 0x20, 0x2, 0x20, 0xa}, 0x2f) (async) write$cgroup_pressure(r12, &(0x7f0000000100)={'some', 0x20, 0x2, 0x20, 0xa}, 0x2f) 1.259060505s ago: executing program 5 (id=11093): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101800, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) (async) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'dummy0\x00', @random="2eda35548c31"}) (async) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x204000, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x13, 0x21, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x6}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @ldst={0x0, 0x0, 0x6, 0x8, 0x8, 0x8, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x19, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x4, 0x4, 0xfffffffb, 0x3}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000280)=[{0x3, 0x1, 0xf, 0xa}, {0x5, 0x4, 0x9, 0xd}, {0x1, 0x4, 0x7, 0x7}, {0x2, 0x5, 0x3, 0x7}], 0x10, 0x2}, 0x94) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000380)=r2) (async) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x49e, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0x1, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x4, [@type_tag={0x8, 0x0, 0x0, 0x12, 0x1}, @fwd={0xd}, @enum={0x2, 0x2, 0x0, 0x6, 0x4, [{0x3, 0xc0}, {0xc, 0x1}]}, @float={0x6, 0x0, 0x0, 0x10, 0x2}, @const={0x7}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000580)=""/72, 0x68, 0x48, 0x0, 0x7, 0x10000}, 0x28) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x3, 0x3, 0x6, 0x18, r3, 0x10001, '\x00', r4, r5, 0x3, 0x4, 0x4}, 0x50) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r3, &(0x7f00000006c0)="b175677844acdf209332b636132175b0a37701db1c0b833c29d50f717a43f34bf80516061bd20b9f90900b05195e8618913ffe3207bc388a31232a277e05c041356830d196f2e421f6594853c53b56ed772746b366e17a4ec332e68c294b1597564ec3", &(0x7f0000000740)=""/9}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000008c0)={r3, &(0x7f00000007c0), &(0x7f0000000800)=""/173}, 0x20) (async) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000900)='cgroup.freeze\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000940)='{\x00') perf_event_open(&(0x7f0000000980)={0x0, 0x80, 0x10, 0x2, 0xd4, 0xc, 0x0, 0x9a4, 0x40008, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, @perf_config_ext={0x92a, 0x9}, 0x10002, 0x5, 0x73f2, 0x0, 0x5, 0xfffffe01, 0x8, 0x0, 0x80, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000b00)={@cgroup=r7, 0x10, 0x1, 0x7, &(0x7f0000000a00)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000a40)=[0x0], &(0x7f0000000a80)=[0x0], &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r10 = openat$cgroup_freezer_state(r7, &(0x7f0000000b80), 0x2, 0x0) (async) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c00)=@generic={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b40)={@fallback=r10, r2, 0x33, 0x0, 0x0, @void, @value=r11, @void, @void, r9}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000f00)={r11, 0x0, 0x3, 0xb3, &(0x7f0000000c40)="9e91d2", &(0x7f0000000c80)=""/179, 0x7, 0x0, 0x92, 0xf1, &(0x7f0000000d40)="3423e24251968f6ba67c058556b54aef0d8f86e6da28e80d09d4a25f87d00f5222405bf735fc7294f30cae0edcc0cebe5f68877a21672a15f10f806d34e83b36216bc149e38e3b6ed6bcdd9e6e227e29d887bc59e18c888030ce6edb9becc0ba6ca06d4fdfe13040cb0652cbc7f993f6b6bb4041b7b3fae8bf5b24b5a726dd8c2e70e467799df21ecd6f0d4e986e5bbd65e7", &(0x7f0000000e00)="2f8eaaa4db8a1cbe929ce17b1e6aaf7f2e2b702b1d52776b5e584782490704316b12bd880568716c0cbdcee71739bc8da0b9114ccfc53e06df30cb8084fe97ac23e136f809505f8a65345b2419e5e73262fdd8d4b21cab7492eb826a4f3a0934af477d43ae544f887f0066462290447f296c84d707343b53ff7be722bb7a90d61d9eea673d5874129dfcad84a3062ef3aad25190fc0433076eba37296d0faa0d84c474f1115b057af419d9a18949b5b0c23f74759c2c9172b7abe3d470705fd3392e9ca251730258512bf55238495202f164566557cb0dc6c3e7810fa39534594403a6fcf6c11c403e063642daef314386", 0x1, 0x0, 0x7}, 0x50) (async) r12 = gettid() (async) r13 = perf_event_open$cgroup(&(0x7f0000001000)={0x0, 0x80, 0x9, 0x80, 0x8b, 0x0, 0x0, 0x8001, 0x9400, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x100000000}, 0x10000a, 0x8000000000000001, 0x0, 0x0, 0x7f, 0x6, 0xfdc0, 0x0, 0xfffffffb, 0x0, 0x2}, r8, 0x6, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000f80)={0x2, 0x80, 0x7, 0x1, 0xc, 0x2, 0x0, 0x16aa, 0x80, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffb, 0x4, @perf_config_ext={0x6, 0x4}, 0x9c2, 0x1, 0x9cd, 0x0, 0xffffffffffffffff, 0x8, 0x8, 0x0, 0x6, 0x0, 0x2}, r12, 0x3, r13, 0x2) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001100)={r7, 0x58, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) perf_event_open(&(0x7f0000001140)={0x0, 0x80, 0xf, 0x78, 0x5, 0xff, 0x0, 0x43bf, 0x104, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x4, @perf_config_ext={0x9, 0x2}, 0x108, 0xffff, 0x5, 0x5, 0x0, 0x5, 0x0, 0x0, 0x7fffffff, 0x0, 0xd86}, 0x0, 0x1, 0xffffffffffffffff, 0xa) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001240)={{r6, 0xffffffffffffffff}, &(0x7f00000011c0), &(0x7f0000001200)='%pK \x00'}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001680)={r11, 0xe0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, &(0x7f0000001400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001440)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x83, &(0x7f0000001480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000014c0), &(0x7f0000001500), 0x8, 0x9f, 0x8, 0x8, &(0x7f0000001540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x9, 0x8, &(0x7f0000001280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@alu={0x7, 0x0, 0x0, 0x9, 0x6, 0xfffffffffffffff0, 0xfffffffffffffffc}, @map_val={0x18, 0xa, 0x2, 0x0, r15, 0x0, 0x0, 0x0, 0xcc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f00000012c0)='GPL\x00', 0xa, 0x16, &(0x7f0000001300)=""/22, 0x41100, 0x64, '\x00', r14, @cgroup_sock=0x22, r3, 0x8, &(0x7f0000001340)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000001380)={0x5, 0x4, 0x4, 0x100}, 0x10, r16, 0xffffffffffffffff, 0x6, &(0x7f00000016c0)=[r3, r7, 0x1, r3, r3, 0x1], &(0x7f0000001700)=[{0x4, 0x2, 0x8, 0x3}, {0x1, 0x5, 0xd, 0x9}, {0x3, 0x2, 0xd, 0x5}, {0x4, 0x1, 0x3, 0x9}, {0x4, 0x4, 0x2, 0x6}, {0x1, 0x4, 0xf, 0x7}], 0x10, 0x9}, 0x94) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001900)=@o_path={&(0x7f0000001840)='./file0\x00', 0x0, 0x4010}, 0x18) 1.224061797s ago: executing program 3 (id=11094): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0xd, 0x4}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0, 0x2a, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000a80)={&(0x7f0000000740)={0x2, 0x4e21, @rand_addr=0x64010101}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000780)="ba1e059dbfbae34ff6a91ec8463e2ac19d859610576992e5e55c7d71d3a8290b40ff631b04de4239bcac747906bcbadb7f9ebe63f9cf1ea09fff351a70b32850399984314e9cb6221b1fb45f92cf9313c9e55e68ef8e2a7daa416b22afe0c8bf5c1e2f731a65e364db05da412f3d928e412350842de7cecb53b692e4821d52ce3e1e36feae1c5dcd8c478c3966f2079b3068159d44e59738353c99952dfa61c4af38325924877a510bddbe9344f4af50598f4664f98fd58b58624180e561bb1040a19ebeadc6e7d80f883d6126d867655f1d3220793d38ce844a7bb2d4e80c", 0xdf}, {&(0x7f0000000880)="e3a44142739cd921250365683cc53aeaf5d163a780a2eb25792ef8d93d9d8baaf12c7fc76b89f455", 0x28}, {&(0x7f00000008c0)="fcdefb", 0x3}, {&(0x7f0000000900)="6d3c28ad173fbfb92713ed018df746168716d03270cb2e3bea9594d870629091302896d3dc76dfe79902f835e548132c189107b2f9eea56c870c18d5dc351362dfce0f895bcee46aa26bb0ed78a1019770ee9bce171a6e06e0a126b788d3b851d7b1c264af56be9b207d5dc4134f5e263cab98f8c7e441f5ebc1d773d1f048a08e597e74dc06789b466243210798ebadcb76543c5213dbaead6f2f7f42a2855c492d268130369e10fb0472f1b0dc9502f8dd207217f8a955e62c7984fd83320b407eee12294a91c58a3137fdf328a4c1c9eff8159086dbc494ac8fd73b50110a2ab2c14779d504861857b9206358d63065", 0xf1}], 0x4, &(0x7f0000000a40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x30}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x1b, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3e}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x10}, @call={0x85, 0x0, 0x0, 0xb0}, @func], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='syzkaller\x00', 0x4, 0x33, &(0x7f0000000240)=""/51, 0x41000, 0x4, '\x00', r2, @fallback=0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xd, 0x384, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[r1]}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0xd, 0x4}, 0x50) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0, 0x2a, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000700)) (async) sendmsg$inet(r3, &(0x7f0000000a80)={&(0x7f0000000740)={0x2, 0x4e21, @rand_addr=0x64010101}, 0x10, &(0x7f0000000a00)=[{&(0x7f0000000780)="ba1e059dbfbae34ff6a91ec8463e2ac19d859610576992e5e55c7d71d3a8290b40ff631b04de4239bcac747906bcbadb7f9ebe63f9cf1ea09fff351a70b32850399984314e9cb6221b1fb45f92cf9313c9e55e68ef8e2a7daa416b22afe0c8bf5c1e2f731a65e364db05da412f3d928e412350842de7cecb53b692e4821d52ce3e1e36feae1c5dcd8c478c3966f2079b3068159d44e59738353c99952dfa61c4af38325924877a510bddbe9344f4af50598f4664f98fd58b58624180e561bb1040a19ebeadc6e7d80f883d6126d867655f1d3220793d38ce844a7bb2d4e80c", 0xdf}, {&(0x7f0000000880)="e3a44142739cd921250365683cc53aeaf5d163a780a2eb25792ef8d93d9d8baaf12c7fc76b89f455", 0x28}, {&(0x7f00000008c0)="fcdefb", 0x3}, {&(0x7f0000000900)="6d3c28ad173fbfb92713ed018df746168716d03270cb2e3bea9594d870629091302896d3dc76dfe79902f835e548132c189107b2f9eea56c870c18d5dc351362dfce0f895bcee46aa26bb0ed78a1019770ee9bce171a6e06e0a126b788d3b851d7b1c264af56be9b207d5dc4134f5e263cab98f8c7e441f5ebc1d773d1f048a08e597e74dc06789b466243210798ebadcb76543c5213dbaead6f2f7f42a2855c492d268130369e10fb0472f1b0dc9502f8dd207217f8a955e62c7984fd83320b407eee12294a91c58a3137fdf328a4c1c9eff8159086dbc494ac8fd73b50110a2ab2c14779d504861857b9206358d63065", 0xf1}], 0x4, &(0x7f0000000a40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x30}, 0x40) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x1b, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3e}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x10}, @call={0x85, 0x0, 0x0, 0xb0}, @func], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='syzkaller\x00', 0x4, 0x33, &(0x7f0000000240)=""/51, 0x41000, 0x4, '\x00', r2, @fallback=0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xd, 0x384, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[r1]}, 0x94) (async) 1.17993774s ago: executing program 5 (id=11095): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4004}, 0x94) (rerun: 64) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000140000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000340)=r2) (async, rerun: 64) write$cgroup_devices(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) (async, rerun: 32) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) (rerun: 32) close(r4) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map=r4, 0x24, 0x0, 0x5, &(0x7f0000000440)=[0x0], 0x3ffffe70, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000640), 0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x14, &(0x7f0000000680)=@raw=[@jmp={0x5, 0x1, 0x1, 0x1, 0x5, 0xfffffffffffffffc, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @alu={0x7, 0x1, 0x1, 0x1, 0xb, 0xffffffffffffffff, 0xfffffffffffffffc}, @ldst={0x0, 0x2, 0x4, 0x0, 0x5, 0x18, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @jmp={0x5, 0x0, 0x5, 0x4, 0xb, 0x20}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @generic={0x6, 0x0, 0x1, 0x1, 0x9}], &(0x7f0000000040)='syzkaller\x00', 0x8, 0xa9, &(0x7f0000000200)=""/169, 0x41000, 0x50, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000002c0)={0x5, 0x1, 0x100, 0x80000000}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0xffffffffffffffff], &(0x7f0000000500)=[{0x2, 0x0, 0x10}]}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000600)={r4, r3, 0x4, r6}, 0x10) 1.0018166s ago: executing program 5 (id=11096): perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="280100000000"], 0x128}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz1\x00', 0x1ff) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x10020) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x1f6, 0x0, &(0x7f0000000740)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x2a}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x2}, 0x0, 0x10, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1f, 0x1, 0x1, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) syz_clone(0x1000, 0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000005c0)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xa, 0x9, 0x2, 0x9, 0x42}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%-010d \x00'}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r2, &(0x7f0000000240), 0x0}, 0x20) socketpair(0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240), 0x50) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f00000002c0)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x2, 0x300}, {0x6e}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x2}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x83f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 879.594458ms ago: executing program 2 (id=11097): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3, 0x0, 0x0, 0x4}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) close(r1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4800) socketpair(0xf, 0x6, 0x3, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r0, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600), 0x0, 0x26, &(0x7f0000000640)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x0, 0x0, &(0x7f00000006c0), 0x8, 0xe3, 0x8, 0x0, 0x0}}, 0x10) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="030000000400000004000000"], 0x48) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000001c0)={r5, &(0x7f0000000240), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000040), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x2b, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000900)=[{0x0, 0x3, 0x6, 0x4}], 0x10, 0x3f0}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 828.03733ms ago: executing program 5 (id=11098): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="00d10a1549000000b703009050db0c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000b1f8306e05d1e4aab009c16b5c05077115d0749619ca39f89974785ae0619b77c6585f678ac92a3b6b4148f56b43c3dd75d75f97c8f92f60a2def458df05e2fbfb3e849b2b3cffd4f29446ae60dd76654b2639b2bc14350706214a6ab7a712d4317fbc3ca01d0d3ed6110b3775903141a5091a4d3db8eb335414fbdb288aba73aaf6d18000a3a2a069cf7f9402e1425bb6bc370576aa1faea0fe222671ecf99038fce8dba53dcb11f87cca"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="1100"/12, @ANYRES32, @ANYBLOB="7d6928f810bda0aff93fce", @ANYRES64=0x0], 0xa) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[], 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9b, 0xff, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x8, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) ioctl$SIOCSIFHWADDR(r5, 0x541b, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8983, &(0x7f0000000080)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 671.93362ms ago: executing program 3 (id=11099): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x12, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007a000000180000000000000000000000000000009500000000000000846bdab3ee67f88bffb73826c5f82839a2756bd52b2f8f914b1ba42e6b0e7ed0388f8c5818adb3c980afb3f8a6efbb9ddbf3aab033ba3bd652d837bb47636b061a9b03d254b0bd9626b583eccafdb033f6"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x78) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7, 0x5}, {0x8, 0x2}, {0xf, 0x5}]}, @typedef={0xf, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x0, 0x0, 0x30]}}, &(0x7f00000001c0)=""/8, 0x4d, 0x8, 0x1, 0xea, 0x10000}, 0x28) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, @flow_dissector=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f0000000580)=r0}, 0x20) (async, rerun: 64) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000011"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r3, &(0x7f00000007c0), 0x0}, 0x20) (async) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)={0x1b, 0x0, 0x0, 0x2013, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1f, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x5}]}, &(0x7f0000000100)='syzkaller\x00', 0x3ff, 0xcf, &(0x7f0000000440)=""/207, 0x41000, 0x0, '\x00', 0x0, @fallback=0x32, r1, 0x8, &(0x7f0000000340)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x25, 0xfff}, 0x10, 0x0, r0, 0x0, &(0x7f0000000680)=[r2, 0x1, 0x1, r3, r4, 0x1], 0x0, 0x10, 0xe8}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="180200000100000000000000000000008500000053000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70600000000000085000000170000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x81) 569.409256ms ago: executing program 1 (id=11100): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d0e, 0x80218, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7}, 0x2005, 0x0, 0x51, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x69, 0x8, 0x0, 0x0}}, 0x1e) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888100", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = syz_clone(0x1022000, 0x0, 0xfffffffffffffc76, 0x0, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000080)=r3, 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x1, 0x4, 0x9, 0xe3, 0x0, 0x0, 0x90000, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000000), 0x9}, 0x810, 0x4, 0x25, 0x6, 0xe4e, 0x8000, 0x0, 0x0, 0x5, 0x0, 0x1}, r3, 0xd, r0, 0x8) 504.57907ms ago: executing program 3 (id=11102): bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080)={0x6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000006110380000000000630a00ff000000009500000c00000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000006110380000000000630a00ff000000009500000c00000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0900000008000000040000000940000040000000", @ANYRES32, @ANYBLOB="000000feffffffffffffff00"], 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xd7}, 0x0, 0x10000000000, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000000065000000000000009500000c00000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000000065000000000000009500000c00000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) 489.62981ms ago: executing program 4 (id=11103): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x10a1, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1}, 0x0, 0x0}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="9deef8f9ab5b68c00d99b4e46ed24ed30435faa16a868e", @ANYRES32=r1, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x58, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10, 0x0, r0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r4, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000380)=@raw=[@generic={0x0, 0x8, 0x0, 0x0, 0x2}], &(0x7f0000000500)='syzkaller\x00', 0x1000, 0xd0, &(0x7f0000000700)=""/208, 0x40f00, 0x19, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x9, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000580)=[r1, r2, r2], &(0x7f00000005c0)=[{0x4, 0x5, 0xc, 0x1}, {0x1, 0x2, 0x7, 0x1}], 0x10, 0x8}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000006c0), 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6307e08102030000fe0ea66718330200975a65789ff57b0000000000"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x2, 0xc48, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0xff90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="09000000ad000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000001a00"/19], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r10}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071115100000000008510000002000000850000007d00000095003300000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000bc0)={r10, &(0x7f0000000a00), 0x0}, 0x20) 358.116528ms ago: executing program 3 (id=11104): openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8000, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x1001a8, 0x0, 0x0, 0x4, 0x0, 0xffff0000, 0x9, 0x0, 0xffffbffe, 0x0, 0xfffffffffffffff1}, 0x0, 0x20000000000, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb2}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000380), 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) r3 = syz_clone(0xc40c1280, &(0x7f0000000140)="9dfa11afe7efd4e5dabc63e438c1f5d789934e11efcce9c7b834a41c46df93a657b328ced154bb82821953a17babac4786fe2d9b4870e691be707b09cb2bb5301d4e9355d6e850b5d7e7a8b7e535dc7af2b6ad6e0ecf695a0985a33245dadd0e37b711482e799bfea5d4ff5dc4bbeab854079a74d5953effa267d4a300", 0x7d, &(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000300)="37c0f4") perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xd, 0x8, 0x10, 0x1, 0x0, 0x9, 0x8091, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x2c, 0x60dd}, 0x800, 0x1b, 0x9, 0x8, 0x1, 0xfffffffd, 0x3, 0x0, 0xe225, 0x0, 0xffffffffffffffff}, r3, 0x9, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xd, 0x8, 0x10, 0x1, 0x0, 0x9, 0x8091, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x2c, 0x60dd}, 0x800, 0x1b, 0x9, 0x8, 0x1, 0xfffffffd, 0x3, 0x0, 0xe225, 0x0, 0xffffffffffffffff}, r3, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 268.744604ms ago: executing program 4 (id=11105): syz_clone(0x45123f80, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb2, 0x0, 0x0, 0x0, 0xec0}, [@jmp={0x5, 0x1, 0xc, 0x5, 0x0, 0x30, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x2, 0xd, 0x0, 0x3}, 0x10, 0x706e, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)=[0x1, 0x1], 0x0, 0x10, 0xffffffff}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r0}, 0x8) 255.107285ms ago: executing program 4 (id=11106): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004070000007f1a00c600feff0000000a9500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, [@generic={0x73, 0x1, 0x1, 0x4, 0xfffffffd}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @cgroup_sock_addr=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89}, 0x94) 196.867438ms ago: executing program 4 (id=11107): perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x20000000000, 0xffffffffffffffff, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000000000d00000000000000000000000a01000000000000000000000a02000000000000000000000b000000000000000000000005"], 0x0, 0x56}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, r7, 0x4, 0x1}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x80, 0x0}, 0x8) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1, 0x5, 0x3, 0x71, 0x8004, r5, 0xff, '\x00', 0x0, r1, 0x0, 0x5, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x20, 0x2a, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x0, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @map_idx={0x18, 0xf, 0x5, 0x0, 0x8}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x1}, @generic={0xf, 0xf, 0x7, 0xc, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000640)='GPL\x00', 0x4d18, 0x0, 0x0, 0x41000, 0x14, '\x00', 0x0, @fallback=0x36, r7, 0x8, &(0x7f00000006c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x1, 0x6, 0xd, 0x40}, 0x10, r8, r6, 0x1, &(0x7f0000000800)=[r4, r4, r0, r5, r9], &(0x7f0000000840)=[{0x0, 0x3, 0x8000, 0x5}], 0x10, 0x9}, 0x94) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r6, 0x4) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@enum, @struct={0x1000000, 0x0, 0x0, 0x4, 0x1}]}}, 0x0, 0x32}, 0x28) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c0000000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0x4}, [@ldst={0x4}]}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x94) ioctl$TUNSETVNETLE(r10, 0x400454dc, &(0x7f0000000940)) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r12, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000730101000000000095000000000000000871ec6fb7792b8eae272b50c98a9ecbdd2be883786951152eb77c1ce7de031474f64949ab1d2c7a9088b2ba60b923f427940054a5f4f68d7e6189a9c0b6d0149b44b7b9687bc501a8026964aa301c89d26e42281125029814d4e34997cbd6baf4f16429b005429f71d4b0322af92cd9c992e26dff504e5f1da4a821d1e940ab636fd0ec3986c73b30f3bc1c2ac0f6a0038462e0ee2dc2d16bea95177c27e70c58e02d6ba41275abe3d2d053c71f0e1f8d9ffa965394290d95944e759e33bb789551c9304d1465d180b49830615bf9df5e41c3a7b8b1aa15c90ed249e90100010000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) 148.423991ms ago: executing program 3 (id=11108): bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x4, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x12, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000010000000000000000000000711809000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2420, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0xc, 0xff}, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x10}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x480, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x100136, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000a000000080000000200000fffffffff0e00000000000000030000000700000003000000fdffffff000000000000000024000af661a3902707559757c004de957f80f8c0bfc6d024d9d21b27f504374f1c364bb559daf1302bd4c726"], &(0x7f0000000040)=""/249, 0x46, 0xf9, 0x6}, 0x28) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x0, 0x2000000, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x5, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffffffe2}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e000000000000", @ANYRES32=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRESOCT=r1], 0x48) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1ff, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x82}, 0x0, 0xaffffffffffffffc, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x20020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext={0x5, 0x8}, 0x9200, 0x3fb, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffff7effffffffff, r7, 0x9) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r6, &(0x7f00000002c0)="79c5b6ce0810720dcfdba817bd5a1f7ea2b651ffa093362540abc2a4c7c97f2ebfe77aa940ec45725a26911de8f7121eeb52feb6763475d8ef96997a95bbbc558a923d511d6e37832e7bfcba5c0629a9d66ccfc9a87f33375bc7d9eac51c", 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004080000000a9500"/40], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1509, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x41, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) ioctl$PERF_EVENT_IOC_QUERY_BPF(r8, 0xc008240a, &(0x7f0000000500)=ANY=[@ANYBLOB="010000000000000004000000266966c386fe18d0eb05ebd5b6ae031c2bd7f137ac05e1cac887fb1ccea447638a85403843ecaff64fa09a6fdcf62267ffffffffffffffff7aa3d5a6fd6721501bd5add7f31883b4263934602958779c"]) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40082404, &(0x7f0000000140)=0x5) 93.988074ms ago: executing program 2 (id=11109): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r0, 0x27, 0xe40, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b08009f59d351", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000b018c018"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES8, @ANYBLOB="00000000d3ec66ecc053c543da2e5f"], 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101801, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'batadv0\x00', 0x1003}) ioctl$TUNSETDEBUG(r5, 0x400454c9, 0xffffffffffffffff) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000680)=0x3) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={&(0x7f00000002c0)="a47977c0f90f3292d29e33cf8831b103ffe4a9e9332d5176bd5a7e7819d1c8d944f85ad6bf35f367f88b7844ee1bcfd4034783196bb4250e5ec62e355c28e711487405dce265fae9a88b5238b4543ef432950f52e2e897ee4b7fe077ebea269b6e74a2988415eac90b985be67e567a25a88d937b5ef0dc57d8958e4a5f4567f9a7b773cf19a9ee8fe2efdba6baa1192f4f165e237d0af2b8764b2c84c1920d8becb8d688e98a5b7f5219622f37590b9c2033c5a7", &(0x7f0000000540)=""/228, &(0x7f0000000640)="3f3c37ef71a1bbfe58f9d3069b9c9e72ebdbbf601b3bee92579865d6e2d7ddc2ec1323c0712276ff85e4ee6875a8cffdd7bc05578ac287e03b5a2b87da07c0d0ddd628b048832ac458a2dab1de8bc4dc7feedf39acfb49ed32c334fddeb874f1c4e11a380be2af186f0bcbe2acfa5e2bcddc8f4d48b0f2898f9b585a36d81de8dff8edbb73ab1e0d47f22a34a6d06b447be6cdc0f073c9afc53eab9b405e757d07b163c9186d6d37882ec772a8d02f6ecfcf0e8f04a978224477be1209b6f0ee1859c5bffa40468876e4c9c91dedfda0aa409ffaf7e20aa8deff27279dc9c3db", &(0x7f0000000040)="1758b0e5ef9693", 0x0, r3, 0x4}, 0x38) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000740)=@id={0x1e, 0x3, 0x0, {0x4e22}}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000780)="cf711611305b68a29a035a525cb7dd6505aa740319260476ed299343128f198617d9bfa656752dd002eb018f1e2e2aecce2a763075a87d3c1acdc9e5ee7c7410fd53e7d8cd15725f6e015004e916c82c4e36b55b35e690c957180d8af864a82fc88fe530c0a5e0141863000f54417495ec406fbe4ede2d12fda94d90e314cd17511621bb5c18e9652aade7e9a1d66948a1d3f904adb2790142683206749493fd87caa2e198ee", 0xa6}, {&(0x7f0000000840)="2bd60669860b40560f84c164211145551513f584460b8a45f541787b52b1908150367729940eaeb7958a4a3e87d64470ef3826de75a16b0f44f3cc401d5bb311cdda26ece7f5a2d08e68bda46ad8417ed15a40294e78295746581e43bed584cba6184be735b5525ea5f9ff9c8cdbbbbcfc3391ac6753fd98ca51ec54fd71a5562c65cb328431d5856fd293adf212cc42edc6c1ef3969187e26c2dc07587f5bff07e1eda55f9feb0f8238d54042bd415d46be56", 0xb3}], 0x2, &(0x7f0000000940)="0c8991e1e30fed519a35ef363b41e7d2f42131c0e19f31a4f09751df49013dbe821f04a4bc2c96a104c28b68c8eff77d2fc122ec9e08134790f88a7636e9875bd2316e515fe38a96e9216120c1e840", 0x4f, 0x8800}, 0x80) openat$cgroup_ro(r6, &(0x7f0000000380)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x306) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x2) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 65.765865ms ago: executing program 4 (id=11110): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffff"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x75, 0x0, &(0x7f0000000100)="b9fffe316844268cb89e14f086dd47e0ffff26123a03631177fbac141416e000030a440a9f03fe80000000000000000000000000002e01070b038da188fe25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x2800000}, 0x50) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x2}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="1b000000000000000700010002000081000000005465f54767de9f124ef335fc15c53b635fea7589fa2ea1d01c5ef22d6d94153cbc65f24ef438b1169aad0fba854248f79160e12ee595594acea1ef0cda83539f9c595a5eb0dd9174cc3fa2b45c75669e913385ccad56fb7209c3ceb44d1890154267160d92e5fea594f27a6cf9ebee60fdc394704cfadad6dd9799b01f3d1379175e60b4c9cde586c4e6aacfaa5c6f1112b0ccf54360097a21d343ed09ada9a9155d2fa0ae6bd51f08e19ccfa4ef5f5a96e6", @ANYRES32, @ANYBLOB="ee0700"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400"/28], 0x50) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) socketpair$unix(0x1, 0x2cabc0e8dcbac074, 0x0, &(0x7f0000000180)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x16, 0xc, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000b80), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x4, 0xc, &(0x7f0000000940)=ANY=[@ANYRESOCT=r4], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x18004, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="b4020000e7ffff1f61118c0000000000850000001c00000095000000000000005af935427d63fb392007c499217ea6de7a68826d24de6af0bf2f131fb5a0f77bd5e8725c309cb28ef469e1bdd7f5d38723bfe2c7bd22d3928c63b99287a344b083ee232fd792fd2f84801e4bacf9794169238a03a2457a5643f6485b6624189975a3bf2ca9a5b49524f60a063a9d484d8ccb71cf2823e29723d6daf8c3420a03d317f725617482dfd8b9321401ad8e8cef34832591e1e6a445056a76ed756949aa01b0bc2d44321fdf33888e0b30aba4f15f5d66b650e2fa743224b46ccc5f9ebf424dbd8a5074079fa6aa544fa1d202a3d9119dafbd156ada8ebc9447c5bc04119edef49d9e6e66f1c735a08f7cf4535f7e2c8a927406e6be02bf74018a3f107ce0d4544459e41820fcc5ffb4052fd3984d60fa244d685e3d15cd070e5a1ca39d3e37407cc6dc464a1a5f242e212f4a80706cc2e81668f9f2247e94b06f874c0f011a4417ea21f4ed4ffd9c0600"], &(0x7f0000000380)='GPL\x00', 0x5, 0xff92, &(0x7f00000003c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x36c, 0x10, &(0x7f0000000000), 0x26}, 0x48) (async, rerun: 64) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x80800, 0x0) recvmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000b80)=""/177, 0xb1}, {&(0x7f0000000780)=""/68, 0x44}, {&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000000800)=""/74, 0x4a}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/37, 0x25}, {&(0x7f0000000a80)=""/237, 0xed}], 0x7}, 0x141) (async, rerun: 32) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 0s ago: executing program 4 (id=11111): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101801, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0x2}) ioctl$TUNSETDEBUG(r0, 0x400454c9, 0xffffffffffffffff) ioctl$TUNSETLINK(r0, 0x400454cd, 0x301) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x4, &(0x7f0000002240)=ANY=[@ANYBLOB="1800000000000000000000000000000071180f000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.123' (ED25519) to the list of known hosts. [ 22.087949][ T24] audit: type=1400 audit(1770702901.110:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.091138][ T267] cgroup: Unknown subsys name 'net' [ 22.110662][ T24] audit: type=1400 audit(1770702901.110:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.137901][ T24] audit: type=1400 audit(1770702901.150:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.138263][ T267] cgroup: Unknown subsys name 'devices' [ 22.345017][ T267] cgroup: Unknown subsys name 'hugetlb' [ 22.350617][ T267] cgroup: Unknown subsys name 'rlimit' [ 22.550895][ T24] audit: type=1400 audit(1770702901.570:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.574211][ T24] audit: type=1400 audit(1770702901.570:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.599029][ T24] audit: type=1400 audit(1770702901.570:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.608281][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 22.631046][ T24] audit: type=1400 audit(1770702901.650:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.656474][ T24] audit: type=1400 audit(1770702901.650:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.682070][ T24] audit: type=1400 audit(1770702901.700:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.682430][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.707797][ T24] audit: type=1400 audit(1770702901.700:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.145961][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.153024][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.160592][ T275] device bridge_slave_0 entered promiscuous mode [ 23.184353][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.191549][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.198977][ T275] device bridge_slave_1 entered promiscuous mode [ 23.225726][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.232772][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.240270][ T276] device bridge_slave_0 entered promiscuous mode [ 23.248266][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.255340][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.262789][ T276] device bridge_slave_1 entered promiscuous mode [ 23.358945][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.366190][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.373642][ T279] device bridge_slave_0 entered promiscuous mode [ 23.380507][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.387608][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.395179][ T279] device bridge_slave_1 entered promiscuous mode [ 23.415850][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.422912][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.430226][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.437264][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.466775][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.474064][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.481346][ T281] device bridge_slave_0 entered promiscuous mode [ 23.488547][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.495624][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.502977][ T281] device bridge_slave_1 entered promiscuous mode [ 23.518297][ T280] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.525498][ T280] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.532796][ T280] device bridge_slave_0 entered promiscuous mode [ 23.541853][ T280] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.549024][ T280] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.556481][ T280] device bridge_slave_1 entered promiscuous mode [ 23.614903][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.621965][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.629226][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.636257][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.670681][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.678032][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.685247][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.692721][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.700115][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.722083][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.730341][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.737411][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.744836][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.752951][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.759999][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.783976][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.791906][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.821243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.838951][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.846638][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.854143][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.862246][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.869293][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.877165][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.885682][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.892693][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.904296][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.912482][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.919531][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.938623][ T276] device veth0_vlan entered promiscuous mode [ 23.946944][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.955285][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.962604][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.970405][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 23.978224][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.986179][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.994127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.012576][ T275] device veth0_vlan entered promiscuous mode [ 24.023631][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.031265][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.039991][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.048167][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.056057][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.064109][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.072232][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.079268][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.086908][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.095318][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.103558][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.110578][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.121083][ T276] device veth1_macvtap entered promiscuous mode [ 24.128643][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.136929][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.145603][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.153179][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.161607][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.169761][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.176800][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.199441][ T275] device veth1_macvtap entered promiscuous mode [ 24.208556][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.216655][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.225519][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.233689][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.241514][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.250004][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.258176][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.265767][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.273854][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.292860][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.300983][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.309277][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.318810][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.327290][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.334719][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.342047][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.350341][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.358748][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 24.367115][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.375408][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.382421][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.389788][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 24.398129][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.406326][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.413393][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.420761][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 24.441891][ T281] device veth0_vlan entered promiscuous mode [ 24.449942][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.458784][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.468052][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.476178][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.484279][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.492496][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.500953][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.509070][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.517031][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.525050][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.533378][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.541540][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.549888][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.557386][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.574894][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.583085][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.584233][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 24.598264][ T281] device veth1_macvtap entered promiscuous mode [ 24.612969][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.622338][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.630722][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.642382][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.656675][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.669757][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.684244][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.692529][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.701153][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.709490][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.717940][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.726317][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.738517][ T279] device veth0_vlan entered promiscuous mode [ 24.746118][ T280] device veth0_vlan entered promiscuous mode [ 24.766571][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.779842][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.788741][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.797238][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.807283][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.814845][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.831635][ T307] cgroup: fork rejected by pids controller in /syz0 [ 24.851823][ T280] device veth1_macvtap entered promiscuous mode [ 24.860195][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.868894][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.877408][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.886180][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.894489][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.920435][ T279] device veth1_macvtap entered promiscuous mode [ 24.931117][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.943087][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.951566][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.974090][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.982451][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.991526][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.999986][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.008598][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.017716][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.051249][ T314] cgroup: syz.2.3 (314) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 25.067519][ T314] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.153147][ T327] device veth1_macvtap left promiscuous mode [ 25.199577][ T324] device veth1_macvtap entered promiscuous mode [ 25.215957][ T324] device macsec0 entered promiscuous mode [ 25.229246][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.233272][ C0] hrtimer: interrupt took 65313 ns [ 25.267581][ T342] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 25.318542][ T342] : renamed from bond_slave_0 [ 25.758108][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.781275][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 25.798960][ T353] device bridge_slave_0 entered promiscuous mode [ 25.842186][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.867954][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 25.899773][ T353] device bridge_slave_1 entered promiscuous mode [ 26.002141][ T378] device syzkaller0 entered promiscuous mode [ 26.164246][ T7] device bridge_slave_1 left promiscuous mode [ 26.170452][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.179889][ T7] device bridge_slave_0 left promiscuous mode [ 26.186065][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.194276][ T7] device veth1_macvtap left promiscuous mode [ 26.200385][ T7] device veth0_vlan left promiscuous mode [ 26.386379][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.404066][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.423904][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.432222][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.448209][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.455316][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.464941][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.473715][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.487861][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.494951][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.508066][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.516172][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.529534][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.537859][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.552460][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.579391][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.597860][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.639599][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.663577][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.706400][ T353] device veth0_vlan entered promiscuous mode [ 26.735020][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.747035][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.802057][ T353] device veth1_macvtap entered promiscuous mode [ 26.810008][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.825766][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.863810][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.909120][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.932291][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.955880][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.964490][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.118727][ T457] syz.4.44[457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.118784][ T457] syz.4.44[457] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.487761][ T24] kauditd_printk_skb: 45 callbacks suppressed [ 27.487771][ T24] audit: type=1400 audit(1770702906.510:119): avc: denied { relabelfrom } for pid=484 comm="syz.4.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.535329][ T24] audit: type=1400 audit(1770702906.530:120): avc: denied { relabelto } for pid=484 comm="syz.4.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 27.589707][ T24] audit: type=1400 audit(1770702906.610:121): avc: denied { create } for pid=487 comm="syz.2.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 27.653301][ T491] syz.3.57[491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.655038][ T491] syz.3.57[491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.791976][ T24] audit: type=1400 audit(1770702906.810:122): avc: denied { tracepoint } for pid=502 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.015432][ T532] device syzkaller0 entered promiscuous mode [ 28.077910][ T24] audit: type=1400 audit(1770702907.100:123): avc: denied { ioctl } for pid=545 comm="syz.0.71" path="socket:[15268]" dev="sockfs" ino=15268 ioctlcmd=0x8943 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.179849][ T553] syz.2.73 uses obsolete (PF_INET,SOCK_PACKET) [ 28.186604][ T24] audit: type=1400 audit(1770702907.210:124): avc: denied { create } for pid=551 comm="syz.2.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 28.239259][ T24] audit: type=1400 audit(1770702907.260:125): avc: denied { create } for pid=550 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 28.314443][ T24] audit: type=1400 audit(1770702907.340:126): avc: denied { create } for pid=563 comm="syz.2.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 28.347681][ T555] device syzkaller0 entered promiscuous mode [ 29.889448][ T640] device wg2 entered promiscuous mode [ 30.298311][ T640] device syzkaller0 entered promiscuous mode [ 30.975612][ T681] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.982923][ T681] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.017215][ T681] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.024438][ T681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.031774][ T681] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.038840][ T681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.080460][ T681] device bridge0 entered promiscuous mode [ 31.164307][ T24] audit: type=1400 audit(1770702910.190:127): avc: denied { create } for pid=696 comm="syz.3.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 31.255371][ T705] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.262673][ T705] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.323987][ T705] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.331077][ T705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.338403][ T705] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.345460][ T705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.443944][ T705] device bridge0 entered promiscuous mode [ 31.948069][ T737] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 31.957989][ T737] syzkaller0: linktype set to 773 [ 32.165268][ T733] device syzkaller0 entered promiscuous mode [ 32.415145][ T747] IPv6: pim6reg1: Disabled Multicast RS [ 32.576564][ T761] device syzkaller0 entered promiscuous mode [ 33.860119][ T24] audit: type=1400 audit(1770702912.880:128): avc: denied { create } for pid=799 comm="syz.3.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 34.330666][ T821] device sit0 entered promiscuous mode [ 34.418128][ T24] audit: type=1400 audit(1770702913.440:129): avc: denied { create } for pid=831 comm="syz.4.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 34.694433][ T24] audit: type=1400 audit(1770702913.720:130): avc: denied { create } for pid=839 comm="syz.3.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 35.074600][ T860] device veth0_vlan left promiscuous mode [ 35.106095][ T860] device veth0_vlan entered promiscuous mode [ 35.158312][ T857] @: renamed from bond_slave_0 [ 35.190207][ T864] : renamed from bond_slave_0 [ 35.587334][ T24] audit: type=1400 audit(1770702914.610:131): avc: denied { ioctl } for pid=896 comm="syz.4.173" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 36.768529][ T955] : port 1(veth0_to_team) entered blocking state [ 36.775760][ T955] : port 1(veth0_to_team) entered disabled state [ 36.786499][ T955] device veth0_to_team entered promiscuous mode [ 36.881896][ T968] device macsec0 entered promiscuous mode [ 37.174254][ T978] device syzkaller0 entered promiscuous mode [ 37.324448][ T1008] device veth0_vlan left promiscuous mode [ 37.332781][ T1008] device veth0_vlan entered promiscuous mode [ 37.410643][ T1023] pimreg1: tun_chr_ioctl cmd 1074025698 [ 37.416519][ T1023] pimreg1: tun_chr_ioctl cmd 2147767519 [ 37.422246][ T1023] pimreg1: tun_chr_ioctl cmd 1074025692 [ 37.429998][ T24] audit: type=1400 audit(1770702916.450:132): avc: denied { create } for pid=1018 comm="syz.0.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 37.509718][ T24] audit: type=1400 audit(1770702916.530:133): avc: denied { create } for pid=1044 comm="syz.4.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 37.692978][ T1065] device tunl0 entered promiscuous mode [ 38.613723][ T24] audit: type=1400 audit(1770702917.640:134): avc: denied { create } for pid=1134 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 38.696708][ T1153] device syzkaller0 entered promiscuous mode [ 38.789985][ T1172] device syzkaller0 entered promiscuous mode [ 39.025586][ T24] audit: type=1400 audit(1770702918.050:135): avc: denied { create } for pid=1192 comm="syz.0.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 39.523028][ T1231] device syzkaller0 entered promiscuous mode [ 40.523204][ T1287] device veth0_vlan left promiscuous mode [ 40.550562][ T1287] device veth0_vlan entered promiscuous mode [ 41.472464][ T1339] sit0: mtu less than device minimum [ 41.657921][ T24] audit: type=1400 audit(1770702920.680:136): avc: denied { create } for pid=1346 comm="syz.1.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 41.996506][ T1361] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 42.204441][ T1373] device syzkaller0 entered promiscuous mode [ 42.494722][ T1387] device veth1_macvtap left promiscuous mode [ 43.057231][ T1407] geneve1: tun_chr_ioctl cmd 1074025672 [ 43.063094][ T1407] geneve1: ignored: set checksum enabled [ 43.102881][ T1410] device syzkaller0 entered promiscuous mode [ 43.927993][ T1434] device syzkaller0 entered promiscuous mode [ 44.046754][ T24] audit: type=1400 audit(1770702923.070:137): avc: denied { append } for pid=1467 comm="syz.3.339" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 44.970428][ T1513] ------------[ cut here ]------------ [ 44.984847][ T1513] trace type BPF program uses run-time allocation [ 45.083646][ T1513] WARNING: CPU: 1 PID: 1513 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 45.213231][ T1513] Modules linked in: [ 45.222109][ T1513] CPU: 0 PID: 1513 Comm: syz.0.353 Not tainted syzkaller #0 [ 45.229892][ T1513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 45.273941][ T1513] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 45.280675][ T1513] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 a4 ae 4b 05 01 48 c7 c7 60 cb 25 85 e8 6a d5 04 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 45.333765][ T1513] RSP: 0018:ffffc9000183f448 EFLAGS: 00010246 [ 45.363609][ T1513] RAX: 7be93a88bee5e100 RBX: 0000000000000001 RCX: 0000000000080000 [ 45.384227][ T1513] RDX: ffffc90000dd1000 RSI: 0000000000001f75 RDI: 0000000000001f76 [ 45.394617][ T1513] RBP: ffffc9000183f490 R08: ffff8881f7152fbf R09: 1ffff1103ee2a5f7 [ 45.402653][ T1513] R10: dffffc0000000000 R11: ffffed103ee2a5f8 R12: ffff8881184d0000 [ 45.410802][ T1513] R13: 0000000000000005 R14: dffffc0000000000 R15: ffff8881108df800 [ 45.418863][ T1513] FS: 00007f465cec86c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 45.427931][ T1513] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 45.434592][ T1513] CR2: 00007fa045405ff8 CR3: 000000012632b000 CR4: 00000000003506a0 [ 45.450684][ T1513] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 45.458966][ T1513] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 45.467094][ T1513] Call Trace: [ 45.470475][ T1513] ? __fdget+0x1a1/0x230 [ 45.488702][ T1513] resolve_pseudo_ldimm64+0x55e/0x1060 [ 45.500112][ T1513] ? bpf_check+0xdb10/0xdb10 [ 45.508169][ T1513] ? kvmalloc_node+0x88/0x130 [ 45.522324][ T1513] bpf_check+0x9058/0xdb10 [ 45.526841][ T1513] ? bpf_get_btf_vmlinux+0x60/0x60 [ 45.535448][ T1513] ? bpf_prog_9e4da6be9002744f+0x5c8/0xf8c [ 45.541466][ T1513] ? is_bpf_text_address+0x177/0x190 [ 45.547045][ T1513] ? selinux_bpf_prog_alloc+0x51/0x140 [ 45.552580][ T1513] ? __kernel_text_address+0xa0/0x100 [ 45.620776][ T1513] ? unwind_get_return_address+0x4d/0x90 [ 45.674201][ T1513] ? stack_trace_save+0xf0/0xf0 [ 45.730631][ T1513] ? arch_stack_walk+0xee/0x140 [ 45.783252][ T1513] ? stack_trace_save+0xa6/0xf0 [ 45.788232][ T1513] ? stack_trace_snprint+0xf0/0xf0 [ 45.847289][ T1513] ? __kasan_slab_alloc+0x69/0xf0 [ 45.863277][ T1513] ? pcpu_block_update+0x3ec/0x900 [ 45.868786][ T1513] ? selinux_bpf_prog_alloc+0x51/0x140 [ 45.874705][ T1513] ? selinux_bpf_prog_alloc+0x51/0x140 [ 45.888828][ T1513] ? __kasan_kmalloc+0xec/0x110 [ 45.897122][ T1513] ? __kasan_kmalloc+0xda/0x110 [ 45.904283][ T1513] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 45.911018][ T1513] ? selinux_bpf_prog_alloc+0x51/0x140 [ 45.918826][ T1513] ? security_bpf_prog_alloc+0x62/0x90 [ 45.928925][ T1513] ? bpf_prog_load+0x9d8/0x14a0 [ 45.936792][ T1513] ? __se_sys_bpf+0x49a/0x740 [ 45.948643][ T1513] ? __x64_sys_bpf+0x7b/0x90 [ 45.956704][ T1513] ? do_syscall_64+0x31/0x40 [ 45.966023][ T1513] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.997222][ T1513] ? memset+0x35/0x40 [ 46.021459][ T1513] ? bpf_obj_name_cpy+0x193/0x1e0 [ 46.050322][ T1513] bpf_prog_load+0xfca/0x14a0 [ 46.092366][ T1513] ? map_freeze+0x320/0x320 [ 46.124242][ T1513] ? selinux_bpf+0xc7/0xf0 [ 46.128696][ T1513] ? security_bpf+0x82/0xa0 [ 46.151464][ T1513] __se_sys_bpf+0x49a/0x740 [ 46.173370][ T1513] ? __x64_sys_bpf+0x90/0x90 [ 46.183766][ T1513] ? __kasan_check_read+0x11/0x20 [ 46.193404][ T1513] __x64_sys_bpf+0x7b/0x90 [ 46.197852][ T1513] do_syscall_64+0x31/0x40 [ 46.212440][ T1513] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 46.218851][ T1513] RIP: 0033:0x7f465e46bf79 [ 46.223500][ T1513] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 46.338834][ T1559] device syzkaller0 entered promiscuous mode [ 46.347706][ T1513] RSP: 002b:00007f465cec8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 46.411106][ T1513] RAX: ffffffffffffffda RBX: 00007f465e6e6fa0 RCX: 00007f465e46bf79 [ 46.442662][ T1513] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 46.481265][ T1513] RBP: 00007f465e5026e0 R08: 0000000000000000 R09: 0000000000000000 [ 46.540743][ T1513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 46.559021][ T1513] R13: 00007f465e6e7038 R14: 00007f465e6e6fa0 R15: 00007ffd6ff8fce8 [ 46.596766][ T1513] ---[ end trace a8cb902d9839e568 ]--- [ 47.161721][ T1594] device syzkaller0 entered promiscuous mode [ 47.202505][ T1595] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 47.713960][ T1651] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.737857][ T1656] device syzkaller0 entered promiscuous mode [ 48.215019][ T24] audit: type=1400 audit(1770702927.240:138): avc: denied { create } for pid=1745 comm="syz.2.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 48.345502][ T1740] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.352827][ T1740] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.799848][ T1783] device wg2 entered promiscuous mode [ 49.038895][ T24] audit: type=1400 audit(1770702928.060:139): avc: denied { create } for pid=1802 comm="syz.4.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 49.993928][ T1855] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.121033][ T1946] tap0: tun_chr_ioctl cmd 1074025681 [ 52.343237][ T1946] tap0: tun_chr_ioctl cmd 1074025680 [ 52.490932][ T1952] geneve1: tun_chr_ioctl cmd 1074025672 [ 52.573274][ T1952] geneve1: ignored: set checksum enabled [ 52.580320][ T1954] geneve1: tun_chr_ioctl cmd 1074025694 [ 53.545675][ T24] audit: type=1400 audit(1770702932.570:140): avc: denied { create } for pid=2012 comm="syz.1.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 53.800505][ T2015] device sit0 entered promiscuous mode [ 53.856473][ T2026] device syzkaller0 entered promiscuous mode [ 55.778134][ T2110] device syzkaller0 entered promiscuous mode [ 57.093984][ T2168] device syzkaller0 entered promiscuous mode [ 57.398137][ T2174] : renamed from team_slave_1 [ 57.655664][ T24] audit: type=1400 audit(1770702936.680:141): avc: denied { create } for pid=2190 comm="syz.1.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 57.756377][ T24] audit: type=1400 audit(1770702936.780:142): avc: denied { create } for pid=2200 comm="syz.3.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 57.914802][ T2211] device syzkaller0 entered promiscuous mode [ 58.186002][ T2227] : renamed from team_slave_1 [ 58.297416][ T2233] device syzkaller0 entered promiscuous mode [ 59.082260][ T2262] device syzkaller0 entered promiscuous mode [ 59.912024][ T2296] device syzkaller0 entered promiscuous mode [ 62.128035][ T2378] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.135411][ T2378] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.231698][ T2378] device bridge0 left promiscuous mode [ 62.267205][ T24] audit: type=1400 audit(1770702941.290:143): avc: denied { create } for pid=2379 comm="syz.0.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 62.554743][ T2407] device veth1_macvtap left promiscuous mode [ 62.763424][ T2412] device sit0 left promiscuous mode [ 62.937689][ T2440] device sit0 entered promiscuous mode [ 62.973817][ T2442] device pim6reg1 entered promiscuous mode [ 63.001400][ T2445] device pim6reg1 entered promiscuous mode [ 64.191847][ T24] audit: type=1400 audit(1770702943.210:144): avc: denied { create } for pid=2503 comm="syz.4.637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 64.264968][ T2505] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 64.275010][ T2505] device syzkaller0 entered promiscuous mode [ 66.903922][ T2623] device syzkaller0 entered promiscuous mode [ 67.412018][ T24] audit: type=1400 audit(1770702946.430:145): avc: denied { create } for pid=2644 comm="syz.4.676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 67.949407][ T2679] bridge0: port 3(syz_tun) entered blocking state [ 67.979899][ T2679] bridge0: port 3(syz_tun) entered disabled state [ 67.994789][ T2679] device syz_tun entered promiscuous mode [ 68.000839][ T2679] bridge0: port 3(syz_tun) entered blocking state [ 68.007323][ T2679] bridge0: port 3(syz_tun) entered forwarding state [ 68.593261][ T2734] device veth0_vlan left promiscuous mode [ 68.613819][ T2734] device veth0_vlan entered promiscuous mode [ 68.628077][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.638316][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.650361][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.426499][ T2766] device syzkaller0 entered promiscuous mode [ 70.863717][ T2818] device syzkaller0 entered promiscuous mode [ 71.093234][ T2817] tap0: tun_chr_ioctl cmd 2147767521 [ 71.130988][ T2848] sock: sock_set_timeout: `syz.0.733' (pid 2848) tries to set negative timeout [ 71.185442][ T2853] device sit0 left promiscuous mode [ 71.208743][ T2853] device sit0 entered promiscuous mode [ 71.378442][ T2872] device syzkaller0 entered promiscuous mode [ 71.412885][ T2875] device pim6reg1 entered promiscuous mode [ 71.587257][ T2882] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 71.751853][ T2896] device syzkaller0 entered promiscuous mode [ 71.783668][ T442] syzkaller0: tun_net_xmit 48 [ 71.791393][ T2901] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 71.824571][ T2901] syzkaller0: tun_net_xmit 1280 [ 71.839873][ T2898] device veth1_macvtap left promiscuous mode [ 71.856477][ T2896] syzkaller0: tun_net_xmit 1280 [ 74.209683][ T3019] device sit0 left promiscuous mode [ 74.475778][ T3025] device veth1_to_batadv entered promiscuous mode [ 74.622352][ T24] audit: type=1400 audit(1770702953.640:146): avc: denied { create } for pid=3046 comm="syz.0.792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 74.981970][ T279] cgroup: fork rejected by pids controller in /syz2 [ 75.728651][ T3107] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.747911][ T3107] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.764566][ T3107] device bridge_slave_0 entered promiscuous mode [ 75.800626][ T3107] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.807880][ T3107] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.815408][ T3107] device bridge_slave_1 entered promiscuous mode [ 75.949325][ T24] audit: type=1400 audit(1770702954.970:147): avc: denied { create } for pid=3107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.009522][ T24] audit: type=1400 audit(1770702955.000:148): avc: denied { write } for pid=3107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.030120][ T24] audit: type=1400 audit(1770702955.000:149): avc: denied { read } for pid=3107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.159308][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.186364][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.280974][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.291702][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.303966][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.311046][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.324763][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.333346][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.343472][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.350538][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.358226][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 76.366438][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.375518][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.383786][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.418006][ T3139] device syzkaller0 entered promiscuous mode [ 76.425136][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.434849][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 76.452558][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 76.464657][ T3107] device veth0_vlan entered promiscuous mode [ 76.483033][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 76.492336][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.500646][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.509138][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.537156][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.547195][ T3107] device veth1_macvtap entered promiscuous mode [ 76.571549][ T296] device bridge_slave_1 left promiscuous mode [ 76.579043][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.590948][ T296] device bridge_slave_0 left promiscuous mode [ 76.597371][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.605525][ T296] device veth0_vlan left promiscuous mode [ 76.759321][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 76.775451][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 76.786514][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 76.794958][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 77.174545][ T3159] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 77.185235][ T3159] device syzkaller0 entered promiscuous mode [ 77.541192][ T3194] device syzkaller0 entered promiscuous mode [ 77.603535][ T3192] device syzkaller0 entered promiscuous mode [ 77.836886][ T3224] device sit0 entered promiscuous mode [ 79.195958][ T3319] device dummy0 entered promiscuous mode [ 82.063855][ T3447] device syzkaller0 entered promiscuous mode [ 82.579002][ T3456] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 82.667366][ T3456] device syzkaller0 entered promiscuous mode [ 82.864696][ T3479] device syzkaller0 entered promiscuous mode [ 83.914940][ T3578] device veth1_macvtap left promiscuous mode [ 83.921123][ T3578] device macsec0 left promiscuous mode [ 84.015005][ T3581] device syzkaller0 entered promiscuous mode [ 84.193893][ T3583] device syzkaller0 entered promiscuous mode [ 84.246346][ T3589] device sit0 left promiscuous mode [ 84.782417][ T3611] nr0: port 1(macsec0) entered blocking state [ 84.789863][ T3611] nr0: port 1(macsec0) entered disabled state [ 84.801634][ T3611] device macsec0 entered promiscuous mode [ 84.819284][ T3618] device wg2 left promiscuous mode [ 87.209326][ T3688] device syzkaller0 entered promiscuous mode [ 87.710245][ T24] audit: type=1400 audit(1770702966.730:150): avc: denied { create } for pid=3730 comm="syz.2.1012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 88.192989][ T3756] device syzkaller0 entered promiscuous mode [ 88.804040][ T3785] device veth0_vlan left promiscuous mode [ 88.846404][ T3785] device veth0_vlan entered promiscuous mode [ 89.048772][ T3804] device vlan0 entered promiscuous mode [ 90.153461][ T3874] device pim6reg1 entered promiscuous mode [ 90.757086][ T3937] device pim6reg1 entered promiscuous mode [ 92.979329][ T4033] device sit0 entered promiscuous mode [ 93.188400][ T4054] device xfrm0 entered promiscuous mode [ 93.592954][ T4077] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 93.648803][ T4077] device syzkaller0 entered promiscuous mode [ 93.841756][ T4092] tap0: tun_chr_ioctl cmd 1074025681 [ 93.894801][ T24] audit: type=1400 audit(1770702972.920:151): avc: denied { attach_queue } for pid=4093 comm="syz.1.1106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 94.006548][ T24] audit: type=1400 audit(1770702972.970:152): avc: denied { create } for pid=4097 comm="syz.4.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 94.930466][ T24] audit: type=1400 audit(1770702973.950:153): avc: denied { create } for pid=4167 comm="syz.4.1128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 95.815510][ T4221] device bridge0 entered promiscuous mode [ 96.121186][ T24] audit: type=1400 audit(1770702975.140:154): avc: denied { create } for pid=4235 comm="syz.0.1148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 96.428441][ T4242] device pim6reg1 left promiscuous mode [ 97.247742][ T4358] device pim6reg1 entered promiscuous mode [ 97.272645][ T24] audit: type=1400 audit(1770702976.280:155): avc: denied { create } for pid=4357 comm="syz.1.1186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 97.468111][ T4377] device syzkaller0 entered promiscuous mode [ 98.053362][ T4409] @: renamed from bond_slave_0 [ 99.326995][ T4462] bridge0: port 3(gretap0) entered blocking state [ 99.338073][ T24] audit: type=1400 audit(1770702978.360:156): avc: denied { create } for pid=4463 comm="syz.2.1216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 99.361111][ T4462] bridge0: port 3(gretap0) entered disabled state [ 99.383515][ T4462] device gretap0 entered promiscuous mode [ 99.402629][ T4462] bridge0: port 3(gretap0) entered blocking state [ 99.409183][ T4462] bridge0: port 3(gretap0) entered forwarding state [ 100.523540][ T4517] device syzkaller0 entered promiscuous mode [ 101.698018][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.709757][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.749669][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.811019][ T4577] device syzkaller0 entered promiscuous mode [ 101.954726][ T4603] device syzkaller0 entered promiscuous mode [ 102.220202][ T4618] device syzkaller0 entered promiscuous mode [ 102.996211][ T4657] device syzkaller0 entered promiscuous mode [ 103.180016][ T4663] device syzkaller0 entered promiscuous mode [ 103.706976][ T4675] ip6tnl0: mtu greater than device maximum [ 104.166276][ T4695] device syzkaller0 entered promiscuous mode [ 105.066847][ T4716] tap0: tun_chr_ioctl cmd 2147767521 [ 105.286294][ T4732] device syzkaller0 entered promiscuous mode [ 106.375790][ T4771] device syzkaller0 entered promiscuous mode [ 106.549992][ T4792] device pim6reg1 entered promiscuous mode [ 106.634731][ T4809] device wg2 entered promiscuous mode [ 107.358781][ T4829] device syzkaller0 entered promiscuous mode [ 107.445440][ T4837] : renamed from vlan1 [ 108.675186][ T4902] device syzkaller0 entered promiscuous mode [ 108.685690][ T24] audit: type=1400 audit(1770702987.710:157): avc: denied { setattr } for pid=4899 comm="syz.0.1346" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 109.057771][ T4925] bY4`Ҙ: renamed from lo [ 109.633413][ T4940] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.642489][ T4940] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.658184][ T4940] device bridge0 left promiscuous mode [ 109.744216][ T4946] device bridge_slave_1 left promiscuous mode [ 109.750697][ T4946] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.788984][ T4946] device bridge_slave_0 left promiscuous mode [ 109.797225][ T4946] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.872937][ T4977] geneve1: tun_chr_ioctl cmd 1074025672 [ 109.878606][ T4977] geneve1: ignored: set checksum enabled [ 110.813433][ T5033] device syzkaller0 entered promiscuous mode [ 111.187676][ T5052] device syzkaller0 entered promiscuous mode [ 111.280820][ T5055] : renamed from team_slave_1 [ 112.232136][ T5103] device syzkaller0 entered promiscuous mode [ 113.817653][ T24] audit: type=1400 audit(1770702992.840:158): avc: denied { read } for pid=5175 comm="syz.4.1424" dev="nsfs" ino=4026532461 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 113.879164][ T24] audit: type=1400 audit(1770702992.870:159): avc: denied { open } for pid=5175 comm="syz.4.1424" path="mnt:[4026532461]" dev="nsfs" ino=4026532461 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 114.417267][ T5192] device syzkaller0 entered promiscuous mode [ 116.407830][ T5315] device syzkaller0 entered promiscuous mode [ 118.166751][ T5399] IPv6: pim6reg1: Disabled Multicast RS [ 119.366292][ T5454] device veth0_vlan left promiscuous mode [ 119.378487][ T5454] device veth0_vlan entered promiscuous mode [ 119.895109][ T5480] device wg2 entered promiscuous mode [ 120.026999][ T5497] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 120.711946][ T24] audit: type=1400 audit(1770702999.730:160): avc: denied { create } for pid=5571 comm="syz.2.1532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 121.296370][ T5599] device syzkaller0 entered promiscuous mode [ 121.643988][ T5611] device syzkaller0 entered promiscuous mode [ 121.689445][ T5620] device syzkaller0 entered promiscuous mode [ 121.699208][ T5622] : port 1(dummy0) entered blocking state [ 121.705807][ T5622] : port 1(dummy0) entered disabled state [ 121.714123][ T5622] device dummy0 entered promiscuous mode [ 121.719949][ T5622] : port 1(dummy0) entered blocking state [ 121.725785][ T5622] : port 1(dummy0) entered forwarding state [ 121.782136][ T5624] device dummy0 left promiscuous mode [ 121.787629][ T5624] : port 1(dummy0) entered disabled state [ 121.821292][ T5617] : port 1(dummy0) entered blocking state [ 121.827424][ T5617] : port 1(dummy0) entered disabled state [ 121.844254][ T5617] device dummy0 entered promiscuous mode [ 121.860386][ T5617] : port 1(dummy0) entered blocking state [ 121.866515][ T5617] : port 1(dummy0) entered forwarding state [ 121.881691][ T5622] device dummy0 left promiscuous mode [ 121.903395][ T5622] : port 1(dummy0) entered disabled state [ 123.160457][ T5669] device syzkaller0 entered promiscuous mode [ 123.372019][ T5681] device veth1_macvtap entered promiscuous mode [ 123.389995][ T5681] device macsec0 entered promiscuous mode [ 123.502268][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 125.362520][ T5731] device syzkaller0 entered promiscuous mode [ 126.141724][ T5761] device sit0 left promiscuous mode [ 127.573834][ T5823] : renamed from pim6reg1 [ 128.689209][ T5859] device pim6reg1 left promiscuous mode [ 128.934540][ T5870] device syzkaller0 entered promiscuous mode [ 129.950298][ T5920] device sit0 entered promiscuous mode [ 130.573546][ T24] audit: type=1400 audit(1770703009.590:161): avc: denied { ioctl } for pid=5944 comm="syz.2.1645" path="mnt:[4026532756]" dev="nsfs" ino=4026532756 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 132.896176][ T24] audit: type=1400 audit(1770703011.920:162): avc: denied { create } for pid=6026 comm="syz.4.1670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 132.932610][ T6029] device syzkaller0 entered promiscuous mode [ 136.688426][ T6171] device syzkaller0 entered promiscuous mode [ 138.380254][ T24] audit: type=1400 audit(1770703017.400:163): avc: denied { create } for pid=6244 comm="syz.3.1734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 138.448796][ T6247] device syzkaller0 entered promiscuous mode [ 138.786811][ T24] audit: type=1400 audit(1770703017.800:164): avc: denied { create } for pid=6263 comm="syz.0.1740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 139.776172][ T6312] device syzkaller0 entered promiscuous mode [ 140.498792][ T6343] device syzkaller0 entered promiscuous mode [ 140.622627][ T6356] device bridge0 left promiscuous mode [ 140.663244][ T6356] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.670323][ T6356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.677597][ T6356] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.684636][ T6356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.785214][ T6356] device bridge0 entered promiscuous mode [ 141.133788][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 141.628705][ T6417] device syzkaller0 entered promiscuous mode [ 141.692736][ T6423] pimreg0: tun_chr_ioctl cmd 35111 [ 141.702685][ T6428] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 141.978490][ T6467] device syzkaller0 entered promiscuous mode [ 142.217595][ T6465] device wg2 entered promiscuous mode [ 143.025901][ T6507] device syzkaller0 entered promiscuous mode [ 143.392408][ T6511] device syzkaller0 entered promiscuous mode [ 143.775666][ T6521] device syzkaller0 entered promiscuous mode [ 144.777229][ T6549] bridge0: port 3(gretap0) entered disabled state [ 144.783737][ T6549] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.823625][ T6549] bridge0: port 3(gretap0) entered blocking state [ 144.830092][ T6549] bridge0: port 3(gretap0) entered forwarding state [ 144.836795][ T6549] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.843854][ T6549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.865215][ T6549] device bridge0 entered promiscuous mode [ 144.926537][ T6567] device syzkaller0 entered promiscuous mode [ 145.108925][ T6577] syz.1.1837 (6577) used obsolete PPPIOCDETACH ioctl [ 145.342337][ T6588] device syzkaller0 entered promiscuous mode [ 145.777466][ T6617] device syzkaller0 entered promiscuous mode [ 146.534189][ T6667] device syzkaller0 entered promiscuous mode [ 146.693942][ T6682] device syzkaller0 entered promiscuous mode [ 147.129538][ T6699] device syzkaller0 entered promiscuous mode [ 147.330176][ T6711] device syzkaller0 entered promiscuous mode [ 147.429700][ T6721] device syzkaller0 entered promiscuous mode [ 147.794260][ T6737] device sit0 left promiscuous mode [ 149.068599][ T6788] pimreg: tun_chr_ioctl cmd 1074025677 [ 149.092111][ T6788] pimreg: linktype set to 6 [ 151.129149][ T6840] device syzkaller0 entered promiscuous mode [ 151.639903][ T6852] device syzkaller0 entered promiscuous mode [ 153.034269][ T6933] device syzkaller0 entered promiscuous mode [ 153.091789][ T6935] device syzkaller0 entered promiscuous mode [ 153.680398][ T6985] device syzkaller0 entered promiscuous mode [ 154.503925][ T7035] device veth0_vlan left promiscuous mode [ 154.528147][ T7035] device veth0_vlan entered promiscuous mode [ 154.655628][ T7036] device syzkaller0 entered promiscuous mode [ 154.674832][ T7032] device syzkaller0 entered promiscuous mode [ 154.738169][ T7046] device syzkaller0 entered promiscuous mode [ 154.759322][ T7050] device syzkaller0 entered promiscuous mode [ 154.978089][ T7084] device syzkaller0 entered promiscuous mode [ 155.072641][ T7086] device syzkaller0 entered promiscuous mode [ 155.816831][ T7137] device syzkaller0 entered promiscuous mode [ 156.676219][ T7168] device dummy0 entered promiscuous mode [ 156.778882][ T7183] device syzkaller0 entered promiscuous mode [ 157.325560][ T7211] tap0: tun_chr_ioctl cmd 1074025675 [ 157.330875][ T7211] tap0: persist enabled [ 157.340756][ T7209] tap0: tun_chr_ioctl cmd 1074025675 [ 157.346493][ T7209] tap0: persist enabled [ 157.458433][ T7209] device wg2 entered promiscuous mode [ 158.420291][ T7237] device syzkaller0 entered promiscuous mode [ 160.024357][ T7321] device syzkaller0 entered promiscuous mode [ 160.163998][ T7329] device syzkaller0 entered promiscuous mode [ 160.955770][ T7356] device syzkaller0 entered promiscuous mode [ 161.405917][ T7411] device syzkaller0 entered promiscuous mode [ 161.786095][ T7409] device aaaaaaaaaaaaaaa entered promiscuous mode [ 162.528009][ T24] audit: type=1400 audit(1770703041.550:165): avc: denied { create } for pid=7461 comm="syz.4.2103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 162.579985][ T7469] device syzkaller0 entered promiscuous mode [ 163.410757][ T7489] device syzkaller0 entered promiscuous mode [ 163.563577][ T7495] device syzkaller0 entered promiscuous mode [ 164.121300][ T7504] device veth0_vlan left promiscuous mode [ 164.138838][ T7504] device veth0_vlan entered promiscuous mode [ 164.262742][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.293262][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.393285][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.576586][ T7526] device pim6reg1 entered promiscuous mode [ 164.730158][ T7534] device syzkaller0 entered promiscuous mode [ 165.122363][ T24] audit: type=1400 audit(1770703044.140:166): avc: denied { create } for pid=7554 comm="syz.0.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 165.671437][ T7572] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 165.696100][ T7572] syzkaller0: persist disabled [ 166.088511][ T7580] device syzkaller0 entered promiscuous mode [ 166.553876][ T7605] device pim6reg1 entered promiscuous mode [ 168.314223][ T7692] device veth1_macvtap left promiscuous mode [ 168.359882][ T7696] device syzkaller0 entered promiscuous mode [ 169.262214][ T7736] device veth1_macvtap left promiscuous mode [ 169.952829][ T7802] device syzkaller0 entered promiscuous mode [ 170.658036][ T24] audit: type=1400 audit(1770703049.680:167): avc: denied { associate } for pid=7823 comm="syz.0.2209" name="blkio.bfq.sectors_recursive" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 171.045215][ T7856] device syzkaller0 entered promiscuous mode [ 171.168853][ T7870] device syzkaller0 entered promiscuous mode [ 171.678862][ T7907] device syzkaller0 entered promiscuous mode [ 171.721748][ T7895] device veth0_vlan left promiscuous mode [ 171.756974][ T7895] device veth0_vlan entered promiscuous mode [ 172.319885][ T7953] device syzkaller0 entered promiscuous mode [ 172.798971][ T7982] device syzkaller0 entered promiscuous mode [ 173.256680][ T8016] device syzkaller0 entered promiscuous mode [ 174.425298][ T8051] device syzkaller0 entered promiscuous mode [ 174.825160][ T8107] device syzkaller0 entered promiscuous mode [ 177.250525][ T8209] device pim6reg1 entered promiscuous mode [ 177.975410][ T8235] device syzkaller0 entered promiscuous mode [ 179.548556][ T8300] device syzkaller0 entered promiscuous mode [ 180.369044][ T8328] device syzkaller0 entered promiscuous mode [ 182.397957][ T24] audit: type=1400 audit(1770703061.420:168): avc: denied { create } for pid=8436 comm="syz.0.2390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 182.453788][ T8437] device dummy0 entered promiscuous mode [ 182.459509][ T8437] IPv6: ADDRCONF(NETDEV_CHANGE): dummy0: link becomes ready [ 183.305848][ T8462] device syzkaller0 entered promiscuous mode [ 183.592170][ T8463] device syzkaller0 left promiscuous mode [ 184.055760][ T8492] device syzkaller0 entered promiscuous mode [ 184.309653][ T8500] device syzkaller0 entered promiscuous mode [ 184.668381][ T8514] device syzkaller0 entered promiscuous mode [ 184.726498][ T8514] FAULT_INJECTION: forcing a failure. [ 184.726498][ T8514] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 184.784788][ T8518] device sit0 entered promiscuous mode [ 184.786906][ T8514] CPU: 1 PID: 8514 Comm: syz.2.2413 Tainted: G W syzkaller #0 [ 184.799075][ T8514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 184.809138][ T8514] Call Trace: [ 184.812469][ T8514] __dump_stack+0x21/0x24 [ 184.816817][ T8514] dump_stack_lvl+0x1a7/0x208 [ 184.821507][ T8514] ? thaw_kernel_threads+0x220/0x220 [ 184.826795][ T8514] ? show_regs_print_info+0x18/0x18 [ 184.832001][ T8514] ? __kernel_text_address+0xa0/0x100 [ 184.837380][ T8514] ? unwind_get_return_address+0x4d/0x90 [ 184.843026][ T8514] dump_stack+0x15/0x1c [ 184.847193][ T8514] should_fail+0x3c1/0x510 [ 184.851625][ T8514] should_fail_usercopy+0x1a/0x20 [ 184.856667][ T8514] _copy_from_iter_full+0x1ac/0x750 [ 184.861873][ T8514] ? stack_trace_save+0xa6/0xf0 [ 184.866741][ T8514] tun_get_user+0x4f6/0x3270 [ 184.871351][ T8514] ? kasan_set_track+0x4a/0x70 [ 184.876138][ T8514] ? putname+0xfe/0x150 [ 184.880305][ T8514] ? do_sys_openat2+0x68e/0x750 [ 184.885165][ T8514] ? tun_do_read+0x1c70/0x1c70 [ 184.889931][ T8514] ? kstrtouint_from_user+0x1c4/0x220 [ 184.895301][ T8514] ? __fsnotify_parent+0x6d2/0x7c0 [ 184.900409][ T8514] ? avc_policy_seqno+0x1b/0x70 [ 184.905362][ T8514] ? selinux_file_permission+0x2a5/0x510 [ 184.910991][ T8514] ? fsnotify_perm+0x66/0x4b0 [ 184.915678][ T8514] tun_chr_write_iter+0x1bf/0x270 [ 184.920699][ T8514] vfs_write+0x758/0xdc0 [ 184.924943][ T8514] ? kernel_write+0x3c0/0x3c0 [ 184.929611][ T8514] ? __fget_files+0x2c4/0x320 [ 184.934286][ T8514] ? __fdget_pos+0x1f7/0x380 [ 184.938875][ T8514] ? ksys_write+0x71/0x250 [ 184.943300][ T8514] ksys_write+0x149/0x250 [ 184.947629][ T8514] ? __ia32_sys_read+0x90/0x90 [ 184.952415][ T8514] ? debug_smp_processor_id+0x17/0x20 [ 184.957780][ T8514] __x64_sys_write+0x7b/0x90 [ 184.962366][ T8514] do_syscall_64+0x31/0x40 [ 184.966785][ T8514] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 184.972666][ T8514] RIP: 0033:0x7f815d4def79 [ 184.977087][ T8514] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 184.996685][ T8514] RSP: 002b:00007f815bf3b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 185.005089][ T8514] RAX: ffffffffffffffda RBX: 00007f815d759fa0 RCX: 00007f815d4def79 [ 185.013065][ T8514] RDX: 000000000000ffdd RSI: 0000200000000280 RDI: 0000000000000009 [ 185.021039][ T8514] RBP: 00007f815bf3b090 R08: 0000000000000000 R09: 0000000000000000 [ 185.029007][ T8514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.036972][ T8514] R13: 00007f815d75a038 R14: 00007f815d759fa0 R15: 00007ffeed83b298 [ 185.847786][ T8554] device syzkaller0 entered promiscuous mode [ 186.229682][ T8575] device syzkaller0 entered promiscuous mode [ 186.276987][ T8579] syzkaller0: tun_chr_ioctl cmd 35108 [ 186.378412][ T8583] device syzkaller0 entered promiscuous mode [ 188.318688][ T8678] device ip6gretap0 entered promiscuous mode [ 189.105302][ T8726] device syzkaller0 entered promiscuous mode [ 189.422372][ T8740] device wg2 left promiscuous mode [ 189.482415][ T8741] device wg2 entered promiscuous mode [ 189.992759][ T8787] device syzkaller0 entered promiscuous mode [ 190.770298][ T8818] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 190.823495][ T8818] device syzkaller0 entered promiscuous mode [ 190.987855][ T8832] device syzkaller0 entered promiscuous mode [ 191.506492][ T8890] device syzkaller0 entered promiscuous mode [ 192.020919][ T8937] device syzkaller0 entered promiscuous mode [ 192.240262][ T8945] device veth0_vlan left promiscuous mode [ 192.275689][ T8945] device veth0_vlan entered promiscuous mode [ 192.299555][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.316254][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.341299][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 192.670916][ T8995] device syzkaller0 entered promiscuous mode [ 193.531433][ T9042] device syzkaller0 entered promiscuous mode [ 193.673708][ T9057] sock: sock_set_timeout: `syz.2.2581' (pid 9057) tries to set negative timeout [ 194.042562][ T9079] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 194.321030][ T9080] device wg2 left promiscuous mode [ 194.588478][ T9089] pimreg0: tun_chr_ioctl cmd 35111 [ 195.231256][ T9137] device syzkaller0 entered promiscuous mode [ 195.576098][ T9152] bridge0: port 4(veth0) entered blocking state [ 195.582482][ T9152] bridge0: port 4(veth0) entered disabled state [ 195.593758][ T9152] device veth0 entered promiscuous mode [ 195.599550][ T9152] bridge0: port 4(veth0) entered blocking state [ 195.605830][ T9152] bridge0: port 4(veth0) entered forwarding state [ 195.851575][ T9205] device syzkaller0 entered promiscuous mode [ 196.184801][ T9215] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 196.230281][ T9238] device syzkaller0 entered promiscuous mode [ 198.145849][ T9333] tun0: tun_chr_ioctl cmd 1074812117 [ 198.511797][ T9344] device sit0 entered promiscuous mode [ 198.555508][ T9360] device syzkaller0 entered promiscuous mode [ 199.549998][ T9428] device sit0 left promiscuous mode [ 199.719440][ T9435] device sit0 entered promiscuous mode [ 199.954789][ T9473] syz.4.2709[9473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.552746][ T9501] device syzkaller0 entered promiscuous mode [ 202.434636][ T9621] device syzkaller0 entered promiscuous mode [ 203.004933][ T9647] device veth0_vlan left promiscuous mode [ 203.010961][ T9647] device veth0_vlan entered promiscuous mode [ 203.020577][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.030921][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.039105][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.928174][ T9706] : renamed from team_slave_1 [ 205.445927][ T9821] device syzkaller0 entered promiscuous mode [ 205.500848][ T9817] device syz_tun entered promiscuous mode [ 205.616419][ T9826] device wg2 entered promiscuous mode [ 205.863915][ T9847] device syzkaller0 entered promiscuous mode [ 206.025935][ T9855] device syzkaller0 entered promiscuous mode [ 206.224364][ T9863] device sit0 entered promiscuous mode [ 206.340754][ T9876] device syzkaller0 entered promiscuous mode [ 207.474157][ T24] audit: type=1400 audit(1770703086.500:169): avc: denied { mounton } for pid=9915 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 207.579461][ T9915] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.586741][ T9915] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.594282][ T9915] device bridge_slave_0 entered promiscuous mode [ 207.601224][ T9915] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.608506][ T9915] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.616104][ T9915] device bridge_slave_1 entered promiscuous mode [ 207.670825][ T9915] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.677892][ T9915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.685179][ T9915] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.692199][ T9915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.713940][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 207.721733][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.729931][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.755465][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 207.763666][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.770707][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 207.794715][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 207.802833][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.809878][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 207.822088][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.833986][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.865390][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 207.878422][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.887196][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.895670][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.903809][ T9915] device veth0_vlan entered promiscuous mode [ 207.915308][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 207.926477][ T9915] device veth1_macvtap entered promiscuous mode [ 207.937583][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 207.950247][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 207.969392][ T24] audit: type=1400 audit(1770703086.990:170): avc: denied { unmount } for pid=9915 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 208.367419][ T9946] bridge0: port 4(veth0) entered disabled state [ 208.375088][ T9946] bridge0: port 3(syz_tun) entered disabled state [ 208.382325][ T9946] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.441385][ T9951] device veth0 left promiscuous mode [ 208.462830][ T9951] bridge0: port 4(veth0) entered disabled state [ 208.479152][ T9951] device syz_tun left promiscuous mode [ 208.484959][ T9951] bridge0: port 3(syz_tun) entered disabled state [ 208.495873][ T9951] device bridge_slave_1 left promiscuous mode [ 208.502093][ T9951] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.514902][ T9951] device bridge_slave_0 left promiscuous mode [ 208.521272][ T9951] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.572150][ T9965] device wg2 left promiscuous mode [ 208.792703][ T296] device bridge_slave_1 left promiscuous mode [ 208.812805][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.840611][ T296] device bridge_slave_0 left promiscuous mode [ 208.864187][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.908468][ T296] device veth1_macvtap left promiscuous mode [ 209.249578][T10000] syzkaller0: tun_chr_ioctl cmd 1074025698 [ 209.360004][T10009] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 211.994774][T10147] device syzkaller0 entered promiscuous mode [ 214.259965][T10277] device syzkaller0 entered promiscuous mode [ 214.938481][T10332] device syzkaller0 entered promiscuous mode [ 215.098976][T10330] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.106128][T10330] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.113799][T10330] device bridge_slave_0 entered promiscuous mode [ 215.160852][T10330] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.168549][T10330] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.176425][T10330] device bridge_slave_1 entered promiscuous mode [ 215.445685][T10330] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.452768][T10330] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.460070][T10330] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.467128][T10330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.586602][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.603231][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.620723][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.639109][T10348] device sit0 entered promiscuous mode [ 215.842172][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.868473][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.912707][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.919803][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.999221][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.015899][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.029778][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.036862][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.058578][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.076711][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.106646][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.116812][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.184381][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 216.209207][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.380871][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 216.393498][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.405481][T10330] device veth0_vlan entered promiscuous mode [ 216.423444][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.435143][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.451900][T10330] device veth1_macvtap entered promiscuous mode [ 216.470409][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 216.479847][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.495071][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 216.578112][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 216.587200][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.620753][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 216.643702][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.500036][ T296] bridge0: port 3(gretap0) entered disabled state [ 217.516927][ T296] device gretap0 left promiscuous mode [ 217.523334][ T296] bridge0: port 3(gretap0) entered disabled state [ 217.921928][ T296] device veth0_to_team left promiscuous mode [ 217.933309][ T296] : port 1(veth0_to_team) entered disabled state [ 217.970968][ T296] device bridge_slave_1 left promiscuous mode [ 217.985849][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.008302][ T296] device bridge_slave_0 left promiscuous mode [ 218.019031][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.032915][ T296] device veth0_vlan left promiscuous mode [ 218.697748][T10489] device syzkaller0 entered promiscuous mode [ 218.811066][T10489] device syzkaller0 left promiscuous mode [ 221.594347][T10626] device syzkaller0 entered promiscuous mode [ 225.240558][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.323227][T10789] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.333173][T10789] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.350992][T10789] device bridge_slave_0 entered promiscuous mode [ 225.369395][T10789] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.393202][T10789] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.410904][T10789] device bridge_slave_1 entered promiscuous mode [ 225.706159][T10789] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.713238][T10789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.720587][T10789] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.727659][T10789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.885124][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.897994][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.919417][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.957391][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.978507][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.985615][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.026113][ T296] device macsec0 left promiscuous mode [ 226.032776][ T296] nr0: port 1(macsec0) entered disabled state [ 226.049806][ T296] device bridge_slave_1 left promiscuous mode [ 226.065057][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.074913][ T296] device bridge_slave_0 left promiscuous mode [ 226.100135][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.433222][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.441574][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.450125][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.457182][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.465160][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.473225][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.481141][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.489261][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.519117][T10841] pimreg0: tun_chr_ioctl cmd 35111 [ 226.527816][T10841] pimreg0: tun_chr_ioctl cmd 1074025672 [ 226.533466][T10841] pimreg0: ignored: set checksum disabled [ 226.548430][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 226.557525][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 226.568982][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 226.577049][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.589183][T10789] device veth0_vlan entered promiscuous mode [ 226.596288][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.604512][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.617650][T10789] device veth1_macvtap entered promiscuous mode [ 226.626907][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 226.643645][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 226.663855][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 226.701283][T10851] device veth0_vlan left promiscuous mode [ 226.718393][T10851] device veth0_vlan entered promiscuous mode [ 226.760266][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 226.777491][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 226.794024][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 226.817325][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 226.826813][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.835361][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.842972][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.831958][T10903] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.840333][T10903] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.847964][T10903] device bridge_slave_0 entered promiscuous mode [ 227.855118][T10903] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.862194][T10903] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.869717][T10903] device bridge_slave_1 entered promiscuous mode [ 227.928256][T10903] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.935418][T10903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.942716][T10903] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.949781][T10903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.975665][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.984285][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.991605][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.040086][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.050967][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.058055][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.072398][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.083356][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.090412][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.123276][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.133002][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.249995][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 228.264083][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.282999][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.295009][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.319714][T10903] device veth0_vlan entered promiscuous mode [ 228.340182][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 228.354488][T10903] device veth1_macvtap entered promiscuous mode [ 228.395688][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 228.414298][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.253196][ T296] device veth0_vlan left promiscuous mode [ 232.704751][T11081] device veth0_vlan left promiscuous mode [ 232.711954][T11081] device veth0_vlan entered promiscuous mode [ 233.834261][T11168] device syzkaller0 entered promiscuous mode [ 234.808353][T11230] device sit0 entered promiscuous mode [ 234.835165][T11231] device syzkaller0 entered promiscuous mode [ 234.914183][T11233] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.921394][T11233] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.017236][T11233] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.024656][T11233] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.033949][T11233] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.041126][T11233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.054273][T11233] device bridge0 entered promiscuous mode [ 236.615077][T11288] device syzkaller0 entered promiscuous mode [ 238.100988][T11347] device syzkaller0 entered promiscuous mode [ 238.514631][T11391] device syzkaller0 entered promiscuous mode [ 240.880006][T11486] device syzkaller0 entered promiscuous mode [ 242.400379][T11547] : renamed from team_slave_1 [ 242.505371][T11549] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 243.008717][T11589] device syzkaller0 entered promiscuous mode [ 243.824041][T11622] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.834200][T11622] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.933201][T11632] device bridge_slave_1 left promiscuous mode [ 243.945614][T11632] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.973100][T11632] device bridge_slave_0 left promiscuous mode [ 243.982530][T11632] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.322983][ T24] audit: type=1400 audit(1770703123.340:171): avc: denied { create } for pid=11668 comm="syz.0.3340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 244.353488][T11674] tap0: tun_chr_ioctl cmd 1074025673 [ 244.362969][T11670] tap0: tun_chr_ioctl cmd 1074025677 [ 244.372345][T11670] tap0: linktype set to 774 [ 244.707364][T11699] cgroup: fork rejected by pids controller in /syz1 [ 245.480466][T11718] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.508152][T11718] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.531025][T11718] device bridge_slave_0 entered promiscuous mode [ 245.554499][T11718] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.561589][T11718] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.569135][T11718] device bridge_slave_1 entered promiscuous mode [ 245.968618][T11742] device syzkaller0 entered promiscuous mode [ 245.977384][T11745] device syzkaller0 entered promiscuous mode [ 246.241384][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.258919][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.323176][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.397307][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.466901][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.473997][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.547469][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.566578][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.575111][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.582143][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.624528][T11718] device veth0_vlan entered promiscuous mode [ 246.677597][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.689894][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 246.746374][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.794584][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.802680][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.810670][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.819029][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.827538][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.835589][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.854809][T11718] device veth1_macvtap entered promiscuous mode [ 246.882825][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.899367][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.907350][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.915074][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 246.923833][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 246.932435][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 246.941105][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 247.559853][T11825] device syzkaller0 entered promiscuous mode [ 248.989686][T11897] syzkaller1: tun_chr_ioctl cmd 21731 [ 249.073854][T11897] bridge0: port 3(gretap0) entered blocking state [ 249.100600][T11897] bridge0: port 3(gretap0) entered disabled state [ 249.134797][T11897] device gretap0 entered promiscuous mode [ 249.140657][T11897] bridge0: port 3(gretap0) entered blocking state [ 249.147126][T11897] bridge0: port 3(gretap0) entered forwarding state [ 249.174287][T11902] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 251.341303][T11988] device syzkaller0 entered promiscuous mode [ 252.297161][T12032] device syzkaller0 entered promiscuous mode [ 252.491490][T12050] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.499430][T12050] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.507689][T12050] device bridge_slave_0 entered promiscuous mode [ 252.565000][T12050] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.580466][T12050] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.613680][T12050] device bridge_slave_1 entered promiscuous mode [ 253.048071][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.063412][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.079632][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.103425][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.112770][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.119833][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.143476][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.290708][T12078] device veth0_vlan left promiscuous mode [ 253.305951][T12078] device veth0_vlan entered promiscuous mode [ 253.346151][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.358017][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.382739][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.389821][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.398933][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.407075][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.425982][T12093] device veth1_macvtap left promiscuous mode [ 253.434642][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.454618][T12050] device veth0_vlan entered promiscuous mode [ 253.463304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.489485][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.497250][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.509849][T12050] device veth1_macvtap entered promiscuous mode [ 253.517407][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.564513][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.588085][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.596507][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.604898][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.224101][T12148] sock: sock_set_timeout: `syz.2.3482' (pid 12148) tries to set negative timeout [ 254.293202][ T296] bridge0: port 3(gretap0) entered disabled state [ 254.325508][ T296] device gretap0 left promiscuous mode [ 254.331013][ T296] bridge0: port 3(gretap0) entered disabled state [ 254.525386][ T296] device bridge_slave_1 left promiscuous mode [ 254.531580][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.636187][ T296] device bridge_slave_0 left promiscuous mode [ 254.685700][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.718204][ T296] device veth1_macvtap left promiscuous mode [ 254.749759][ T296] device veth0_vlan left promiscuous mode [ 255.674483][T12208] device syzkaller0 entered promiscuous mode [ 256.874403][T12239] device syzkaller0 entered promiscuous mode [ 257.053942][T12254] device pim6reg1 entered promiscuous mode [ 257.337847][T12264] device syzkaller0 entered promiscuous mode [ 257.355267][T12263] device syzkaller0 entered promiscuous mode [ 260.612776][T12371] device syzkaller0 entered promiscuous mode [ 264.511936][T12541] device syzkaller0 entered promiscuous mode [ 265.065284][T12558] device syzkaller0 entered promiscuous mode [ 265.091623][T12557] syzkaller0: create flow: hash 775352361 index 1 [ 265.108443][ T1689] syzkaller0: tun_net_xmit 48 [ 265.262052][T12557] syzkaller0: delete flow: hash 775352361 index 1 [ 269.694182][T12700] device dummy0 entered promiscuous mode [ 270.354348][T12738] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 271.019691][T12759] device syzkaller0 entered promiscuous mode [ 271.039578][ T3890] syzkaller0: tun_net_xmit 48 [ 271.180718][T12768] device syzkaller0 entered promiscuous mode [ 273.264820][T12853] : port 1(vlan1) entered blocking state [ 273.270955][T12853] : port 1(vlan1) entered disabled state [ 273.277523][T12853] device vlan1 entered promiscuous mode [ 273.815805][T12893] tun0: tun_chr_ioctl cmd 1074025676 [ 273.826523][T12893] tun0: owner set to 0 [ 273.851394][T12898] tap0: tun_chr_ioctl cmd 1074025675 [ 273.857009][T12898] tap0: persist enabled [ 273.878108][T12898] tap0: tun_chr_ioctl cmd 1074025675 [ 273.884068][T12898] tap0: persist disabled [ 274.073647][T12928] device syzkaller0 entered promiscuous mode [ 275.417342][T13011] device veth0_vlan left promiscuous mode [ 275.445713][T13011] device veth0_vlan entered promiscuous mode [ 275.557098][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 275.574154][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 275.591885][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.492207][T13182] device syzkaller0 entered promiscuous mode [ 278.084979][T13209] device syzkaller0 entered promiscuous mode [ 278.475613][T13249] device veth1_macvtap left promiscuous mode [ 280.943604][T13364] device wg2 entered promiscuous mode [ 281.221586][T13400] device syzkaller0 entered promiscuous mode [ 282.421138][T13446] device syzkaller0 entered promiscuous mode [ 284.026695][T13506] device syzkaller0 entered promiscuous mode [ 284.604451][T13540] device syzkaller0 entered promiscuous mode [ 285.593524][T13556] syzkaller0: tun_chr_ioctl cmd 35108 [ 285.609087][T13557] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.616220][T13557] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.623665][T13557] device bridge0 left promiscuous mode [ 289.078690][T13680] syz.0.3932[13680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.078735][T13680] syz.0.3932[13680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.413978][T13691] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.435038][T13691] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.283888][T13718] device syzkaller0 entered promiscuous mode [ 290.717156][T13746] device syzkaller0 entered promiscuous mode [ 290.775961][T13757] device syzkaller0 entered promiscuous mode [ 290.789912][T13757] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 291.446497][T13796] device syzkaller0 entered promiscuous mode [ 292.340758][T13832] device syzkaller0 entered promiscuous mode [ 292.822490][T13858] device veth0_vlan left promiscuous mode [ 292.858352][T13858] device veth0_vlan entered promiscuous mode [ 293.815447][T13913] device syzkaller0 entered promiscuous mode [ 294.095719][T13938] batadv0: tun_chr_ioctl cmd 1074025684 [ 294.217741][T13943] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 295.497360][T14007] device syzkaller0 entered promiscuous mode [ 297.876148][T14125] device syzkaller0 entered promiscuous mode [ 298.112258][T14132] tap0: tun_chr_ioctl cmd 2147767521 [ 298.118845][T14134] device syzkaller0 left promiscuous mode [ 298.455250][T14155] bridge0: port 3(veth0) entered blocking state [ 298.461909][T14155] bridge0: port 3(veth0) entered disabled state [ 298.468869][T14155] device veth0 entered promiscuous mode [ 298.839740][T14168] device syzkaller0 entered promiscuous mode [ 301.279742][T14289] device syzkaller0 entered promiscuous mode [ 301.782648][T14307] device syzkaller0 entered promiscuous mode [ 302.057841][T14314] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 302.104734][T14314] device syzkaller0 entered promiscuous mode [ 303.720612][T14458] : port 1(ip6gretap0) entered blocking state [ 303.732038][T14458] : port 1(ip6gretap0) entered disabled state [ 303.738831][T14458] device ip6gretap0 entered promiscuous mode [ 304.649326][T14496] device syzkaller0 entered promiscuous mode [ 304.987203][T14531] device sit0 left promiscuous mode [ 305.079567][T14541] device sit0 entered promiscuous mode [ 305.283481][T14553] device wg2 entered promiscuous mode [ 305.583754][T14587] device syzkaller0 entered promiscuous mode [ 305.851362][T14618] device syzkaller0 entered promiscuous mode [ 306.465972][T14639] device syzkaller0 entered promiscuous mode [ 306.661906][T14662] : renamed from bond_slave_0 [ 307.590855][T14710] device syzkaller0 entered promiscuous mode [ 308.487726][T14743] device syzkaller0 entered promiscuous mode [ 308.930198][T14759] device syzkaller0 entered promiscuous mode [ 310.081240][T14813] device syzkaller0 entered promiscuous mode [ 311.366830][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.795589][T14980] device syzkaller0 entered promiscuous mode [ 312.217980][T15006] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 312.227519][T15006] device syzkaller0 entered promiscuous mode [ 313.065591][ T24] audit: type=1400 audit(1770703192.090:172): avc: denied { ioctl } for pid=15059 comm="syz.0.4338" path="" dev="cgroup2" ino=248 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 313.112989][T15058] device syzkaller0 entered promiscuous mode [ 314.626148][T15157] pimreg1: tun_chr_ioctl cmd 1074025692 [ 315.287561][T15199] device syzkaller0 entered promiscuous mode [ 317.131683][T15300] device syzkaller0 entered promiscuous mode [ 318.139719][T15367] 0: renamed from pim6reg1 [ 320.787404][T15494] device veth0_vlan left promiscuous mode [ 320.898192][T15494] device veth0_vlan entered promiscuous mode [ 320.985484][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.994956][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 321.002555][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.765673][T15531] tun0: tun_chr_ioctl cmd 1074812117 [ 322.073701][T15532] tap0: tun_chr_ioctl cmd 2147767521 [ 323.205589][T15588] device syzkaller0 entered promiscuous mode [ 323.911121][T15611] device sit0 entered promiscuous mode [ 326.815636][T15730] device syzkaller0 entered promiscuous mode [ 327.315156][T15758] : renamed from team_slave_1 [ 327.528667][T15762] device syzkaller0 entered promiscuous mode [ 328.395964][T15786] device syzkaller0 entered promiscuous mode [ 328.638466][T15819] device sit0 left promiscuous mode [ 328.708722][T15825] device sit0 entered promiscuous mode [ 328.752498][T15829] device sit0 left promiscuous mode [ 329.596569][T15868] device syzkaller0 entered promiscuous mode [ 330.630812][T15974] device syzkaller0 entered promiscuous mode [ 332.020141][T16093] device veth1_macvtap left promiscuous mode [ 332.111228][T16093] device veth1_macvtap entered promiscuous mode [ 332.271774][T16093] device macsec0 entered promiscuous mode [ 333.061024][T16143] device syzkaller0 entered promiscuous mode [ 334.448476][T16223] device bridge_slave_1 left promiscuous mode [ 334.458026][T16223] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.472117][T16223] device bridge_slave_0 left promiscuous mode [ 334.481495][T16223] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.931751][T16277] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 335.002967][T16283] lo: mtu less than device minimum [ 335.060268][T16288] device aaaaaaaaaaaaaaa entered promiscuous mode [ 336.413986][T16357] device bridge_slave_1 left promiscuous mode [ 336.420230][T16357] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.518651][T16357] device bridge_slave_0 left promiscuous mode [ 336.533259][T16357] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.645682][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.683242][ C0] Illegal XDP return value 16128, expect packet loss! [ 339.694064][T16515] device syzkaller0 entered promiscuous mode [ 341.203254][T16606] nr0: port 1(macsec0) entered blocking state [ 341.210022][T16606] nr0: port 1(macsec0) entered disabled state [ 341.216725][T16606] device macsec0 entered promiscuous mode [ 341.420257][ T24] audit: type=1400 audit(1770703220.440:173): avc: denied { create } for pid=16623 comm="syz.0.4792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 341.989522][T16650] device syzkaller0 entered promiscuous mode [ 342.113993][T16663] device sit0 entered promiscuous mode [ 342.150864][T16665] tap0: tun_chr_ioctl cmd 1074025681 [ 343.878943][T16727] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.886257][T16727] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.118308][T16831] device veth0_vlan left promiscuous mode [ 347.143858][T16831] device veth0_vlan entered promiscuous mode [ 348.699810][T16904] device syzkaller0 entered promiscuous mode [ 350.121566][T16965] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.231307][T16965] device veth0 left promiscuous mode [ 350.273341][T16965] bridge0: port 3(veth0) entered disabled state [ 350.340629][T16965] device bridge_slave_1 left promiscuous mode [ 350.375508][T16965] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.408251][T16965] device bridge_slave_0 left promiscuous mode [ 350.420342][T16965] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.825411][T17036] device syzkaller0 entered promiscuous mode [ 352.261084][T17045] device syzkaller0 entered promiscuous mode [ 352.627341][T17086] device sit0 left promiscuous mode [ 352.877823][T17098] device sit0 entered promiscuous mode [ 352.889677][T17108] device veth1_macvtap left promiscuous mode [ 352.916129][T17114] syz.0.4942[17114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.916183][T17114] syz.0.4942[17114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.231689][T17134] syzkaller0: mtu greater than device maximum [ 355.974345][T17163] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 356.019623][T17164] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 356.105734][T17163] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 356.956486][T17207] device veth0_vlan left promiscuous mode [ 356.983877][T17207] device veth0_vlan entered promiscuous mode [ 357.215330][T17225] device pim6reg1 entered promiscuous mode [ 357.966556][T17276] device syzkaller0 entered promiscuous mode [ 358.887738][T17319] device bond_slave_1 entered promiscuous mode [ 358.913540][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 358.935678][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 360.247259][T17405] device syzkaller0 entered promiscuous mode [ 365.377212][T17550] nr0: port 1(macsec0) entered blocking state [ 365.400735][T17550] nr0: port 1(macsec0) entered disabled state [ 369.197786][T17738] device sit0 entered promiscuous mode [ 369.617065][T17766] tap0: tun_chr_ioctl cmd 1074025692 [ 370.119752][T17814] device syzkaller0 entered promiscuous mode [ 370.612269][T17898] device syzkaller0 entered promiscuous mode [ 371.281594][T17938] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 373.993446][T18063] device bridge_slave_1 left promiscuous mode [ 374.009822][T18063] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.032065][T18063] device bridge_slave_0 left promiscuous mode [ 374.053593][T18063] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.662516][T18251] device syzkaller0 entered promiscuous mode [ 379.868839][T18234] device syzkaller0 entered promiscuous mode [ 381.329514][T18320] device pim6reg1 entered promiscuous mode [ 381.747547][T18348] : port 2(veth0_to_team) entered blocking state [ 381.759350][T18348] : port 2(veth0_to_team) entered disabled state [ 381.776599][T18348] device veth0_to_team entered promiscuous mode [ 382.274996][T18392] device syzkaller0 left promiscuous mode [ 382.496410][T18399] device syzkaller0 entered promiscuous mode [ 383.730184][T18456] device sit0 entered promiscuous mode [ 385.914532][T18538] device syzkaller0 entered promiscuous mode [ 386.000902][T18553] device syzkaller0 left promiscuous mode [ 388.005785][T18631] : renamed from team_slave_1 [ 388.450961][T18652] batadv0: tun_chr_ioctl cmd 2148553947 [ 388.456680][T18652] batadv0: tun_chr_ioctl cmd 1074025698 [ 388.837582][T18673] device syzkaller0 entered promiscuous mode [ 388.966847][T18683] geneve1: tun_chr_ioctl cmd 1074025672 [ 388.995221][T18683] geneve1: ignored: set checksum enabled [ 390.995238][T18754] device syzkaller0 entered promiscuous mode [ 391.757688][T18773] device syzkaller0 entered promiscuous mode [ 392.552905][T18824] device veth0_vlan left promiscuous mode [ 392.563070][T18824] device veth0_vlan entered promiscuous mode [ 393.013940][T18853] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 396.836919][T19028] nr0: port 1(macsec0) entered blocking state [ 396.848288][T19028] nr0: port 1(macsec0) entered disabled state [ 396.855788][T19028] device macsec0 entered promiscuous mode [ 396.871334][T19023] device wg2 left promiscuous mode [ 396.962448][T19027] device syzkaller0 entered promiscuous mode [ 396.974615][T19030] device wg2 entered promiscuous mode [ 397.867036][T19061] device syzkaller0 entered promiscuous mode [ 400.290340][T19179] device syzkaller0 entered promiscuous mode [ 400.536150][T19187] batadv0: tun_chr_ioctl cmd 2148553947 [ 400.804116][T19204] tap1: tun_chr_ioctl cmd 1074025677 [ 400.810024][T19204] tap1: linktype set to 270 [ 406.855691][T19461] device veth1_macvtap left promiscuous mode [ 407.160005][T19475] device syzkaller0 entered promiscuous mode [ 407.465933][T19476] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.474883][T19476] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.482345][T19476] device bridge_slave_0 entered promiscuous mode [ 407.497782][T19476] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.513100][T19476] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.520575][T19476] device bridge_slave_1 entered promiscuous mode [ 407.576915][T19488] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 407.642443][T19476] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.649517][T19476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 407.656808][T19476] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.663856][T19476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 407.722094][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 407.743514][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.867850][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.966132][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 407.976278][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 407.984692][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.991736][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.000303][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 408.008678][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 408.017002][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.024060][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.046000][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 408.083440][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 408.091515][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 408.114772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 408.267771][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 408.277038][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 408.293998][T19476] device veth0_vlan entered promiscuous mode [ 408.339053][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 408.347595][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 408.356126][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 408.363833][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 408.438897][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 408.447359][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 408.477025][T19476] device veth1_macvtap entered promiscuous mode [ 408.489443][ T296] device macsec0 left promiscuous mode [ 408.496868][ T296] nr0: port 1(macsec0) entered disabled state [ 408.504359][ T296] device veth0_to_team left promiscuous mode [ 408.510658][ T296] : port 2(veth0_to_team) entered disabled state [ 408.518995][ T296] device vlan1 left promiscuous mode [ 408.524742][ T296] : port 1(vlan1) entered disabled state [ 408.902992][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 408.911203][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 408.919590][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 408.928900][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 408.939454][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 409.816947][T19642] device veth0_vlan left promiscuous mode [ 409.852677][T19642] device veth0_vlan entered promiscuous mode [ 410.722631][T19680] device sit0 entered promiscuous mode [ 411.118111][T19712] device sit0 left promiscuous mode [ 411.660681][T19724] device syzkaller0 entered promiscuous mode [ 411.674909][T19743] device syzkaller0 entered promiscuous mode [ 412.321527][T19772] device syzkaller0 entered promiscuous mode [ 413.275519][T19801] device syzkaller0 entered promiscuous mode [ 413.285917][T19801] device syzkaller0 left promiscuous mode [ 413.312306][T19808] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 413.323250][T19808] device syzkaller0 entered promiscuous mode [ 413.339245][T19815] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 413.355353][T19813] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 413.361277][T19813] syzkaller0: linktype set to 825 [ 413.470971][T19821] FAULT_INJECTION: forcing a failure. [ 413.470971][T19821] name failslab, interval 1, probability 0, space 0, times 1 [ 413.546709][T19821] CPU: 1 PID: 19821 Comm: syz.2.5749 Tainted: G W syzkaller #0 [ 413.555592][T19821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 413.565656][T19821] Call Trace: [ 413.568950][T19821] __dump_stack+0x21/0x24 [ 413.573372][T19821] dump_stack_lvl+0x1a7/0x208 [ 413.578048][T19821] ? thaw_kernel_threads+0x220/0x220 [ 413.583335][T19821] ? show_regs_print_info+0x18/0x18 [ 413.588536][T19821] ? unwind_get_return_address+0x4d/0x90 [ 413.594248][T19821] ? stack_trace_save+0xf0/0xf0 [ 413.599101][T19821] dump_stack+0x15/0x1c [ 413.603269][T19821] should_fail+0x3c1/0x510 [ 413.607685][T19821] ? __get_vm_area_node+0x113/0x450 [ 413.612889][T19821] __should_failslab+0xa4/0xe0 [ 413.617658][T19821] should_failslab+0x9/0x20 [ 413.622167][T19821] kmem_cache_alloc_trace+0x3a/0x2e0 [ 413.627455][T19821] __get_vm_area_node+0x113/0x450 [ 413.632480][T19821] __vmalloc_node_range+0xe0/0x790 [ 413.637613][T19821] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 413.643184][T19821] ? _kstrtoull+0x3c0/0x4d0 [ 413.647685][T19821] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 413.653228][T19821] __vmalloc+0x79/0x90 [ 413.657294][T19821] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 413.662831][T19821] bpf_prog_alloc_no_stats+0x3b/0x250 [ 413.668199][T19821] ? bpf_prog_alloc+0x17/0x1f0 [ 413.672959][T19821] bpf_prog_alloc+0x21/0x1f0 [ 413.677576][T19821] bpf_prog_load+0x7c4/0x14a0 [ 413.682267][T19821] ? map_freeze+0x320/0x320 [ 413.686765][T19821] ? vfs_write+0xb27/0xdc0 [ 413.691173][T19821] ? selinux_bpf+0xc7/0xf0 [ 413.695584][T19821] ? security_bpf+0x82/0xa0 [ 413.700103][T19821] __se_sys_bpf+0x49a/0x740 [ 413.704604][T19821] ? __x64_sys_bpf+0x90/0x90 [ 413.709191][T19821] ? debug_smp_processor_id+0x17/0x20 [ 413.714562][T19821] __x64_sys_bpf+0x7b/0x90 [ 413.718976][T19821] do_syscall_64+0x31/0x40 [ 413.723396][T19821] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 413.729287][T19821] RIP: 0033:0x7faff08d6f79 [ 413.733703][T19821] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 413.753315][T19821] RSP: 002b:00007fafef333028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 413.761743][T19821] RAX: ffffffffffffffda RBX: 00007faff0b51fa0 RCX: 00007faff08d6f79 [ 413.769719][T19821] RDX: 0000000000000048 RSI: 000020000000e000 RDI: 0000000000000005 [ 413.777687][T19821] RBP: 00007fafef333090 R08: 0000000000000000 R09: 0000000000000000 [ 413.785659][T19821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.793627][T19821] R13: 00007faff0b52038 R14: 00007faff0b51fa0 R15: 00007fff281aebb8 [ 413.842827][T19821] syz.2.5749: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 413.859807][T19821] CPU: 1 PID: 19821 Comm: syz.2.5749 Tainted: G W syzkaller #0 [ 413.868774][T19821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 413.878832][T19821] Call Trace: [ 413.882118][T19821] __dump_stack+0x21/0x24 [ 413.886455][T19821] dump_stack_lvl+0x1a7/0x208 [ 413.891127][T19821] ? show_regs_print_info+0x18/0x18 [ 413.896325][T19821] ? pr_cont_kernfs_name+0xe3/0xf0 [ 413.901526][T19821] dump_stack+0x15/0x1c [ 413.905679][T19821] warn_alloc+0x1dc/0x200 [ 413.910006][T19821] ? __get_vm_area_node+0x113/0x450 [ 413.915206][T19821] ? zone_watermark_ok_safe+0x250/0x250 [ 413.920772][T19821] ? __get_vm_area_node+0x345/0x450 [ 413.925977][T19821] __vmalloc_node_range+0x27d/0x790 [ 413.931175][T19821] ? _kstrtoull+0x3c0/0x4d0 [ 413.935685][T19821] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 413.941234][T19821] __vmalloc+0x79/0x90 [ 413.945301][T19821] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 413.950886][T19821] bpf_prog_alloc_no_stats+0x3b/0x250 [ 413.956471][T19821] ? bpf_prog_alloc+0x17/0x1f0 [ 413.961233][T19821] bpf_prog_alloc+0x21/0x1f0 [ 413.965835][T19821] bpf_prog_load+0x7c4/0x14a0 [ 413.970515][T19821] ? map_freeze+0x320/0x320 [ 413.975035][T19821] ? vfs_write+0xb27/0xdc0 [ 413.979461][T19821] ? selinux_bpf+0xc7/0xf0 [ 413.983963][T19821] ? security_bpf+0x82/0xa0 [ 413.988554][T19821] __se_sys_bpf+0x49a/0x740 [ 413.993062][T19821] ? __x64_sys_bpf+0x90/0x90 [ 413.997662][T19821] ? debug_smp_processor_id+0x17/0x20 [ 414.003068][T19821] __x64_sys_bpf+0x7b/0x90 [ 414.007569][T19821] do_syscall_64+0x31/0x40 [ 414.011978][T19821] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 414.017867][T19821] RIP: 0033:0x7faff08d6f79 [ 414.022276][T19821] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 414.041883][T19821] RSP: 002b:00007fafef333028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 414.050305][T19821] RAX: ffffffffffffffda RBX: 00007faff0b51fa0 RCX: 00007faff08d6f79 [ 414.058278][T19821] RDX: 0000000000000048 RSI: 000020000000e000 RDI: 0000000000000005 [ 414.066247][T19821] RBP: 00007fafef333090 R08: 0000000000000000 R09: 0000000000000000 [ 414.074226][T19821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 414.082195][T19821] R13: 00007faff0b52038 R14: 00007faff0b51fa0 R15: 00007fff281aebb8 [ 414.099206][T19821] Mem-Info: [ 414.102413][T19821] active_anon:36 inactive_anon:25583 isolated_anon:0 [ 414.102413][T19821] active_file:23774 inactive_file:3983 isolated_file:0 [ 414.102413][T19821] unevictable:0 dirty:122 writeback:0 [ 414.102413][T19821] slab_reclaimable:7819 slab_unreclaimable:90734 [ 414.102413][T19821] mapped:29336 shmem:162 pagetables:801 bounce:0 [ 414.102413][T19821] free:1526072 free_pcp:739 free_cma:0 [ 414.139476][T19821] Node 0 active_anon:144kB inactive_anon:102432kB active_file:95096kB inactive_file:15932kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117344kB dirty:488kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:7360kB all_unreclaimable? no [ 414.169719][T19821] DMA32 free:2985148kB min:62644kB low:78304kB high:93964kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2986532kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1384kB local_pcp:1384kB free_cma:0kB [ 414.218141][T19821] lowmem_reserve[]: 0 3941 3941 [ 414.223848][T19821] Normal free:3118472kB min:84808kB low:106008kB high:127208kB reserved_highatomic:0KB active_anon:144kB inactive_anon:102364kB active_file:95096kB inactive_file:15932kB unevictable:0kB writepending:488kB present:5242880kB managed:4036112kB mlocked:0kB pagetables:3148kB bounce:0kB free_pcp:2564kB local_pcp:1256kB free_cma:0kB [ 414.258058][T19821] lowmem_reserve[]: 0 0 0 [ 414.262504][T19821] DMA32: 5*4kB (UM) 3*8kB (M) 3*16kB (M) 7*32kB (UM) 8*64kB (UM) 5*128kB (UM) 7*256kB (UM) 6*512kB (M) 5*1024kB (UM) 4*2048kB (UM) 724*4096kB (M) = 2985148kB [ 414.279950][T19821] Normal: 467*4kB (UME) 617*8kB (ME) 545*16kB (ME) 931*32kB (UME) 413*64kB (UME) 130*128kB (UM) 190*256kB (UME) 87*512kB (UM) 36*1024kB (UM) 12*2048kB (M) 702*4096kB (UM) = 3118404kB [ 414.299617][T19821] 27919 total pagecache pages [ 414.320723][T19821] 0 pages in swap cache [ 414.330930][T19821] Swap cache stats: add 0, delete 0, find 0/0 [ 414.340507][T19821] Free swap = 124996kB [ 414.346129][T19821] Total swap = 124996kB [ 414.351800][T19821] 2097051 pages RAM [ 414.363309][T19821] 0 pages HighMem/MovableOnly [ 414.368167][T19821] 341390 pages reserved [ 414.378237][T19821] 0 pages cma reserved [ 414.462653][T19854] device pim6reg1 entered promiscuous mode [ 416.227607][T19918] device wg2 entered promiscuous mode [ 416.263585][T19923] tap0: tun_chr_ioctl cmd 2147767521 [ 416.323603][T19926] device pim6reg1 entered promiscuous mode [ 416.819935][T19952] device sit0 left promiscuous mode [ 416.874462][T19960] device sit0 left promiscuous mode [ 416.924247][T19957] device sit0 entered promiscuous mode [ 417.244942][T19963] device sit0 entered promiscuous mode [ 418.456501][T20062] device pim6reg1 entered promiscuous mode [ 419.802457][T20126] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.953410][T20126] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.960922][T20126] device bridge_slave_0 entered promiscuous mode [ 420.143329][T20126] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.191620][T20126] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.215281][T20126] device bridge_slave_1 entered promiscuous mode [ 420.885658][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 420.913850][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 420.993122][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 421.001786][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.010289][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.017367][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.024951][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 421.033432][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.041525][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.048569][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.056181][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 421.120275][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 421.130754][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.144128][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 421.152241][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 421.239935][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 421.248979][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 421.310647][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 421.337267][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 421.346386][T20126] device veth0_vlan entered promiscuous mode [ 421.541188][T20173] device syzkaller0 entered promiscuous mode [ 421.551964][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 421.559492][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 421.587104][T20126] device veth1_macvtap entered promiscuous mode [ 421.593851][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 421.601947][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 421.610296][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 421.639428][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 421.647973][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 421.656981][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 421.667212][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 421.781210][T20194] device wg2 left promiscuous mode [ 421.853827][ T296] device veth1_macvtap left promiscuous mode [ 421.862324][ T296] device veth0_vlan left promiscuous mode [ 421.992868][T20207] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.003897][T20207] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.056926][T20208] device bridge_slave_1 left promiscuous mode [ 422.063299][T20208] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.070978][T20208] device bridge_slave_0 left promiscuous mode [ 422.077388][T20208] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.134813][T20204] device wg2 entered promiscuous mode [ 423.028708][T20256] device veth0_to_batadv entered promiscuous mode [ 424.080506][T20303] device syzkaller0 left promiscuous mode [ 424.747819][T20330] device pim6reg1 entered promiscuous mode [ 425.489972][T20358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 426.829240][T20396] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.839318][T20396] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.889257][T20397] device bridge_slave_1 left promiscuous mode [ 426.896203][T20397] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.903909][T20397] device bridge_slave_0 left promiscuous mode [ 426.910290][T20397] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.108407][T20442] device syzkaller0 entered promiscuous mode [ 430.774938][T20556] device syzkaller0 entered promiscuous mode [ 430.802385][T20552] device sit0 entered promiscuous mode [ 431.969301][T20663] device syzkaller0 entered promiscuous mode [ 433.617326][T20772] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.624607][T20772] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.632099][T20772] device bridge_slave_0 entered promiscuous mode [ 433.664560][T20789] device syzkaller0 entered promiscuous mode [ 433.671615][T20772] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.680978][T20772] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.693515][T20772] device bridge_slave_1 entered promiscuous mode [ 433.876697][T20772] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.883802][T20772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.891106][T20772] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.898245][T20772] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.908800][T20796] device syzkaller0 left promiscuous mode [ 434.053772][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 434.062237][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 434.072003][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 434.081369][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 434.089855][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 434.143195][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 434.159754][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 434.191908][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 434.230507][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 434.251921][T20772] device veth0_vlan entered promiscuous mode [ 434.262867][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 434.283445][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 434.329978][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 434.372744][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 434.383694][T20772] device veth1_macvtap entered promiscuous mode [ 434.545524][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 434.564046][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 434.573756][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 434.614330][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 434.638221][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 436.112133][T20860] device syzkaller0 entered promiscuous mode [ 436.321559][ T296] device macsec0 left promiscuous mode [ 436.327401][ T296] nr0: port 1(macsec0) entered disabled state [ 436.386253][ T296] device veth0_vlan left promiscuous mode [ 437.479479][T20957] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.488896][T20957] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.597084][T20945] device sit0 left promiscuous mode [ 437.651307][T20961] device bridge_slave_1 left promiscuous mode [ 437.658672][T20961] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.669539][T20961] device bridge_slave_0 left promiscuous mode [ 437.710887][T20961] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.314299][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 440.475929][T21052] syzkaller0: mtu greater than device maximum [ 441.216304][T21049] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 441.534005][T21097] device wg2 left promiscuous mode [ 442.597754][T21171] device syzkaller0 entered promiscuous mode [ 443.290191][T21230] device bridge_slave_0 entered promiscuous mode [ 443.683084][T21250] : renamed from bond_slave_0 [ 443.812190][T21259] device sit0 entered promiscuous mode [ 444.137753][T21261] device syzkaller0 entered promiscuous mode [ 444.909866][T21315] device syzkaller0 entered promiscuous mode [ 445.177066][T21329] @: renamed from bond_slave_0 [ 445.341727][T21340] device syzkaller0 entered promiscuous mode [ 446.503964][T21399] : port 1(veth0_to_team) entered blocking state [ 446.592965][T21399] : port 1(veth0_to_team) entered disabled state [ 446.643272][T21399] device veth0_to_team entered promiscuous mode [ 446.975410][T21407] device syzkaller0 entered promiscuous mode [ 447.018513][T21408] device syzkaller0 left promiscuous mode [ 448.601043][T21506] +: renamed from team_slave_1 [ 448.834655][T21522] device pim6reg1 entered promiscuous mode [ 449.226918][T21540] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 449.247295][T21540] syzkaller0: linktype set to 0 [ 449.519981][T21549] device syzkaller0 left promiscuous mode [ 450.681661][T21635] device syzkaller0 entered promiscuous mode [ 450.914874][T21642] : renamed from vlan1 [ 450.984748][T21650] batadv0: tun_chr_ioctl cmd 1074025684 [ 451.041315][T21654] tap0: tun_chr_ioctl cmd 1074025675 [ 451.054314][T21654] tap0: persist enabled [ 451.071772][T21654] tap0: tun_chr_ioctl cmd 1074025675 [ 451.097149][T21654] tap0: persist disabled [ 451.612769][T21678] device team_slave_1 entered promiscuous mode [ 451.620985][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 451.633352][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 452.531875][T21735] pimreg1: tun_chr_ioctl cmd 1074025692 [ 453.957188][T21786] device syzkaller0 entered promiscuous mode [ 455.058682][T21833] device syzkaller0 entered promiscuous mode [ 456.044253][T21892] device veth0_vlan left promiscuous mode [ 456.050429][T21892] device veth0_vlan entered promiscuous mode [ 456.057708][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 456.074653][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 456.113423][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 457.363869][T21987] device syzkaller0 left promiscuous mode [ 457.899337][T22019] device syzkaller0 entered promiscuous mode [ 459.209962][T22111] tap0: tun_chr_ioctl cmd 2147767521 [ 459.224185][T22110] tap0: tun_chr_ioctl cmd 2147767521 [ 459.272441][T22115] tun0: tun_chr_ioctl cmd 1074025678 [ 459.306309][T22115] tun0: group set to 1 [ 459.339696][T22116] tun0: tun_chr_ioctl cmd 1074025675 [ 459.377065][T22116] tun0: persist enabled [ 460.761618][T22181] device syzkaller0 entered promiscuous mode [ 461.430182][T22221] ref_ctr_offset mismatch. inode: 0xa3a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 462.989683][T22299] device veth0_vlan left promiscuous mode [ 462.995925][T22299] device veth0_vlan entered promiscuous mode [ 463.031166][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 463.041590][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 463.068412][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 463.151368][T22322] device syzkaller0 left promiscuous mode [ 463.538599][T22329] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.548465][T22329] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.559227][T22329] device bridge_slave_0 entered promiscuous mode [ 463.569833][T22329] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.580261][T22329] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.589940][T22329] device bridge_slave_1 entered promiscuous mode [ 463.670746][T22329] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.677933][T22329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 463.685275][T22329] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.692311][T22329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 463.741111][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 463.749564][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.774808][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.817476][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 463.829236][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.836325][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 463.849868][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 463.861431][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.868512][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 463.881392][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 463.893147][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 463.922336][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 463.938225][T22329] device veth0_vlan entered promiscuous mode [ 463.946323][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 463.956716][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 463.969172][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 463.998282][T22329] device veth1_macvtap entered promiscuous mode [ 464.006293][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 464.021227][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 464.032877][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 464.052452][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 464.061974][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 464.144325][T22353] tun0: tun_chr_ioctl cmd 1074025678 [ 464.153256][T22353] tun0: group set to 1 [ 464.450378][ T9] device macsec0 left promiscuous mode [ 464.459990][ T9] nr0: port 1(macsec0) entered disabled state [ 464.491500][ T9] device veth0_vlan left promiscuous mode [ 465.133717][T22420] device syzkaller0 entered promiscuous mode [ 465.916597][T22446] device sit0 left promiscuous mode [ 466.181807][T22456] device syzkaller0 entered promiscuous mode [ 466.488817][T22479] device syzkaller0 entered promiscuous mode [ 467.083374][T22525] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 467.090370][T22525] syzkaller0: linktype set to 804 [ 467.116095][T22527] device syzkaller0 entered promiscuous mode [ 467.128524][T22527] syzkaller0: create flow: hash 3799672285 index 0 [ 467.143753][ T1673] syzkaller0: tun_net_xmit 48 [ 467.246310][T22527] syzkaller0 (unregistered): delete flow: hash 3799672285 index 0 [ 468.363505][T22552] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 468.369505][T22552] syzkaller0: linktype set to 804 [ 468.538291][T22570] device veth0_vlan left promiscuous mode [ 468.545320][T22570] device veth0_vlan entered promiscuous mode [ 468.821783][T22603] device syzkaller0 entered promiscuous mode [ 469.519236][T22628] device wg2 entered promiscuous mode [ 470.066571][T22654] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 470.932907][T22704] : renamed from pim6reg1 [ 471.589342][T22722] : renamed from bond_slave_0 [ 472.436053][T22739] cgroup: fork rejected by pids controller in /syz4 [ 472.896927][T22859] device syzkaller0 entered promiscuous mode [ 473.382621][T22881] device syzkaller0 entered promiscuous mode [ 473.745995][T22874] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.753444][T22874] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.761497][T22874] device bridge_slave_0 entered promiscuous mode [ 473.768573][T22874] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.775759][T22874] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.786093][T22874] device bridge_slave_1 entered promiscuous mode [ 473.848644][T22902] tap0: tun_chr_ioctl cmd 2147767521 [ 473.884325][T22874] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.891407][T22874] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.898689][T22874] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.905741][T22874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.953341][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.974594][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.988395][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 473.996059][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 474.017514][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 474.028959][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.036044][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.065785][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 474.173311][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.180390][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.292662][T22874] device veth0_vlan entered promiscuous mode [ 474.305294][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 474.314087][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 474.322162][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 474.329714][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 474.337233][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 474.345198][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 474.399352][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 474.408463][T22874] device veth1_macvtap entered promiscuous mode [ 474.429003][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 474.437809][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 475.497934][ T9] device veth1_macvtap left promiscuous mode [ 475.506306][ T9] device veth0_vlan left promiscuous mode [ 478.228471][T23149] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.237368][T23149] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.441725][T23149] device bridge_slave_1 left promiscuous mode [ 478.534116][T23149] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.659862][T23149] device bridge_slave_0 left promiscuous mode [ 478.681791][T23149] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.138732][T23187] device syzkaller0 entered promiscuous mode [ 479.347515][ T24] audit: type=1400 audit(1770703358.370:174): avc: denied { create } for pid=23193 comm="syz.2.6723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 479.473281][T23198] device syzkaller0 entered promiscuous mode [ 481.623424][T23284] : renamed from pim6reg1 [ 484.217691][T23373] device syzkaller0 entered promiscuous mode [ 485.496194][T23439] device wg2 entered promiscuous mode [ 485.913172][T23444] device veth0_vlan left promiscuous mode [ 485.931768][T23444] device veth0_vlan entered promiscuous mode [ 485.980140][T23444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 486.035626][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 486.045885][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 486.053840][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 486.533870][T23511] device pim6reg1 entered promiscuous mode [ 487.871594][T23592] tap0: tun_chr_ioctl cmd 1074025675 [ 487.894294][T23592] tap0: persist enabled [ 487.964917][T23596] tap0: tun_chr_ioctl cmd 1074025675 [ 487.999903][T23596] tap0: persist enabled [ 488.125828][T23607] device sit0 entered promiscuous mode [ 488.620330][T23636] device syzkaller0 entered promiscuous mode [ 491.033759][T23751] : port 1(ip6gretap0) entered blocking state [ 491.039982][T23751] : port 1(ip6gretap0) entered forwarding state [ 491.974159][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 492.231972][T23803] device syzkaller0 entered promiscuous mode [ 492.720183][T23857] tun0: tun_chr_ioctl cmd 1074025676 [ 492.725591][T23857] tun0: owner set to 0 [ 493.065385][T23893] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 493.678605][T23937] device syzkaller0 entered promiscuous mode [ 495.369703][T24012] device syzkaller0 entered promiscuous mode [ 496.008288][T24048] device syzkaller0 entered promiscuous mode [ 497.221377][T24138] device veth1_macvtap left promiscuous mode [ 497.337135][T24138] device veth1_macvtap entered promiscuous mode [ 497.371406][T24138] device macsec0 entered promiscuous mode [ 497.377558][T24138] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 497.436795][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 497.592883][T24155] tap0: tun_chr_ioctl cmd 1074025677 [ 497.621928][T24155] tap0: linktype set to 7 [ 497.892457][T24160] device syzkaller0 entered promiscuous mode [ 498.758387][T24206] device pim6reg1 entered promiscuous mode [ 499.814569][T24242] : port 1(ip6gretap0) entered blocking state [ 499.863112][T24242] : port 1(ip6gretap0) entered disabled state [ 499.869933][T24242] device ip6gretap0 entered promiscuous mode [ 499.927993][T24247] device ip6gretap0 left promiscuous mode [ 499.952942][T24247] : port 1(ip6gretap0) entered disabled state [ 500.270633][T24267] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.279621][T24267] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.401279][T24278] : port 1(ip6gretap0) entered blocking state [ 500.417069][T24278] : port 1(ip6gretap0) entered disabled state [ 500.424073][T24278] device ip6gretap0 entered promiscuous mode [ 500.431340][T24267] device bridge_slave_1 left promiscuous mode [ 500.440572][T24267] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.492882][T24267] device bridge_slave_0 left promiscuous mode [ 500.514633][T24267] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.648481][T24269] device ip6gretap0 left promiscuous mode [ 500.654415][T24269] : port 1(ip6gretap0) entered disabled state [ 500.809478][T24302] device syzkaller0 entered promiscuous mode [ 501.184957][T24328] sit0: mtu less than device minimum [ 502.508770][T24429] device pim6reg1 left promiscuous mode [ 504.731673][T24516] FAULT_INJECTION: forcing a failure. [ 504.731673][T24516] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 504.889496][T24516] CPU: 1 PID: 24516 Comm: syz.0.7118 Tainted: G W syzkaller #0 [ 504.898376][T24516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 504.908437][T24516] Call Trace: [ 504.911753][T24516] __dump_stack+0x21/0x24 [ 504.916105][T24516] dump_stack_lvl+0x1a7/0x208 [ 504.920806][T24516] ? show_regs_print_info+0x18/0x18 [ 504.926021][T24516] ? slab_post_alloc_hook+0x5d/0x2f0 [ 504.931322][T24516] ? napi_get_frags+0x6b/0x170 [ 504.936099][T24516] ? tun_chr_write_iter+0x1bf/0x270 [ 504.941313][T24516] ? vfs_write+0x758/0xdc0 [ 504.945736][T24516] ? ksys_write+0x149/0x250 [ 504.950247][T24516] ? do_syscall_64+0x31/0x40 [ 504.954842][T24516] dump_stack+0x15/0x1c [ 504.958995][T24516] should_fail+0x3c1/0x510 [ 504.963425][T24516] should_fail_alloc_page+0x4f/0x60 [ 504.968797][T24516] __alloc_pages_nodemask+0x119/0x620 [ 504.974175][T24516] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 504.979755][T24516] kmalloc_order+0x4c/0x160 [ 504.984298][T24516] ? tun_get_user+0x10aa/0x3270 [ 504.989153][T24516] kmalloc_order_trace+0x16/0x80 [ 504.994105][T24516] __kmalloc_track_caller+0x1d4/0x320 [ 504.999481][T24516] ? tun_get_user+0x10aa/0x3270 [ 505.004340][T24516] pskb_expand_head+0x123/0x1110 [ 505.009287][T24516] ? __napi_alloc_skb+0x169/0x2e0 [ 505.014333][T24516] tun_get_user+0x10aa/0x3270 [ 505.019014][T24516] ? tun_do_read+0x1c70/0x1c70 [ 505.023777][T24516] ? kstrtouint_from_user+0x1c4/0x220 [ 505.029157][T24516] ? __fsnotify_parent+0x6d2/0x7c0 [ 505.034289][T24516] ? avc_policy_seqno+0x1b/0x70 [ 505.039161][T24516] ? selinux_file_permission+0x2a5/0x510 [ 505.044796][T24516] ? fsnotify_perm+0x66/0x4b0 [ 505.049469][T24516] tun_chr_write_iter+0x1bf/0x270 [ 505.054487][T24516] vfs_write+0x758/0xdc0 [ 505.058726][T24516] ? kernel_write+0x3c0/0x3c0 [ 505.063406][T24516] ? __fget_files+0x2c4/0x320 [ 505.068084][T24516] ? __fdget_pos+0x1f7/0x380 [ 505.072670][T24516] ? ksys_write+0x71/0x250 [ 505.077084][T24516] ksys_write+0x149/0x250 [ 505.081417][T24516] ? __ia32_sys_read+0x90/0x90 [ 505.086184][T24516] ? debug_smp_processor_id+0x17/0x20 [ 505.091563][T24516] __x64_sys_write+0x7b/0x90 [ 505.096148][T24516] do_syscall_64+0x31/0x40 [ 505.100570][T24516] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 505.106457][T24516] RIP: 0033:0x7fd4e7cd3f79 [ 505.110873][T24516] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 505.130467][T24516] RSP: 002b:00007fd4e670f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 505.138874][T24516] RAX: ffffffffffffffda RBX: 00007fd4e7f4f090 RCX: 00007fd4e7cd3f79 [ 505.146846][T24516] RDX: 000000000000fdef RSI: 0000200000000440 RDI: 0000000000000005 [ 505.154809][T24516] RBP: 00007fd4e670f090 R08: 0000000000000000 R09: 0000000000000000 [ 505.162779][T24516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 505.170745][T24516] R13: 00007fd4e7f4f128 R14: 00007fd4e7f4f090 R15: 00007ffe854fdd98 [ 505.817820][T24539] device syzkaller0 entered promiscuous mode [ 505.867756][T24539] +: renamed from team_slave_1 [ 506.043796][T24572] FAULT_INJECTION: forcing a failure. [ 506.043796][T24572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 506.079206][T24572] CPU: 0 PID: 24572 Comm: syz.1.7134 Tainted: G W syzkaller #0 [ 506.088094][T24572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 506.098149][T24572] Call Trace: [ 506.101450][T24572] __dump_stack+0x21/0x24 [ 506.105786][T24572] dump_stack_lvl+0x1a7/0x208 [ 506.110461][T24572] ? show_regs_print_info+0x18/0x18 [ 506.115662][T24572] dump_stack+0x15/0x1c [ 506.119823][T24572] should_fail+0x3c1/0x510 [ 506.124280][T24572] should_fail_usercopy+0x1a/0x20 [ 506.129328][T24572] _copy_from_iter+0x1d1/0x9f0 [ 506.134101][T24572] ? __kasan_check_read+0x11/0x20 [ 506.139134][T24572] ? __check_object_size+0x2f4/0x3c0 [ 506.144428][T24572] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 506.150173][T24572] tun_get_user+0xc8b/0x3270 [ 506.154770][T24572] ? tun_do_read+0x1c70/0x1c70 [ 506.159542][T24572] ? kstrtouint_from_user+0x1c4/0x220 [ 506.164923][T24572] ? __fsnotify_parent+0x6d2/0x7c0 [ 506.170057][T24572] ? avc_policy_seqno+0x1b/0x70 [ 506.174908][T24572] ? selinux_file_permission+0x2a5/0x510 [ 506.180540][T24572] ? fsnotify_perm+0x66/0x4b0 [ 506.185225][T24572] tun_chr_write_iter+0x1bf/0x270 [ 506.190270][T24572] vfs_write+0x758/0xdc0 [ 506.194517][T24572] ? perf_trace_kmem_free+0x3f/0x110 [ 506.199803][T24572] ? kernel_write+0x3c0/0x3c0 [ 506.204481][T24572] ? __fget_files+0x2c4/0x320 [ 506.209161][T24572] ? __fdget_pos+0x1f7/0x380 [ 506.213755][T24572] ? ksys_write+0x71/0x250 [ 506.218179][T24572] ksys_write+0x149/0x250 [ 506.222516][T24572] ? __ia32_sys_read+0x90/0x90 [ 506.227283][T24572] ? debug_smp_processor_id+0x17/0x20 [ 506.232655][T24572] __x64_sys_write+0x7b/0x90 [ 506.237256][T24572] do_syscall_64+0x31/0x40 [ 506.241679][T24572] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 506.247564][T24572] RIP: 0033:0x7fdf8194bf79 [ 506.251972][T24572] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 506.271568][T24572] RSP: 002b:00007fdf80387028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 506.279978][T24572] RAX: ffffffffffffffda RBX: 00007fdf81bc7090 RCX: 00007fdf8194bf79 [ 506.287948][T24572] RDX: 000000000000fdef RSI: 0000200000000440 RDI: 0000000000000005 [ 506.295949][T24572] RBP: 00007fdf80387090 R08: 0000000000000000 R09: 0000000000000000 [ 506.303926][T24572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 506.311896][T24572] R13: 00007fdf81bc7128 R14: 00007fdf81bc7090 R15: 00007ffc8d08f4b8 [ 506.791452][T24591] device syzkaller0 entered promiscuous mode [ 507.842848][T24634] FAULT_INJECTION: forcing a failure. [ 507.842848][T24634] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 507.964563][T24634] CPU: 0 PID: 24634 Comm: syz.1.7152 Tainted: G W syzkaller #0 [ 507.973444][T24634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 507.983515][T24634] Call Trace: [ 507.986809][T24634] __dump_stack+0x21/0x24 [ 507.991136][T24634] dump_stack_lvl+0x1a7/0x208 [ 507.995819][T24634] ? thaw_kernel_threads+0x220/0x220 [ 508.001100][T24634] ? vsnprintf+0x189c/0x1990 [ 508.005722][T24634] ? show_regs_print_info+0x18/0x18 [ 508.010935][T24634] dump_stack+0x15/0x1c [ 508.015109][T24634] should_fail+0x3c1/0x510 [ 508.019550][T24634] should_fail_usercopy+0x1a/0x20 [ 508.024577][T24634] _copy_to_user+0x20/0x90 [ 508.029002][T24634] simple_read_from_buffer+0xe9/0x160 [ 508.034388][T24634] proc_fail_nth_read+0x1a6/0x220 [ 508.039404][T24634] ? proc_fault_inject_write+0x310/0x310 [ 508.045134][T24634] ? rw_verify_area+0x1c0/0x360 [ 508.049984][T24634] ? proc_fault_inject_write+0x310/0x310 [ 508.055614][T24634] vfs_read+0x209/0xa60 [ 508.059763][T24634] ? kernel_read+0x70/0x70 [ 508.064182][T24634] ? __kasan_check_write+0x14/0x20 [ 508.069293][T24634] ? mutex_lock+0x92/0xf0 [ 508.073623][T24634] ? mutex_trylock+0xa0/0xa0 [ 508.078220][T24634] ? __fget_files+0x2c4/0x320 [ 508.082893][T24634] ? __fdget_pos+0x2d2/0x380 [ 508.087482][T24634] ? ksys_read+0x71/0x250 [ 508.091820][T24634] ksys_read+0x149/0x250 [ 508.096052][T24634] ? vfs_write+0xdc0/0xdc0 [ 508.100483][T24634] ? ____fput+0x15/0x20 [ 508.104663][T24634] ? debug_smp_processor_id+0x17/0x20 [ 508.110023][T24634] __x64_sys_read+0x7b/0x90 [ 508.114521][T24634] do_syscall_64+0x31/0x40 [ 508.118961][T24634] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 508.124848][T24634] RIP: 0033:0x7fdf8190c84e [ 508.129265][T24634] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 508.148874][T24634] RSP: 002b:00007fdf80386fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 508.157280][T24634] RAX: ffffffffffffffda RBX: 00007fdf803876c0 RCX: 00007fdf8190c84e [ 508.165262][T24634] RDX: 000000000000000f RSI: 00007fdf803870a0 RDI: 0000000000000008 [ 508.173233][T24634] RBP: 00007fdf80387090 R08: 0000000000000000 R09: 0000000000000000 [ 508.181211][T24634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 508.189181][T24634] R13: 00007fdf81bc7128 R14: 00007fdf81bc7090 R15: 00007ffc8d08f4b8 [ 508.455616][T24650] device syzkaller0 entered promiscuous mode [ 509.089544][T24688] device syzkaller0 entered promiscuous mode [ 509.412631][T24696] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.424358][T24696] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.431845][T24696] device bridge_slave_0 entered promiscuous mode [ 509.451004][T24712] device syzkaller0 entered promiscuous mode [ 509.480763][T24696] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.488017][T24696] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.495414][T24696] device bridge_slave_1 entered promiscuous mode [ 509.734997][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 509.742558][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 509.761010][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 509.775345][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 509.784451][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.791509][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 509.830445][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 509.843821][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 509.858686][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 509.867730][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.874850][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 509.936299][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 509.956822][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 509.991773][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 510.009351][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 510.058533][T24696] device veth0_vlan entered promiscuous mode [ 510.071699][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 510.083752][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 510.092515][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 510.101791][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 510.125515][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 510.137124][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 510.156003][T24696] device veth1_macvtap entered promiscuous mode [ 510.163719][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 510.177793][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 510.196403][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 510.217836][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 510.226583][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 510.235586][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 510.245573][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 510.435415][T24760] device veth1_macvtap left promiscuous mode [ 510.528496][T24766] device sit0 left promiscuous mode [ 510.586413][ T296] : port 1(ip6gretap0) entered disabled state [ 510.596071][ T296] device ip6gretap0 left promiscuous mode [ 510.601815][ T296] : port 1(ip6gretap0) entered disabled state [ 510.610555][T24768] device sit0 entered promiscuous mode [ 511.089893][T24814] tap0: tun_chr_ioctl cmd 1074025677 [ 511.099288][T24814] tap0: linktype set to 774 [ 511.224675][ T296] device veth0_to_team left promiscuous mode [ 511.263780][ T296] : port 1(veth0_to_team) entered disabled state [ 511.296939][ T296] device veth0_vlan left promiscuous mode [ 511.621926][T24831] device syzkaller0 entered promiscuous mode [ 517.120201][T24994] device sit0 entered promiscuous mode [ 517.935956][T25037] device syzkaller0 entered promiscuous mode [ 518.279739][T25054] device syzkaller0 entered promiscuous mode [ 519.511238][T25147] device syzkaller0 entered promiscuous mode [ 520.281289][T25203] syzkaller0: tun_chr_ioctl cmd 35108 [ 520.310545][ T1045] syzkaller0: tun_net_xmit 76 [ 520.315668][ T1045] syzkaller0: tun_net_xmit 48 [ 520.333375][ C1] syzkaller0: tun_net_xmit 76 [ 520.816287][T25226] : renamed from vlan1 [ 520.999318][T25237] device sit0 entered promiscuous mode [ 521.168050][T25251] device syzkaller0 entered promiscuous mode [ 521.409486][T25274] device syzkaller0 entered promiscuous mode [ 521.534580][T25284] syz.4.7342[25284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.534619][T25284] syz.4.7342[25284] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.829377][T25305] device veth0_vlan left promiscuous mode [ 521.889469][T25305] device veth0_vlan entered promiscuous mode [ 521.968454][T25306] device veth0_vlan left promiscuous mode [ 521.989849][T25306] device veth0_vlan entered promiscuous mode [ 522.022540][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 522.040935][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 522.048876][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 522.104090][T25328] device pim6reg1 entered promiscuous mode [ 522.303166][T25339] device vlan0 entered promiscuous mode [ 522.386132][T25362] tap0: tun_chr_ioctl cmd 2147767506 [ 523.152401][T25409] device veth0_vlan left promiscuous mode [ 523.165172][T25409] device veth0_vlan entered promiscuous mode [ 523.429450][T25432] device syzkaller0 entered promiscuous mode [ 523.749866][T25468] device syzkaller0 entered promiscuous mode [ 523.911550][T25479] device syzkaller0 entered promiscuous mode [ 526.555148][T25647] device wg2 entered promiscuous mode [ 528.238641][T25705] device wg2 entered promiscuous mode [ 528.928687][T25797] device syzkaller0 entered promiscuous mode [ 529.397814][T25814] device wg2 left promiscuous mode [ 530.202949][T25870] device wg2 entered promiscuous mode [ 530.742394][T25895] device syzkaller0 entered promiscuous mode [ 532.733801][T25966] erspan0: refused to change device tx_queue_len [ 534.058846][T26060] device sit0 left promiscuous mode [ 534.222096][T26067] device sit0 entered promiscuous mode [ 535.316030][T26135] device sit0 left promiscuous mode [ 535.340851][T26135] device sit0 entered promiscuous mode [ 537.072320][T26239] device syzkaller0 entered promiscuous mode [ 537.775269][T26267] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 539.431413][T26332] bridge0: port 2(bridge_slave_1) entered disabled state [ 539.440802][T26332] bridge0: port 1(bridge_slave_0) entered disabled state [ 539.502872][T26340] device bridge_slave_1 left promiscuous mode [ 539.509284][T26340] bridge0: port 2(bridge_slave_1) entered disabled state [ 539.517193][T26340] device bridge_slave_0 left promiscuous mode [ 539.534423][T26340] bridge0: port 1(bridge_slave_0) entered disabled state [ 539.772252][T26359] device syzkaller0 entered promiscuous mode [ 542.332469][T26534] device syzkaller0 entered promiscuous mode [ 542.373382][T26534] device syzkaller0 left promiscuous mode [ 543.492485][T26556] bridge0: port 1(bridge_slave_0) entered blocking state [ 543.499666][T26556] bridge0: port 1(bridge_slave_0) entered disabled state [ 543.508575][T26556] device bridge_slave_0 entered promiscuous mode [ 543.515748][T26556] bridge0: port 2(bridge_slave_1) entered blocking state [ 543.522821][T26556] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.530261][T26556] device bridge_slave_1 entered promiscuous mode [ 543.866994][T26556] bridge0: port 2(bridge_slave_1) entered blocking state [ 543.874090][T26556] bridge0: port 2(bridge_slave_1) entered forwarding state [ 543.881372][T26556] bridge0: port 1(bridge_slave_0) entered blocking state [ 543.888522][T26556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 544.287689][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 544.304594][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 544.318094][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 544.335359][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 544.350296][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 544.367020][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 544.378997][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 544.419258][T26556] device veth0_vlan entered promiscuous mode [ 544.428845][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 544.544450][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 544.563859][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 544.592445][ T580] device veth1_macvtap left promiscuous mode [ 544.745877][T26556] device veth1_macvtap entered promiscuous mode [ 544.753897][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 544.762023][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 544.770410][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 544.820380][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 544.828906][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 544.853656][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 544.861988][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 545.068422][T26620] device syzkaller0 entered promiscuous mode [ 546.994758][T26718] device veth0_vlan left promiscuous mode [ 547.043674][T26718] device veth0_vlan entered promiscuous mode [ 548.174239][T26743] device veth1_macvtap left promiscuous mode [ 548.180266][T26743] device macsec0 left promiscuous mode [ 548.303117][T26745] device veth1_macvtap entered promiscuous mode [ 548.340780][T26745] device macsec0 entered promiscuous mode [ 548.356453][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 549.128628][T26778] device wg2 entered promiscuous mode [ 550.107939][T26840] device macsec0 entered promiscuous mode [ 551.683796][T26899] device sit0 left promiscuous mode [ 551.852610][T26905] device sit0 entered promiscuous mode [ 552.205767][T26918] GPL: port 1(erspan0) entered blocking state [ 552.263026][T26918] GPL: port 1(erspan0) entered disabled state [ 552.342359][T26918] device erspan0 entered promiscuous mode [ 552.393813][T26921] GPL: port 1(erspan0) entered blocking state [ 552.399928][T26921] GPL: port 1(erspan0) entered forwarding state [ 553.411805][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 554.314341][T27011] device veth0_vlan left promiscuous mode [ 554.413484][T27011] device veth0_vlan entered promiscuous mode [ 554.434688][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 554.447458][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 554.468221][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 556.733691][T27181] device syzkaller0 entered promiscuous mode [ 558.725693][T27231] device veth1_macvtap left promiscuous mode [ 559.142138][T27247] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 559.148153][T27247] syzkaller0: linktype set to 773 [ 559.222482][T27241] device wg2 left promiscuous mode [ 559.405556][T27248] device syzkaller0 entered promiscuous mode [ 560.305996][T27325] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 560.319120][T27325] syzkaller0: linktype set to 804 [ 562.853992][T27457] device syzkaller0 entered promiscuous mode [ 563.108443][T27474] device syzkaller0 entered promiscuous mode [ 563.614866][T27498] device veth0_vlan left promiscuous mode [ 563.648702][T27498] device veth0_vlan entered promiscuous mode [ 564.455372][T27533] syzkaller0: mtu greater than device maximum [ 566.713503][T27613] device sit0 entered promiscuous mode [ 567.224619][T27623] device syzkaller0 entered promiscuous mode [ 567.588379][T27662] device syzkaller0 entered promiscuous mode [ 568.044277][T27678] device veth0_vlan left promiscuous mode [ 568.083819][T27678] device veth0_vlan entered promiscuous mode [ 568.232702][T27682] device syzkaller0 entered promiscuous mode [ 568.542452][T27701] device syzkaller0 entered promiscuous mode [ 568.669640][T27716] device veth0_vlan left promiscuous mode [ 568.677932][T27716] device veth0_vlan entered promiscuous mode [ 568.710856][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 568.723872][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 568.741635][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 570.358682][T27807] device wg2 entered promiscuous mode [ 570.491161][T27836] device syzkaller0 entered promiscuous mode [ 572.003217][T27907] device syzkaller0 entered promiscuous mode [ 572.299153][T27920] device syzkaller0 entered promiscuous mode [ 574.865968][T28073] device syzkaller0 entered promiscuous mode [ 574.984358][T28083] device syzkaller0 entered promiscuous mode [ 575.197221][T28087] device syzkaller0 entered promiscuous mode [ 575.561078][T28099] tap0: tun_chr_ioctl cmd 1074025675 [ 575.607117][T28099] tap0: persist enabled [ 575.631042][T28112] tap0: tun_chr_ioctl cmd 1074025675 [ 575.683097][T28112] tap0: persist enabled [ 576.885772][T28165] device veth0_vlan left promiscuous mode [ 576.901219][T28165] device veth0_vlan entered promiscuous mode [ 576.941498][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 576.964736][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 576.981750][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 578.134731][T28253] tap0: tun_chr_ioctl cmd 2147767521 [ 578.241385][T28256] device syzkaller0 entered promiscuous mode [ 579.703284][T28302] device sit0 left promiscuous mode [ 579.757730][T28294] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.765778][T28294] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.807581][T28305] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.814676][T28305] bridge0: port 2(bridge_slave_1) entered listening state [ 579.821872][T28305] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.828945][T28305] bridge0: port 1(bridge_slave_0) entered listening state [ 579.846119][T28305] device bridge0 entered promiscuous mode [ 580.559913][T28376] device syzkaller0 entered promiscuous mode [ 581.149495][T28429] device syzkaller0 entered promiscuous mode [ 586.217461][T28674] device syzkaller0 entered promiscuous mode [ 586.438388][T28690] device syzkaller0 entered promiscuous mode [ 586.556336][T28690] syzkaller0: tun_net_xmit 1280 [ 587.645016][T28795] device syzkaller0 entered promiscuous mode [ 588.112345][T28814] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.133015][T28814] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.140469][T28814] device bridge_slave_0 entered promiscuous mode [ 588.179015][T28814] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.202020][T28814] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.212552][T28814] device bridge_slave_1 entered promiscuous mode [ 588.264127][T28820] device syzkaller0 entered promiscuous mode [ 588.519592][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 588.527318][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 588.541121][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 588.549470][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 588.560626][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.567715][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.591858][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 588.600316][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 588.608949][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 588.618234][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.625305][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.731708][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 588.828332][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 588.836940][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 588.893827][T28814] device veth0_vlan entered promiscuous mode [ 588.900369][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 588.912449][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 588.929183][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 588.957621][T28814] device veth1_macvtap entered promiscuous mode [ 588.995335][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 589.023758][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 589.268230][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 590.191164][ T296] device veth0_vlan left promiscuous mode [ 590.328034][T28900] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 590.538266][T28905] device syzkaller0 entered promiscuous mode [ 590.656337][T28928] device pim6reg1 entered promiscuous mode [ 590.699795][T28928] device syzkaller0 entered promiscuous mode [ 590.845548][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 590.864631][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 590.872647][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 592.444119][T29046] tap0: tun_chr_ioctl cmd 1074025677 [ 592.450597][T29046] tap0: linktype set to 780 [ 592.458811][T29046] tap0: tun_chr_ioctl cmd 2147767520 [ 592.874372][T29071] device sit0 entered promiscuous mode [ 593.881780][T29149] device syzkaller0 entered promiscuous mode [ 594.702921][T29191] tap0: tun_chr_ioctl cmd 1074025673 [ 594.712801][T29185] tap0: tun_chr_ioctl cmd 1074025675 [ 594.733504][T29185] tap0: persist enabled [ 594.768783][T29185] tap0: tun_chr_ioctl cmd 1074025675 [ 594.844566][T29185] tap0: persist enabled [ 595.143056][T29203] device syzkaller0 entered promiscuous mode [ 596.131753][T29221] device syzkaller0 entered promiscuous mode [ 596.214449][T29242] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 596.703274][T29252] device syzkaller0 entered promiscuous mode [ 596.750291][T29252] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 597.016487][T29281] IPv6: pim6reg1: Disabled Multicast RS [ 597.670225][T29340] device syzkaller0 entered promiscuous mode [ 598.684538][T29400] device veth1_macvtap left promiscuous mode [ 599.103706][T29413] device syzkaller0 entered promiscuous mode [ 600.322753][T29460] device sit0 entered promiscuous mode [ 600.644414][T29469] device veth0_vlan left promiscuous mode [ 600.650707][T29469] device veth0_vlan entered promiscuous mode [ 602.044485][T29541] device aaaaaaaaaaaaaaa entered promiscuous mode [ 602.302709][T29564] device veth0_vlan left promiscuous mode [ 602.309479][T29564] device veth0_vlan entered promiscuous mode [ 602.796777][T29590] device veth0_vlan left promiscuous mode [ 602.852211][T29590] device veth0_vlan entered promiscuous mode [ 603.980635][T29694] bridge0: port 2(bridge_slave_1) entered disabled state [ 603.987771][T29694] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.013078][T29694] device bridge0 left promiscuous mode [ 604.022050][T29671] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 604.091691][T29671] device syzkaller0 entered promiscuous mode [ 604.413095][T29707] device syzkaller0 entered promiscuous mode [ 605.176213][T29748] IPv6: ADDRCONF(NETDEV_CHANGE): ip6tnl0: link becomes ready [ 605.713875][T29794] device veth0_vlan left promiscuous mode [ 605.745941][T29794] device veth0_vlan entered promiscuous mode [ 606.218004][T29836] device syzkaller0 entered promiscuous mode [ 607.039790][T29875] : renamed from vlan1 [ 607.996352][T29910] device syzkaller0 entered promiscuous mode [ 608.501979][T29946] device syzkaller0 entered promiscuous mode [ 608.735295][T29983] device wg2 left promiscuous mode [ 608.765906][T29983] device syzkaller0 entered promiscuous mode [ 608.780101][T29983] device wg2 entered promiscuous mode [ 610.032204][T30079] device syzkaller0 entered promiscuous mode [ 610.239199][T30083] device wg2 entered promiscuous mode [ 613.537331][T30244] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 613.603790][T30251] batadv0: tun_chr_ioctl cmd 1074025684 [ 614.250581][T30287] device syzkaller0 entered promiscuous mode [ 615.703637][T30366] device sit0 left promiscuous mode [ 615.773618][T30370] device sit0 entered promiscuous mode [ 617.381761][T30457] syzkaller0: create flow: hash 881870916 index 2 [ 617.479301][T30462] device syzkaller0 entered promiscuous mode [ 617.614107][T30474] syzkaller0: delete flow: hash 881870916 index 2 [ 617.646744][T23125] syzkaller0: tun_net_xmit 48 [ 617.665486][T30482] bridge0: port 3(syz_tun) entered blocking state [ 617.675239][T30482] bridge0: port 3(syz_tun) entered disabled state [ 617.692376][T30482] device syz_tun entered promiscuous mode [ 617.890102][T30493] device pim6reg1 entered promiscuous mode [ 618.217546][T30507] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 618.256381][T30507] syzkaller0: linktype set to 0 [ 620.629968][T30640] device team_slave_0 entered promiscuous mode [ 620.654574][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 620.673435][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 621.384847][T30679] device syz_tun left promiscuous mode [ 621.391740][T30679] bridge0: port 3(syz_tun) entered disabled state [ 621.417507][T30679] device bridge_slave_1 left promiscuous mode [ 621.426677][T30679] bridge0: port 2(bridge_slave_1) entered disabled state [ 621.447979][T30679] device bridge_slave_0 left promiscuous mode [ 621.456495][T30679] bridge0: port 1(bridge_slave_0) entered disabled state [ 621.859281][T30697] device pim6reg1 entered promiscuous mode [ 622.182318][T30728] device syzkaller0 entered promiscuous mode [ 623.460220][T30769] device syzkaller0 entered promiscuous mode [ 623.725628][T30779] device syzkaller0 entered promiscuous mode [ 624.779245][T30814] device syzkaller0 entered promiscuous mode [ 625.551281][T30863] device syzkaller0 entered promiscuous mode [ 626.490572][T30914] device syzkaller0 entered promiscuous mode [ 626.573104][T30920] tap0: tun_chr_ioctl cmd 1074025677 [ 626.583219][T30920] tap0: linktype set to 769 [ 626.646112][T30917] tap0: tun_chr_ioctl cmd 35108 [ 626.828390][T30911] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.888015][T30911] bridge0: port 1(bridge_slave_0) entered disabled state [ 626.904275][T30911] device bridge_slave_0 entered promiscuous mode [ 627.036391][T30911] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.044151][T30911] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.059179][T30911] device bridge_slave_1 entered promiscuous mode [ 627.308565][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 627.316575][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 627.355038][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 627.364288][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 627.378152][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.385263][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 627.394003][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 627.402451][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 627.411937][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.419125][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 627.465130][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 627.484274][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 627.492006][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 627.501868][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 627.555619][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 627.567470][T30911] device veth0_vlan entered promiscuous mode [ 627.575716][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 627.585985][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 627.607939][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 627.617603][T30911] device veth1_macvtap entered promiscuous mode [ 627.629232][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 627.664159][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 627.877647][T30991] device wg2 entered promiscuous mode [ 627.954381][T30999] device syzkaller0 entered promiscuous mode [ 628.321884][T31006] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.345546][T31006] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.381185][T31006] device bridge_slave_0 entered promiscuous mode [ 628.418642][T31006] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.437055][T31006] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.486780][T31006] device bridge_slave_1 entered promiscuous mode [ 628.550041][ T580] GPL: port 1(erspan0) entered disabled state [ 628.560400][ T580] device erspan0 left promiscuous mode [ 628.566106][ T580] GPL: port 1(erspan0) entered disabled state [ 628.748267][T31006] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.755381][T31006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 628.762666][T31006] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.769731][T31006] bridge0: port 1(bridge_slave_0) entered forwarding state [ 628.856138][ T580] device veth1_macvtap left promiscuous mode [ 628.865315][ T580] device veth0_vlan left promiscuous mode [ 629.290823][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 629.303513][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.313427][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.336295][T31051] device syzkaller0 entered promiscuous mode [ 629.349435][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 629.373363][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 629.381925][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.389038][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.558632][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 629.567172][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.575824][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 629.584432][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.724200][T31059] : renamed from pim6reg1 [ 629.734324][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 629.743102][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 629.755863][T31006] device veth0_vlan entered promiscuous mode [ 629.763234][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 629.771297][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 629.783309][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 629.792416][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 629.814067][T31006] device veth1_macvtap entered promiscuous mode [ 629.836602][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 629.847940][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 629.866247][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 629.874400][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 629.885122][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 629.933721][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 629.954030][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 630.145352][T31099] device pim6reg1 entered promiscuous mode [ 630.597255][T31140] device syzkaller0 entered promiscuous mode [ 630.908755][ T580] device veth1_macvtap left promiscuous mode [ 630.919775][ T580] device veth0_vlan left promiscuous mode [ 631.260852][T31170] bridge0: port 2(bridge_slave_1) entered disabled state [ 631.270023][T31170] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.330704][T31175] device bridge_slave_1 left promiscuous mode [ 631.340706][T31175] bridge0: port 2(bridge_slave_1) entered disabled state [ 631.353456][T31175] device bridge_slave_0 left promiscuous mode [ 631.359657][T31175] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.509040][T31187] device pim6reg1 entered promiscuous mode [ 632.495378][T31225] device syzkaller0 entered promiscuous mode [ 633.318130][T31314] device syzkaller0 entered promiscuous mode [ 633.352117][T31316] device syzkaller0 entered promiscuous mode [ 633.388152][T18821] syzkaller0: tun_net_xmit 48 [ 633.409635][T31316] syzkaller0: create flow: hash 3044710996 index 0 [ 633.566768][T31331] device syzkaller0 entered promiscuous mode [ 633.594822][T31316] syzkaller0 (unregistered): delete flow: hash 3044710996 index 0 [ 633.876877][T31344] device veth0_vlan left promiscuous mode [ 633.903622][T31344] device veth0_vlan entered promiscuous mode [ 636.190858][T31449] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 636.440614][T31523] device syzkaller0 entered promiscuous mode [ 636.621904][T31527] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.631104][T31527] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.783129][T31546] device bridge_slave_1 left promiscuous mode [ 636.796005][T31546] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.817923][T31546] device bridge_slave_0 left promiscuous mode [ 636.837658][T31546] bridge0: port 1(bridge_slave_0) entered disabled state [ 638.184528][T31655] device sit0 entered promiscuous mode [ 638.869192][T31703] syz.2.9186[31703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.869249][T31703] syz.2.9186[31703] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 639.278417][T31724] device syzkaller0 entered promiscuous mode [ 640.405550][T31794] : renamed from bond_slave_0 [ 640.601389][T31807] device sit0 left promiscuous mode [ 641.870935][T31841] pimreg1: tun_chr_ioctl cmd 1074025692 [ 642.201400][T31855] device syzkaller0 entered promiscuous mode [ 644.034369][T31967] tap0: tun_chr_ioctl cmd 2147767521 [ 644.852156][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 644.883825][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 644.922294][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 645.378549][T32029] bridge0: port 1(bridge_slave_0) entered blocking state [ 645.386200][T32029] bridge0: port 1(bridge_slave_0) entered disabled state [ 645.397173][T32029] device bridge_slave_0 entered promiscuous mode [ 645.444773][T32029] bridge0: port 2(bridge_slave_1) entered blocking state [ 645.451841][T32029] bridge0: port 2(bridge_slave_1) entered disabled state [ 645.460278][T32029] device bridge_slave_1 entered promiscuous mode [ 645.936822][T32029] bridge0: port 2(bridge_slave_1) entered blocking state [ 645.943924][T32029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 645.951231][T32029] bridge0: port 1(bridge_slave_0) entered blocking state [ 645.958395][T32029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 646.068975][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.084061][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.091996][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 646.137600][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 646.167847][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 646.183476][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.190572][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 646.214746][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 646.233880][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.240953][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 646.259511][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 646.275745][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 646.453894][ T580] device veth1_macvtap left promiscuous mode [ 646.585852][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 646.597700][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 646.709081][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 646.743755][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 646.783399][T32029] device veth0_vlan entered promiscuous mode [ 646.794950][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 646.812791][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 646.854444][T32029] device veth1_macvtap entered promiscuous mode [ 646.915279][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 646.933466][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 646.944385][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 647.006376][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 647.016814][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 647.059973][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 647.073995][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 647.205421][T32094] device syzkaller0 entered promiscuous mode [ 648.150862][T32148] device syzkaller0 entered promiscuous mode [ 648.757024][T32186] device sit0 entered promiscuous mode [ 649.231672][T32220] device syzkaller0 entered promiscuous mode [ 649.515587][T32262] device syzkaller0 entered promiscuous mode [ 649.923256][T32307] device syzkaller0 entered promiscuous mode [ 650.592163][T32325] device syzkaller0 entered promiscuous mode [ 650.999908][T32346] device syzkaller0 entered promiscuous mode [ 651.130302][T32354] device syzkaller0 entered promiscuous mode [ 651.915977][T32408] device veth0_vlan left promiscuous mode [ 651.946029][T32408] device veth0_vlan entered promiscuous mode [ 652.058940][T32416] device syzkaller0 entered promiscuous mode [ 652.297077][T32426] device veth1_macvtap left promiscuous mode [ 652.497249][ T24] audit: type=1400 audit(1770703531.520:175): avc: denied { setattr } for pid=32432 comm="syz.4.9398" path="pipe:[127508]" dev="pipefs" ino=127508 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 653.840192][T32462] tun0: tun_chr_ioctl cmd 1074025676 [ 653.870692][T32462] tun0: owner set to 0 [ 653.958602][T32462] device syzkaller0 entered promiscuous mode [ 654.055175][T32467] device syzkaller0 entered promiscuous mode [ 654.770470][T32517] device syzkaller0 entered promiscuous mode [ 655.048044][T32534] device veth1_macvtap entered promiscuous mode [ 655.072988][T32534] device macsec0 entered promiscuous mode [ 655.079264][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 655.473560][T32545] device syzkaller0 entered promiscuous mode [ 655.841376][T32564] device syzkaller0 entered promiscuous mode [ 656.150686][T32575] device syzkaller0 entered promiscuous mode [ 657.002115][T32615] device syzkaller0 entered promiscuous mode [ 657.917234][T32641] device aaaaaaaaaaaaaaa entered promiscuous mode [ 657.949770][ T24] audit: type=1400 audit(1770703536.970:176): avc: denied { create } for pid=32632 comm="syz.2.9457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 658.087928][T32665] device syzkaller0 entered promiscuous mode [ 658.981083][T32717] device syzkaller0 entered promiscuous mode [ 659.287309][T32754] device veth1_macvtap left promiscuous mode [ 659.429130][ T303] device syzkaller0 entered promiscuous mode [ 661.712776][ T418] device syzkaller0 entered promiscuous mode [ 662.996751][ T542] device veth0_vlan left promiscuous mode [ 663.022538][ T542] device veth0_vlan entered promiscuous mode [ 663.492881][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 663.948174][ T594] bY4`Ҙ: renamed from lo [ 664.732521][ T629] tun0: tun_chr_ioctl cmd 1074025676 [ 664.795430][ T629] tun0: owner set to 0 [ 665.653806][ T685] device syzkaller0 entered promiscuous mode [ 665.776957][ T689] device syzkaller0 entered promiscuous mode [ 665.784307][ T689] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 665.837737][ T692] device veth1_macvtap left promiscuous mode [ 666.813186][ T742] : renamed from team_slave_1 [ 666.825923][ T743] bridge0: port 3(veth0) entered blocking state [ 666.832278][ T743] bridge0: port 3(veth0) entered disabled state [ 666.860164][ T743] device veth0 entered promiscuous mode [ 666.882290][ T743] bridge0: port 3(veth0) entered blocking state [ 666.888624][ T743] bridge0: port 3(veth0) entered forwarding state [ 667.642396][ T789] device wg2 entered promiscuous mode [ 668.005238][ T816] device syzkaller0 entered promiscuous mode [ 669.463901][ T894] device macsec0 left promiscuous mode [ 669.472622][ T894] device veth1_macvtap entered promiscuous mode [ 669.484637][ T894] device macsec0 entered promiscuous mode [ 669.497603][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 669.567616][ T897] device syzkaller0 entered promiscuous mode [ 669.675854][ T906] device syzkaller0 entered promiscuous mode [ 669.860477][ T914] device sit0 entered promiscuous mode [ 670.062401][ T920] : port 1(ip6gretap0) entered blocking state [ 670.107576][ T920] : port 1(ip6gretap0) entered disabled state [ 670.158338][ T920] device ip6gretap0 entered promiscuous mode [ 675.145441][ T1116] device syzkaller0 entered promiscuous mode [ 675.900131][ T1137] device pimreg0 entered promiscuous mode [ 676.043536][ T1145] device syzkaller0 entered promiscuous mode [ 680.958669][ T1334] device syzkaller0 entered promiscuous mode [ 682.040951][ T1369] device aaaaaaaaaaaaaaa entered promiscuous mode [ 682.534194][ T1429] syz.3.9815[1429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.534256][ T1429] syz.3.9815[1429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.870972][ T1440] device syzkaller0 entered promiscuous mode [ 683.496677][ T1476] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 683.544178][ T1476] device syzkaller0 entered promiscuous mode [ 683.986967][ T1534] device syzkaller0 entered promiscuous mode [ 686.441320][ T1615] tap1: tun_chr_ioctl cmd 1074025677 [ 686.497037][ T1615] tap1: linktype set to 780 [ 686.632997][ T1619] tap1: tun_chr_ioctl cmd 1074025680 [ 686.662813][ T1615] device syzkaller0 entered promiscuous mode [ 686.998672][ T1634] device syzkaller0 entered promiscuous mode [ 690.060344][ T1818] device syzkaller0 entered promiscuous mode [ 690.254271][ T1837] -1: renamed from syzkaller0 [ 690.721868][ T1880] bY4`Ҙ: renamed from lo [ 690.820197][ T1892] device syzkaller0 entered promiscuous mode [ 690.974941][ T1914] device syzkaller0 entered promiscuous mode [ 691.834109][ T1937] device veth1_macvtap left promiscuous mode [ 691.853112][ T1937] device macsec0 left promiscuous mode [ 691.903976][ T1940] device veth1_macvtap left promiscuous mode [ 691.939212][ T1940] device veth1_macvtap entered promiscuous mode [ 691.947214][ T1940] device macsec0 entered promiscuous mode [ 692.236451][ T1949] device syzkaller0 entered promiscuous mode [ 693.013621][ T2011] device pim6reg1 entered promiscuous mode [ 693.663367][ T2063] device veth0_vlan left promiscuous mode [ 693.669572][ T2063] device veth0_vlan entered promiscuous mode [ 693.704397][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 693.713610][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 693.721374][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 693.941742][ T2094] device syzkaller0 entered promiscuous mode [ 694.945883][ T2145] tap0: tun_chr_ioctl cmd 1074025673 [ 694.952911][ T2142] tap0: tun_chr_ioctl cmd 1074025677 [ 694.959676][ T2142] tap0: linktype set to 780 [ 694.993118][ T2143] tap0: tun_chr_ioctl cmd 1074025677 [ 695.002900][ T2143] tap0: linktype set to 780 [ 696.587376][ T2252] device syzkaller0 entered promiscuous mode [ 697.138886][ T2318] device syzkaller0 entered promiscuous mode [ 697.204029][ T2323] device syzkaller0 entered promiscuous mode [ 698.260810][ T2405] device veth0_vlan left promiscuous mode [ 698.290076][ T2405] device veth0_vlan entered promiscuous mode [ 698.905693][ T2431] syzkaller1: tun_chr_ioctl cmd 21731 [ 698.913225][ T2431] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 699.918762][ T2462] device syzkaller0 entered promiscuous mode [ 700.832779][ T2508] @: renamed from bond_slave_0 [ 701.358130][ T2567] device syzkaller0 entered promiscuous mode [ 704.006953][ T2672] veth1_macvtap: mtu greater than device maximum [ 707.664418][ T2785] device veth0_vlan left promiscuous mode [ 707.732573][ T2785] device veth0_vlan entered promiscuous mode [ 707.782841][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 707.800237][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 707.843848][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 709.011074][ T2810] device syzkaller0 entered promiscuous mode [ 710.409078][ T2853] device syzkaller0 entered promiscuous mode [ 711.314916][ T2911] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.322214][ T2911] bridge0: port 1(bridge_slave_0) entered disabled state [ 711.329825][ T2911] device bridge_slave_0 entered promiscuous mode [ 711.363012][ T2911] bridge0: port 2(bridge_slave_1) entered blocking state [ 711.371285][ T2911] bridge0: port 2(bridge_slave_1) entered disabled state [ 711.382150][ T2911] device bridge_slave_1 entered promiscuous mode [ 711.512291][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 711.524403][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 711.562875][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 711.586095][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 711.605585][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 711.612679][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 711.637278][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 711.656386][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 711.674583][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 711.681680][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 711.694214][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 711.701967][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 711.735358][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 711.752804][ T2911] device veth0_vlan entered promiscuous mode [ 711.764604][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 711.773429][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 711.781547][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 711.789701][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 711.811424][ T2911] device veth1_macvtap entered promiscuous mode [ 711.822845][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 711.837688][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 711.879268][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 712.565247][ T2969] device syzkaller0 entered promiscuous mode [ 712.782650][ T2981] IPv6: pim6reg1: Disabled Multicast RS [ 713.496452][ T297] device bridge_slave_1 left promiscuous mode [ 713.509480][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 713.574172][ T297] device bridge_slave_0 left promiscuous mode [ 713.580612][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.487865][ T3073] bY4`Ҙ: renamed from lo [ 715.342995][ T3136] device syzkaller0 entered promiscuous mode [ 715.359121][ T3138] device syzkaller0 entered promiscuous mode [ 716.219220][ T24] audit: type=1400 audit(1770703595.240:177): avc: denied { create } for pid=3183 comm="syz.1.10322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 716.385781][ T3194] device syzkaller0 entered promiscuous mode [ 716.968777][ T3215] device sit0 entered promiscuous mode [ 717.357595][ T3242] tun0: tun_chr_ioctl cmd 1074025678 [ 717.373126][ T3242] tun0: group set to 1 [ 718.651605][ T3320] device syzkaller0 entered promiscuous mode [ 719.084174][ T3340] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 719.321860][ T3348] device syzkaller0 entered promiscuous mode [ 719.354097][ T3354] device syzkaller0 entered promiscuous mode [ 720.314744][ T3396] device syzkaller0 entered promiscuous mode [ 720.653352][ T3410] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.660621][ T3410] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.668294][ T3410] device bridge_slave_0 entered promiscuous mode [ 720.716500][ T3410] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.729999][ T3410] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.741592][ T3410] device bridge_slave_1 entered promiscuous mode [ 721.025342][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 721.036329][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 721.058997][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 721.076307][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 721.087484][ T580] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.094605][ T580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.113062][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 721.121563][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 721.129844][ T580] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.136913][ T580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.163160][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 721.173779][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 721.182244][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 721.237563][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 721.281023][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 721.294802][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 721.305517][ T580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 721.329367][ T3410] device veth0_vlan entered promiscuous mode [ 721.356281][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 721.405856][ T3410] device veth1_macvtap entered promiscuous mode [ 721.444216][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 721.483797][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 721.512482][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 721.543855][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 721.566699][ T3449] device syzkaller0 entered promiscuous mode [ 721.873439][ T297] device veth0_vlan left promiscuous mode [ 723.300773][ T3508] device veth0_vlan left promiscuous mode [ 723.355177][ T3508] device veth0_vlan entered promiscuous mode [ 723.575438][ T3516] device syzkaller0 entered promiscuous mode [ 724.296704][ T3553] device syzkaller0 entered promiscuous mode [ 725.675070][ T3607] device syzkaller0 entered promiscuous mode [ 725.931946][ T3627] cgroup: fork rejected by pids controller in /syz5 [ 726.372809][ T3735] device syzkaller0 entered promiscuous mode [ 727.036971][ T3746] bridge0: port 1(bridge_slave_0) entered blocking state [ 727.045248][ T3746] bridge0: port 1(bridge_slave_0) entered disabled state [ 727.053906][ T3746] device bridge_slave_0 entered promiscuous mode [ 727.120182][ T3746] bridge0: port 2(bridge_slave_1) entered blocking state [ 727.133319][ T3746] bridge0: port 2(bridge_slave_1) entered disabled state [ 727.141000][ T3746] device bridge_slave_1 entered promiscuous mode [ 727.600172][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 727.623299][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 727.866836][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 727.944038][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 727.968410][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 727.975513][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 728.133119][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 728.183448][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 728.294053][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 728.301131][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 728.339909][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 728.367701][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 728.377049][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 728.412611][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 728.423207][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 728.452178][ T3746] device veth0_vlan entered promiscuous mode [ 728.468476][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 728.478064][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 728.570525][ T3746] device veth1_macvtap entered promiscuous mode [ 728.583664][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 728.592121][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 728.632059][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 728.657340][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 728.706252][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 728.816097][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 728.824789][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 728.861812][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 728.893798][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 729.585309][ T297] device bridge_slave_1 left promiscuous mode [ 729.593968][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.623708][ T297] device bridge_slave_0 left promiscuous mode [ 729.639792][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.684169][ T297] device veth1_macvtap left promiscuous mode [ 729.716763][ T297] device veth0_vlan left promiscuous mode [ 730.314941][ T3907] device syzkaller0 entered promiscuous mode [ 732.129796][ T3994] tap0: tun_chr_ioctl cmd 1074025675 [ 732.145604][ T3994] tap0: persist enabled [ 732.202456][ T3994] tap0: tun_chr_ioctl cmd 1074025675 [ 732.219446][ T3994] tap0: persist disabled [ 732.496195][ T4009] IPv6: pim6reg1: Disabled Multicast RS [ 734.076897][ T4068] : renamed from bond_slave_0 [ 734.358063][ T4084] device syzkaller0 entered promiscuous mode [ 734.636604][ T4106] tun0: tun_chr_ioctl cmd 1074025694 [ 735.364533][ T4139] syz.5.10567[4139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 735.364603][ T4139] syz.5.10567[4139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 737.026831][ T4241] device syzkaller0 entered promiscuous mode [ 737.485855][ T4276] bridge0: port 3(veth0) entered disabled state [ 737.493461][ T4276] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.503040][ T4276] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.635435][ T4277] device veth0 left promiscuous mode [ 737.640822][ T4277] bridge0: port 3(veth0) entered disabled state [ 737.664093][ T4277] device bridge_slave_1 left promiscuous mode [ 737.670264][ T4277] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.694456][ T4277] device bridge_slave_0 left promiscuous mode [ 737.700896][ T4277] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.871409][ T4299] tap0: tun_chr_ioctl cmd 2147767521 [ 737.877365][ T4295] device pim6reg1 entered promiscuous mode [ 739.749730][ T4417] syz.3.10645[4417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 739.751158][ T4417] syz.3.10645[4417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 742.497551][ T4493] device syzkaller0 entered promiscuous mode [ 742.524160][ T4498] bridge0: port 1(bridge_slave_0) entered disabled state [ 742.562600][ T4493] syzkaller0: tun_net_xmit 1280 [ 742.741382][ T4527] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 743.444787][ T4563] device syzkaller0 entered promiscuous mode [ 743.484567][ T4562] device syzkaller0 entered promiscuous mode [ 743.510461][ T1665] syzkaller0: tun_net_xmit 48 [ 743.945255][ T4582] IPv6: pim6reg1: Disabled Multicast RS [ 746.363119][ T4698] tap0: tun_chr_ioctl cmd 1074025677 [ 746.372065][ T4698] tap0: linktype set to 1 [ 746.429802][ T4701] device syzkaller0 entered promiscuous mode [ 746.441627][ T4702] cgroup: fork rejected by pids controller in /syz3 [ 747.124637][ T4829] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.142770][ T4829] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.167727][ T4829] device bridge_slave_0 entered promiscuous mode [ 747.200211][ T4829] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.228884][ T4829] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.246407][ T4829] device bridge_slave_1 entered promiscuous mode [ 747.431491][ T4868] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 747.528063][ T4829] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.535431][ T4829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 747.542754][ T4829] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.549839][ T4829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 747.621652][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 747.629713][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.665285][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.690175][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 747.703159][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.710275][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 747.764886][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 747.775718][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.782926][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 747.995965][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 748.030715][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 748.118024][ T4829] device veth0_vlan entered promiscuous mode [ 748.160699][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 748.169492][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 748.178375][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 748.187940][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 748.247188][ T4829] device veth1_macvtap entered promiscuous mode [ 748.254797][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 748.262616][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 748.274441][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 748.283621][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 748.303084][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 748.341672][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 748.360805][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 748.391466][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 748.404898][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 748.836813][ T9] device veth0_vlan left promiscuous mode [ 749.435419][ T4995] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 751.396746][ T5136] device syzkaller0 entered promiscuous mode [ 751.413104][ T5136] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 753.300086][ T5178] device bridge_slave_1 entered promiscuous mode [ 753.895701][ T5229] device syzkaller0 entered promiscuous mode [ 754.089823][ T5236] device veth0_vlan left promiscuous mode [ 754.118419][ T5236] device veth0_vlan entered promiscuous mode [ 754.632978][ T5303] device syzkaller0 entered promiscuous mode [ 757.134087][ T5436] IPv6: : Disabled Multicast RS [ 759.665410][ T5539] device syzkaller0 entered promiscuous mode [ 759.988402][ T5559] device syzkaller0 entered promiscuous mode [ 762.810310][ T5702] bridge0: port 1(bridge_slave_0) entered disabled state [ 764.919974][ T5778] device sit0 left promiscuous mode [ 765.153065][ T5789] device sit0 entered promiscuous mode [ 765.907267][ T5849] device sit0 entered promiscuous mode [ 766.465390][ T24] audit: type=1400 audit(1770703645.490:178): avc: denied { read } for pid=5857 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 186) OK Stopping crond: stopped /usr/sbin/crond (pid 179) OK Stopping dhcpcd... [ 767.675740][ T5925] tap1: tun_chr_ioctl cmd 1074025677 stopped /sbin/dhcpcd (pid 133) [ 767.763123][ T24] audit: type=1400 audit(1770703646.790:179): avc: denied { search } for pid=5934 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 767.883611][ T5925] tap1: linktype set to 774 OK Stopping iptables: [ 768.261576][ T24] audit: type=1400 audit(1770703647.280:180): avc: denied { write } for pid=134 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=411 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 768.319289][ T24] audit: type=1400 audit(1770703647.280:181): avc: denied { remove_name } for pid=134 comm="dhcpcd" name="sock" dev="tmpfs" ino=413 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping system message bus: [ 768.373253][ T24] audit: type=1400 audit(1770703647.280:182): avc: denied { unlink } for pid=134 comm="dhcpcd" name="sock" dev="tmpfs" ino=413 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 768.460074][ T24] audit: type=1400 audit(1770703647.320:183): avc: denied { search } for pid=5986 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 768.559433][ T24] audit: type=1400 audit(1770703647.320:184): avc: denied { write } for pid=5986 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 768.596979][ T24] audit: type=1400 audit(1770703647.320:185): avc: denied { add_name } for pid=5986 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 768.619843][ T24] audit: type=1400 audit(1770703647.320:186): avc: denied { create } for pid=5986 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 768.646283][ T24] audit: type=1400 audit(1770703647.320:187): avc: denied { read open } for pid=5986 comm="iptables" path="/run/xtables.lock" dev="tmpfs" ino=42898 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 done [ 769.565876][ T6033] device wg2 entered promiscuous mode killall: can't kill pid 300: No such process killall: can't kill pid 537: No such process killall: can't kill pid 19606: No such process Stopping klogd: OK Stopping acpid: [ 770.035638][ T6078] device syzkaller0 entered promiscuous mode [ 770.126063][ T6081] device syzkaller0 entered promiscuous mode OK Stopping syslogd: stopped /sbin/syslogd (pid 77) OK [ 770.990948][ T6134] : renamed from vlan1 umount: can't remount debugfs read-only [ 771.418620][ T6165] tap0: tun_chr_ioctl cmd 1074025677 [ 771.428599][ T6165] tap0: linktype set to 769 [ 771.444979][ T6166] batadv0: tun_chr_ioctl cmd 1074025684 umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Connection to 10.128.0.123 closed by remote host. [ 771.531340][ T24] kauditd_printk_skb: 7 callbacks suppressed [ 771.531355][ T24] audit: type=1400 audit(1770703650.500:195): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[14252]" dev="pipefs" ino=14252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 Sent SIGTERM to all processes Sent SIGKILL to all processes Requesting system poweroff [ 773.015441][ T49] device ip6gretap0 left promiscuous mode [ 773.021181][ T49] : port 1(ip6gretap0) entered disabled state [ 773.643202][ T6167] kvm: exiting hardware virtualization [ 773.650112][ T6167] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 773.657760][ T6167] ACPI: Preparing to enter system sleep state S5 [ 773.664591][ T6167] reboot: Power down serialport: VM disconnected.