last executing test programs: 4.721201166s ago: executing program 2 (id=9704): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x28594, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x100840, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0xfffdffffffffffff, 0xffffffffffffffff, 0x9) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 4.609945666s ago: executing program 2 (id=9707): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41000}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) r3 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x7, 0x0, 0x0, 0x0, 0x0, 0x35a05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x500, 0x2}, 0x1075, 0x6, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0x201, 0x0, 0xfffffffd, 0x0, 0x8}, r3, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0xc00600000000c006) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 3.567578797s ago: executing program 2 (id=9717): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xc, 0x13, &(0x7f00000004c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x8}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b80a000500000000", &(0x7f0000000300)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073011100000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) 3.500909903s ago: executing program 2 (id=9722): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.empty_time\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x28, &(0x7f0000000380)=@raw=[@map_fd={0x18, 0x9, 0x1, 0x0, r0}, @ldst={0x2, 0x1, 0x0, 0x3, 0xa, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0xb9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x4, 0x0, 0xa, 0x0, 0x5, 0x30, 0x1}, @generic={0x42, 0x7, 0x4, 0x3, 0x7}, @ldst={0x2, 0x3, 0x0, 0x7, 0x2, 0x80, 0x5ab57ad1df935b6f}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xd}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) 3.392469572s ago: executing program 2 (id=9726): bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x12, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006b00000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @cgroup_sock_addr=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0xff9d}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000027c0)={0xffffffffffffffff, 0x20e, 0x126, 0x0, &(0x7f00000004c0)="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", 0x0, 0x33, 0x6000000000000000, 0x1b, 0x64, &(0x7f0000000140)="a26b7ec71dcf778b5a5013bc7f00"/27, &(0x7f0000002740)="f701c4df73001a68d930d941700ea80f7c9f1352875555bc500a0fde04af0ae933265c100c4b75e77ca41aa121588beda0e8a243d6bb53aaa5294adb5802d852a8ff0413e1e7f0ea891e811b04fe051c37b67204f51d34f6701d2625644ddd9bb6e468da", 0x1, 0x0, 0x200000}, 0x50) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=@framed={{0x62, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0x22}}, &(0x7f0000000480)='GPL\x00'}, 0x80) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x5, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000611214000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x7, 0x4, 0x900, 0x5, 0x28}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000002d40)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="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"/344], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000400)={r7, r6}, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={r5, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa9, &(0x7f0000000900)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000940), &(0x7f0000000980), 0x8, 0x83, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x11, 0x53, &(0x7f0000002ec0)=ANY=[@ANYBLOB="180000000000008000000000d83b000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7080000000000007b8af8ff00000000b7080000010000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRESHEX=r7, @ANYBLOB="0000000000000000b705000008974c6ca384f150ac00000085000000a500", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000018410000feffffff0000000000000000850000004400000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000008500000006000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x7, 0x1000, &(0x7f0000001740)=""/4093, 0x40f00, 0x1f, '\x00', r8, 0x0, r4, 0x8, &(0x7f0000000b80)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000bc0)={0x0, 0x4, 0x1, 0x3972}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000c00)=[r6], &(0x7f0000000c40)=[{0x5, 0x4, 0x7, 0xa}, {0x5, 0x3, 0x7, 0xb}, {0x4, 0x1, 0x6, 0xc}, {0x3, 0x5, 0xe, 0x3}], 0x10, 0x3}, 0x94) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003040)={0x6, 0x17, &(0x7f0000002c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x1, 0x1, 0x3, 0x0, 0x3, 0xffffffffffffffc0, 0xfffffffffffffffc}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @generic={0xfa, 0x9, 0xd, 0x9083, 0x3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x101}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffe}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x8000000, 0xc1, &(0x7f00000005c0)=""/193, 0x41100, 0x0, '\x00', r8, 0x25, r2, 0x8, &(0x7f0000000180)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x7, 0x20, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, 0x10, 0xfffffff5}, 0x94) socketpair(0xa, 0x1, 0x2, &(0x7f0000001100)) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000240)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x2, 0x34000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0xffff, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000080)) socketpair(0x8, 0xa, 0x2f, &(0x7f0000002d00)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002ac0)={r9, 0xe0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000002840)=[0x0], &(0x7f0000002880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd, &(0x7f00000028c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000002900), &(0x7f0000002940), 0x8, 0xcb, 0x8, 0x8, &(0x7f0000002980)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002b80)={{r2}, &(0x7f0000002b00), &(0x7f0000002b40)='%pi6 \x00'}, 0x20) 3.129301316s ago: executing program 1 (id=9732): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x88}, 0x10020) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) ioctl$TUNSETNOCSUM(r2, 0xc0189436, 0x8000001ffffffd) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, r1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x12, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000015000900000073110400000000009500000000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x100200, &(0x7f0000000000)="e406d11740c69eff580b0814a6989ad33f5e393a6b5a023b9f52a801d704a16cbc803adcd50341165c6c505d29cd2a0ecc7f09786cc88bbb93cd17923b8c9c95eae0f75b66de5560c212b4616b69387b8044a6df20ae5113b8ac0eb507e3", 0x5e, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240)="5126b9eeb4218263d5dad1662c5dad3f7d380aa37d3155ad230a398054a9a1686fd4af3d6fe5110af811caa7d5f50962d404a1742ac64b6eb58a5f15072c8312eedfe290068cd35a027aa9b08e9f8b92f9a0fa237d50412ae69f92cb2bd5a8b2e50d2ea4db8e65e37733a9831a037e6195691d36679a3f1db97ef45713e6003ffbdd7ebcaaa879baf39c33be839f26909ee0bf04a9bd0d29244721320d5efe9f8d1610733a564dda56b9ef45164be8700efccfd8bc0f01d9415814f06bca9dee443d") 2.583664973s ago: executing program 2 (id=9742): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x1000000) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="020053", @ANYRES32=0x0], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x2, 0x101, 0x0, 0x0, 0x1, 0xfffffff8, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3, 0x2}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000002e000000760000000008000000000000000000009500000000000000"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 2.484088492s ago: executing program 0 (id=9744): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000001800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000d0df00850000001b"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xabfb98f76cdb31c6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x25, &(0x7f0000000000)='/proc/sys/net/ipv6\x00\x00\x00\x00\x00\x00\x00\x00\x80=\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000060000000800000008"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r4}, 0x38) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x3, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x8601, 0x2000000, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) gettid() sendmsg$unix(r5, 0x0, 0x40800) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004743d, 0x110e22fff6) 2.305830308s ago: executing program 1 (id=9745): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x3, 0x14, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@jmp={0x5, 0x1, 0x6, 0xb, 0x5, 0x40, 0x10}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6e}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xb}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0xc18, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000000400000007"], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xab, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xff, 0x1}, 0x0, 0x4, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x16, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071104f000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x27) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200200004000000085371002300010000008000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x6, 0x13, &(0x7f0000001040)=ANY=[@ANYRES64=r0], &(0x7f0000000000)='GPL\x00', 0x1a, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000100)=r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, 0x0, 0x26}, 0x20) ioctl$TUNSETQUEUE(r7, 0x5450, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8906, 0x0) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 2.136530782s ago: executing program 0 (id=9749): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x880, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0xfc, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x8b001, 0x0, 0xfffffffd, 0x6, 0x1ff, 0x100000, 0x3, 0x0, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x335) 1.94133245s ago: executing program 3 (id=9750): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000280), &(0x7f0000000000)=""/3, 0x2}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x4}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x8200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='8-N:'], 0x6a) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000140), &(0x7f0000000000)=""/6, 0x2}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000800)={r0, &(0x7f0000000780)}, 0x20) (async) socketpair(0x29, 0x2, 0x2, &(0x7f0000000180)) 1.887131794s ago: executing program 3 (id=9751): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0x84a46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ada}, 0x40, 0x8, 0x0, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0x1ff, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000280), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x17, 0x8, &(0x7f00000005c0)=ANY=[@ANYRES32=r2, @ANYRES64, @ANYRESHEX=r1, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="e3b8cda71aee998593b58dfebce4bb5e6e202f764f16e0de75d643cce6a41c76d20e5d5760993d9d12dbdd291023d0e47964d068e15a3bd0", @ANYRES64, @ANYRES8=r3], &(0x7f0000000200)='syzkaller\x00', 0x200000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1080}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000010000000000000000000000711830000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @cgroup_sock_addr=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1d, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0xc, '\x00', r3, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000000100)=ANY=[@ANYBLOB='b *:*(wm\x00'], 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r4, 0x0, 0x53, 0xb4, &(0x7f0000000440)="4d9f2d301a7ef6f390acd2675c1f507c97e86546cd4eabc06da0d717ed47b0ba44901465474936724e137fbe41aeedb92f5a710f06ed789bad0838262e31bc786c7d1ee03b3aa708a946df2a5caa91473d1159", &(0x7f0000000840)=""/180, 0x5, 0x0, 0x9a, 0x67, &(0x7f0000000900)="86165062d5fbdaa531d9827a93a0876c744b0ee8ce1cc7a8cfcccc0e920dbe03dfea78d9f7a0eb3e0948c07b3a71ff960d871dbad947fd62c84fc46fe7fbdd0b03d1523c8b5254d5eeac120c3da5d16fff914001473446548d25a711448ac39422cd497de46cf3e5a8f8999316e10bb76b9882b6ff4061284c1e0a0e3ef93d122977e5f18f844c75891fe34abdefaf90b46420eadce7a129491f", &(0x7f0000000680)="ed27d3057d7ebea8783c1493983a9ede9a3a7a2d348cab085f9aef73cf23350ee46559b90a80ab16f047512ecc345ab5c70eea0dccc9e8d2700547a7d4ac1437dc7830ed2a106bd86822f316e063a8512f1b43e1d8c04ff19e2bd0d544c026ee84d9aec76ea243", 0x4, 0x0, 0x658a}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c}}, 0x0, 0x74}, 0x7b) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 1.739708357s ago: executing program 3 (id=9752): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x9, '\x00', 0x0, r0, 0x0, 0xfffffffe}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], 0x0, 0xcb, &(0x7f0000000300)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x90, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_tracing={0x1a, 0x16, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ldst={0x1, 0x2, 0x4, 0x1, 0x0, 0xfffffffffffffff0, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @exit, @map_idx={0x18, 0x5, 0x5, 0x0, 0x10}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x7c, &(0x7f0000000180)=""/124, 0x41100, 0x5, '\x00', r3, 0x1a, r0, 0x8, &(0x7f0000000540)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x5, 0x6, 0x7fffffff}, 0x10, 0x27e33, r0, 0x6, 0x0, &(0x7f00000005c0)=[{0x2, 0x4, 0x8, 0x7}, {0x5, 0x3, 0xf, 0x7}, {0x3, 0x2, 0x0, 0x4}, {0x4, 0x3, 0x2, 0x4}, {0x2, 0x1, 0x9, 0x3}, {0x3, 0x5, 0x8, 0x3}], 0x10, 0x2}, 0x94) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000800)={r2}, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000a00)={@ifindex=r3, r4, 0x29, 0x0, 0x0, @void, @value=r4}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000940)={@fallback=r4, 0x6, 0x0, 0xeef, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0x1}, 0xc) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000980)={@map=r7, r5, 0x5, 0x10, r4, @void, @value=r4, @void, @void, r6}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r1}, &(0x7f0000000700), &(0x7f0000000740)=r4}, 0x20) 1.669162714s ago: executing program 0 (id=9753): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9, 0xe57f}, 0x0, 0xaffffff7ffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)=0x7fff) r1 = gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x21820, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x5, @perf_config_ext={0x7, 0x2}, 0x0, 0xc8, 0x5, 0x9, 0x1, 0x0, 0xa}, r1, 0x9, r0, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x21820, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x5, @perf_config_ext={0x7, 0x2}, 0x0, 0xc8, 0x5, 0x9, 0x1, 0x0, 0xa}, r1, 0x9, r0, 0x0) socketpair(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x7, &(0x7f0000000000), 0x4) socketpair(0x1, 0x1, 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xf, 0x4, 0x8, 0xc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="4000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000000000000000000000000006100000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6c69f68dc1cf3e78, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={r3}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r6) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r6) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x84}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x34}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_pid(r8, &(0x7f0000000340)=r1, 0x12) (async) write$cgroup_pid(r8, &(0x7f0000000340)=r1, 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xfffffffffffffd94}, 0xc0000023) (async) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xfffffffffffffd94}, 0xc0000023) write$cgroup_subtree(r11, &(0x7f0000000000), 0xfdef) (async) write$cgroup_subtree(r11, &(0x7f0000000000), 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0x6, 0x2, 0x4, 0x0, r3, 0x8, '\x00', r9, r11, 0x4, 0x1, 0x5, 0xc}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0x6, 0x2, 0x4, 0x0, r3, 0x8, '\x00', r9, r11, 0x4, 0x1, 0x5, 0xc}, 0x50) 1.661488134s ago: executing program 3 (id=9754): r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x8, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x3, 0x0, &(0x7f0000000100)="b9ff03", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8912, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x0, 0x96, 0x0, 0x0, 0x10, &(0x7f00000006c0), 0x0, 0x0, 0xe4, 0x8, 0x0, 0x0}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r7, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="03000000040000000400"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r10}, &(0x7f0000000280), &(0x7f0000000240)=r6}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000000c0)=r11, 0x4) sendmsg$inet(r9, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000140)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000180)=[0x0, 0x0], &(0x7f00000001c0)=[0x0], 0x0, 0xd6, &(0x7f0000000200)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0xc2, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x0, 0x3, 0x3ff, 0x800, r0, 0x4, '\x00', r12, r13, 0x0, 0x3, 0x1, 0xa}, 0x50) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) 1.381506079s ago: executing program 4 (id=9755): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0xffff0000, 0x11, 0x0, &(0x7f0000000980)="2b1317094c51b6206d074843b397737ea4", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETDEBUG(r3, 0x400454c9, &(0x7f0000000180)=0x5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0004f678ec630000000066"], 0xd) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) socketpair$unix(0x1, 0x3, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x8202) close(r4) close(r3) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd63"], 0xfdef) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1f, 0x4, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r1], &(0x7f0000000100)='GPL\x00', 0x1004, 0xff2, &(0x7f00000019c0)=""/4082, 0x0, 0xc41f59d8c74bac7d, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x1, @value=r2}, 0x94) 1.175318457s ago: executing program 0 (id=9756): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) ioctl$SIOCSIFHWADDR(r0, 0xc0189436, &(0x7f0000000000)={'bond_slave_0\x00', @random='\\\x00\x00 \x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000340)={r3}, 0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x3c}, {0x40}, {0x6}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="620ac4ff000000007110b2000000000095000000000000006ff1afae727d790c9100c30e2121af0c21114393d06b"], &(0x7f0000000480)='GPL\x00'}, 0x80) 788.791951ms ago: executing program 3 (id=9757): r0 = perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x4, &(0x7f0000001480)=ANY=[@ANYBLOB="1800000009000000000000000100000063016f5300000000950000"], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, 0x0, 0x0}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)='GPL\x00'}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x12, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000001000000000000000000000071181a000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000001840)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1b}, {0x85, 0x0, 0x0, 0x44}}, {}, [], {{}, {0x6, 0x0, 0xb, 0x8}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x0, 0x80000, 0x1028, &(0x7f0000000140)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'team0\x00', 0x112}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x20, 0x3, 0x45, 0xfffff010}, {0x6, 0x2, 0x4, 0xe5}]}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x1, 0x20, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@ldst={0x3, 0x2, 0x0, 0x58e024bd6632d8da, 0x4, 0xfffffffffffffff0, 0xfffffffffffffff0}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='GPL\x00', 0x1, 0xb8, &(0x7f00000003c0)=""/184, 0x41100, 0x78, '\x00', r6, @fallback=0x2a, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x6, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f00000006c0)=[0x1, r1, r4, r3, r3, r1], &(0x7f0000000700)=[{0x3, 0x1, 0xc, 0xb}, {0x5, 0x1, 0xb, 0xc}, {0x1, 0x2, 0xe}, {0x4, 0x4, 0x10, 0x9}, {0x2, 0x3, 0x2, 0x7}, {0x0, 0x3, 0xa, 0x4}], 0x10, 0x7}, 0x94) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='cpuset.memory_spread_slab\x00', 0x2, 0x0) 723.087936ms ago: executing program 0 (id=9758): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000000000000004000fcffff0800000000610000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000008000000850000000600000095000000000000e01202791e5c44b5bab87c477118e94a2bb1ed01ba0f976a04ad3ffa7aa64e376529c25856e9fa8e284e36687984978fb7297159a36b7779ab67ec4070115da6cb26f14e5b86a7496252e082c0990d57afe17e830083817b8fc9816106fee5bf44f703c24abcf3378bfb2c0a43c87a863018ee"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000004000000850000000600000085000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x10, r3}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) syz_clone(0x20000, &(0x7f0000000380)="3a5eb22b5032e3c64c02c0be2fc2df9c80554ec9f51dbf00a0c95bc6f5fff0fb36fe35343001ec929fb66312af21d6f070ae082c5f3c75f8faf5480e9ffbb3ea4204b271d0cf6b676cdcd3799e9b647ec8427687b21d7ddae1327b02cc9cf781518f9abdeb6c9d9988ef9518b80bdb66d87a15035ca1dfa9ce04f27373e06c9aa8d729a0e4c6b613d69729f4080ce26d603bbe72bfc07d242022d239d91fa9800d", 0xa1, &(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)="3385cfd8441ae6b1d0ff375344738332aeeadb2b0c92fa4306ff1229f3e93ab15024eaa48ca4cc5fc916b33533809aa0ad923d8da1d9c1166eca7d3fd27f3ceedfa29965a18b07a519d947f71b16fda1d9fee26d5f162e54fbdcbbc5a64d9bc6") r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x891f, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r7}, &(0x7f0000000280), &(0x7f0000000240)=r4}, 0x20) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) sendmsg$inet(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) (async) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x12, 0x2000035e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x66, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7d}, 0x94) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000000000)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) (async, rerun: 32) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) (async, rerun: 32) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 521.679224ms ago: executing program 3 (id=9763): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000340)=@base={0x12, 0x2, 0x8, 0x2}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000400)=ANY=[@ANYRES32=r1, @ANYRES32=r0, @ANYBLOB='\a'], 0x10) close(0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="61123000000000006113100000000000bf2000000000000016000200071b48013d030100000000009500000000000000bc26000000000000bf67000000000000070200000fff0727670200000c000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r4}, 0x8) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x3, 0x5, &(0x7f00000006c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x80}, [@call={0x85, 0x0, 0x0, 0x27}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000680)='GPL\x00'}, 0x5d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r6, 0x0, 0x80, 0x0, &(0x7f0000000200)="5becbc0e0d7cca6073a4f11dad00a7560bfffffcf6467b4cdce4350fea62125258be12b1e375faa787fa2be845d403ed597e6d3b653e402c19286f6d45b84e30eface15c3c8335b08ecc19cf6a9cf9ed0c7042367c9c45ac8d5d90674db9449fb3e2a46ee49726ed9383378c7d0ee22519aa5d1dfe4dab986ee923d88a532117", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000004c0)={@cgroup=r5, 0x1e, 0x1, 0x800, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000580)=[0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x18, &(0x7f00000006c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x52, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000500)={@ifindex=r8, r6, 0x36, 0x6, r0, @void, @value=r5, @void, @void, r7}, 0x20) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) perf_event_open(&(0x7f0000000240)={0x2, 0x78, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r9}, 0x8) ioctl$SIOCSIFHWADDR(r10, 0x541b, 0x0) r11 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, r11, 0x0) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720ac4ff000000007110bb00000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) write$cgroup_subtree(r12, &(0x7f0000000000), 0xfdef) ioctl$TUNSETOFFLOAD(r12, 0x400454d0, 0x8) 489.635967ms ago: executing program 1 (id=9764): bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="82", 0x1}], 0x1}, 0x80) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x11100, 0xb, 0xfffffffc, 0x2, 0x0, 0xb}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000280)=0x10, 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) recvmsg(r1, &(0x7f00000003c0)={&(0x7f00000004c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000540)=""/125, 0x7d}, {&(0x7f00000005c0)=""/99, 0x63}, {&(0x7f0000000640)=""/160, 0xa0}, {&(0x7f0000000780)=""/114, 0x72}, {&(0x7f0000000240)=""/18, 0x12}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/82, 0x52}, {&(0x7f00000002c0)=""/29, 0x1d}, {&(0x7f0000003540)=""/4096, 0x1000}], 0x9, &(0x7f0000001940)=""/221, 0xdd}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r4, @ANYBLOB="0000000002000020b705000008000000850000005e00000095", @ANYRES16], &(0x7f0000000300)='GPL\x00', 0x2, 0x230, &(0x7f0000002500)=""/4106, 0x0, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf8, 0x10, 0x0, 0x34, 0x0, 0x0, 0xfffffffffffffe65}, 0x4a) close(r1) recvmsg(r0, &(0x7f0000002c80)={0x0, 0x0, 0x0}, 0x0) 273.934336ms ago: executing program 4 (id=9765): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8940, &(0x7f0000000080)) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x103040, 0x0) (async) close(r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000001300000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f088a8", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 165.045145ms ago: executing program 1 (id=9766): bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r0, 0x0, 0x8}, 0xc) (async) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r0, 0x0, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001480)={r1, &(0x7f00000003c0)="e3", 0x0}, 0x20) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x1, 0x4, 0x0, 0x0, 0x0, 0x2000000000000, 0x30084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0xb, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000580)='cgroup.stat\x00', 0x275a, 0x0) (async) r3 = openat$cgroup_ro(r2, &(0x7f0000000580)='cgroup.stat\x00', 0x275a, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x9) (async) write$cgroup_type(r3, &(0x7f0000000180), 0x9) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r1}, &(0x7f0000000080), &(0x7f00000000c0)=r5}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000240)=""/252, 0x37, 0xfc, 0x1}, 0x20) (async) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000240)=""/252, 0x37, 0xfc, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000040)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, r7, 0x14, &(0x7f00000000c0)={0x0, 0x11}, 0x1, 0x10, &(0x7f0000000000), 0xa, 0x0, 0xffffffffffffffff, 0x4c}, 0x70) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r0, 0x8, 0x8}, 0xc) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1, 0xf, &(0x7f0000000480)=ANY=[@ANYBLOB="18ff0000002546e4e20000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x25, 0x80000, 0x1, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000008000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000008000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000880)={r10, r9}, 0xc) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000e9ff0000a4290bd98e6f9ff837bcecc20505d47720d71367bab9de404084fec6e93df1e63d6d69871c657ffa67293ea750f14bff527f8451525464c70bfcb9a24e7f2394fafd3832cad969f2a55fc15c5a779dfe9e32eaa6cf78ad101e787bb327cdd895e6ec750118a149689c48c33f15d1e6f3d4d954ad90394b115e5930e8373aea57dd304c8d80d3b174553f96d22954dbb933edd55e1c44b40bb79df90c3a1483035ed842cb9602", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x20, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b702000007000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020737200000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x20, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b702000007000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020737200000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r13, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES64, @ANYBLOB="f9ffffffffffffffdcd5632e5f"], 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa0}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x0, 0x2, 0x3, 0xe, 0x4000, r8, 0x0, '\x00', 0x0, r3, 0x1, 0x5, 0x2}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x0, 0x2, 0x3, 0xe, 0x4000, r8, 0x0, '\x00', 0x0, r3, 0x1, 0x5, 0x2}, 0x50) 164.391595ms ago: executing program 4 (id=9767): r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000380)='D`\xc9Kap\\\xa7\xb2\x12\xbe)y\xfb\xfa\xc8!\xa9\xf3`\xa4\x14O\xfe\xe8\xc0\x19j\xec\xeb\xa7\x8ct\x86\x98\xaf\x82C\x85\xa9\xa4R\xc7h|\xf4\xea\x9a\xdeB%\xdd`\x91\xcb\x19a\x8b\xba\xba\xc3Q\x1d\xdf\x81\x89\xa5&R\x85\xd82\"\x057\xee$\x9d\xfd\xce\x1f\xaa@\xb1\xb4$\x9d\x8a\x0e\x88\x8f\xbbd\xac\xcf+e\xfc\x1a\x82\\\t\xd1~%\xf8\xe1\xa2N\xad7$B\x13\xbf\"\xbf\xac\xc2\xbd\xc2{\x84B+u\xe4\x1b\xb0$\xbcl\xc6\xad\r\x1c\xf8\xf6^K)\xe0\x00\x9a^\x16\x11\x89\x8a\xc00\x1b$XG\x81E\x83\xa3\x0e\xa9\x8e\tTn\xb9\xdc\xdd\x9c\xcf\xe8\xa4B\x91\x890\xa5h\xdb\xf0\xf2\xee\xda\x16\xe2\vM\xa9\x1a3\x12e\xc4@o\xf3\xfb\x1c\xa9\xb6\x96>Vg\x99W>P:\"-\xc8\'m') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="18060000000000010000000000000000851000000200000020000000000000009500007b0000000085000000560000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x2, 0x92, &(0x7f0000000240)=""/146}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="18060000000000010000000000000000851000000200000020000000000000009500007b0000000085000000560000009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x2, 0x92, &(0x7f0000000240)=""/146}, 0x80) 108.74839ms ago: executing program 4 (id=9768): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x1ff, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffffffffffc, 0xffffffffffffffff, 0x0) (async) r3 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="2d637075202b63707561636375202b638ba0d225a5637075000000000000000073202b6e65745f7072696f202d637075616363742021758104c3c58bb2f1810ef7f0089200109a6f6b4c7433b41a0e1ec4f0b0fe93af530d7323c1d928b64683ccb21d19f224d220e61c90e4597729ff3f0dd5cae4bc90661e929fcf68b9945dbd1f974ef9b4246e71fddfffb790835092"], 0x2f) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000001140)=ANY=[@ANYBLOB="8fedc5790700117df37538e486dd6317ce220000000000000000000000000000ffff7fc5f6112be8263da43a7fc33922bdbb4e0aa8ede71aa2"], 0xfdef) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) (async) close(r7) (async) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) close(r9) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 0s ago: executing program 1 (id=9769): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000080)="de260959a8208d0cf8fe3081b096e6d90ca080bd8b9f989f670f6d5534bdb310a2c85c0cf410eed955c861165c31d13bc9ec38dbc1be58473b4bc2f79c7c908815ff4c53bde9b8970a1f81e69313654c347fd3ed35fc58ea5d764e9526cafa3660e523a67ea88234ef6940d21f25989c7144a69a23dd3edd", 0x78}, {&(0x7f0000000180)="7bf6", 0x2}, {&(0x7f00000001c0)="0e0f6c52da46b732d93c144077b63b4313118ff0100bee9eefe455725864a76e6c6480ab9b8589", 0x27}, {&(0x7f0000000200)="d17a03aee8f59c406c0bb6d7cbc49c4362e6336e84a08deb42d4849cac79f42414c5265264cfd648f27a29", 0x2b}, {&(0x7f0000000240)="bfc1308b73c01e83f3cf", 0xa}], 0x5, &(0x7f0000000300)=[@ip_retopts={{0x20, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0x72, [@multicast1, @local, @rand_addr=0x64010100]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xb}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}], 0xe0}, 0x4c101) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xb9, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8b, 0x5, 0x9, 0x1, 0x1}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r2, &(0x7f0000000180), &(0x7f0000000680)=""/141}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r2, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1010000}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) kernel console output (not intermixed with test programs): miscuous mode [ 132.220501][ T5924] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 132.253212][ T5924] device syzkaller0 entered promiscuous mode [ 132.992067][ T5962] syz.3.1602[5962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.992125][ T5962] syz.3.1602[5962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.237872][ T5969] device syzkaller0 entered promiscuous mode [ 134.088263][ T5997] device wg2 entered promiscuous mode [ 134.663114][ T6042] device pim6reg1 entered promiscuous mode [ 135.087417][ T6063] device syzkaller0 entered promiscuous mode [ 135.918195][ T6144] : renamed from bond_slave_0 [ 136.086345][ T6163] device veth0_vlan left promiscuous mode [ 136.104276][ T6163] device veth0_vlan entered promiscuous mode [ 136.567502][ T6189] device syzkaller0 entered promiscuous mode [ 138.449207][ T6320] device syzkaller0 entered promiscuous mode [ 138.488523][ T6320] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 140.426990][ T6443] device wg2 entered promiscuous mode [ 141.468410][ T6495] syz.1.1758[6495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.468460][ T6495] syz.1.1758[6495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.498913][ T6492] syz.1.1758[6492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.542119][ T6492] syz.1.1758[6492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.605735][ T6661] device syzkaller0 entered promiscuous mode [ 143.966462][ T24] audit: type=1400 audit(1771791267.869:162): avc: denied { create } for pid=6692 comm="syz.2.1817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 144.101791][ T6700] device syzkaller0 entered promiscuous mode [ 144.227453][ T6710] device bridge_slave_1 left promiscuous mode [ 144.264216][ T6710] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.272110][ T6710] device bridge_slave_0 left promiscuous mode [ 144.278261][ T6710] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.434236][ T6930] device syzkaller0 entered promiscuous mode [ 147.756354][ T6966] : renamed from vlan1 [ 148.583321][ T6996] device syzkaller0 entered promiscuous mode [ 148.930149][ T7009] device syzkaller0 entered promiscuous mode [ 149.090953][ T7018] nr0: port 1(macsec0) entered blocking state [ 149.115040][ T7018] nr0: port 1(macsec0) entered disabled state [ 149.131641][ T7018] device macsec0 entered promiscuous mode [ 149.251752][ T7013] device syzkaller0 entered promiscuous mode [ 149.320916][ T7031] erspan0: refused to change device tx_queue_len [ 149.424355][ T7041] device pim6reg1 entered promiscuous mode [ 150.556866][ T7072] device syzkaller0 entered promiscuous mode [ 152.636230][ T7251] device syzkaller0 entered promiscuous mode [ 153.601792][ T7278] : port 1() entered blocking state [ 153.607971][ T7278] : port 1() entered disabled state [ 153.621952][ T7278] device entered promiscuous mode [ 156.392425][ T7414] device syzkaller0 entered promiscuous mode [ 156.414161][ T7414] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 156.458869][ T7414] tap1: tun_chr_ioctl cmd 1074025675 [ 156.467551][ T7414] tap1: persist enabled [ 156.479040][ T7414] tap1: tun_chr_ioctl cmd 1074025675 [ 156.491032][ T7414] tap1: persist enabled [ 156.500938][ T7414] tap1: tun_chr_ioctl cmd 2148553947 [ 157.464540][ T7480] device syzkaller0 entered promiscuous mode [ 157.547197][ T7501] sock: sock_set_timeout: `syz.3.2051' (pid 7501) tries to set negative timeout [ 157.558798][ T24] audit: type=1400 audit(1771791281.469:163): avc: denied { create } for pid=7502 comm="syz.1.2053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 157.694049][ T7522] device syzkaller0 entered promiscuous mode [ 157.938486][ T7539] batadv0: tun_chr_ioctl cmd 1074025684 [ 158.987848][ T7588] device syzkaller0 entered promiscuous mode [ 159.105643][ T7588] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 159.893232][ T24] audit: type=1400 audit(1771791283.789:164): avc: denied { create } for pid=7632 comm="syz.3.2092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 161.505934][ T7736] device veth1_macvtap left promiscuous mode [ 161.513626][ T7736] device veth1_macvtap entered promiscuous mode [ 161.519896][ T7736] device macsec0 entered promiscuous mode [ 162.040213][ T7775] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 162.273264][ T24] audit: type=1400 audit(1771791286.179:165): avc: denied { create } for pid=7798 comm="syz.3.2137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 163.315243][ T7925] device syzkaller0 entered promiscuous mode [ 163.549537][ T7936] device syzkaller0 entered promiscuous mode [ 164.062987][ T7968] device sit0 left promiscuous mode [ 164.607562][ T7986] syz.4.2190[7986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.607616][ T7986] syz.4.2190[7986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.748540][ T24] audit: type=1400 audit(1771791288.649:166): avc: denied { create } for pid=7993 comm="syz.0.2191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 166.161885][ T24] audit: type=1400 audit(1771791290.069:167): avc: denied { read } for pid=8060 comm="syz.3.2210" name="cgroup.subtree_control" dev="cgroup2" ino=231 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 166.891075][ T8095] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 166.931551][ T8091] device veth1_macvtap entered promiscuous mode [ 166.952954][ T8091] device macsec0 entered promiscuous mode [ 166.965240][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.022806][ T8104] device syzkaller0 entered promiscuous mode [ 168.616629][ T24] audit: type=1400 audit(1771791292.519:168): avc: denied { create } for pid=8166 comm="syz.0.2239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 170.166533][ T8255] device pim6reg1 entered promiscuous mode [ 171.984064][ T24] audit: type=1400 audit(1771791295.889:169): avc: denied { create } for pid=8320 comm="syz.0.2283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 174.116402][ T8376] device syzkaller0 entered promiscuous mode [ 175.531602][ T8429] device veth1_macvtap left promiscuous mode [ 175.540423][ T8429] device macsec0 left promiscuous mode [ 175.621552][ T8434] device veth1_macvtap entered promiscuous mode [ 175.631543][ T8434] device macsec0 entered promiscuous mode [ 178.863435][ T8580] tun0: tun_chr_ioctl cmd 1074025678 [ 178.881821][ T8580] tun0: group set to 1 [ 179.543763][ T8602] device lo entered promiscuous mode [ 180.801881][ T8639] device syzkaller0 entered promiscuous mode [ 184.637311][ T8877] device syzkaller0 entered promiscuous mode [ 185.896168][ T8962] device wg2 left promiscuous mode [ 186.064470][ T8962] device syzkaller0 entered promiscuous mode [ 187.626199][ T9050] : renamed from bond_slave_0 [ 187.761936][ T9059] device lo entered promiscuous mode [ 189.017761][ T9111] tap0: tun_chr_ioctl cmd 1074025675 [ 189.102265][ T9111] tap0: persist enabled [ 189.208439][ T9112] tap0: tun_chr_ioctl cmd 1074025675 [ 189.222756][ T9112] tap0: persist enabled [ 189.239157][ T9115] tap0: tun_chr_ioctl cmd 2148553947 [ 191.891277][ T9214] device syzkaller0 entered promiscuous mode [ 192.386323][ T9234] pimreg1: tun_chr_ioctl cmd 1074025692 [ 193.893669][ T9267] device syzkaller0 entered promiscuous mode [ 194.157832][ T9285] syz.3.2558[9285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.554920][ T9299] device syzkaller0 entered promiscuous mode [ 196.116171][ T9396] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 196.125201][ T9396] device syzkaller0 entered promiscuous mode [ 200.302448][ T24] audit: type=1400 audit(1771791324.209:170): avc: denied { mounton } for pid=9718 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 200.303880][ T9711] device syzkaller0 entered promiscuous mode [ 200.687934][ T9718] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.695592][ T9718] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.703045][ T9718] device bridge_slave_0 entered promiscuous mode [ 200.721736][ T9727] device syzkaller0 entered promiscuous mode [ 200.735812][ T9718] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.744228][ T9718] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.756019][ T9718] device bridge_slave_1 entered promiscuous mode [ 200.968742][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.988293][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.019477][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.039400][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.056366][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.063441][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.168667][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.242857][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.340754][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.347923][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.379469][ T9749] : port 1(vlan1) entered blocking state [ 201.389807][ T9749] : port 1(vlan1) entered disabled state [ 201.402936][ T9749] device vlan1 entered promiscuous mode [ 201.419945][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.431014][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.468453][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.502584][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 201.520062][ T9718] device veth0_vlan entered promiscuous mode [ 201.534346][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.553666][ T9718] device veth1_macvtap entered promiscuous mode [ 201.570509][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.603624][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.621784][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.673665][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 201.700594][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 201.738768][ T24] audit: type=1400 audit(1771791325.639:171): avc: denied { unmount } for pid=9718 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 202.164997][ T9777] device syzkaller0 entered promiscuous mode [ 202.264539][ T9791] device syzkaller0 entered promiscuous mode [ 202.472272][ T9812] device GPL entered promiscuous mode [ 202.591575][ T9815] device syzkaller0 entered promiscuous mode [ 203.822558][ T9842] device syzkaller0 entered promiscuous mode [ 204.186212][ T310] device veth1_macvtap left promiscuous mode [ 207.508065][ T9901] device syzkaller0 entered promiscuous mode [ 208.284992][ T9913] device pim6reg1 entered promiscuous mode [ 208.771824][ T9920] device bond_slave_1 entered promiscuous mode [ 208.798539][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 208.815958][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 208.869384][ T9926] syz.2.2743[9926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.869463][ T9926] syz.2.2743[9926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.205499][ T9997] device syzkaller0 entered promiscuous mode [ 213.105825][T10024] device syzkaller0 entered promiscuous mode [ 217.826871][T10105] device syzkaller0 entered promiscuous mode [ 219.962829][T10204] IPv6: pim6reg1: Disabled Multicast RS [ 222.350570][T10356] : renamed from pim6reg1 [ 226.136486][T10506] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.171561][T10506] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.179004][T10506] device bridge_slave_0 entered promiscuous mode [ 226.415591][T10506] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.438138][T10506] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.454319][T10506] device bridge_slave_1 entered promiscuous mode [ 227.418389][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.456321][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.571643][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.704760][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.729859][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.736939][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.968707][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.025930][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.042855][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.049942][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.072558][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.083176][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.091218][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.099471][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.390893][T10506] device veth0_vlan entered promiscuous mode [ 228.399735][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.407936][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 228.416422][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 228.425268][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 228.441897][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.460291][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.469962][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.663279][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 228.703818][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 228.821903][T10506] device veth1_macvtap entered promiscuous mode [ 228.969114][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 229.002615][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 229.105061][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 229.132192][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 229.143172][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.496191][T10630] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.503306][T10630] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.510771][T10630] device bridge_slave_0 entered promiscuous mode [ 230.827041][T10630] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.857553][T10630] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.941816][T10630] device bridge_slave_1 entered promiscuous mode [ 231.614571][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.632976][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.908740][T10672] device pim6reg1 left promiscuous mode [ 231.918457][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.939845][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.948413][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.955590][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.963537][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.971961][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.980232][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.987290][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.026622][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.091493][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.155421][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.165190][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 232.185258][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.206320][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 232.214396][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.222821][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.230348][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.243908][T10630] device veth0_vlan entered promiscuous mode [ 232.267868][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 232.276539][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.286591][T10630] device veth1_macvtap entered promiscuous mode [ 232.296917][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.314894][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.326122][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.371147][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.409689][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.768901][T10713] device lo entered promiscuous mode [ 232.856765][T10740] device syzkaller0 entered promiscuous mode [ 233.401785][ T112] device macsec0 left promiscuous mode [ 233.407426][ T112] nr0: port 1(macsec0) entered disabled state [ 233.429822][ T112] device veth0_vlan left promiscuous mode [ 233.685229][T10804] syz.2.2988[10804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.685273][T10804] syz.2.2988[10804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.593812][T10897] tun0: tun_chr_ioctl cmd 1074025678 [ 234.671273][T10897] tun0: group set to 1 [ 235.758462][T10981] syzkaller1: tun_chr_ioctl cmd 1074025673 [ 235.778635][T10979] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 235.791428][T10981] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 235.853774][T10993] device xfrm0 entered promiscuous mode [ 237.136739][T11053] syzkaller0: mtu greater than device maximum [ 237.706243][T11098] syz.2.3075[11098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.706319][T11098] syz.2.3075[11098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.399075][T11130] device pim6reg1 entered promiscuous mode [ 238.420362][T11114] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.430216][T11114] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.440216][T11114] device bridge_slave_0 entered promiscuous mode [ 238.459027][T11114] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.471383][T11114] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.482403][T11114] device bridge_slave_1 entered promiscuous mode [ 238.729935][T11114] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.736993][T11114] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.744301][T11114] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.751317][T11114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.829490][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.849130][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.932927][ T651] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.036825][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.075088][ T651] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.082169][ T651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.105260][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.118772][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.186211][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.228953][T11114] device veth0_vlan entered promiscuous mode [ 239.267406][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 239.285309][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 239.303643][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 239.317458][T11114] device veth1_macvtap entered promiscuous mode [ 239.352357][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 239.439823][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 239.483026][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 239.495856][ T24] audit: type=1400 audit(1771791363.379:172): avc: denied { create } for pid=11178 comm="syz.3.3099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 239.547223][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 239.576595][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 239.978121][T11228] nr0: port 1(macsec0) entered blocking state [ 239.992991][T11228] nr0: port 1(macsec0) entered disabled state [ 240.324003][T11247] device syzkaller0 entered promiscuous mode [ 240.536899][T11290] device syzkaller0 entered promiscuous mode [ 241.600903][ T112] device vlan1 left promiscuous mode [ 241.606835][ T112] : port 1(vlan1) entered disabled state [ 241.682489][ T112] device veth1_macvtap left promiscuous mode [ 241.689694][ T112] device veth0_vlan left promiscuous mode [ 243.463680][T11474] device syzkaller0 entered promiscuous mode [ 245.372524][T11535] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.379602][T11535] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.415729][T11535] device bridge_slave_0 entered promiscuous mode [ 245.472172][T11535] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.479213][T11535] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.519296][T11535] device bridge_slave_1 entered promiscuous mode [ 245.741649][T11561] @0: renamed from bond_slave_1 [ 246.158948][T11535] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.166079][T11535] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.173409][T11535] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.180421][T11535] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.190240][ T651] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.218049][ T651] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.461193][T11584] device syzkaller0 entered promiscuous mode [ 246.503229][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.510789][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.518462][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.527118][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.535368][ T651] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.542407][ T651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.551057][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.560042][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.568378][ T651] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.575410][ T651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.622152][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 246.644308][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.657766][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.666500][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.681404][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 246.694153][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.747713][T11535] device veth0_vlan entered promiscuous mode [ 246.776313][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 246.802745][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.810836][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.818561][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.850098][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 246.889612][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.931614][T11535] device veth1_macvtap entered promiscuous mode [ 246.976474][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 246.984472][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 246.993054][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.074145][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 247.096652][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 247.191190][T11621] device syzkaller0 entered promiscuous mode [ 249.094596][ T112] nr0: port 1(macsec0) entered disabled state [ 249.102862][ T112] device left promiscuous mode [ 249.108448][ T112] : port 1() entered disabled state [ 249.177598][ T112] device veth1_macvtap left promiscuous mode [ 249.599183][T11762] device syzkaller0 entered promiscuous mode [ 249.665644][T11766] device syzkaller0 entered promiscuous mode [ 250.382628][T11812] device syzkaller0 entered promiscuous mode [ 255.066454][T12079] nr0: port 1(macsec0) entered blocking state [ 255.076585][T12079] nr0: port 1(macsec0) entered disabled state [ 255.089847][T12079] device macsec0 entered promiscuous mode [ 256.832269][T12172] device syzkaller0 entered promiscuous mode [ 256.852476][T12176] device syzkaller0 entered promiscuous mode [ 259.115659][T12289] batadv_slave_0: mtu less than device minimum [ 259.445632][T12331] device syzkaller0 entered promiscuous mode [ 259.717748][T12348] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 260.606473][T12409] device syzkaller0 entered promiscuous mode [ 261.072355][T12435] device syzkaller0 entered promiscuous mode [ 261.096225][T12435] device syzkaller0 left promiscuous mode [ 263.220282][T12564] syz.4.3487[12564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.220333][T12564] syz.4.3487[12564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.413522][T12632] bridge0: port 3(veth1) entered blocking state [ 264.461423][T12632] bridge0: port 3(veth1) entered disabled state [ 264.534255][T12632] device veth1 entered promiscuous mode [ 264.544625][T12632] bridge0: port 3(veth1) entered blocking state [ 264.550968][T12632] bridge0: port 3(veth1) entered forwarding state [ 264.710310][T12656] device syzkaller0 entered promiscuous mode [ 265.056500][T12689] device syzkaller0 entered promiscuous mode [ 266.558268][T12752] bridge0: port 3(veth1) entered disabled state [ 266.564959][T12752] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.572103][T12752] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.812257][T12759] device veth1 left promiscuous mode [ 266.932629][T12759] bridge0: port 3(veth1) entered disabled state [ 266.971718][T12759] device bridge_slave_1 left promiscuous mode [ 267.026190][T12759] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.122485][T12759] device bridge_slave_0 left promiscuous mode [ 267.131954][T12759] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.320331][ T24] audit: type=1400 audit(1771791396.219:173): avc: denied { create } for pid=12951 comm="syz.0.3596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 274.314760][T13100] IPv6: pim6reg1: Disabled Multicast RS [ 275.389945][T13176] device syzkaller0 entered promiscuous mode [ 275.565228][T13180] device syzkaller0 entered promiscuous mode [ 275.578439][T13180] syzkaller0: create flow: hash 851359313 index 2 [ 275.588385][T13179] syzkaller0: delete flow: hash 851359313 index 2 [ 276.780214][T13252] device syzkaller0 entered promiscuous mode [ 285.213650][T13505] device syzkaller0 entered promiscuous mode [ 286.731481][T13577] : port 1(vlan1) entered blocking state [ 286.783697][T13577] : port 1(vlan1) entered disabled state [ 286.907898][T13577] device vlan1 entered promiscuous mode [ 287.663819][T13589] device syzkaller0 entered promiscuous mode [ 288.146525][T13685] device veth0_vlan left promiscuous mode [ 288.154409][T13685] device veth0_vlan entered promiscuous mode [ 288.161221][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.174487][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 288.182008][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.263984][T13697] device syzkaller0 entered promiscuous mode [ 288.339257][T13709] device syzkaller0 entered promiscuous mode [ 289.150161][T13757] device syzkaller0 entered promiscuous mode [ 290.245322][T13819] device syzkaller0 entered promiscuous mode [ 291.809862][T13891] device syzkaller0 entered promiscuous mode [ 293.271895][T13949] device syzkaller0 entered promiscuous mode [ 294.135689][T14055] device syzkaller0 entered promiscuous mode [ 294.282296][T14084] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 294.290334][T14084] device syzkaller0 entered promiscuous mode [ 294.719452][T14106] device syzkaller0 entered promiscuous mode [ 294.732226][T14107] device syzkaller0 entered promiscuous mode [ 294.758806][T14120] device syzkaller0 entered promiscuous mode [ 295.231805][T14152] syzkaller1: tun_chr_ioctl cmd 21731 [ 295.245190][T14152] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 295.579436][T14160] device syzkaller0 entered promiscuous mode [ 296.296835][ T24] audit: type=1400 audit(1771791420.199:174): avc: denied { ioctl } for pid=14224 comm="syz.2.3970" path="" dev="cgroup2" ino=327 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 296.679782][T14241] device syzkaller0 entered promiscuous mode [ 296.689832][T14243] device xfrm0 entered promiscuous mode [ 296.793653][T14254] device veth1_macvtap left promiscuous mode [ 297.406880][T14303] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 297.418024][T14303] syzkaller0: linktype set to 804 [ 297.592483][T14309] device wg2 entered promiscuous mode [ 298.024424][T14338] : renamed from team_slave_1 [ 298.715097][T14381] device syzkaller0 entered promiscuous mode [ 299.103501][T14393] device syzkaller0 entered promiscuous mode [ 299.390828][ T24] audit: type=1400 audit(1771791423.289:175): avc: denied { create } for pid=14407 comm="syz.1.4024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 299.738743][T14417] device pim6reg1 entered promiscuous mode [ 300.334011][T14441] device syzkaller0 entered promiscuous mode [ 300.896604][T14469] device syzkaller0 entered promiscuous mode [ 301.456397][T14486] device syzkaller0 entered promiscuous mode [ 301.585372][T14487] syzkaller0: create flow: hash 2483126915 index 1 [ 301.592329][ T429] syzkaller0: tun_net_xmit 48 [ 301.811388][T14490] syzkaller0: delete flow: hash 2483126915 index 1 [ 302.609202][T14520] GPL: port 1(erspan0) entered blocking state [ 302.641427][T14520] GPL: port 1(erspan0) entered disabled state [ 302.671922][T14520] device erspan0 entered promiscuous mode [ 302.736095][T14525] GPL: port 1(erspan0) entered blocking state [ 302.742225][T14525] GPL: port 1(erspan0) entered forwarding state [ 302.841104][T14524] device syzkaller0 entered promiscuous mode [ 304.463921][T14586] device syzkaller0 entered promiscuous mode [ 305.975180][T14653] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 305.981419][ C1] syzkaller0: tun_net_xmit 76 [ 305.993980][T14653] syzkaller0: Linktype set failed because interface is up [ 306.001442][ C1] syzkaller0: tun_net_xmit 76 [ 306.141450][ C1] syzkaller0: tun_net_xmit 76 [ 307.176891][T14704] batadv0: tun_chr_ioctl cmd 1074025677 [ 307.182986][T14704] batadv0: linktype set to 776 [ 308.377576][ T24] audit: type=1400 audit(1771791432.279:176): avc: denied { getattr } for pid=14772 comm="syz.3.4125" path="net:[4026533097]" dev="nsfs" ino=4026533097 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 311.383134][T14940] tap0: tun_chr_ioctl cmd 1074025677 [ 311.388448][T14940] tap0: linktype set to 780 [ 311.835492][T14983] device wg2 entered promiscuous mode [ 312.540935][T15015] IPv6: pim6reg1: Disabled Multicast RS [ 312.898328][ T24] audit: type=1400 audit(1771791436.799:177): avc: denied { create } for pid=15059 comm="syz.1.4206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 313.609864][T15132] device vlan0 entered promiscuous mode [ 314.483621][T15199] device syzkaller0 entered promiscuous mode [ 319.716801][T15372] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 319.725268][T15372] device syzkaller0 entered promiscuous mode [ 319.903141][T15390] device syzkaller0 entered promiscuous mode [ 320.170871][T15430] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.351773][T15436] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.358848][T15436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.652150][T15464] device syzkaller0 entered promiscuous mode [ 320.706998][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 320.839443][T15470] device syzkaller0 entered promiscuous mode [ 322.115320][T15561] device syzkaller0 entered promiscuous mode [ 323.229061][T15637] IPv6: pim6reg1: Disabled Multicast RS [ 324.540162][T15714] device wg2 entered promiscuous mode [ 331.173715][T15887] device syzkaller0 entered promiscuous mode [ 331.724065][T15941] device syzkaller0 entered promiscuous mode [ 333.528541][T16016] device syzkaller0 entered promiscuous mode [ 333.695937][T16027] device syzkaller0 entered promiscuous mode [ 334.251758][T16059] device lo entered promiscuous mode [ 335.129737][T16080] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.168098][T16080] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.265166][T16080] device bridge_slave_0 entered promiscuous mode [ 335.348354][T16080] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.424644][T16080] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.531874][T16080] device bridge_slave_1 entered promiscuous mode [ 335.924676][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 335.933204][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.043306][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.084577][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.107986][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.115167][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.171466][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.191791][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.200638][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.207781][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.227191][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.242009][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.260310][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.295013][ T310] device macsec0 left promiscuous mode [ 336.301145][ T310] nr0: port 1(macsec0) entered disabled state [ 336.319629][ T310] device bridge_slave_1 left promiscuous mode [ 336.331453][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.350566][ T310] device bridge_slave_0 left promiscuous mode [ 336.356755][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.379946][ T310] device veth1_macvtap left promiscuous mode [ 336.386372][ T310] device veth0_vlan left promiscuous mode [ 336.670227][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 337.006136][T16168] device syzkaller0 entered promiscuous mode [ 337.022852][T16080] device veth0_vlan entered promiscuous mode [ 337.031467][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 337.039415][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.051900][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.059345][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.094133][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 337.103186][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 337.112929][T16080] device veth1_macvtap entered promiscuous mode [ 337.123141][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 337.131026][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 337.141913][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 337.177761][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 337.187142][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 337.207594][ T24] audit: type=1400 audit(1771791461.109:178): avc: denied { create } for pid=16178 comm="syz.3.4514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 338.218810][T16220] device syzkaller0 entered promiscuous mode [ 339.239090][T16273] device syzkaller0 entered promiscuous mode [ 339.674076][T16325] device syzkaller0 entered promiscuous mode [ 340.031300][T16360] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.126791][T16366] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.133886][T16366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.178703][T16365] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.196791][T16365] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.342707][T16368] device bridge_slave_1 left promiscuous mode [ 340.349284][T16368] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.358771][T16368] device bridge_slave_0 left promiscuous mode [ 340.365341][T16368] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.599953][T16395] device wg2 entered promiscuous mode [ 341.042461][T16438] device wg2 left promiscuous mode [ 341.180755][T16438] device wg2 entered promiscuous mode [ 341.809882][T16467] device syzkaller0 entered promiscuous mode [ 342.435535][T16495] device syzkaller0 entered promiscuous mode [ 342.564751][T16469] device syzkaller0 entered promiscuous mode [ 342.717439][T16495] syzkaller0: tun_net_xmit 1280 [ 343.203925][T16534] device pim6reg1 entered promiscuous mode [ 343.984369][T16583] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.995333][T16583] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.003702][T16583] device bridge_slave_0 entered promiscuous mode [ 344.025952][T16583] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.040539][T16583] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.055757][T16583] device bridge_slave_1 entered promiscuous mode [ 344.145063][ T9] GPL: port 1(erspan0) entered disabled state [ 344.160421][ T9] device erspan0 left promiscuous mode [ 344.166055][ T9] GPL: port 1(erspan0) entered disabled state [ 344.460601][T16612] bY4`Ҙ: renamed from lo [ 344.470587][T16583] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.477647][T16583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.484914][T16583] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.491939][T16583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.526586][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.534595][ T310] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.542981][ T310] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.572319][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.583700][ T310] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.590756][ T310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.600383][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.608866][ T310] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.615934][ T310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.624777][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 344.632928][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.649264][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 344.690422][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.704063][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 344.714399][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 344.761483][T16583] device veth0_vlan entered promiscuous mode [ 344.830344][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 344.846231][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 344.856328][T16583] device veth1_macvtap entered promiscuous mode [ 344.879745][ T9] device bridge_slave_1 left promiscuous mode [ 344.886037][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.895592][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.904347][ T9] device veth1_macvtap left promiscuous mode [ 345.038946][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 345.050214][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 345.060267][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 345.110384][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 345.176497][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 346.227322][T16707] : renamed from vlan1 [ 348.412279][T16840] syzkaller0: tun_chr_ioctl cmd 1074025684 [ 348.427223][T16842] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 348.778865][T16853] IPv6: : Disabled Multicast RS [ 349.575991][T16890] device pim6reg1 entered promiscuous mode [ 349.669641][T16893] device syzkaller0 entered promiscuous mode [ 350.703692][T16915] device wg2 left promiscuous mode [ 350.850958][T16918] device wg2 entered promiscuous mode [ 351.327063][T16965] ref_ctr_offset mismatch. inode: 0x61 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 352.570551][T17048] : renamed from pim6reg1 [ 355.861856][T17216] device syzkaller0 entered promiscuous mode [ 356.025859][T17224] device syzkaller0 entered promiscuous mode [ 356.042669][T17229] device bond_slave_1 entered promiscuous mode [ 356.153358][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 356.163603][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 359.759147][T17424] device syzkaller0 entered promiscuous mode [ 361.317994][T17459] device syzkaller0 entered promiscuous mode [ 362.842506][T17495] syz.2.4888[17495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.842610][T17495] syz.2.4888[17495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.332157][T17520] device sit0 entered promiscuous mode [ 363.962260][T17541] IPv6: pim6reg1: Disabled Multicast RS [ 365.029894][T17619] device syzkaller0 entered promiscuous mode [ 365.068633][T17625] device syzkaller0 entered promiscuous mode [ 365.244523][T17642] device syzkaller0 entered promiscuous mode [ 365.991311][T17677] device syzkaller0 entered promiscuous mode [ 367.206281][T17745] device syzkaller0 entered promiscuous mode [ 367.336075][T17747] device wg2 left promiscuous mode [ 368.585196][T17775] : renamed from vlan0 [ 372.516839][T17955] device macsec0 entered promiscuous mode [ 372.987964][T17975] device aaaaaaaaaaaaaaa entered promiscuous mode [ 373.300046][T18020] device syzkaller0 entered promiscuous mode [ 373.691025][T18049] device syzkaller0 entered promiscuous mode [ 373.899936][T18046] syzkaller0 selects TX queue 2, but real number of TX queues is 2 [ 375.212414][T18171] device syzkaller0 entered promiscuous mode [ 376.042388][T18225] device syzkaller0 entered promiscuous mode [ 376.239800][T18245] device syzkaller0 entered promiscuous mode [ 376.628919][T18276] device pim6reg1 left promiscuous mode [ 376.777202][T18296] device syzkaller0 entered promiscuous mode [ 377.317682][T18359] device syzkaller0 entered promiscuous mode [ 381.903917][T18495] device syzkaller0 entered promiscuous mode [ 382.195566][T18504] device veth0_vlan left promiscuous mode [ 382.238896][T18504] device veth0_vlan entered promiscuous mode [ 382.362710][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.423139][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.514993][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 383.022562][T18513] tap0: tun_chr_ioctl cmd 1074025692 [ 383.180451][T18524] device wg2 left promiscuous mode [ 383.360599][T18530] device syzkaller0 entered promiscuous mode [ 384.703580][T18587] device lo entered promiscuous mode [ 385.381830][T18602] device syzkaller0 entered promiscuous mode [ 388.388235][T18723] syz.3.5245[18723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.388292][T18723] syz.3.5245[18723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.198842][T18747] device syzkaller0 entered promiscuous mode [ 389.585251][T18771] IPv6: sit2: Disabled Multicast RS [ 389.904192][T18780] pimreg1: tun_chr_ioctl cmd 1074025692 [ 391.062554][T18818] device syzkaller0 entered promiscuous mode [ 392.942249][T18887] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 394.330459][T18921] syz.4.5302[18921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.330519][T18921] syz.4.5302[18921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.506854][T18938] device lo left promiscuous mode [ 394.965662][T18954] tap0: tun_chr_ioctl cmd 1074025677 [ 394.970978][T18954] tap0: linktype set to 780 [ 399.564423][T19142] device bridge_slave_0 entered promiscuous mode [ 403.007283][T19348] device syzkaller0 entered promiscuous mode [ 403.037783][T19353] device pim6reg1 left promiscuous mode [ 403.730061][T19436] device syzkaller0 entered promiscuous mode [ 405.185719][T19472] device syzkaller0 entered promiscuous mode [ 405.752793][T19505] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 405.821505][T19505] syzkaller0: linktype set to 0 [ 408.454616][T19643] -1: renamed from syzkaller0 [ 408.912335][T19680] device sit0 entered promiscuous mode [ 409.520113][T19742] syz.1.5530[19742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.520173][T19742] syz.1.5530[19742] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.295862][T19771] device syzkaller0 entered promiscuous mode [ 411.548084][T19836] device syzkaller0 entered promiscuous mode [ 411.807030][T19852] device syzkaller0 entered promiscuous mode [ 413.271120][T19939] batadv0: tun_chr_ioctl cmd 1074025677 [ 413.294830][T19939] batadv0: linktype set to 776 [ 414.059985][T19974] device bridge0 entered promiscuous mode [ 414.137092][T19972] device wg2 left promiscuous mode [ 414.242522][T19976] device wg2 entered promiscuous mode [ 414.249072][T19978] device bridge_slave_0 left promiscuous mode [ 414.263844][T19983] device syzkaller0 entered promiscuous mode [ 414.272558][T19978] device bridge_slave_0 entered promiscuous mode [ 415.814943][T20091] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 415.904131][T20102] device sit0 left promiscuous mode [ 415.954694][T20102] device sit0 entered promiscuous mode [ 416.081943][T20112] device macsec0 left promiscuous mode [ 416.499701][ T24] audit: type=1400 audit(1771791540.399:179): avc: denied { setattr } for pid=20150 comm="syz.3.5653" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 416.501844][T20156] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 419.241815][T20270] syz.2.5686[20270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.241871][T20270] syz.2.5686[20270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.671623][T20298] tap0: tun_chr_ioctl cmd 1074025692 [ 420.598844][T20334] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.617844][T20334] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.759072][T20334] device bridge0 left promiscuous mode [ 421.036630][T20345] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 421.047383][T20345] syzkaller0: linktype set to 804 [ 421.958141][T20445] device syzkaller0 entered promiscuous mode [ 422.017402][T20453] syzkaller0: delete flow: hash 2483126915 index 1 [ 422.710462][T20506] device sit0 left promiscuous mode [ 426.479475][T20717] device syzkaller0 entered promiscuous mode [ 427.279267][T20727] device syzkaller0 entered promiscuous mode [ 428.004431][T20770] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 428.121437][T20770] device syzkaller0 entered promiscuous mode [ 430.256607][T20859] device syzkaller0 entered promiscuous mode [ 430.447912][T20883] device syzkaller0 entered promiscuous mode [ 432.283836][T20957] device pim6reg1 entered promiscuous mode [ 433.983940][T21052] : renamed from team_slave_1 [ 434.053007][T21056] device syzkaller0 entered promiscuous mode [ 434.149832][T21050] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.167079][T21050] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.182861][T21050] device bridge_slave_0 entered promiscuous mode [ 434.301245][T21066] device syzkaller0 entered promiscuous mode [ 434.404426][T21050] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.421927][T21050] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.429409][T21050] device bridge_slave_1 entered promiscuous mode [ 434.769840][T21073] device syzkaller0 entered promiscuous mode [ 435.163419][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 435.191644][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 435.234110][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 435.282061][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 435.300892][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.307954][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.317605][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 435.327821][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 435.336250][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.343291][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 435.351142][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 435.364489][T21094] device veth0_vlan left promiscuous mode [ 435.449902][T21094] device veth0_vlan entered promiscuous mode [ 435.469639][T21050] device veth0_vlan entered promiscuous mode [ 435.479228][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 435.489964][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 435.508631][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 435.522197][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 435.534461][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 435.551815][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 435.579307][T21050] device veth1_macvtap entered promiscuous mode [ 435.590705][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 435.642446][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 435.652105][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 435.663892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 435.672297][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 435.800344][T21131] : port 1(dummy0) entered blocking state [ 435.834990][T21131] : port 1(dummy0) entered disabled state [ 435.894213][T21131] device dummy0 entered promiscuous mode [ 438.179216][T21214] device syzkaller0 entered promiscuous mode [ 438.213169][T21210] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.230367][T21210] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.238145][T21210] device bridge_slave_0 entered promiscuous mode [ 438.329956][T21210] bridge0: port 2(bridge_slave_1) entered blocking state [ 438.337127][T21210] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.344890][T21210] device bridge_slave_1 entered promiscuous mode [ 438.478413][ T112] device bridge_slave_1 left promiscuous mode [ 438.494827][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.610582][ T112] device bridge_slave_0 left promiscuous mode [ 438.622938][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.690758][ T112] device veth1_macvtap left promiscuous mode [ 438.777743][ T112] device veth0_vlan left promiscuous mode [ 439.875666][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 439.990452][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 440.121694][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 440.170708][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.223782][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.231029][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.249619][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 440.269885][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.290131][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.297201][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.312043][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 440.371661][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 440.386360][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 440.466989][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 440.486630][T21210] device veth0_vlan entered promiscuous mode [ 440.494769][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 440.512502][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 440.547325][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 440.619191][T21210] device veth1_macvtap entered promiscuous mode [ 440.682941][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 440.775605][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 440.791701][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 440.800294][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 440.809393][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 441.180132][T21309] device macsec0 entered promiscuous mode [ 441.186578][T21307] tap0: tun_chr_ioctl cmd 1074025692 [ 441.821603][T21348] device syzkaller0 entered promiscuous mode [ 442.239277][T21336] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.246446][T21336] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.272052][T21336] device bridge_slave_0 entered promiscuous mode [ 442.278959][T21336] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.291380][T21336] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.299008][T21336] device bridge_slave_1 entered promiscuous mode [ 442.570370][T21336] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.577580][T21336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.584877][T21336] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.591917][T21336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.108499][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.115783][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.169513][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 443.177073][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 443.187426][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 443.195960][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 443.204526][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.211563][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.224276][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 443.238876][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 443.256875][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.263949][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.333034][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 443.344734][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 443.354704][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 443.365290][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 443.374597][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 443.383690][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 443.403589][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 443.411588][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.444588][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 443.459863][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 443.517418][T21336] device veth0_vlan entered promiscuous mode [ 443.582397][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 443.600794][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 443.623271][T21336] device veth1_macvtap entered promiscuous mode [ 443.650119][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 443.665216][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 443.706925][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 443.731827][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 443.752004][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 446.064239][ T112] device vlan1 left promiscuous mode [ 446.069654][ T112] : port 1(vlan1) entered disabled state [ 446.077830][ T112] device bridge_slave_1 left promiscuous mode [ 446.084499][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.092626][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.555076][T21560] device syzkaller0 entered promiscuous mode [ 447.164090][T21578] device syzkaller0 entered promiscuous mode [ 447.172998][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 448.152247][T21620] syz.2.6064[21620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.152401][T21620] syz.2.6064[21620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.226900][T21727] device syzkaller0 entered promiscuous mode [ 453.401668][T21834] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 453.513341][T21837] @: renamed from bond_slave_0 [ 454.882236][T21879] syzkaller1: tun_chr_ioctl cmd 21731 [ 454.888134][T21879] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 455.070914][T21899] device pim6reg1 entered promiscuous mode [ 456.124835][T21951] device syzkaller0 entered promiscuous mode [ 459.465880][T22134] device wg2 entered promiscuous mode [ 462.914688][T22276] device syzkaller0 entered promiscuous mode [ 463.220983][T22290] syz.3.6259[22290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.221432][T22290] syz.3.6259[22290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.248855][T22295] device syzkaller0 entered promiscuous mode [ 464.441740][T22353] -: renamed from syzkaller0 [ 464.493000][T22360] device syzkaller0 entered promiscuous mode [ 465.520620][T22442] device wg2 left promiscuous mode [ 466.671874][T22535] device syzkaller0 entered promiscuous mode [ 467.345366][T22602] device veth1_macvtap left promiscuous mode [ 468.467474][T22641] device syzkaller0 entered promiscuous mode [ 470.970882][T22785] device syzkaller0 entered promiscuous mode [ 471.038443][T22789] device syzkaller0 entered promiscuous mode [ 471.227070][T22797] device aaaaaaaaaaaaaaa entered promiscuous mode [ 471.290762][T22806] device syzkaller0 entered promiscuous mode [ 471.816664][T22843] device syzkaller0 entered promiscuous mode [ 474.642659][T23010] device syzkaller0 entered promiscuous mode [ 475.513781][T23042] device syzkaller0 entered promiscuous mode [ 477.097626][T23112] device syzkaller0 entered promiscuous mode [ 478.098906][T23165] device syzkaller0 entered promiscuous mode [ 478.203344][T23171] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 478.211401][T23171] device syzkaller0 entered promiscuous mode [ 478.575685][T23197] device pimreg0 entered promiscuous mode [ 478.827742][T23227] device syzkaller0 entered promiscuous mode [ 480.611702][T23272] -: renamed from syzkaller0 [ 482.589411][T23342] device syzkaller0 entered promiscuous mode [ 482.726590][T23357] batadv0: tun_chr_ioctl cmd 1074025684 [ 482.755156][T23357] batadv0: tun_chr_ioctl cmd 1074025692 [ 482.762501][T23357] batadv0: tun_chr_ioctl cmd 35106 [ 482.908734][T23370] device syzkaller0 entered promiscuous mode [ 483.640853][T23422] device syzkaller0 entered promiscuous mode [ 484.363309][T23482] device syzkaller0 entered promiscuous mode [ 485.778296][T23532] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.785634][T23532] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.942963][T23539] device bond_slave_1 entered promiscuous mode [ 485.949723][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 485.960948][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 486.187485][T23560] device syzkaller0 entered promiscuous mode [ 487.815969][T23692] device syzkaller0 entered promiscuous mode [ 487.999757][T23700] device bridge_slave_1 left promiscuous mode [ 488.015893][T23700] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.050862][T23700] device bridge_slave_0 left promiscuous mode [ 488.060002][T23700] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.167760][T23725] device syzkaller0 entered promiscuous mode [ 488.178695][T23729] device syzkaller0 entered promiscuous mode [ 489.310782][T23801] device syzkaller0 entered promiscuous mode [ 492.135720][T23917] device syzkaller0 entered promiscuous mode [ 493.064573][T23973] device syzkaller0 entered promiscuous mode [ 493.308248][T24007] device syzkaller0 entered promiscuous mode [ 493.365536][T24021] device pim6reg1 entered promiscuous mode [ 494.560398][ T24] audit: type=1400 audit(1771791618.459:180): avc: denied { create } for pid=24083 comm="syz.3.6776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 495.942546][T24172] GPL: port 1(erspan0) entered blocking state [ 495.959596][T24172] GPL: port 1(erspan0) entered disabled state [ 495.981694][T24172] device erspan0 entered promiscuous mode [ 496.032041][T24174] GPL: port 1(erspan0) entered blocking state [ 496.038125][T24174] GPL: port 1(erspan0) entered forwarding state [ 496.465187][T24194] device pim6reg1 entered promiscuous mode [ 496.934714][T24219] device syzkaller0 entered promiscuous mode [ 496.974194][T24221] device pim6reg1 entered promiscuous mode [ 498.178023][T24272] device syzkaller0 entered promiscuous mode [ 498.186034][T24285] sit0: mtu greater than device maximum [ 498.267291][T24292] 7B: renamed from syzkaller0 [ 498.426994][T24317] device syzkaller0 entered promiscuous mode [ 499.631698][T24379] device syzkaller0 entered promiscuous mode [ 501.884101][T24500] syz.2.6889[24500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.884158][T24500] syz.2.6889[24500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 502.124296][T24529] syz.3.6896[24529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 502.185665][T24529] syz.3.6896[24529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.050862][T24553] device syzkaller0 entered promiscuous mode [ 503.430968][T24579] device wg2 entered promiscuous mode [ 504.797490][T24652] tap0: tun_chr_ioctl cmd 1074025677 [ 504.811469][T24652] tap0: linktype set to 780 [ 505.027852][T24689] device syzkaller0 entered promiscuous mode [ 505.245374][T24708] -1: renamed from syzkaller0 [ 505.943378][T24756] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 506.236222][T24772] syz.0.6970[24772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.236310][T24772] syz.0.6970[24772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.525085][T24835] nr0: port 1(macsec0) entered blocking state [ 507.545446][T24835] nr0: port 1(macsec0) entered disabled state [ 507.552166][T24835] device macsec0 entered promiscuous mode [ 507.711889][T24858] : renamed from bond_slave_0 [ 508.460198][T24930] device syzkaller0 entered promiscuous mode [ 508.739679][T24952] batadv0: tun_chr_ioctl cmd 1074025684 [ 510.222975][T25045] device syzkaller0 entered promiscuous mode [ 510.240857][T25048] device syzkaller0 entered promiscuous mode [ 510.322291][T25060] @: renamed from bond_slave_0 [ 510.682399][T25106] device syzkaller0 entered promiscuous mode [ 510.709441][T25106] syzkaller0: create flow: hash 1033588551 index 2 [ 510.727194][T25106] syzkaller0: delete flow: hash 1033588551 index 2 [ 514.587513][T25293] device syzkaller0 entered promiscuous mode [ 514.653889][T25304] pimreg1: tun_chr_ioctl cmd 1074025692 [ 515.134891][T25319] device wg2 entered promiscuous mode [ 515.758998][T25369] device syzkaller0 entered promiscuous mode [ 516.091376][T25383] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 516.800648][T25401] device syzkaller0 entered promiscuous mode [ 517.842045][T25446] device wg2 entered promiscuous mode [ 519.809442][T25594] device syzkaller0 entered promiscuous mode [ 521.204638][T25676] device syzkaller0 entered promiscuous mode [ 521.743302][T25687] device syzkaller0 entered promiscuous mode [ 521.954167][T25680] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 522.054256][T25680] device syzkaller0 entered promiscuous mode [ 522.402047][T25697] device syzkaller0 entered promiscuous mode [ 522.581736][T25698] bridge0: port 2(bridge_slave_1) entered disabled state [ 522.588942][T25698] bridge0: port 1(bridge_slave_0) entered disabled state [ 522.682664][T25713] device pim6reg1 entered promiscuous mode [ 523.257507][T25743] device bridge_slave_1 left promiscuous mode [ 523.370588][T25743] bridge0: port 2(bridge_slave_1) entered disabled state [ 523.455937][T25743] device bridge_slave_0 left promiscuous mode [ 523.534262][T25743] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.386747][T25856] syz.2.7282[25856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.386854][T25856] syz.2.7282[25856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.441126][T25862] device syzkaller0 entered promiscuous mode [ 527.610856][T25885] syz.3.7293[25885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.610908][T25885] syz.3.7293[25885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.251234][T25963] device syzkaller0 entered promiscuous mode [ 529.401900][T26034] bridge0: port 1(bridge_slave_0) entered blocking state [ 529.421591][T26034] bridge0: port 1(bridge_slave_0) entered disabled state [ 529.428876][T26034] device bridge_slave_0 entered promiscuous mode [ 530.243761][T26034] bridge0: port 2(bridge_slave_1) entered blocking state [ 530.251240][T26034] bridge0: port 2(bridge_slave_1) entered disabled state [ 530.260136][T26034] device bridge_slave_1 entered promiscuous mode [ 530.407864][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 530.415751][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 530.433070][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 530.441871][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 530.450084][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 530.457230][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 530.465290][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 530.474216][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 530.485365][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 530.492450][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 530.500183][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 530.509929][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 530.525726][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 530.545056][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 530.568203][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 530.576736][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 530.584435][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 530.597141][T26034] device veth0_vlan entered promiscuous mode [ 530.606536][T26091] : renamed from pim6reg1 [ 530.659584][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 530.679114][T26034] device veth1_macvtap entered promiscuous mode [ 530.689913][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 530.718269][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 531.223002][T26133] bridge0: port 3(veth1) entered blocking state [ 531.229366][T26133] bridge0: port 3(veth1) entered disabled state [ 531.261930][T26133] device veth1 entered promiscuous mode [ 531.267616][T26133] bridge0: port 3(veth1) entered blocking state [ 531.273973][T26133] bridge0: port 3(veth1) entered forwarding state [ 531.521721][T26138] device wg2 left promiscuous mode [ 531.571678][T26144] device wg2 entered promiscuous mode [ 531.836052][T26131] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.843223][T26131] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.850560][T26131] device bridge_slave_0 entered promiscuous mode [ 531.857538][T26131] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.865038][T26131] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.872665][T26131] device bridge_slave_1 entered promiscuous mode [ 531.992736][T26131] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.999912][T26131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 532.007188][T26131] bridge0: port 1(bridge_slave_0) entered blocking state [ 532.014209][T26131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 532.051889][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 532.059170][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 532.128349][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 532.137179][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 532.155304][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 532.164463][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 532.172875][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 532.179924][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 532.187658][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 532.211956][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 532.221691][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 532.228713][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 532.253450][T26172] geneve1: tun_chr_ioctl cmd 1074025672 [ 532.259008][T26172] geneve1: ignored: set checksum enabled [ 532.294741][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 532.329786][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 532.338414][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 532.346710][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 532.382101][T26172] geneve1: tun_chr_ioctl cmd 21731 [ 532.398042][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 532.424118][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 532.444803][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 532.452936][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 532.460983][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 532.468807][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 532.476976][T26131] device veth0_vlan entered promiscuous mode [ 532.490605][ T651] device macsec0 left promiscuous mode [ 532.497994][ T651] nr0: port 1(macsec0) entered disabled state [ 532.526121][ T651] device veth1_macvtap left promiscuous mode [ 532.532798][ T651] device veth0_vlan left promiscuous mode [ 532.594771][ T24] audit: type=1400 audit(1771791656.499:181): avc: denied { create } for pid=26189 comm="syz.2.7379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 532.663158][T26188] device veth1_macvtap entered promiscuous mode [ 532.669887][T26188] device macsec0 entered promiscuous mode [ 532.684011][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 532.705048][T26131] device veth1_macvtap entered promiscuous mode [ 532.717610][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 532.726331][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 532.735946][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 532.766874][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 532.778968][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 532.789294][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 532.798263][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 532.817369][T26203] pimreg1: tun_chr_ioctl cmd 1074025692 [ 532.981546][T26204] device dummy0 entered promiscuous mode [ 534.244120][ T651] device veth1_macvtap left promiscuous mode [ 535.793989][T26371] device wg2 entered promiscuous mode [ 536.044874][T26387] device syzkaller0 entered promiscuous mode [ 538.178918][T26505] device syzkaller0 entered promiscuous mode [ 539.059610][T26528] device syzkaller0 entered promiscuous mode [ 539.683646][T26553] device wg2 entered promiscuous mode [ 541.051922][T26608] device wg2 left promiscuous mode [ 541.088774][T26608] device wg2 entered promiscuous mode [ 541.506611][T26650] tap0: tun_chr_ioctl cmd 1074025677 [ 541.570631][T26650] tap0: linktype set to 519 [ 543.517006][T26760] device sit0 entered promiscuous mode [ 543.773528][T26772] syz.1.7548[26772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.782558][T26772] syz.1.7548[26772] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 544.282067][T26790] device dummy0 entered promiscuous mode [ 545.401588][T26890] device syzkaller0 entered promiscuous mode [ 545.574749][T26912] device syzkaller0 entered promiscuous mode [ 545.585193][T26912] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 546.525466][T26948] bridge0: port 3(veth1) entered disabled state [ 547.606864][T27006] IPv6: GPL: Disabled Multicast RS [ 548.672255][T27031] : renamed from team_slave_1 [ 548.727606][T27048] device syzkaller0 entered promiscuous mode [ 550.387099][T27116] device sit0 left promiscuous mode [ 550.424318][T27116] device sit0 entered promiscuous mode [ 551.835112][T27190] device syzkaller0 entered promiscuous mode [ 552.047284][T27204] device syzkaller0 entered promiscuous mode [ 552.394405][T27229] nr0: port 1(macsec0) entered blocking state [ 552.400504][T27229] nr0: port 1(macsec0) entered disabled state [ 552.407660][T27229] device macsec0 entered promiscuous mode [ 552.716899][T27253] device wg2 left promiscuous mode [ 553.079395][T27275] device pim6reg1 entered promiscuous mode [ 554.038756][T27291] device syzkaller0 entered promiscuous mode [ 555.157070][T27337] tap0: tun_chr_ioctl cmd 1074025675 [ 555.162625][T27337] tap0: persist enabled [ 555.175439][T27337] tap0: tun_chr_ioctl cmd 1074025675 [ 555.180817][T27337] tap0: persist enabled [ 555.214955][T27337] tap0: tun_chr_ioctl cmd 2148553947 [ 556.020195][T27393] device syzkaller0 entered promiscuous mode [ 556.775168][T27440] syz.0.7751[27440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 556.775285][T27440] syz.0.7751[27440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.456599][T27491] device syzkaller0 entered promiscuous mode [ 557.907184][T27508] : port 1(vlan1) entered blocking state [ 557.982602][T27508] : port 1(vlan1) entered disabled state [ 558.047035][T27508] device vlan1 entered promiscuous mode [ 558.533624][T27538] device syzkaller0 entered promiscuous mode [ 558.567663][T27547] device syzkaller0 entered promiscuous mode [ 558.672313][T27567] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 558.678551][T27566] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 558.702910][T27566] syzkaller0: persist disabled [ 559.548617][T27618] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 559.714630][T27636] device pim6reg1 entered promiscuous mode [ 562.027414][T27801] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.037026][T27801] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.222451][T27799] device veth0_vlan left promiscuous mode [ 562.254254][T27799] device veth0_vlan entered promiscuous mode [ 563.538867][T27883] device syzkaller0 entered promiscuous mode [ 565.053684][T28013] device pim6reg1 entered promiscuous mode [ 565.925817][T28072] device syzkaller0 entered promiscuous mode [ 566.032873][T28082] device syzkaller0 entered promiscuous mode [ 566.134347][T28095] nr0: port 1(macsec0) entered blocking state [ 566.161559][T28095] nr0: port 1(macsec0) entered disabled state [ 566.168236][T28095] device macsec0 entered promiscuous mode [ 566.188044][T28101] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 566.206247][T28101] device syzkaller0 entered promiscuous mode [ 566.313424][T28103] device syzkaller0 entered promiscuous mode [ 569.188546][T28257] device syzkaller0 entered promiscuous mode [ 576.843429][T28567] device syzkaller0 entered promiscuous mode [ 578.878549][T28675] device wg2 left promiscuous mode [ 579.033930][T28682] device wg2 entered promiscuous mode [ 579.417608][T28736] device syzkaller0 entered promiscuous mode [ 579.657250][T28756] device syzkaller0 entered promiscuous mode [ 579.705999][T28761] geneve1: tun_chr_ioctl cmd 1074025672 [ 579.712551][T28761] geneve1: ignored: set checksum enabled [ 582.138669][T28935] device syzkaller0 entered promiscuous mode [ 583.662004][T29008] device bond_slave_1 entered promiscuous mode [ 583.758934][T29002] device syzkaller0 entered promiscuous mode [ 583.882304][T28993] : port 1(vlan1) entered blocking state [ 583.908723][T28993] : port 1(vlan1) entered disabled state [ 584.025090][T28993] device vlan1 entered promiscuous mode [ 584.300472][T29033] device syzkaller0 entered promiscuous mode [ 584.831445][T29061] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.838728][T29061] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.944896][T29063] device syzkaller0 entered promiscuous mode [ 587.031741][T29171] device wg2 left promiscuous mode [ 587.344080][T29196] device syzkaller0 entered promiscuous mode [ 588.820528][T29258] device syzkaller0 entered promiscuous mode [ 589.328476][T29290] 0: renamed from pim6reg1 [ 589.787028][T29326] bY4`Ҙ: renamed from lo [ 590.805411][T29372] @0: renamed from bond_slave_1 [ 591.010315][T29389] device syzkaller0 entered promiscuous mode [ 591.689658][T29404] device wg2 left promiscuous mode [ 591.761874][T29405] device wg2 entered promiscuous mode [ 592.988676][T29494] device sit0 left promiscuous mode [ 593.065418][T29502] syz.1.8343[29502] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.065496][T29502] syz.1.8343[29502] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.466436][T29531] device syzkaller0 entered promiscuous mode [ 593.505344][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 593.810966][T29555] device syzkaller0 entered promiscuous mode [ 594.466547][T29577] device syzkaller0 entered promiscuous mode [ 595.483621][T29655] device veth1 left promiscuous mode [ 595.500987][T29655] bridge0: port 3(veth1) entered disabled state [ 595.509997][T29655] device bridge_slave_1 left promiscuous mode [ 595.516483][T29655] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.547952][T29655] device bridge_slave_0 left promiscuous mode [ 595.561008][T29655] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.864500][T29670] device syzkaller0 entered promiscuous mode [ 596.219598][T29737] device syzkaller0 entered promiscuous mode [ 597.418209][T29780] device syzkaller0 entered promiscuous mode [ 599.385994][T29849] device syzkaller0 entered promiscuous mode [ 601.716182][T29951] device syzkaller0 entered promiscuous mode [ 604.848022][T30083] device syzkaller0 entered promiscuous mode [ 607.358437][T30184] 7B: renamed from syzkaller0 [ 607.743540][T30215] syz.2.8548[30215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 607.743632][T30215] syz.2.8548[30215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 608.718122][T30277] tap0: tun_chr_ioctl cmd 1074025675 [ 608.739362][T30277] tap0: persist enabled [ 608.805346][T30272] tap0: tun_chr_ioctl cmd 1074025675 [ 608.811014][T30272] tap0: persist enabled [ 611.802416][T30407] device syzkaller0 entered promiscuous mode [ 611.937250][T30413] device syzkaller0 entered promiscuous mode [ 611.949784][T30413] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 614.083191][T30547] syz.0.8647[30547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 614.880145][T30582] device syzkaller0 entered promiscuous mode [ 615.001918][T30576] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.009051][T30576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 615.016345][T30576] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.023391][T30576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.132971][T30576] device bridge0 entered promiscuous mode [ 615.146086][T24991] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 616.637737][T30655] device syzkaller0 entered promiscuous mode [ 616.654126][T30663] syzkaller0: create flow: hash 2099548872 index 0 [ 616.714971][ T4487] syzkaller0: tun_net_xmit 48 [ 616.772967][T30655] syzkaller0 (unregistered): delete flow: hash 2099548872 index 0 [ 620.371221][T30784] device syzkaller0 entered promiscuous mode [ 620.464358][ T3838] syzkaller0: tun_net_xmit 48 [ 621.187646][T30817] device syzkaller0 entered promiscuous mode [ 621.414847][T30845] device syzkaller0 entered promiscuous mode [ 622.760219][T30941] device wg2 left promiscuous mode [ 623.445558][T30965] device syzkaller0 entered promiscuous mode [ 623.715317][T30971] device syzkaller0 entered promiscuous mode [ 625.010418][T31018] device pim6reg1 entered promiscuous mode [ 626.330072][T31074] device syzkaller0 entered promiscuous mode [ 627.406586][T31136] syz.3.8816[31136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.937424][ T24] audit: type=1400 audit(1771791754.839:182): avc: denied { create } for pid=31336 comm="syz.1.8878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 632.444025][T31421] device syzkaller0 entered promiscuous mode [ 632.930337][T31465] sock: sock_set_timeout: `syz.4.8911' (pid 31465) tries to set negative timeout [ 635.800741][T31612] bridge0: port 2(bridge_slave_1) entered disabled state [ 635.807870][T31612] bridge0: port 1(bridge_slave_0) entered disabled state [ 635.905419][T31612] device bridge0 left promiscuous mode [ 636.324925][T31644] device syzkaller0 entered promiscuous mode [ 637.254268][T31707] batadv0: tun_chr_ioctl cmd 1074812118 [ 638.684568][T31784] tap0: tun_chr_ioctl cmd 1074025675 [ 638.697531][T31784] tap0: persist enabled [ 639.983240][T31862] device sit0 entered promiscuous mode [ 640.299813][T31896] device syzkaller0 entered promiscuous mode [ 641.091897][T31920] bridge0: port 1(bridge_slave_0) entered blocking state [ 641.108780][T31920] bridge0: port 1(bridge_slave_0) entered disabled state [ 641.133260][T31920] device bridge_slave_0 entered promiscuous mode [ 641.167469][T31920] bridge0: port 2(bridge_slave_1) entered blocking state [ 641.178020][T31920] bridge0: port 2(bridge_slave_1) entered disabled state [ 641.202766][T31920] device bridge_slave_1 entered promiscuous mode [ 641.531089][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 641.548826][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 641.581508][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 641.603073][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 641.612397][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 641.619465][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 641.640535][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 641.666017][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 641.685933][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 641.693196][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 641.759946][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 641.773805][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 641.791854][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 641.809763][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 641.830351][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 641.855598][T31920] device veth0_vlan entered promiscuous mode [ 641.885805][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 641.897596][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 641.922112][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 641.940236][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 641.986762][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 642.020885][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 642.050687][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 642.078693][T31920] device veth1_macvtap entered promiscuous mode [ 642.115270][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 642.131302][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 642.213381][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 642.226249][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 642.439105][T31978] device syzkaller0 entered promiscuous mode [ 642.472135][ T651] GPL: port 1(erspan0) entered disabled state [ 642.501105][ T651] device erspan0 left promiscuous mode [ 642.615446][ T651] GPL: port 1(erspan0) entered disabled state [ 642.809903][T32018] device syzkaller0 entered promiscuous mode [ 642.870529][ T651] device dummy0 left promiscuous mode [ 642.879706][ T651] : port 1(dummy0) entered disabled state [ 642.927221][ T651] device veth1_macvtap left promiscuous mode [ 643.230021][T32033] device syzkaller0 entered promiscuous mode [ 644.091433][T32073] device veth1_macvtap left promiscuous mode [ 644.801524][T21336] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 644.870194][T21336] CPU: 0 PID: 21336 Comm: syz-executor Tainted: G W syzkaller #0 [ 644.879311][T21336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 644.889364][T21336] Call Trace: [ 644.892669][T21336] __dump_stack+0x21/0x24 [ 644.897003][T21336] dump_stack_lvl+0x1a7/0x208 [ 644.901691][T21336] ? show_regs_print_info+0x18/0x18 [ 644.906901][T21336] ? ___ratelimit+0x3de/0x560 [ 644.911575][T21336] ? __kasan_check_write+0x14/0x20 [ 644.916698][T21336] ? _raw_spin_lock+0x94/0xf0 [ 644.921379][T21336] dump_stack+0x15/0x1c [ 644.925533][T21336] dump_header+0xdd/0x650 [ 644.929862][T21336] oom_kill_process+0x1fa/0x2c0 [ 644.934719][T21336] out_of_memory+0x93f/0xd20 [ 644.939308][T21336] ? __irq_exit_rcu+0x40/0x150 [ 644.944207][T21336] ? unregister_oom_notifier+0x20/0x20 [ 644.950019][T21336] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 644.956202][T21336] ? mem_cgroup_oom_trylock+0x350/0x350 [ 644.961762][T21336] ? _raw_spin_trylock_bh+0x150/0x150 [ 644.967150][T21336] ? _raw_spin_unlock+0x4d/0x70 [ 644.972017][T21336] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 644.977677][T21336] try_charge+0xf69/0x1500 [ 644.982340][T21336] ? __memcg_kmem_charge+0x150/0x150 [ 644.987638][T21336] ? get_page_from_freelist+0x223b/0x23d0 [ 644.993365][T21336] ? _raw_spin_trylock+0xb7/0x150 [ 644.998394][T21336] ? read_pages+0x643/0xb60 [ 645.002964][T21336] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 645.008605][T21336] __mem_cgroup_charge+0x14c/0x6d0 [ 645.013728][T21336] __add_to_page_cache_locked+0x1fe/0x9a0 [ 645.019633][T21336] ? __alloc_pages_nodemask+0x290/0x620 [ 645.025367][T21336] ? put_page+0xd0/0xd0 [ 645.029798][T21336] ? workingset_activation+0x250/0x250 [ 645.035261][T21336] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 645.040816][T21336] ? find_get_entry+0x37b/0x3e0 [ 645.045673][T21336] ? page_cache_prev_miss+0x210/0x290 [ 645.051490][T21336] add_to_page_cache_lru+0xa7/0x210 [ 645.056970][T21336] pagecache_get_page+0x700/0x930 [ 645.062084][T21336] filemap_fault+0x1b51/0x20d0 [ 645.066859][T21336] ? generic_file_read_iter+0x5c0/0x5c0 [ 645.072691][T21336] ? wait_consider_task+0x1af1/0x27d0 [ 645.078064][T21336] ? filemap_allow_speculation+0x10/0x10 [ 645.083872][T21336] ? __kasan_check_write+0x14/0x20 [ 645.089070][T21336] ext4_filemap_fault+0x8a/0xa0 [ 645.093954][T21336] handle_pte_fault+0x1fa5/0x3750 [ 645.098978][T21336] handle_mm_fault+0xf81/0x1710 [ 645.103833][T21336] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 645.110445][T21336] ? can_reuse_spf_vma+0xe0/0xe0 [ 645.115389][T21336] ? __kasan_check_write+0x14/0x20 [ 645.120501][T21336] ? down_read_trylock+0x106/0x160 [ 645.125692][T21336] ? __init_rwsem+0x1c0/0x1c0 [ 645.130355][T21336] ? find_vma+0x30/0x150 [ 645.134584][T21336] do_user_addr_fault+0x5a8/0xc90 [ 645.139587][T21336] ? do_kern_addr_fault+0x80/0x80 [ 645.144588][T21336] ? debug_smp_processor_id+0x17/0x20 [ 645.150018][T21336] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 645.156056][T21336] exc_page_fault+0x5a/0xc0 [ 645.160539][T21336] ? asm_exc_page_fault+0x8/0x30 [ 645.165453][T21336] asm_exc_page_fault+0x1e/0x30 [ 645.170282][T21336] RIP: 0033:0x7f7ea22726b4 [ 645.174687][T21336] Code: 85 62 0a 00 00 48 b8 db 34 b6 d7 82 de 1b 43 48 f7 a4 24 98 00 00 00 48 8b 05 00 b1 ed 00 48 69 8c 24 90 00 00 00 e8 03 00 00 <8b> 78 08 48 8b 44 24 18 48 c1 ea 12 4c 8b 0d f9 af ed 00 48 01 d1 [ 645.194264][T21336] RSP: 002b:00007ffd07a512f0 EFLAGS: 00010206 [ 645.200306][T21336] RAX: 0000001b30e24000 RBX: 0000000000000816 RCX: 000000000009d3a0 [ 645.208258][T21336] RDX: 000000000bf5afc4 RSI: 00007ffd07a51380 RDI: 000000002d9f684f [ 645.216235][T21336] RBP: 00007ffd07a5132c R08: 0000000000000284 R09: 002cd3fa5e5378e0 [ 645.224183][T21336] R10: 0000014b701d1ab0 R11: 000000000001eb56 R12: 0000000000001388 [ 645.232125][T21336] R13: 00000000000927c0 R14: 000000000009d59f R15: 00007ffd07a51380 [ 645.250149][T21336] memory: usage 307200kB, limit 307200kB, failcnt 10532 [ 645.257210][T21336] memory+swap: usage 424736kB, limit 9007199254740988kB, failcnt 0 [ 645.266002][T21336] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 645.277332][T21336] Memory cgroup stats for /syz2: [ 645.277686][T21336] anon 405504 [ 645.277686][T21336] file 306561024 [ 645.277686][T21336] kernel_stack 0 [ 645.277686][T21336] percpu 0 [ 645.277686][T21336] sock 0 [ 645.277686][T21336] shmem 306561024 [ 645.277686][T21336] file_mapped 135168 [ 645.277686][T21336] file_dirty 0 [ 645.277686][T21336] file_writeback 0 [ 645.277686][T21336] anon_thp 0 [ 645.277686][T21336] inactive_anon 313966592 [ 645.277686][T21336] active_anon 405504 [ 645.277686][T21336] inactive_file 49152 [ 645.277686][T21336] active_file 77824 [ 645.277686][T21336] unevictable 0 [ 645.277686][T21336] slab_reclaimable 0 [ 645.277686][T21336] slab_unreclaimable 0 [ 645.277686][T21336] slab 0 [ 645.277686][T21336] workingset_refault_anon 0 [ 645.277686][T21336] workingset_refault_file 0 [ 645.277686][T21336] workingset_activate_anon 0 [ 645.277686][T21336] workingset_activate_file 0 [ 645.277686][T21336] workingset_restore_anon 0 [ 645.277686][T21336] workingset_restore_file 0 [ 645.371068][T21336] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.9008,pid=31789,uid=0 [ 645.395704][T21336] Memory cgroup out of memory: Killed process 31789 (syz.2.9008) total-vm:90308kB, anon-rss:1260kB, file-rss:53508kB, shmem-rss:0kB, UID:0 pgtables:200kB oom_score_adj:1000 [ 645.454294][T32142] device syzkaller0 entered promiscuous mode [ 645.513584][T31814] syz.2.9008 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 645.531778][T31814] CPU: 0 PID: 31814 Comm: syz.2.9008 Tainted: G W syzkaller #0 [ 645.540636][T31814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 645.550679][T31814] Call Trace: [ 645.553948][T31814] __dump_stack+0x21/0x24 [ 645.558246][T31814] dump_stack_lvl+0x1a7/0x208 [ 645.562909][T31814] ? show_regs_print_info+0x18/0x18 [ 645.568102][T31814] ? ___ratelimit+0x3de/0x560 [ 645.572766][T31814] ? __kasan_check_write+0x14/0x20 [ 645.577859][T31814] ? _raw_spin_lock+0x94/0xf0 [ 645.582530][T31814] dump_stack+0x15/0x1c [ 645.586673][T31814] dump_header+0xdd/0x650 [ 645.590990][T31814] oom_kill_process+0x1fa/0x2c0 [ 645.595831][T31814] out_of_memory+0x93f/0xd20 [ 645.600420][T31814] ? unregister_oom_notifier+0x20/0x20 [ 645.605871][T31814] ? mutex_lock_killable+0xdf/0xf0 [ 645.610980][T31814] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 645.617478][T31814] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 645.623107][T31814] ? mem_cgroup_oom_trylock+0x350/0x350 [ 645.628658][T31814] ? _raw_spin_trylock_bh+0x150/0x150 [ 645.634031][T31814] ? _raw_spin_unlock+0x4d/0x70 [ 645.638882][T31814] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 645.644423][T31814] try_charge+0xf69/0x1500 [ 645.648840][T31814] ? __memcg_kmem_charge+0x150/0x150 [ 645.654115][T31814] ? percpu_counter_add_batch+0x13c/0x160 [ 645.659917][T31814] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 645.665459][T31814] __mem_cgroup_charge+0x14c/0x6d0 [ 645.670560][T31814] shmem_add_to_page_cache+0x574/0xe30 [ 645.676010][T31814] ? shmem_alloc_page+0x380/0x380 [ 645.681017][T31814] ? _raw_spin_lock_irqsave+0x130/0x130 [ 645.686546][T31814] ? find_lock_entry+0x4b/0x200 [ 645.691381][T31814] shmem_getpage_gfp+0x8eb/0x2120 [ 645.696564][T31814] shmem_write_begin+0xce/0x1b0 [ 645.701431][T31814] generic_perform_write+0x2ce/0x540 [ 645.706694][T31814] ? atime_needs_update+0x5b0/0x5b0 [ 645.711878][T31814] ? grab_cache_page_write_begin+0xb0/0xb0 [ 645.717751][T31814] ? file_remove_privs+0x5b0/0x5b0 [ 645.722833][T31814] ? __kasan_check_write+0x14/0x20 [ 645.727915][T31814] ? down_write+0xb2/0x120 [ 645.732305][T31814] __generic_file_write_iter+0x24b/0x480 [ 645.737919][T31814] ? generic_write_checks+0x3d4/0x480 [ 645.743353][T31814] generic_file_write_iter+0xa9/0x1d0 [ 645.748695][T31814] __kernel_write+0x535/0x910 [ 645.753374][T31814] ? vfs_read+0xa60/0xa60 [ 645.757680][T31814] ? populate_vma_page_range+0xf0/0xf0 [ 645.763130][T31814] ? cgroup_freezing+0x86/0xb0 [ 645.767884][T31814] ? freezing_slow_path+0x10a/0x150 [ 645.773060][T31814] dump_emit+0x246/0x370 [ 645.777284][T31814] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 645.782717][T31814] ? freezing_slow_path+0x10a/0x150 [ 645.787887][T31814] dump_user_range+0x6a/0x1a0 [ 645.792625][T31814] elf_core_dump+0x2866/0x2cc0 [ 645.797370][T31814] ? load_elf_binary+0x28e0/0x28e0 [ 645.802461][T31814] ? __fsnotify_parent+0x6db/0x7c0 [ 645.807556][T31814] ? do_truncate+0x1c6/0x240 [ 645.812132][T31814] ? putname+0xfe/0x150 [ 645.816266][T31814] ? __kasan_check_read+0x11/0x20 [ 645.821267][T31814] ? cgroup_freezing+0x86/0xb0 [ 645.826133][T31814] ? freezing_slow_path+0x10a/0x150 [ 645.831316][T31814] do_coredump+0x1ba3/0x28e0 [ 645.835889][T31814] ? simple_acl_create+0x1c0/0x1c0 [ 645.841013][T31814] ? debug_smp_processor_id+0x17/0x20 [ 645.846361][T31814] ? kmem_cache_free+0x100/0x2d0 [ 645.851274][T31814] ? ____kasan_slab_free+0x130/0x160 [ 645.856565][T31814] ? get_signal+0xb98/0x12e0 [ 645.861131][T31814] ? kmem_cache_free+0x100/0x2d0 [ 645.866051][T31814] get_signal+0xf23/0x12e0 [ 645.870798][T31814] arch_do_signal_or_restart+0xe2/0x11d0 [ 645.876532][T31814] ? send_signal+0x3b1/0x590 [ 645.881196][T31814] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 645.886811][T31814] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 645.892776][T31814] ? force_sig+0xca/0x120 [ 645.897092][T31814] ? send_sig+0x70/0x70 [ 645.901313][T31814] exit_to_user_mode_loop+0xa2/0xe0 [ 645.906490][T31814] exit_to_user_mode_prepare+0x76/0xa0 [ 645.911924][T31814] irqentry_exit_to_user_mode+0x9/0x10 [ 645.917441][T31814] irqentry_exit+0x12/0x60 [ 645.921830][T31814] exc_general_protection+0x1ca/0x250 [ 645.927172][T31814] ? debug_smp_processor_id+0x17/0x20 [ 645.932520][T31814] ? asm_exc_general_protection+0x8/0x30 [ 645.938132][T31814] asm_exc_general_protection+0x1e/0x30 [ 645.943667][T31814] RIP: 0033:0x7f7ea23a4631 [ 645.948058][T31814] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 645.967648][T31814] RSP: 002b:00002000000004e0 EFLAGS: 00010217 [ 645.973695][T31814] RAX: 0000000000000000 RBX: 00007f7ea261e090 RCX: 00007f7ea23a4629 [ 645.981650][T31814] RDX: 0000200000000500 RSI: 00002000000004e0 RDI: 0000000002040000 [ 645.989603][T31814] RBP: 00007f7ea243ab39 R08: 0000200000000580 R09: 0000200000000580 [ 645.997552][T31814] R10: 0000200000000540 R11: 0000000000000206 R12: 0000000000000000 [ 646.005498][T31814] R13: 00007f7ea261e128 R14: 00007f7ea261e090 R15: 00007ffd07a50f88 [ 646.071371][T31814] memory: usage 307188kB, limit 307200kB, failcnt 11495 [ 646.087746][T32147] sit0: mtu less than device minimum [ 646.149667][T32154] device syzkaller0 entered promiscuous mode [ 646.188276][T31814] memory+swap: usage 425688kB, limit 9007199254740988kB, failcnt 0 [ 646.361716][T31814] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 646.370133][T31814] Memory cgroup stats for /syz2: [ 646.375537][T31814] anon 270336 [ 646.375537][T31814] file 307372032 [ 646.375537][T31814] kernel_stack 0 [ 646.375537][T31814] percpu 0 [ 646.375537][T31814] sock 0 [ 646.375537][T31814] shmem 307507200 [ 646.375537][T31814] file_mapped 0 [ 646.375537][T31814] file_dirty 0 [ 646.375537][T31814] file_writeback 0 [ 646.375537][T31814] anon_thp 0 [ 646.375537][T31814] inactive_anon 312750080 [ 646.375537][T31814] active_anon 1622016 [ 646.375537][T31814] inactive_file 4096 [ 646.375537][T31814] active_file 73728 [ 646.375537][T31814] unevictable 0 [ 646.375537][T31814] slab_reclaimable 0 [ 646.375537][T31814] slab_unreclaimable 0 [ 646.375537][T31814] slab 0 [ 646.375537][T31814] workingset_refault_anon 0 [ 646.375537][T31814] workingset_refault_file 693 [ 646.375537][T31814] workingset_activate_anon 0 [ 646.375537][T31814] workingset_activate_file 165 [ 646.375537][T31814] workingset_restore_anon 0 [ 646.375537][T31814] workingset_restore_file 132 [ 646.621841][T31814] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.9008,pid=31785,uid=0 [ 646.801623][T31814] Memory cgroup out of memory: Killed process 31785 (syz.2.9008) total-vm:90308kB, anon-rss:1236kB, file-rss:49988kB, shmem-rss:0kB, UID:0 pgtables:200kB oom_score_adj:1000 [ 646.867467][T32157] syz.2.9109 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 646.880340][T32208] batadv0: tun_chr_ioctl cmd 1074025677 [ 646.886011][T32208] batadv0: linktype set to 823 [ 647.042638][T32157] CPU: 1 PID: 32157 Comm: syz.2.9109 Tainted: G W syzkaller #0 [ 647.051497][T32157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 647.061536][T32157] Call Trace: [ 647.064817][T32157] __dump_stack+0x21/0x24 [ 647.069134][T32157] dump_stack_lvl+0x1a7/0x208 [ 647.073795][T32157] ? show_regs_print_info+0x18/0x18 [ 647.079027][T32157] ? ___ratelimit+0x3de/0x560 [ 647.083689][T32157] ? __kasan_check_write+0x14/0x20 [ 647.088875][T32157] ? _raw_spin_lock+0x94/0xf0 [ 647.093551][T32157] dump_stack+0x15/0x1c [ 647.097712][T32157] dump_header+0xdd/0x650 [ 647.102038][T32157] oom_kill_process+0x1fa/0x2c0 [ 647.106877][T32157] out_of_memory+0x93f/0xd20 [ 647.111462][T32157] ? unregister_oom_notifier+0x20/0x20 [ 647.116920][T32157] ? mutex_lock_killable+0xdf/0xf0 [ 647.122128][T32157] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 647.128621][T32157] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 647.134160][T32157] ? mem_cgroup_oom_trylock+0x350/0x350 [ 647.139694][T32157] ? _raw_spin_trylock_bh+0x150/0x150 [ 647.145058][T32157] ? _raw_spin_unlock+0x4d/0x70 [ 647.149900][T32157] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 647.155445][T32157] try_charge+0xf69/0x1500 [ 647.159901][T32157] ? __memcg_kmem_charge+0x150/0x150 [ 647.165177][T32157] ? get_page_from_freelist+0x223b/0x23d0 [ 647.170891][T32157] ? _raw_spin_trylock+0xb7/0x150 [ 647.175990][T32157] ? read_pages+0x643/0xb60 [ 647.180491][T32157] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 647.186034][T32157] __mem_cgroup_charge+0x14c/0x6d0 [ 647.191137][T32157] __add_to_page_cache_locked+0x1fe/0x9a0 [ 647.196842][T32157] ? __alloc_pages_nodemask+0x290/0x620 [ 647.202392][T32157] ? put_page+0xd0/0xd0 [ 647.206540][T32157] ? workingset_activation+0x250/0x250 [ 647.211983][T32157] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 647.217515][T32157] ? find_get_entry+0x37b/0x3e0 [ 647.222353][T32157] ? page_cache_prev_miss+0x210/0x290 [ 647.227713][T32157] add_to_page_cache_lru+0xa7/0x210 [ 647.232897][T32157] pagecache_get_page+0x700/0x930 [ 647.237911][T32157] filemap_fault+0x1b51/0x20d0 [ 647.242663][T32157] ? generic_file_read_iter+0x5c0/0x5c0 [ 647.248288][T32157] ? hrtimer_cancel+0x2d/0x60 [ 647.252958][T32157] ? futex_wait+0x5b5/0x6f0 [ 647.257453][T32157] ? __kasan_check_write+0x14/0x20 [ 647.262554][T32157] ext4_filemap_fault+0x8a/0xa0 [ 647.267401][T32157] handle_pte_fault+0x13e3/0x3750 [ 647.272411][T32157] handle_mm_fault+0xf81/0x1710 [ 647.277249][T32157] ? can_reuse_spf_vma+0xe0/0xe0 [ 647.282186][T32157] ? __kasan_check_write+0x14/0x20 [ 647.287283][T32157] ? down_read_trylock+0x106/0x160 [ 647.292391][T32157] ? __kasan_check_write+0x14/0x20 [ 647.297485][T32157] ? can_reuse_spf_vma+0xc8/0xe0 [ 647.302407][T32157] do_user_addr_fault+0x5a8/0xc90 [ 647.307420][T32157] ? do_kern_addr_fault+0x80/0x80 [ 647.312429][T32157] ? __kasan_check_read+0x11/0x20 [ 647.317436][T32157] exc_page_fault+0x5a/0xc0 [ 647.321931][T32157] ? asm_exc_page_fault+0x8/0x30 [ 647.326874][T32157] asm_exc_page_fault+0x1e/0x30 [ 647.331710][T32157] RIP: 0033:0x7f7ea2278e20 [ 647.336109][T32157] Code: 89 dc 41 83 e4 03 0f 85 ca 01 00 00 4c 89 ff be 04 00 00 00 e8 81 94 fe ff 49 8b 47 40 41 83 47 30 04 48 8d 50 fc 49 89 57 40 <89> 68 fc 41 8b 47 30 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f c3 [ 647.355703][T32157] RSP: 002b:00007ffd07a50fd0 EFLAGS: 00010206 [ 647.361762][T32157] RAX: 0000001b31223f90 RBX: ffffffffffffff90 RCX: ffffffff8128d1da [ 647.369724][T32157] RDX: 0000001b31223f8c RSI: 0000000000000004 RDI: 00007f7ea314d720 [ 647.377769][T32157] RBP: 0000000000000000 R08: 00007f7ea2608000 R09: 00007f7ea260a000 [ 647.385740][T32157] R10: 000000008128d1de R11: 0000000000000005 R12: 0000000000000000 [ 647.393703][T32157] R13: 00000000000019d7 R14: ffffffff8128d9e1 R15: 00007f7ea314d720 [ 647.401671][T32157] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 647.407736][T32157] ? fpu__drop+0x11a/0x230 [ 647.641373][T32157] memory: usage 306348kB, limit 307200kB, failcnt 13041 [ 647.749480][T32157] memory+swap: usage 405816kB, limit 9007199254740988kB, failcnt 0 [ 647.936547][T32227] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 647.957915][T32157] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 647.967997][T32157] Memory cgroup stats for /syz2: [ 647.968117][T32157] anon 270336 [ 647.968117][T32157] file 286691328 [ 647.968117][T32157] kernel_stack 0 [ 647.968117][T32157] percpu 0 [ 647.968117][T32157] sock 0 [ 647.968117][T32157] shmem 286691328 [ 647.968117][T32157] file_mapped 0 [ 647.968117][T32157] file_dirty 0 [ 647.968117][T32157] file_writeback 0 [ 647.968117][T32157] anon_thp 0 [ 647.968117][T32157] inactive_anon 290988032 [ 647.968117][T32157] active_anon 946176 [ 647.968117][T32157] inactive_file 81920 [ 647.968117][T32157] active_file 0 [ 647.968117][T32157] unevictable 0 [ 647.968117][T32157] slab_reclaimable 0 [ 647.968117][T32157] slab_unreclaimable 0 [ 647.968117][T32157] slab 0 [ 647.968117][T32157] workingset_refault_anon 0 [ 647.968117][T32157] workingset_refault_file 1320 [ 647.968117][T32157] workingset_activate_anon 0 [ 647.968117][T32157] workingset_activate_file 165 [ 647.968117][T32157] workingset_restore_anon 0 [ 647.968117][T32157] workingset_restore_file 132 [ 648.077234][T32227] syzkaller0: linktype set to 773 [ 648.081413][T32157] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.9008,pid=31822,uid=0 [ 648.097413][T32157] Memory cgroup out of memory: Killed process 31822 (syz.2.9008) total-vm:90308kB, anon-rss:1236kB, file-rss:53316kB, shmem-rss:0kB, UID:0 pgtables:200kB oom_score_adj:1000 [ 648.128849][T32228] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 648.145017][T32228] syzkaller0: linktype set to 773 [ 651.084500][T31835] syz.2.9008 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 651.326354][T31835] CPU: 0 PID: 31835 Comm: syz.2.9008 Tainted: G W syzkaller #0 [ 651.335308][T31835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 651.345358][T31835] Call Trace: [ 651.348654][T31835] __dump_stack+0x21/0x24 [ 651.352975][T31835] dump_stack_lvl+0x1a7/0x208 [ 651.357644][T31835] ? show_regs_print_info+0x18/0x18 [ 651.362836][T31835] ? ___ratelimit+0x3de/0x560 [ 651.367510][T31835] ? _raw_spin_lock+0x94/0xf0 [ 651.372472][T31835] dump_stack+0x15/0x1c [ 651.376622][T31835] dump_header+0xdd/0x650 [ 651.380939][T31835] oom_kill_process+0x1fa/0x2c0 [ 651.386000][T31835] out_of_memory+0x93f/0xd20 [ 651.390587][T31835] ? unregister_oom_notifier+0x20/0x20 [ 651.396049][T31835] ? mutex_lock_killable+0x92/0xf0 [ 651.401151][T31835] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 651.407734][T31835] mem_cgroup_out_of_memory+0x2d5/0x3b0 [ 651.413476][T31835] ? mem_cgroup_oom_trylock+0x350/0x350 [ 651.419015][T31835] ? _raw_spin_trylock_bh+0x150/0x150 [ 651.424379][T31835] ? _raw_spin_unlock+0x4d/0x70 [ 651.429216][T31835] ? mem_cgroup_oom_trylock+0x1fc/0x350 [ 651.434831][T31835] try_charge+0xf69/0x1500 [ 651.439237][T31835] ? __memcg_kmem_charge+0x150/0x150 [ 651.444596][T31835] ? get_page_from_freelist+0x223b/0x23d0 [ 651.450306][T31835] ? _raw_spin_trylock+0xb7/0x150 [ 651.455323][T31835] ? read_pages+0x643/0xb60 [ 651.459814][T31835] ? get_mem_cgroup_from_mm+0x197/0x1b0 [ 651.465346][T31835] __mem_cgroup_charge+0x14c/0x6d0 [ 651.470444][T31835] __add_to_page_cache_locked+0x1fe/0x9a0 [ 651.476151][T31835] ? __alloc_pages_nodemask+0x290/0x620 [ 651.481681][T31835] ? put_page+0xd0/0xd0 [ 651.485822][T31835] ? workingset_activation+0x250/0x250 [ 651.491263][T31835] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 651.496795][T31835] ? find_get_entry+0x37b/0x3e0 [ 651.501641][T31835] ? page_cache_prev_miss+0x210/0x290 [ 651.507005][T31835] add_to_page_cache_lru+0xa7/0x210 [ 651.512196][T31835] pagecache_get_page+0x700/0x930 [ 651.517212][T31835] filemap_fault+0x1b51/0x20d0 [ 651.521964][T31835] ? generic_file_read_iter+0x5c0/0x5c0 [ 651.527503][T31835] ? filemap_allow_speculation+0x10/0x10 [ 651.533122][T31835] ? __kasan_check_write+0x14/0x20 [ 651.538217][T31835] ext4_filemap_fault+0x8a/0xa0 [ 651.543054][T31835] handle_pte_fault+0x1fa5/0x3750 [ 651.548065][T31835] handle_mm_fault+0xf81/0x1710 [ 651.552914][T31835] ? can_reuse_spf_vma+0xe0/0xe0 [ 651.557850][T31835] ? follow_page_mask+0x7ad/0x1150 [ 651.562949][T31835] __get_user_pages+0xbf8/0x1400 [ 651.567962][T31835] ? populate_vma_page_range+0xf0/0xf0 [ 651.573423][T31835] ? __kasan_check_write+0x14/0x20 [ 651.578522][T31835] get_dump_page+0x160/0x5a0 [ 651.583101][T31835] ? freezing_slow_path+0x10a/0x150 [ 651.588290][T31835] ? __mm_populate+0x440/0x440 [ 651.593044][T31835] ? wait_for_dump_helpers+0x3a0/0x3a0 [ 651.598579][T31835] ? freezing_slow_path+0x10a/0x150 [ 651.603772][T31835] dump_user_range+0x3c/0x1a0 [ 651.608435][T31835] elf_core_dump+0x2866/0x2cc0 [ 651.613189][T31835] ? load_elf_binary+0x28e0/0x28e0 [ 651.618286][T31835] ? __fsnotify_parent+0x6db/0x7c0 [ 651.623490][T31835] ? do_truncate+0x1c6/0x240 [ 651.628159][T31835] ? putname+0xfe/0x150 [ 651.632307][T31835] ? __kasan_check_read+0x11/0x20 [ 651.637332][T31835] ? cgroup_freezing+0x86/0xb0 [ 651.642166][T31835] ? freezing_slow_path+0x10a/0x150 [ 651.647354][T31835] do_coredump+0x1ba3/0x28e0 [ 651.651981][T31835] ? simple_acl_create+0x1c0/0x1c0 [ 651.657076][T31835] ? debug_smp_processor_id+0x17/0x20 [ 651.662453][T31835] ? kmem_cache_free+0x100/0x2d0 [ 651.667374][T31835] ? ____kasan_slab_free+0x130/0x160 [ 651.672734][T31835] ? get_signal+0xb98/0x12e0 [ 651.677311][T31835] ? kmem_cache_free+0x100/0x2d0 [ 651.682237][T31835] get_signal+0xf23/0x12e0 [ 651.686684][T31835] arch_do_signal_or_restart+0xe2/0x11d0 [ 651.692306][T31835] ? send_signal+0x3b1/0x590 [ 651.696883][T31835] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 651.702500][T31835] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 651.708293][T31835] ? force_sig+0xca/0x120 [ 651.712706][T31835] ? send_sig+0x70/0x70 [ 651.716852][T31835] exit_to_user_mode_loop+0xa2/0xe0 [ 651.722035][T31835] exit_to_user_mode_prepare+0x76/0xa0 [ 651.727489][T31835] irqentry_exit_to_user_mode+0x9/0x10 [ 651.732934][T31835] irqentry_exit+0x12/0x60 [ 651.737337][T31835] exc_general_protection+0x1ca/0x250 [ 651.742697][T31835] ? debug_smp_processor_id+0x17/0x20 [ 651.748062][T31835] ? asm_exc_general_protection+0x8/0x30 [ 651.753693][T31835] asm_exc_general_protection+0x1e/0x30 [ 651.759636][T31835] RIP: 0033:0x7f7ea23a4631 [ 651.764041][T31835] Code: 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 651.783637][T31835] RSP: 002b:00002000000004e0 EFLAGS: 00010217 [ 651.789697][T31835] RAX: 0000000000000000 RBX: 00007f7ea261e090 RCX: 00007f7ea23a4629 [ 651.797672][T31835] RDX: 0000200000000500 RSI: 00002000000004e0 RDI: 0000000002040000 [ 651.805632][T31835] RBP: 00007f7ea243ab39 R08: 0000200000000580 R09: 0000200000000580 [ 651.813597][T31835] R10: 0000200000000540 R11: 0000000000000206 R12: 0000000000000000 [ 651.821559][T31835] R13: 00007f7ea261e128 R14: 00007f7ea261e090 R15: 00007ffd07a50f88 [ 651.861400][T31835] memory: usage 57612kB, limit 307200kB, failcnt 15886 [ 652.016759][T31835] memory+swap: usage 52804kB, limit 9007199254740988kB, failcnt 0 [ 652.033246][T31835] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 652.063953][T31835] Memory cgroup stats for /syz2: [ 652.064075][T31835] anon 135168 [ 652.064075][T31835] file 31494144 [ 652.064075][T31835] kernel_stack 0 [ 652.064075][T31835] percpu 0 [ 652.064075][T31835] sock 0 [ 652.064075][T31835] shmem 31629312 [ 652.064075][T31835] file_mapped 135168 [ 652.064075][T31835] file_dirty 0 [ 652.064075][T31835] file_writeback 0 [ 652.064075][T31835] anon_thp 0 [ 652.064075][T31835] inactive_anon 30498816 [ 652.064075][T31835] active_anon 1486848 [ 652.064075][T31835] inactive_file 86016 [ 652.064075][T31835] active_file 0 [ 652.064075][T31835] unevictable 0 [ 652.064075][T31835] slab_reclaimable 0 [ 652.064075][T31835] slab_unreclaimable 0 [ 652.064075][T31835] slab 0 [ 652.064075][T31835] workingset_refault_anon 0 [ 652.064075][T31835] workingset_refault_file 2706 [ 652.064075][T31835] workingset_activate_anon 0 [ 652.064075][T31835] workingset_activate_file 1287 [ 652.064075][T31835] workingset_restore_anon 0 [ 652.064075][T31835] workingset_restore_file 264 [ 652.180942][T31835] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.9008,pid=31787,uid=0 [ 652.200105][T31835] Memory cgroup out of memory: OOM victim 31787 (syz.2.9008) is already exiting. Skip killing the task [ 652.215590][T32353] bridge0: port 1(bridge_slave_0) entered blocking state [ 652.223082][T32353] bridge0: port 1(bridge_slave_0) entered disabled state [ 652.230524][T32353] device bridge_slave_0 entered promiscuous mode [ 652.454581][T32353] bridge0: port 2(bridge_slave_1) entered blocking state [ 652.471042][T32353] bridge0: port 2(bridge_slave_1) entered disabled state [ 652.486055][T32353] device bridge_slave_1 entered promiscuous mode [ 652.853304][T32353] bridge0: port 2(bridge_slave_1) entered blocking state [ 652.860371][T32353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 652.867766][T32353] bridge0: port 1(bridge_slave_0) entered blocking state [ 652.874803][T32353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 653.056051][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 653.063502][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 653.071068][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 653.078602][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 653.094634][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 653.103296][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 653.110453][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 653.152596][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 653.171880][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 653.187001][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 653.194065][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 653.205036][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 653.213083][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 653.269801][T32353] device veth0_vlan entered promiscuous mode [ 653.281316][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 653.293608][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 653.302008][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 653.309658][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 653.338031][T32353] device veth1_macvtap entered promiscuous mode [ 653.385394][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 653.422385][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 653.452007][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 653.557679][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 653.566822][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 653.575536][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 653.583795][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 653.854675][T32455] device syzkaller0 entered promiscuous mode [ 654.076303][T32467] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 654.119628][T32467] device syzkaller0 entered promiscuous mode [ 654.306278][T32474] device syzkaller0 entered promiscuous mode [ 654.545820][T32481] bridge0: port 1(bridge_slave_0) entered blocking state [ 654.577314][T32481] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.585018][T32481] device bridge_slave_0 entered promiscuous mode [ 654.664561][T32481] bridge0: port 2(bridge_slave_1) entered blocking state [ 654.671718][T32481] bridge0: port 2(bridge_slave_1) entered disabled state [ 654.680930][T32481] device bridge_slave_1 entered promiscuous mode [ 655.080313][T32481] bridge0: port 2(bridge_slave_1) entered blocking state [ 655.087554][T32481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 655.094863][T32481] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.101897][T32481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 655.127583][T32534] device syzkaller0 entered promiscuous mode [ 655.171309][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 655.188864][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 655.196385][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 655.214077][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 655.225240][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.232310][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 655.245245][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 655.253886][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 655.260938][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 655.304493][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 655.315634][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 655.332986][ T651] device veth1_macvtap left promiscuous mode [ 655.342885][ T651] device veth0_vlan left promiscuous mode [ 655.501541][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 655.510132][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 655.524748][T32570] device aaaaaaaaaaaaaaa entered promiscuous mode [ 655.542604][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 655.551153][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 655.568232][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 655.578193][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 655.594354][T32481] device veth0_vlan entered promiscuous mode [ 655.614812][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 655.623203][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 655.642757][T32481] device veth1_macvtap entered promiscuous mode [ 655.651232][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 655.660219][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 655.668647][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 655.678756][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 655.687449][ T310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 655.722452][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 655.740453][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 656.847024][T32634] device syzkaller0 entered promiscuous mode [ 657.100914][T32659] device syzkaller0 entered promiscuous mode [ 657.914396][ T651] device vlan1 left promiscuous mode [ 657.941517][ T651] : port 1(vlan1) entered disabled state [ 657.978746][ T651] device bridge_slave_1 left promiscuous mode [ 658.043739][ T651] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.101983][ T651] device bridge_slave_0 left promiscuous mode [ 658.146205][ T651] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.182138][ T651] device veth1_macvtap left promiscuous mode [ 658.188158][ T651] device veth0_vlan left promiscuous mode [ 658.784210][T32741] device syzkaller0 entered promiscuous mode [ 660.550073][ T400] bridge0: port 2(bridge_slave_1) entered disabled state [ 660.561367][ T400] bridge0: port 1(bridge_slave_0) entered disabled state [ 660.847018][ T404] device bridge_slave_1 left promiscuous mode [ 660.881630][ T404] bridge0: port 2(bridge_slave_1) entered disabled state [ 660.890677][ T404] device bridge_slave_0 left promiscuous mode [ 660.897524][ T404] bridge0: port 1(bridge_slave_0) entered disabled state [ 660.949931][ T413] device syzkaller0 entered promiscuous mode [ 661.066263][ T436] device veth0_vlan left promiscuous mode [ 661.107278][ T436] device veth0_vlan entered promiscuous mode [ 661.134242][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 661.142488][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 661.150074][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 661.228770][ T458] device veth0_vlan left promiscuous mode [ 661.262889][ T458] device veth0_vlan entered promiscuous mode [ 661.304830][ T481] device syzkaller0 entered promiscuous mode [ 661.346339][ T484] device syzkaller0 entered promiscuous mode [ 662.716568][ T602] device syzkaller0 entered promiscuous mode [ 664.068498][ T705] device syzkaller0 entered promiscuous mode [ 664.497469][ T738] device syzkaller0 entered promiscuous mode [ 664.741699][ T776] device vlan0 entered promiscuous mode [ 665.101287][ T811] pimreg1: tun_chr_ioctl cmd 1074025692 [ 665.228991][ T828] bridge0: port 2(bridge_slave_1) entered disabled state [ 665.246679][ T828] bridge0: port 1(bridge_slave_0) entered disabled state [ 665.567853][ T845] =0,off=0,: renamed from vlan1 [ 665.582087][ T846] tap0: tun_chr_ioctl cmd 1074025677 [ 665.592460][ T846] tap0: linktype set to 804 [ 665.621624][ T835] tap0: tun_chr_ioctl cmd 1074025694 [ 665.679180][ T849] device syzkaller0 entered promiscuous mode [ 666.232409][ T876] bridge0: port 2(bridge_slave_1) entered blocking state [ 666.239990][ T876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 666.247358][ T876] bridge0: port 1(bridge_slave_0) entered blocking state [ 666.254681][ T876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 666.412825][ T876] device bridge0 entered promiscuous mode [ 666.545443][ T898] device syzkaller0 entered promiscuous mode [ 667.055637][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 668.704356][ T973] device wg2 entered promiscuous mode [ 669.129575][ T1018] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 669.998768][ T1063] device syzkaller0 entered promiscuous mode [ 670.240330][ T1083] device syzkaller0 entered promiscuous mode [ 670.505705][ T1102] device syzkaller0 entered promiscuous mode [ 671.503179][ T1131] syz.4.9510[1131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 671.503238][ T1131] syz.4.9510[1131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 672.991510][ T1223] device syzkaller0 entered promiscuous mode [ 673.210976][ T1229] device syzkaller0 entered promiscuous mode [ 673.758098][ T1273] device syzkaller0 entered promiscuous mode [ 674.343996][ T1315] device syzkaller0 entered promiscuous mode [ 676.582628][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 676.611980][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 676.643848][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): =0,off=0,: link becomes ready [ 678.271624][ T1450] device syzkaller0 entered promiscuous mode [ 679.554794][ T1535] syz.1.9627[1535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 679.554882][ T1535] syz.1.9627[1535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 679.578845][ T1538] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 681.189916][ T1630] device syzkaller0 entered promiscuous mode [ 685.670983][ T1780] device syzkaller0 entered promiscuous mode [ 686.381436][ T1843] pimreg0: tun_chr_ioctl cmd 35111 [ 687.845969][ T1932] tap0: tun_chr_ioctl cmd 1074025681 [ 687.875438][ T1932] tap0: tun_chr_ioctl cmd 35092 [ 690.032728][ T2008] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 690.684691][ T307] ------------[ cut here ]------------ [ 690.690190][ T307] kernel BUG at kernel/bpf/arraymap.c:993! [ 690.714984][ T307] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 690.721071][ T307] CPU: 0 PID: 307 Comm: kworker/0:82 Tainted: G W syzkaller #0 [ 690.729913][ T307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 690.739977][ T307] Workqueue: events prog_array_map_clear_deferred [ 690.746656][ T307] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 690.752889][ T307] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 38 63 e9 ff 0f 0b e9 78 f9 ff ff e8 2c 63 e9 ff 0f 0b e8 25 63 e9 ff <0f> 0b e8 1e 63 e9 ff 0f 0b e8 17 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 690.772496][ T307] RSP: 0018:ffffc90001647c18 EFLAGS: 00010293 [ 690.778556][ T307] RAX: ffffffff817b532b RBX: ffff888112c8e050 RCX: ffff88811e53a780 [ 690.786524][ T307] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 690.794573][ T307] RBP: ffffc90001647c98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 690.802543][ T307] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 690.810589][ T307] R13: ffff888114982880 R14: 0000000000000001 R15: ffff888114982800 [ 690.818536][ T307] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 690.827436][ T307] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 690.834087][ T307] CR2: 00002000001fd000 CR3: 0000000110792000 CR4: 00000000003506b0 [ 690.842042][ T307] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000200000000300 [ 690.849987][ T307] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 690.857938][ T307] Call Trace: [ 690.861221][ T307] ? bpf_prog_abc0298cba7e4453+0xb/0x724 [ 690.866843][ T307] fd_array_map_delete_elem+0x14c/0x250 [ 690.872383][ T307] prog_array_map_clear_deferred+0x9e/0x140 [ 690.878258][ T307] process_one_work+0x6e1/0xba0 [ 690.883086][ T307] worker_thread+0xa6a/0x13c0 [ 690.887741][ T307] kthread+0x346/0x3d0 [ 690.891781][ T307] ? worker_clr_flags+0x190/0x190 [ 690.896776][ T307] ? kthread_blkcg+0xd0/0xd0 [ 690.901340][ T307] ret_from_fork+0x1f/0x30 [ 690.905725][ T307] Modules linked in: [ 690.939329][ T307] ---[ end trace b21043bc9e76dd56 ]--- [ 690.954465][ T307] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 691.001324][ T307] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 38 63 e9 ff 0f 0b e9 78 f9 ff ff e8 2c 63 e9 ff 0f 0b e8 25 63 e9 ff <0f> 0b e8 1e 63 e9 ff 0f 0b e8 17 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 691.064167][ T307] RSP: 0018:ffffc90001647c18 EFLAGS: 00010293 [ 691.070437][ T307] RAX: ffffffff817b532b RBX: ffff888112c8e050 RCX: ffff88811e53a780 [ 691.078660][ T307] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 691.086794][ T307] RBP: ffffc90001647c98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 691.094995][ T307] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 691.103213][ T307] R13: ffff888114982880 R14: 0000000000000001 R15: ffff888114982800 [ 691.137885][ T307] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 691.147691][ T307] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 691.161383][ T307] CR2: 0000000000000000 CR3: 0000000124faf000 CR4: 00000000003506b0 [ 691.179502][ T307] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000200000000300 [ 691.197792][ T307] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 691.206057][ T307] Kernel panic - not syncing: Fatal exception [ 691.212398][ T307] Kernel Offset: disabled [ 691.216891][ T307] Rebooting in 86400 seconds..